Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    97s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2024, 11:00

General

  • Target

    6f803ef93ff43f7ca1c58a4da0a93e0f.exe

  • Size

    5.2MB

  • MD5

    6f803ef93ff43f7ca1c58a4da0a93e0f

  • SHA1

    edfcb91cfc368a096541393cbea32fc42954336b

  • SHA256

    bda2b27d917dc919d2df7f2768a5d20f4f554e6f0eeb687f5ac45b53aecbb2f3

  • SHA512

    9a6b30821cb36ed1634bd9f962bf4c71a61ccff8ec67c317dab3655104faad9f62ec869a4a1c9032f218308d77e0b26c1a0f08c777109faad17e0037ef684235

  • SSDEEP

    98304:yYgYhpOqywS4gcAXVaOjV3XdUsLATs6QlSnAg268nrzbYq5BKyKjc6I6uY0aeF:yYNdyoXAXVaO3muP9l8AgJmzkq5oyKPU

Malware Config

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

redline

Botnet

pub1

C2

viacetequn.site:80

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 3 IoCs
  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f803ef93ff43f7ca1c58a4da0a93e0f.exe
    "C:\Users\Admin\AppData\Local\Temp\6f803ef93ff43f7ca1c58a4da0a93e0f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4656
      • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS032D7237\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1424
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Mon00a4b905d6fcf0a9.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4608
          • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00a4b905d6fcf0a9.exe
            Mon00a4b905d6fcf0a9.exe
            5⤵
            • Executes dropped EXE
            PID:4404
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 1856
              6⤵
              • Program crash
              PID:1576
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Mon0001207aa1161f.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1328
          • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon0001207aa1161f.exe
            Mon0001207aa1161f.exe
            5⤵
            • Executes dropped EXE
            PID:2444
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 564
          4⤵
          • Program crash
          PID:3224
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Mon0015a1e17ea5.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3796
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Mon00b1849cf0bf91e9.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3184
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Mon00e8b91b250904.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3424
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Mon00271bbb5e.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1300
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Mon00f61d292f523.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2144
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Mon001af0f6251.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4420
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Mon000d7b2b59b9.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3436
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1248
  • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon001af0f6251.exe
    Mon001af0f6251.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4292
  • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00f61d292f523.exe
    Mon00f61d292f523.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1744
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3136
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1424 -ip 1424
    1⤵
      PID:4156
    • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00e8b91b250904.exe
      Mon00e8b91b250904.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2416
    • C:\Windows\SysWOW64\dllhost.exe
      dllhost.exe
      1⤵
        PID:4832
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Sfaldavano.xls
        1⤵
          PID:4212
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            2⤵
              PID:1684
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com
                Amica.exe.com Y
                3⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2568
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y
                  4⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:3688
              • C:\Windows\SysWOW64\PING.EXE
                ping VFMDDVWB -n 30
                3⤵
                • Runs ping.exe
                PID:4268
              • C:\Windows\SysWOW64\findstr.exe
                findstr /V /R "^fARmmICHAETEVIAiewsqLILJhRoBwBFrurUNyycHHdHtUkLfezrMoLJHPojHmwGYYPnRONeXFJaxqGOwySnHnTVxzjYWSOiGKIutNTBfsuin$" Serravano.xls
                3⤵
                  PID:2824
            • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon000d7b2b59b9.exe
              "C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon000d7b2b59b9.exe" -a
              1⤵
              • Executes dropped EXE
              PID:4324
            • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00b1849cf0bf91e9.exe
              Mon00b1849cf0bf91e9.exe
              1⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:3056
            • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00271bbb5e.exe
              Mon00271bbb5e.exe
              1⤵
              • Executes dropped EXE
              PID:2212
            • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon0015a1e17ea5.exe
              Mon0015a1e17ea5.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2752
            • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon000d7b2b59b9.exe
              Mon000d7b2b59b9.exe
              1⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:4528
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4404 -ip 4404
              1⤵
                PID:5044

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\4soCukMn\KLviOpPTl8P8.zip

                Filesize

                38KB

                MD5

                5b90cb10b77ab38849752f940e1c8024

                SHA1

                24ffd33e74bc16899b694688fafe3323831a3300

                SHA256

                1fa1c92b73c90263161244e3c6f75270f6ad1a0a460317487c56ff448db3dde6

                SHA512

                aede1ecb5cd4ef42846cc3e6442514d82a0e6c188e4d45d58542358a2eceaa6aea9d133b857ade532c6e8689b96bf4ef26814110724cb332bbf8361d259cda03

              • C:\Users\Admin\AppData\Local\Temp\4soCukMn\_Files\_Information.txt

                Filesize

                4KB

                MD5

                89eb1d3b678be100766ab669bebb4c1e

                SHA1

                21973874746a3ada0ff4376ae8dc6f175a77abea

                SHA256

                3d36c44f9851cba7e2775dfdb0c30430776f8f7dd2d87fa646f8578080eb18b1

                SHA512

                c86a41781e278aae4f56b4f94302b0369994eebcba6e5d7219aff430ac437a266f461ddf566dbb72be714bdeb4874ade6b1bee13cf098759d72a86666b670634

              • C:\Users\Admin\AppData\Local\Temp\4soCukMn\_Files\_Information.txt

                Filesize

                6KB

                MD5

                3c2e89923a43bc0288cbd4afc795983d

                SHA1

                05af8225df0c76acd39242b7ad333b1a310fbf9f

                SHA256

                4cabb6bb863eaafb0898884d09a3246ae1753dd98c24775563136d0579095c8d

                SHA512

                2b35106c61d1027e11e3abb64f73db93ca895b73922b7c5e4d6b0581e2cc2aaa5022bed1cf394dde62b3987924231d33eb453579c15d0d7d845367b74ba24049

              • C:\Users\Admin\AppData\Local\Temp\4soCukMn\_Files\_Screen_Desktop.jpeg

                Filesize

                44KB

                MD5

                97b4eb46a856e6abcbfc0cb1103c5112

                SHA1

                1805f6ea329f8cfb70f100fa2c328ea6c363275e

                SHA256

                b44c9be116344d0a4d72a8499c376340bf7105b73a3b88d859c5656d36fc60f2

                SHA512

                646ac738f0a5c0445861a58f8e48d6bc24b34879bd2ddf4d2ab69e1237f7fe4aea9a8f154a5a99d56f5f9d807031f579b0642590cf884afbe6f46b38b5a0b137

              • C:\Users\Admin\AppData\Local\Temp\4soCukMn\files_\system_info.txt

                Filesize

                4KB

                MD5

                2ffc4caf5ec8117c00973056d7f349b2

                SHA1

                60b1f5602234c3ec553e81648f9132aaa8ffce14

                SHA256

                cc69965ef5ac55c3056ead2c5f47374a8186944934fd1b1712c833c9142c4448

                SHA512

                986f7585de4595a9b443fa1e791fbb1eaf39e957fef2a8593dcd1e2d4cbdab7ef6043b8e6ef913042e26863de5691365aa696587cc8c5dd3db08e39abdd22d8f

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon0001207aa1161f.exe

                Filesize

                1.3MB

                MD5

                57d883f2e96dccb2ca2867cb858151f8

                SHA1

                09e0fcd15cc69bcd6a9ef2928c4054d754b1aaa3

                SHA256

                c1dc7829e850ff7189e993b6f2bd3b00d56f3ec062da364e8698fd39e79f0072

                SHA512

                2235866e39dccc8cd524592f6f0b514878bf0c5ad13ee95bd01508766eb789528394bf329faee481d81e3fe389664fb5673d214d478cda58f4293bfe58ba4012

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon000d7b2b59b9.exe

                Filesize

                56KB

                MD5

                c0d18a829910babf695b4fdaea21a047

                SHA1

                236a19746fe1a1063ebe077c8a0553566f92ef0f

                SHA256

                78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98

                SHA512

                cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon0015a1e17ea5.exe

                Filesize

                8KB

                MD5

                408f2c9252ad66429a8d5401f1833db3

                SHA1

                3829d2d03a728ecd59b38cc189525220a60c05db

                SHA256

                890db580fac738971bc7c714735ff6f1f2ee31edccd7881044da3e98452af664

                SHA512

                d4c89dfd928023b9f4380808b27e032342d2a85963b95bbed3191cc03b455dbc6f5ffecf29828a53b1d9011b3881f1cda9d15d269a2cbcbd4be5c993bcd9643b

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon001af0f6251.exe

                Filesize

                236KB

                MD5

                7de877618ab2337aa32901030365b2ff

                SHA1

                adb006662ec67e244d2d9c935460c656c3d47435

                SHA256

                989079a8616a9e5c4f77c0e86b89d170dc7b8c4bf23768111f8e0d60e2c29da7

                SHA512

                b7f9b402baad41e8e9df1db856b2273b64dd603b6c5bae147979fbff215af79b1d261cdd89f0eb050c7ef3db820bb0207decd58fbc7f9a8d4ffb179133a7c8ff

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00271bbb5e.exe

                Filesize

                1.5MB

                MD5

                df80b76857b74ae1b2ada8efb2a730ee

                SHA1

                5653be57533c6eb058fed4963a25a676488ef832

                SHA256

                5545c43eb14b0519ab997673efa379343f98d2b6b1578d9fdeb369234789f9dd

                SHA512

                060b04536003ce4a91e5847d487701eed7e093408e427198be552f0af37aee498929586f3a0110c78173873a28d95c6c0a4cdd01c7218274f5849a4730f9efdd

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00a4b905d6fcf0a9.exe

                Filesize

                572KB

                MD5

                6dba60503ea60560826fe5a12dced3e9

                SHA1

                7bb04d508e970701dc2945ed42fe96dbb083ec33

                SHA256

                8d49f82aaa8eb3dfa5c7d7dffd7efb9dd6b776ef08b8b8c5afc6cb8ab0743865

                SHA512

                837c0f0dc70386ce1d143332e4d273750f64dd7f8be5b4ce79aa39628ceebf27d01e447ed0b9ec6064c6ba9dbaa13a64631c2e136ec99d27c0f4a25681053ff9

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00b1849cf0bf91e9.exe

                Filesize

                1.5MB

                MD5

                5f0617b7287c5f217e89b9407284736e

                SHA1

                64db3f9ceedda486648db13b4ed87e868c9192ca

                SHA256

                b0560993c8b7df45ede6031471dee138a335c428dd16454570ffa1b66175aa2a

                SHA512

                6367d9f5749260b326328f2ca455cbb22fc4696f44e61fab7616e39471742afbce26b69ed3ffb27f4d9cad7b643a50b54aea5f33892f0422d331ca76b6ea05b9

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00e8b91b250904.exe

                Filesize

                156KB

                MD5

                cda12ae37191467d0a7d151664ed74aa

                SHA1

                2625b2e142c848092aa4a51584143ab7ed7d33d2

                SHA256

                1e07bb767e9979d4afa4f8d69b68e33dd7c1a43f6863096a2b091047a10cdc2e

                SHA512

                77c4429e22754e50828d9ec344cd63780acd31c350ef16ef69e2a396114df10e7c43d791440faee90e7f80be73e845ab579fd7b38efbd12f5de11bbc906f1c1d

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00f61d292f523.exe

                Filesize

                248KB

                MD5

                d23c06e25b4bd295e821274472263572

                SHA1

                9ad295ec3853dc465ae77f9479f8c4f76e2748b8

                SHA256

                f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c

                SHA512

                122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\libcurl.dll

                Filesize

                218KB

                MD5

                d09be1f47fd6b827c81a4812b4f7296f

                SHA1

                028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                SHA256

                0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                SHA512

                857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\libcurlpp.dll

                Filesize

                54KB

                MD5

                e6e578373c2e416289a8da55f1dc5e8e

                SHA1

                b601a229b66ec3d19c2369b36216c6f6eb1c063e

                SHA256

                43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                SHA512

                9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\libgcc_s_dw2-1.dll

                Filesize

                113KB

                MD5

                9aec524b616618b0d3d00b27b6f51da1

                SHA1

                64264300801a353db324d11738ffed876550e1d3

                SHA256

                59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                SHA512

                0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\libstdc++-6.dll

                Filesize

                647KB

                MD5

                5e279950775baae5fea04d2cc4526bcc

                SHA1

                8aef1e10031c3629512c43dd8b0b5d9060878453

                SHA256

                97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                SHA512

                666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\libwinpthread-1.dll

                Filesize

                69KB

                MD5

                1e0d62c34ff2e649ebc5c372065732ee

                SHA1

                fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                SHA256

                509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                SHA512

                3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

              • C:\Users\Admin\AppData\Local\Temp\7zS032D7237\setup_install.exe

                Filesize

                2.1MB

                MD5

                f69dc484a152f3e9f551fb34fbf15604

                SHA1

                414ff10cdf2642172c0ec9cd28612a41facb95a9

                SHA256

                031461d720fc1807aaf0ddb8410fc9cc7b154aac6f585f28d73ebf77d8093e82

                SHA512

                ebb6a154d3b95be2d956ef738640709ecc56a80280adc32efcc029c844cf6aa97ef223b4b7602701358bc36fcac7af49ba37962aa5068a70b70b002e4a33013e

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com

                Filesize

                14KB

                MD5

                c33dad8348217ffcfdefa352dc93e1de

                SHA1

                795e9f77aa41a0485e7b5f3c23e5326bcc86dd8e

                SHA256

                4f100280e559747a9eb8339d315e921f48f2ea51e4c01117e5eb36e846fc4303

                SHA512

                395c3136e0255e348761c7a6c2d38ce439ddf15516ad48199093965665d822a2a3cb592bd9c5630a32e7b53c438ec4cb21f4cea7205320990b30fad952426213

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com

                Filesize

                602KB

                MD5

                44f72d9c2fe5b601a078cb6acdc67fd4

                SHA1

                308d501f27df34d4ac3ae7b187a61babec147a0b

                SHA256

                5542d500b58c4fecb241d5a82393ca06badcf6215e01d3cee6512c543bab396f

                SHA512

                7e5801e9619abbcd9d8cad1db3092a8ea1bf2f00bcb246a32b43ab85b15b9b1214d91327ac6a0e1ac61ed83bd48994054443705edacb3847a2ba0328e1fe90ba

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com

                Filesize

                872KB

                MD5

                c56b5f0201a3b3de53e561fe76912bfd

                SHA1

                2a4062e10a5de813f5688221dbeb3f3ff33eb417

                SHA256

                237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                SHA512

                195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Dov.xls

                Filesize

                104KB

                MD5

                3c6cee4070cb904d41443c7350a14697

                SHA1

                56920bfeb94f291549aebe3bf30ee8b78a4544e8

                SHA256

                356990a014e848b22da6817ead39bc3be46eb417e156d2c7677e780db2831bc8

                SHA512

                f29759ebd59c4daa4abc61fd9c06db808eea5c044c915472244997870d0d3fb45b2b1a98be5c98ebfe1648beb0117164598fffeb886c2ef4ab23401271ca807a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Serravano.xls

                Filesize

                137KB

                MD5

                aa44cdf439e12f29c710ab824d0b231c

                SHA1

                66c324067da7d35e0bb89a0f3adb2cf61e556db2

                SHA256

                4ebc5ad89666c566789b383322fe4dca4aa4f91235eac19d3cd75687da85ebc1

                SHA512

                058b0a692dd36cdf2f2e3881ba8bbaee1dd03f1e0914d167af735cd0db855b80083fdc8a8c1b8b6a7fb2ca58118b2d38898944822d2ef5085623bed3bcdfb333

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sfaldavano.xls

                Filesize

                526B

                MD5

                26ebbe10f1e4b7581ee0137b3263c744

                SHA1

                7f5b7949216744cbe8cde40f8b4762224cce8cc0

                SHA256

                376c16f256225ebadc257dab804c5bfbc1dde251a7aea7b55239d30261098495

                SHA512

                48014f2f9de728f0d5af3b072a11552e798e6de07f86ed2ff6448b7ac3dbacf582801ee128a175d17df2be9e0d7c27caf6dc455b4b4f5786868567aa41a4f8ed

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tornano.xls

                Filesize

                317KB

                MD5

                6a5cdee01b20ba4a69eb575f4a82d95e

                SHA1

                21de0abbcfd80a420f7ebf062b086f93078c8d41

                SHA256

                2789946dcab07cd376d471191ba08fadccc6e4cbf2b0331ef4632055989aaf4a

                SHA512

                edf9436851deef79415dc9c2dc80c9ee9fb2187bd5bf6112f91080cc5f46c898131f99a088889e3741de120b9736b02ed7d9a8e8af05accefbe54e4d740b7b17

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Y

                Filesize

                7KB

                MD5

                59c1a0e040bc2147708982117381c7b0

                SHA1

                b7ab1ba81078292a77285ce1d965c07ba9710500

                SHA256

                7879606f9e1273fb78348a444e43b7d783a2d56a06f0c8ea98f6d72b181a0e2e

                SHA512

                522928999a1c84337b280402bfc75998c1082d37b8e167b069a557d479fb89d59c6d8fc8a4cbff0a54dffa84380611cf77d7952f578a95814bc8ea5aa46d0318

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hjpg5css.ml5.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe

                Filesize

                4.8MB

                MD5

                a3b27ac1b878a79530e9701746d842d4

                SHA1

                47d544d03e00dd2b3e22e7e18566a354bbfc1d04

                SHA256

                7e5e878be8ef8a06761f9a564a470a44d52871fe4b506e30c3141605eae1479f

                SHA512

                75324f94f6b8175021c5189207190ff4f60fb90db4fa4182c69f35370c6f282c845086200ec29848f0ce8213dc3d276a3c85597e0cb3afcd7eee845e97f03c63

              • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe

                Filesize

                5.2MB

                MD5

                71e2cf4709767eab8e0e6dcd8f19d37c

                SHA1

                0641acedc06c13a17d94968e3237c4d9533fc0b9

                SHA256

                077ac4018bc25a85796c54e06872071d561df272188dde34daca7e5d01e950fd

                SHA512

                686cae3db08ad1c7beaf13758a74cae4eb4084d152be49510c11a13010cbb27a1407657fab57d0d732648e91e21862c0604a9ad789e55bcac803fc7be6b4b675

              • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe

                Filesize

                5.1MB

                MD5

                125392396db5b5bf3c34b4dafd0010f6

                SHA1

                1d1e7bbebc70726d2accf837e9d878f00645d527

                SHA256

                1f1c3a64dbdbb64843963e642b10599916177ab0b2e28e40a7fcb30c88945e01

                SHA512

                3c062aa3d8f9455e72f3445aca362bd4a5200b118e5d6835d1a360d327916a33dc539addefdf4b9060d838ccc04a16ba62d0a8b1de0afc80c9c297f7877e580a

              • memory/1424-72-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/1424-152-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/1424-151-0x000000006EB40000-0x000000006EB63000-memory.dmp

                Filesize

                140KB

              • memory/1424-63-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/1424-73-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/1424-66-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/1424-71-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/1424-153-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/1424-70-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/1424-150-0x0000000064940000-0x0000000064959000-memory.dmp

                Filesize

                100KB

              • memory/1424-147-0x0000000000400000-0x000000000051B000-memory.dmp

                Filesize

                1.1MB

              • memory/1424-148-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/1424-61-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/1424-64-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/1424-62-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/1424-68-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/1424-69-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/1424-67-0x0000000064940000-0x0000000064959000-memory.dmp

                Filesize

                100KB

              • memory/1424-65-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/1744-113-0x00000000073B0000-0x0000000007954000-memory.dmp

                Filesize

                5.6MB

              • memory/1744-117-0x00000000073A0000-0x00000000073B0000-memory.dmp

                Filesize

                64KB

              • memory/1744-218-0x0000000002DD0000-0x0000000002ED0000-memory.dmp

                Filesize

                1024KB

              • memory/1744-137-0x0000000007F80000-0x0000000007FCC000-memory.dmp

                Filesize

                304KB

              • memory/1744-219-0x00000000073A0000-0x00000000073B0000-memory.dmp

                Filesize

                64KB

              • memory/1744-97-0x0000000002DD0000-0x0000000002ED0000-memory.dmp

                Filesize

                1024KB

              • memory/1744-123-0x00000000072E0000-0x00000000072F2000-memory.dmp

                Filesize

                72KB

              • memory/1744-125-0x0000000007300000-0x000000000733C000-memory.dmp

                Filesize

                240KB

              • memory/1744-103-0x0000000004C40000-0x0000000004C62000-memory.dmp

                Filesize

                136KB

              • memory/1744-143-0x00000000073A0000-0x00000000073B0000-memory.dmp

                Filesize

                64KB

              • memory/1744-144-0x0000000002D70000-0x0000000002D9F000-memory.dmp

                Filesize

                188KB

              • memory/1744-149-0x0000000000400000-0x0000000002CCD000-memory.dmp

                Filesize

                40.8MB

              • memory/1744-122-0x0000000007960000-0x0000000007F78000-memory.dmp

                Filesize

                6.1MB

              • memory/1744-115-0x0000000073010000-0x00000000737C0000-memory.dmp

                Filesize

                7.7MB

              • memory/1744-146-0x00000000080D0000-0x00000000081DA000-memory.dmp

                Filesize

                1.0MB

              • memory/1744-120-0x00000000073A0000-0x00000000073B0000-memory.dmp

                Filesize

                64KB

              • memory/1744-116-0x0000000007220000-0x0000000007240000-memory.dmp

                Filesize

                128KB

              • memory/1744-119-0x00000000073A0000-0x00000000073B0000-memory.dmp

                Filesize

                64KB

              • memory/2416-142-0x000000001B7B0000-0x000000001B7C0000-memory.dmp

                Filesize

                64KB

              • memory/2416-114-0x0000000002950000-0x0000000002972000-memory.dmp

                Filesize

                136KB

              • memory/2416-110-0x00000000009D0000-0x00000000009FC000-memory.dmp

                Filesize

                176KB

              • memory/2416-157-0x00007FFB65060000-0x00007FFB65B21000-memory.dmp

                Filesize

                10.8MB

              • memory/2416-111-0x00007FFB65060000-0x00007FFB65B21000-memory.dmp

                Filesize

                10.8MB

              • memory/2752-215-0x00007FFB65060000-0x00007FFB65B21000-memory.dmp

                Filesize

                10.8MB

              • memory/2752-217-0x0000000002220000-0x0000000002230000-memory.dmp

                Filesize

                64KB

              • memory/2752-95-0x00007FFB65060000-0x00007FFB65B21000-memory.dmp

                Filesize

                10.8MB

              • memory/2752-96-0x0000000002220000-0x0000000002230000-memory.dmp

                Filesize

                64KB

              • memory/2752-91-0x0000000000250000-0x0000000000258000-memory.dmp

                Filesize

                32KB

              • memory/3136-127-0x00000000057B0000-0x0000000005816000-memory.dmp

                Filesize

                408KB

              • memory/3136-207-0x00000000073C0000-0x00000000073CE000-memory.dmp

                Filesize

                56KB

              • memory/3136-159-0x0000000005E60000-0x0000000005E7E000-memory.dmp

                Filesize

                120KB

              • memory/3136-104-0x0000000073010000-0x00000000737C0000-memory.dmp

                Filesize

                7.7MB

              • memory/3136-109-0x0000000002880000-0x00000000028B6000-memory.dmp

                Filesize

                216KB

              • memory/3136-181-0x0000000002940000-0x0000000002950000-memory.dmp

                Filesize

                64KB

              • memory/3136-155-0x0000000002940000-0x0000000002950000-memory.dmp

                Filesize

                64KB

              • memory/3136-185-0x000000006F2F0000-0x000000006F33C000-memory.dmp

                Filesize

                304KB

              • memory/3136-184-0x000000007F6D0000-0x000000007F6E0000-memory.dmp

                Filesize

                64KB

              • memory/3136-183-0x00000000063B0000-0x00000000063E2000-memory.dmp

                Filesize

                200KB

              • memory/3136-195-0x0000000006390000-0x00000000063AE000-memory.dmp

                Filesize

                120KB

              • memory/3136-112-0x0000000005010000-0x0000000005638000-memory.dmp

                Filesize

                6.2MB

              • memory/3136-196-0x0000000006F00000-0x0000000006FA3000-memory.dmp

                Filesize

                652KB

              • memory/3136-118-0x0000000002940000-0x0000000002950000-memory.dmp

                Filesize

                64KB

              • memory/3136-202-0x0000000007830000-0x0000000007EAA000-memory.dmp

                Filesize

                6.5MB

              • memory/3136-203-0x0000000006EB0000-0x0000000006ECA000-memory.dmp

                Filesize

                104KB

              • memory/3136-204-0x0000000007210000-0x000000000721A000-memory.dmp

                Filesize

                40KB

              • memory/3136-205-0x0000000007400000-0x0000000007496000-memory.dmp

                Filesize

                600KB

              • memory/3136-206-0x0000000007390000-0x00000000073A1000-memory.dmp

                Filesize

                68KB

              • memory/3136-126-0x0000000004F70000-0x0000000004F92000-memory.dmp

                Filesize

                136KB

              • memory/3136-208-0x00000000073D0000-0x00000000073E4000-memory.dmp

                Filesize

                80KB

              • memory/3136-209-0x00000000074C0000-0x00000000074DA000-memory.dmp

                Filesize

                104KB

              • memory/3136-210-0x00000000074B0000-0x00000000074B8000-memory.dmp

                Filesize

                32KB

              • memory/3136-213-0x0000000073010000-0x00000000737C0000-memory.dmp

                Filesize

                7.7MB

              • memory/3136-133-0x0000000005820000-0x0000000005886000-memory.dmp

                Filesize

                408KB

              • memory/3136-140-0x0000000005990000-0x0000000005CE4000-memory.dmp

                Filesize

                3.3MB

              • memory/3516-197-0x0000000002F20000-0x0000000002F36000-memory.dmp

                Filesize

                88KB

              • memory/3688-235-0x0000000000690000-0x0000000000733000-memory.dmp

                Filesize

                652KB

              • memory/3688-232-0x0000000000690000-0x0000000000733000-memory.dmp

                Filesize

                652KB

              • memory/3688-233-0x0000000000690000-0x0000000000733000-memory.dmp

                Filesize

                652KB

              • memory/3688-234-0x0000000000690000-0x0000000000733000-memory.dmp

                Filesize

                652KB

              • memory/3688-236-0x0000000000690000-0x0000000000733000-memory.dmp

                Filesize

                652KB

              • memory/3688-237-0x0000000000690000-0x0000000000733000-memory.dmp

                Filesize

                652KB

              • memory/4292-134-0x0000000000400000-0x00000000023A5000-memory.dmp

                Filesize

                31.6MB

              • memory/4292-121-0x00000000024F0000-0x00000000024F9000-memory.dmp

                Filesize

                36KB

              • memory/4292-199-0x0000000000400000-0x00000000023A5000-memory.dmp

                Filesize

                31.6MB

              • memory/4292-156-0x0000000002630000-0x0000000002730000-memory.dmp

                Filesize

                1024KB

              • memory/4404-160-0x0000000000400000-0x00000000023F9000-memory.dmp

                Filesize

                32.0MB

              • memory/4404-141-0x0000000002910000-0x00000000029AD000-memory.dmp

                Filesize

                628KB

              • memory/4404-158-0x0000000002630000-0x0000000002730000-memory.dmp

                Filesize

                1024KB