Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2024, 11:00

General

  • Target

    setup_installer.exe

  • Size

    5.2MB

  • MD5

    71e2cf4709767eab8e0e6dcd8f19d37c

  • SHA1

    0641acedc06c13a17d94968e3237c4d9533fc0b9

  • SHA256

    077ac4018bc25a85796c54e06872071d561df272188dde34daca7e5d01e950fd

  • SHA512

    686cae3db08ad1c7beaf13758a74cae4eb4084d152be49510c11a13010cbb27a1407657fab57d0d732648e91e21862c0604a9ad789e55bcac803fc7be6b4b675

  • SSDEEP

    98304:xwCvLUBsg6N9b/s7w39Zl+M0pVlFT77ekNZarbw8lsI4ZhQZX5ksdE9pvccJ2o3:xNLUCgM5k0vlSl8OZ6sI4ZipbEpvc02a

Malware Config

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

redline

Botnet

pub1

C2

viacetequn.site:80

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 3 IoCs
  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 4 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 496
        3⤵
        • Program crash
        PID:1924
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon0015a1e17ea5.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1960
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon00b1849cf0bf91e9.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4824
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon00e8b91b250904.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4940
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon00271bbb5e.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4516
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon00f61d292f523.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4484
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon00a4b905d6fcf0a9.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4504
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon0001207aa1161f.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4888
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon001af0f6251.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1920
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon000d7b2b59b9.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1676
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:60
  • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00e8b91b250904.exe
    Mon00e8b91b250904.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4936
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2988 -ip 2988
    1⤵
      PID:5108
    • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00a4b905d6fcf0a9.exe
      Mon00a4b905d6fcf0a9.exe
      1⤵
      • Executes dropped EXE
      PID:848
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 1524
        2⤵
        • Program crash
        PID:1760
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4992
    • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon0001207aa1161f.exe
      Mon0001207aa1161f.exe
      1⤵
      • Executes dropped EXE
      PID:2716
    • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00b1849cf0bf91e9.exe
      Mon00b1849cf0bf91e9.exe
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Windows\SysWOW64\dllhost.exe
        dllhost.exe
        2⤵
          PID:3460
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Sfaldavano.xls
          2⤵
            PID:2880
            • C:\Windows\SysWOW64\cmd.exe
              cmd
              3⤵
                PID:3028
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V /R "^fARmmICHAETEVIAiewsqLILJhRoBwBFrurUNyycHHdHtUkLfezrMoLJHPojHmwGYYPnRONeXFJaxqGOwySnHnTVxzjYWSOiGKIutNTBfsuin$" Serravano.xls
                  4⤵
                    PID:2940
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com
                    Amica.exe.com Y
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2204
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y
                      5⤵
                      • Executes dropped EXE
                      • Checks processor information in registry
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:5108
                  • C:\Windows\SysWOW64\PING.EXE
                    ping EUCQOBEO -n 30
                    4⤵
                    • Runs ping.exe
                    PID:2132
            • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00f61d292f523.exe
              Mon00f61d292f523.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2480
            • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00271bbb5e.exe
              Mon00271bbb5e.exe
              1⤵
              • Executes dropped EXE
              PID:4036
            • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon000d7b2b59b9.exe
              Mon000d7b2b59b9.exe
              1⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:4684
              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon000d7b2b59b9.exe
                "C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon000d7b2b59b9.exe" -a
                2⤵
                • Executes dropped EXE
                PID:3892
            • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon0015a1e17ea5.exe
              Mon0015a1e17ea5.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:4908
            • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon001af0f6251.exe
              Mon001af0f6251.exe
              1⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              PID:2196
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 848 -ip 848
              1⤵
                PID:4696

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon0001207aa1161f.exe

                Filesize

                1.3MB

                MD5

                57d883f2e96dccb2ca2867cb858151f8

                SHA1

                09e0fcd15cc69bcd6a9ef2928c4054d754b1aaa3

                SHA256

                c1dc7829e850ff7189e993b6f2bd3b00d56f3ec062da364e8698fd39e79f0072

                SHA512

                2235866e39dccc8cd524592f6f0b514878bf0c5ad13ee95bd01508766eb789528394bf329faee481d81e3fe389664fb5673d214d478cda58f4293bfe58ba4012

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon000d7b2b59b9.exe

                Filesize

                56KB

                MD5

                c0d18a829910babf695b4fdaea21a047

                SHA1

                236a19746fe1a1063ebe077c8a0553566f92ef0f

                SHA256

                78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98

                SHA512

                cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon0015a1e17ea5.exe

                Filesize

                8KB

                MD5

                408f2c9252ad66429a8d5401f1833db3

                SHA1

                3829d2d03a728ecd59b38cc189525220a60c05db

                SHA256

                890db580fac738971bc7c714735ff6f1f2ee31edccd7881044da3e98452af664

                SHA512

                d4c89dfd928023b9f4380808b27e032342d2a85963b95bbed3191cc03b455dbc6f5ffecf29828a53b1d9011b3881f1cda9d15d269a2cbcbd4be5c993bcd9643b

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon001af0f6251.exe

                Filesize

                236KB

                MD5

                7de877618ab2337aa32901030365b2ff

                SHA1

                adb006662ec67e244d2d9c935460c656c3d47435

                SHA256

                989079a8616a9e5c4f77c0e86b89d170dc7b8c4bf23768111f8e0d60e2c29da7

                SHA512

                b7f9b402baad41e8e9df1db856b2273b64dd603b6c5bae147979fbff215af79b1d261cdd89f0eb050c7ef3db820bb0207decd58fbc7f9a8d4ffb179133a7c8ff

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00271bbb5e.exe

                Filesize

                1.5MB

                MD5

                df80b76857b74ae1b2ada8efb2a730ee

                SHA1

                5653be57533c6eb058fed4963a25a676488ef832

                SHA256

                5545c43eb14b0519ab997673efa379343f98d2b6b1578d9fdeb369234789f9dd

                SHA512

                060b04536003ce4a91e5847d487701eed7e093408e427198be552f0af37aee498929586f3a0110c78173873a28d95c6c0a4cdd01c7218274f5849a4730f9efdd

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00a4b905d6fcf0a9.exe

                Filesize

                572KB

                MD5

                6dba60503ea60560826fe5a12dced3e9

                SHA1

                7bb04d508e970701dc2945ed42fe96dbb083ec33

                SHA256

                8d49f82aaa8eb3dfa5c7d7dffd7efb9dd6b776ef08b8b8c5afc6cb8ab0743865

                SHA512

                837c0f0dc70386ce1d143332e4d273750f64dd7f8be5b4ce79aa39628ceebf27d01e447ed0b9ec6064c6ba9dbaa13a64631c2e136ec99d27c0f4a25681053ff9

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00b1849cf0bf91e9.exe

                Filesize

                1.5MB

                MD5

                5f0617b7287c5f217e89b9407284736e

                SHA1

                64db3f9ceedda486648db13b4ed87e868c9192ca

                SHA256

                b0560993c8b7df45ede6031471dee138a335c428dd16454570ffa1b66175aa2a

                SHA512

                6367d9f5749260b326328f2ca455cbb22fc4696f44e61fab7616e39471742afbce26b69ed3ffb27f4d9cad7b643a50b54aea5f33892f0422d331ca76b6ea05b9

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00e8b91b250904.exe

                Filesize

                156KB

                MD5

                cda12ae37191467d0a7d151664ed74aa

                SHA1

                2625b2e142c848092aa4a51584143ab7ed7d33d2

                SHA256

                1e07bb767e9979d4afa4f8d69b68e33dd7c1a43f6863096a2b091047a10cdc2e

                SHA512

                77c4429e22754e50828d9ec344cd63780acd31c350ef16ef69e2a396114df10e7c43d791440faee90e7f80be73e845ab579fd7b38efbd12f5de11bbc906f1c1d

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\Mon00f61d292f523.exe

                Filesize

                248KB

                MD5

                d23c06e25b4bd295e821274472263572

                SHA1

                9ad295ec3853dc465ae77f9479f8c4f76e2748b8

                SHA256

                f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c

                SHA512

                122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\libcurl.dll

                Filesize

                218KB

                MD5

                d09be1f47fd6b827c81a4812b4f7296f

                SHA1

                028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                SHA256

                0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                SHA512

                857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\libcurlpp.dll

                Filesize

                54KB

                MD5

                e6e578373c2e416289a8da55f1dc5e8e

                SHA1

                b601a229b66ec3d19c2369b36216c6f6eb1c063e

                SHA256

                43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                SHA512

                9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\libgcc_s_dw2-1.dll

                Filesize

                113KB

                MD5

                9aec524b616618b0d3d00b27b6f51da1

                SHA1

                64264300801a353db324d11738ffed876550e1d3

                SHA256

                59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                SHA512

                0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\libstdc++-6.dll

                Filesize

                647KB

                MD5

                5e279950775baae5fea04d2cc4526bcc

                SHA1

                8aef1e10031c3629512c43dd8b0b5d9060878453

                SHA256

                97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                SHA512

                666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\libwinpthread-1.dll

                Filesize

                69KB

                MD5

                1e0d62c34ff2e649ebc5c372065732ee

                SHA1

                fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                SHA256

                509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                SHA512

                3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

              • C:\Users\Admin\AppData\Local\Temp\7zS4B6C1337\setup_install.exe

                Filesize

                2.1MB

                MD5

                f69dc484a152f3e9f551fb34fbf15604

                SHA1

                414ff10cdf2642172c0ec9cd28612a41facb95a9

                SHA256

                031461d720fc1807aaf0ddb8410fc9cc7b154aac6f585f28d73ebf77d8093e82

                SHA512

                ebb6a154d3b95be2d956ef738640709ecc56a80280adc32efcc029c844cf6aa97ef223b4b7602701358bc36fcac7af49ba37962aa5068a70b70b002e4a33013e

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com

                Filesize

                439KB

                MD5

                e5445cf8a9d9a17f51cb2480bfc3a12d

                SHA1

                e3f0d449586d2de3cc5b99eb04ed68e6bf496f0b

                SHA256

                b307f0113b0aab030c2d87abddbd47b85dab2fd9c6f2d4c94d2cfe2464ea1280

                SHA512

                7a8c9c5d67ea077dfe6c002839188fdcba60844db18caecdc3a77f9f48b337800584f2c4dc694da0141e9271e31b18fca088cf15aea5e1baf81e48350c31a2cb

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com

                Filesize

                320KB

                MD5

                1cc023fee6feb69a54dbfe330b07655b

                SHA1

                a394b32233561e189bf42246b6391d38825fc933

                SHA256

                f065da4ca2d1c98ebe3daaa2018c7451819aa20c7c97f49c0ae9ac1a0205b973

                SHA512

                f714cec6c37e8d3f7b7d9b6b50006d1fce56936455a29423ed96912c30218a816f0f634e77df67ca895ab7394404d3476ce017452bdd84c51d86c9e106c63d61

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com

                Filesize

                872KB

                MD5

                c56b5f0201a3b3de53e561fe76912bfd

                SHA1

                2a4062e10a5de813f5688221dbeb3f3ff33eb417

                SHA256

                237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                SHA512

                195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Dov.xls

                Filesize

                438KB

                MD5

                3cbdfcc98cf6035e4dbbb9e2973408ac

                SHA1

                74109a53790d57a4f556e89d923e3b6e75750a7f

                SHA256

                3eb1635551b5ba5a6da0c24fd53c29d377da2c483da9fe8ab1ab5d8ac7bb15bc

                SHA512

                2ce5556baadf2a761205ea4bc0924d90735640c343dfa1a905436da86cbb9da0729684e0358e185cf9efdf2bedb138d942471f53fcf7458670deda8a118ee03c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Serravano.xls

                Filesize

                520KB

                MD5

                38ca87634efe105eb17cd2f5d66c3de0

                SHA1

                644a5e08590a8542c47702dc358b2a2ba0134d15

                SHA256

                c09c92bcb6e44cf033e547c73a28abcab0e314561f79840f30da42457ec25ca7

                SHA512

                836f57853501e48690f79596db654b2efc6c89a3192ea72bd5f5ce618048406761df361c0717396c99e1e4f0536f686343a695f73adf9ddc7bdee70a5439ae94

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sfaldavano.xls

                Filesize

                526B

                MD5

                26ebbe10f1e4b7581ee0137b3263c744

                SHA1

                7f5b7949216744cbe8cde40f8b4762224cce8cc0

                SHA256

                376c16f256225ebadc257dab804c5bfbc1dde251a7aea7b55239d30261098495

                SHA512

                48014f2f9de728f0d5af3b072a11552e798e6de07f86ed2ff6448b7ac3dbacf582801ee128a175d17df2be9e0d7c27caf6dc455b4b4f5786868567aa41a4f8ed

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tornano.xls

                Filesize

                195KB

                MD5

                c74c9e2a517d576b12d14b458dd37fa1

                SHA1

                232ae8fbc817142372c5000d78a2f32e6ef77db7

                SHA256

                d66c3bcdada88f7ae7e39dafb74fa6bf5b6a95ddb7bdbde4ac3849a86b05ecca

                SHA512

                8e4e5c9fe761bbb8dbc61b1408fd732a21420d6af563def839e69a8e911758a83fccd9f169fc847dd32aedc9e2da70bc74cf147368da0539f62a885e55667393

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Y

                Filesize

                259KB

                MD5

                9c4c0dd66d58cd672e5b7a889910c30a

                SHA1

                d558da1bb91d239d519f0ed50ae9d9a9d16d0098

                SHA256

                8dc6fd4fced04083ffea7d5d540d7d2424eabac6327b3cfe7c3c57fc7e89721e

                SHA512

                28715832b39414ee08191d34bab9bd69028fd61edf43b4c874b32366ec4e36976c98f80d0a454993761d019c0f49519850b66f03a9cf965395fbe11639f25c87

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_votmhf2k.xc1.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\g4KzPlemD\_Files\_Information.txt

                Filesize

                1KB

                MD5

                53ce540d9420b471e08d69d3bea56151

                SHA1

                4693863dd34e99c72021f485eb759c04c59ce0cc

                SHA256

                c525be399ce74fb62724e69e27a0e8bf3b8afd756a63dc0616d13eb6e0839192

                SHA512

                7e285bc42c1fd2829f87ae84463f541778b6740c53a70cb62e6741295b65629985dba0d164c6603af65c37c8ffe4c8e9646d316052544acab8206914347a0b02

              • C:\Users\Admin\AppData\Local\Temp\g4KzPlemD\_Files\_Information.txt

                Filesize

                1KB

                MD5

                f1500a3c6b8e3d3459144b28066d97ba

                SHA1

                e356c611b288daae7185f09bcae53cea1e79c000

                SHA256

                fedcdd647acb5f53b9207bfc2ac562c4789421a9b9c29100806620c36021473b

                SHA512

                9f60362ce97789577d15fc5f2b927f3a1fca101670df4b482aaf34ccca436538c20d425e2ade208e7c14bd328fdd34e09a0691eaeff6e7c0165cd5492a28ad30

              • C:\Users\Admin\AppData\Local\Temp\g4KzPlemD\_Files\_Information.txt

                Filesize

                7KB

                MD5

                16815061e4a1c12749216ffcafe23688

                SHA1

                b5d09451b645a8ea8393b7f1774dea0a61191ec8

                SHA256

                a856fe724c363173eef4cdb31a921719e83d45129ad5097bdf411db8016b5548

                SHA512

                26e94a9f3fdc42f243a96df1057daef28e8fe3c0f457fdf913bb707fe3d4c9413f5acd3cdc3e284b9dcb01b9674e2e38eb6d11dafa6675fadfd8e3b20b8cae38

              • C:\Users\Admin\AppData\Local\Temp\g4KzPlemD\_Files\_Screen_Desktop.jpeg

                Filesize

                48KB

                MD5

                ba993c4aac2c2b2b5b5e5ea35fbba707

                SHA1

                0c451901608ad94242ddd8ca95452d914aabfff4

                SHA256

                3e39193bdfe7e67f12815322fd1caaacab440f6b24d1fd24be88b0182e31f206

                SHA512

                e96eff44394b0cc310aeaa4309be5011b53e1fddb4791c2321f23180195404a7cd045ff51e44339f04c1298808c48e91cf62381490fd9365884444a25ab9e317

              • C:\Users\Admin\AppData\Local\Temp\g4KzPlemD\dAVg6MRaWZI.zip

                Filesize

                42KB

                MD5

                dbbfe9f3cc54de3c1e1300dc4ea25931

                SHA1

                e73b56adb6007b8d831fc21d737fe2acecca584b

                SHA256

                4fd8c2d4b25d065fb547f85d9f0204e4ffdc85f57b62916982d7e7986d5ee429

                SHA512

                1d7d710489ac7e19131c305925ac5f2dc1b699f5c90688dbfb92207b6d2870a826d3b1d7c042774b704ff85fad4229086f697d292283816dd5700711326cd7c1

              • C:\Users\Admin\AppData\Local\Temp\g4KzPlemD\files_\system_info.txt

                Filesize

                1KB

                MD5

                a28b938e8a6eb8aaaf9ec16bb3584d13

                SHA1

                eb0cd4b236a35c357d647618a8177b460a568057

                SHA256

                9e6dff9dd5c4263b7a81e6abc6a4338413a2b85fdc93e1451b0923637aa6485a

                SHA512

                e7378dca2399a89b737f3a2a0cdf0c469013ad637bba60e108afc82527768d75190e957f8183bb17e645839501f7bc25065fd0face989e8d7f2942c78f7a68fa

              • C:\Users\Admin\AppData\Local\Temp\g4KzPlemD\files_\system_info.txt

                Filesize

                4KB

                MD5

                45e0f865d849541ed12a7b3c2688f875

                SHA1

                a459077b85cf0ce698d575a6f802583f8d92438a

                SHA256

                28d761ef7d4d02d0f71f6b4280eb94c302ee5b0218743138a0886390f51398da

                SHA512

                836399156f939ec6cc54bdaee0c507fff6a0e0451251f1d9ed27b30f91dc239ca0c9559dfd79d220e4371f63a3ff1aac46da0b0bdd205fea7e203657195b85f7

              • memory/848-139-0x0000000000400000-0x00000000023F9000-memory.dmp

                Filesize

                32.0MB

              • memory/848-186-0x0000000000400000-0x00000000023F9000-memory.dmp

                Filesize

                32.0MB

              • memory/848-100-0x00000000025E0000-0x00000000026E0000-memory.dmp

                Filesize

                1024KB

              • memory/848-193-0x00000000028E0000-0x000000000297D000-memory.dmp

                Filesize

                628KB

              • memory/848-99-0x00000000028E0000-0x000000000297D000-memory.dmp

                Filesize

                628KB

              • memory/2196-116-0x0000000000400000-0x00000000023A5000-memory.dmp

                Filesize

                31.6MB

              • memory/2196-98-0x0000000002600000-0x0000000002700000-memory.dmp

                Filesize

                1024KB

              • memory/2196-191-0x0000000000400000-0x00000000023A5000-memory.dmp

                Filesize

                31.6MB

              • memory/2196-94-0x0000000002800000-0x0000000002809000-memory.dmp

                Filesize

                36KB

              • memory/2196-195-0x0000000002800000-0x0000000002809000-memory.dmp

                Filesize

                36KB

              • memory/2480-118-0x0000000004FB0000-0x0000000004FEC000-memory.dmp

                Filesize

                240KB

              • memory/2480-138-0x0000000008120000-0x000000000822A000-memory.dmp

                Filesize

                1.0MB

              • memory/2480-93-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/2480-207-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/2480-97-0x0000000072500000-0x0000000072CB0000-memory.dmp

                Filesize

                7.7MB

              • memory/2480-92-0x0000000000400000-0x0000000002CCD000-memory.dmp

                Filesize

                40.8MB

              • memory/2480-112-0x0000000007550000-0x0000000007AF4000-memory.dmp

                Filesize

                5.6MB

              • memory/2480-114-0x0000000004C10000-0x0000000004C30000-memory.dmp

                Filesize

                128KB

              • memory/2480-90-0x0000000004A50000-0x0000000004A72000-memory.dmp

                Filesize

                136KB

              • memory/2480-115-0x0000000007B00000-0x0000000008118000-memory.dmp

                Filesize

                6.1MB

              • memory/2480-88-0x0000000002F40000-0x0000000002F6F000-memory.dmp

                Filesize

                188KB

              • memory/2480-117-0x0000000004F90000-0x0000000004FA2000-memory.dmp

                Filesize

                72KB

              • memory/2480-120-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/2480-119-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                Filesize

                64KB

              • memory/2480-87-0x0000000002FA0000-0x00000000030A0000-memory.dmp

                Filesize

                1024KB

              • memory/2480-125-0x0000000005020000-0x000000000506C000-memory.dmp

                Filesize

                304KB

              • memory/2988-53-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/2988-56-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/2988-63-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/2988-62-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/2988-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/2988-50-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/2988-60-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/2988-51-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/2988-140-0x0000000000400000-0x000000000051B000-memory.dmp

                Filesize

                1.1MB

              • memory/2988-58-0x0000000064940000-0x0000000064959000-memory.dmp

                Filesize

                100KB

              • memory/2988-141-0x0000000064940000-0x0000000064959000-memory.dmp

                Filesize

                100KB

              • memory/2988-142-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/2988-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/2988-143-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/2988-54-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/2988-55-0x0000000000F40000-0x0000000000FCF000-memory.dmp

                Filesize

                572KB

              • memory/2988-145-0x000000006EB40000-0x000000006EB63000-memory.dmp

                Filesize

                140KB

              • memory/2988-146-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/2988-57-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/3428-189-0x00000000023C0000-0x00000000023D6000-memory.dmp

                Filesize

                88KB

              • memory/4908-86-0x00007FF9500C0000-0x00007FF950B81000-memory.dmp

                Filesize

                10.8MB

              • memory/4908-206-0x00007FF9500C0000-0x00007FF950B81000-memory.dmp

                Filesize

                10.8MB

              • memory/4908-95-0x000000001B6C0000-0x000000001B6D0000-memory.dmp

                Filesize

                64KB

              • memory/4908-76-0x0000000000AA0000-0x0000000000AA8000-memory.dmp

                Filesize

                32KB

              • memory/4936-149-0x00007FF9500C0000-0x00007FF950B81000-memory.dmp

                Filesize

                10.8MB

              • memory/4936-101-0x0000000001300000-0x0000000001322000-memory.dmp

                Filesize

                136KB

              • memory/4936-84-0x00007FF9500C0000-0x00007FF950B81000-memory.dmp

                Filesize

                10.8MB

              • memory/4936-85-0x0000000000B30000-0x0000000000B5C000-memory.dmp

                Filesize

                176KB

              • memory/4936-122-0x0000000001350000-0x0000000001360000-memory.dmp

                Filesize

                64KB

              • memory/4992-123-0x0000000005560000-0x0000000005582000-memory.dmp

                Filesize

                136KB

              • memory/4992-204-0x0000000072500000-0x0000000072CB0000-memory.dmp

                Filesize

                7.7MB

              • memory/4992-187-0x0000000007D70000-0x00000000083EA000-memory.dmp

                Filesize

                6.5MB

              • memory/4992-188-0x0000000007730000-0x000000000774A000-memory.dmp

                Filesize

                104KB

              • memory/4992-185-0x0000000007400000-0x00000000074A3000-memory.dmp

                Filesize

                652KB

              • memory/4992-184-0x0000000007380000-0x000000000739E000-memory.dmp

                Filesize

                120KB

              • memory/4992-194-0x00000000077B0000-0x00000000077BA000-memory.dmp

                Filesize

                40KB

              • memory/4992-174-0x000000006E590000-0x000000006E5DC000-memory.dmp

                Filesize

                304KB

              • memory/4992-172-0x00000000073C0000-0x00000000073F2000-memory.dmp

                Filesize

                200KB

              • memory/4992-196-0x00000000079A0000-0x0000000007A36000-memory.dmp

                Filesize

                600KB

              • memory/4992-197-0x0000000007930000-0x0000000007941000-memory.dmp

                Filesize

                68KB

              • memory/4992-198-0x0000000007960000-0x000000000796E000-memory.dmp

                Filesize

                56KB

              • memory/4992-199-0x0000000007970000-0x0000000007984000-memory.dmp

                Filesize

                80KB

              • memory/4992-200-0x0000000007A60000-0x0000000007A7A000-memory.dmp

                Filesize

                104KB

              • memory/4992-201-0x0000000007A50000-0x0000000007A58000-memory.dmp

                Filesize

                32KB

              • memory/4992-173-0x000000007F320000-0x000000007F330000-memory.dmp

                Filesize

                64KB

              • memory/4992-168-0x0000000002F30000-0x0000000002F40000-memory.dmp

                Filesize

                64KB

              • memory/4992-147-0x0000000006420000-0x000000000643E000-memory.dmp

                Filesize

                120KB

              • memory/4992-144-0x0000000002F30000-0x0000000002F40000-memory.dmp

                Filesize

                64KB

              • memory/4992-96-0x0000000072500000-0x0000000072CB0000-memory.dmp

                Filesize

                7.7MB

              • memory/4992-111-0x0000000002F30000-0x0000000002F40000-memory.dmp

                Filesize

                64KB

              • memory/4992-102-0x0000000002E20000-0x0000000002E56000-memory.dmp

                Filesize

                216KB

              • memory/4992-113-0x00000000055A0000-0x0000000005BC8000-memory.dmp

                Filesize

                6.2MB

              • memory/4992-124-0x0000000005D40000-0x0000000005DA6000-memory.dmp

                Filesize

                408KB

              • memory/4992-126-0x0000000005DB0000-0x0000000005E16000-memory.dmp

                Filesize

                408KB

              • memory/4992-136-0x0000000005E20000-0x0000000006174000-memory.dmp

                Filesize

                3.3MB

              • memory/5108-228-0x0000000005A20000-0x0000000005AC3000-memory.dmp

                Filesize

                652KB

              • memory/5108-227-0x0000000005A20000-0x0000000005AC3000-memory.dmp

                Filesize

                652KB

              • memory/5108-226-0x0000000005A20000-0x0000000005AC3000-memory.dmp

                Filesize

                652KB

              • memory/5108-225-0x0000000005A20000-0x0000000005AC3000-memory.dmp

                Filesize

                652KB

              • memory/5108-224-0x0000000005A20000-0x0000000005AC3000-memory.dmp

                Filesize

                652KB

              • memory/5108-223-0x0000000005A20000-0x0000000005AC3000-memory.dmp

                Filesize

                652KB