Analysis

  • max time kernel
    1799s
  • max time network
    1800s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231222-en
  • resource tags

    arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01/02/2024, 15:23

General

  • Target

    refurefy.msi

  • Size

    4.2MB

  • MD5

    e0e692aebaa2da2506ed840863673a8c

  • SHA1

    8d2410aa0e2bc6b62cd4ef8a4278434661e62561

  • SHA256

    1eff3c163f78ac2db6b1b3140f2c8995d60eb305698fde906628f7baee6628ba

  • SHA512

    1521b7611f502fb1fec3667b26bff5b39d13e55cb942d2123bf90e28120782e9665de501b68d968b66a448c9a4a426be3431fbe287f2294010ab5273ef98acd5

  • SSDEEP

    49152:npUPF9qhCxzT+WKjSX1ZzLVI4QWqyipO4+JtbjeYvd403NX9tmH3b3zB37irrrri:npoCQ1lLe7Wz1Jtbj9403NX9tmH3bjH

Malware Config

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 64 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:2772
      • \??\c:\windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        c:\windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        2⤵
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2632
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\refurefy.msi
      1⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:840
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4560
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding A05D070C8CD97A524EB2494A402CA751
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:260
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
          3⤵
          • Modifies file permissions
          PID:4304
        • C:\Windows\SysWOW64\EXPAND.EXE
          "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
          3⤵
          • Drops file in Windows directory
          PID:1808
        • C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\files\iTunesHelper.exe
          "C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\files\iTunesHelper.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:4412
          • \??\c:\temp\Autoit3.exe
            "c:\temp\Autoit3.exe" c:\temp\script.au3
            4⤵
            • Executes dropped EXE
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3004
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\temp\Overdue Account Letter Feb 13, 2023.pdf"
              5⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Checks processor information in registry
              • Modifies Internet Explorer settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2092
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3152
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=90101C67982A01D81886C109105D74BF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=90101C67982A01D81886C109105D74BF --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:1
                  7⤵
                    PID:1552
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=903BEFABC54E6236FCEE512BE56896AA --mojo-platform-channel-handle=1756 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                    7⤵
                      PID:3332
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6383427E8A4B0F62EC6A233BC7BC856E --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                      7⤵
                        PID:2952
                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=632CA2D6E095DD8F5F04FE504EF7E9EE --mojo-platform-channel-handle=2352 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                        7⤵
                          PID:2244
                        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C332723741B55E5FDF13F5DDDD4CD64A --mojo-platform-channel-handle=1920 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                          7⤵
                            PID:3044
                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A89CDB93B72453A9102138BA6D1A211E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A89CDB93B72453A9102138BA6D1A211E --renderer-client-id=7 --mojo-platform-channel-handle=2368 --allow-no-sandbox-job /prefetch:1
                            7⤵
                              PID:500
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\files"
                      3⤵
                        PID:548
                      • C:\Windows\SysWOW64\ICACLS.EXE
                        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\." /SETINTEGRITYLEVEL (CI)(OI)LOW
                        3⤵
                        • Modifies file permissions
                        PID:1904
                  • C:\Windows\system32\vssvc.exe
                    C:\Windows\system32\vssvc.exe
                    1⤵
                    • Checks SCSI registry key(s)
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4388
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:660

                    Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\efabcce\bhdbdea.au3

                            Filesize

                            907KB

                            MD5

                            158c76e3e09819ed5aeeb52a7182621d

                            SHA1

                            e0a744e0319bb4ca2d274b641ae0b05160d78f72

                            SHA256

                            89e643b280af63e6b166a4da96c80771ac78f72cb2bb22af9493163cf97770ba

                            SHA512

                            7bbdbfbb35770247491155fce70247d52833f4790c8b7422907b439d08f024da144c97f94c9433ab891135fd9c76c23130e25c60441093c49878d706f2bd472a

                          • C:\ProgramData\efabcce\dgakedd

                            Filesize

                            1KB

                            MD5

                            823610c314d38f41dadbf6071ed31557

                            SHA1

                            646a0c24bc62a8cc01f24dcde012cc078959baac

                            SHA256

                            bc4ae6f1197e8b26e98a4d917605ba73cfb5a6ed2cb77b734af7ddfc6ddfe9ae

                            SHA512

                            ce2bd44da33ee07b32760db1acf305c9de51f2239b1a4ff314f41b979ab3964b9918752acf4fee22a2ab22fa68b46846e4d9af9a56b4d39c3880fc83407ce26e

                          • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                            Filesize

                            21KB

                            MD5

                            10f0ab6c003fb837447d7c86685c0c48

                            SHA1

                            f39a080ea374ec99b8c3056d64c6a1b7f7cf5e08

                            SHA256

                            93369c6867f197cf60ca42efefe80e85fb074c00e6243b6780f038ce5aec15ac

                            SHA512

                            e44ab2edf3c3310c925bf8e37570b469fb65a880321bd24d84c8cb9cb6731aefc74463a53d2e34739f310856ea3e6e434a9279dd8104ea9d3db92de6d571eab5

                          • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                            Filesize

                            56KB

                            MD5

                            752a1f26b18748311b691c7d8fc20633

                            SHA1

                            c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                            SHA256

                            111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                            SHA512

                            a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                          • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                            Filesize

                            64KB

                            MD5

                            16e1f6b6e135673914329eb57fb22b35

                            SHA1

                            7dfb8301ead8af837012cfa9c649f0871510fafb

                            SHA256

                            6e0dfd14555af3afcc9c582144fa8dc7286b117d4d61ea5cfc513a40dc2ff131

                            SHA512

                            f93e54c65841b26f20adc529eb53b75b1985cd13db42773b31a1839bb010652e6c944702801d7720e05080becaa05df57c0c6998416c2693264b07823186a4f7

                          • C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\files.cab

                            Filesize

                            3.0MB

                            MD5

                            36733a3d7ff444bc8594de947968dc89

                            SHA1

                            523e4d5f63a1b74a1604c7febb0c0259b29fa360

                            SHA256

                            bc887ab1e809213b575ca2bd6eaae4a30f2cbd49222e3127eeb79ffe280ebbef

                            SHA512

                            43264a47e29c81c0f8b9bfd7323b2d1f2ac3746ade77d8fbbfa611467a8ce0263e7bb9e3378732a389e3d0ed9c39c7c49b8161b265a448746ed10455785f8b65

                          • C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\files\CoreFoundation.dll

                            Filesize

                            1.0MB

                            MD5

                            0d7a4cd949b5e3e3825d56b420f14ca4

                            SHA1

                            dca57312a1c1d205d6cb9c0d30e574e6fa2072b3

                            SHA256

                            9590f742e14146d8e58fd12dd2b6df6bc47ab6ee8ab1aef3762a7ff888182fe1

                            SHA512

                            54eefe738a81f7b02afa5b7751c3d4125a65ac6973f433edb28841d1bb0fb325279cf981f796f7bb47fc24ea1280c2d7564b3a857bddff5f05662782f94eb18c

                          • C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\files\CoreFoundation.dll

                            Filesize

                            986KB

                            MD5

                            f96aa2f45eca4d91a58aef6e1f6ee380

                            SHA1

                            da69da70bdc381fe2a3bd93eb45844c411224f10

                            SHA256

                            6e38536c0dd46ef2745cc1b2b89aff83b0a1fb76f0f1862484190c61a316a972

                            SHA512

                            b0ef54acd426099497f431b776b7c3f04963324dc034a4df87ac3222e1560cafec84bd72e4df60d3a7d913c89d0d9e4931026f81bd068897eb680adb549a78d8

                          • C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\files\iTunesHelper.exe

                            Filesize

                            358KB

                            MD5

                            ed6a1c72a75dee15a6fa75873cd64975

                            SHA1

                            67a15ca72e3156f8be6c46391e184087e47f4a0d

                            SHA256

                            0d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda

                            SHA512

                            256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03

                          • C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\files\sqlite3.dll

                            Filesize

                            801KB

                            MD5

                            501fa0fbb866e58c032f77e4c52cc0c6

                            SHA1

                            af092567120f0b41d382272d994eb3de78d0de26

                            SHA256

                            d74bb2fbc635692c7511489b4866ce9c72142248aefa16f73c5d53b59016353f

                            SHA512

                            3d7b628563704548e623c2a517f5aa167da61bf79941b394211026f0d9bdb8e650e9255db68ce6345699542a83a6e43e2a82d26fc7b974ec7502e1756fda02d2

                          • C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\msiwrapper.ini

                            Filesize

                            1KB

                            MD5

                            01f360f942cc798c6fe3517768f1d6d8

                            SHA1

                            46fd91f1ebd4f1eabce53230a147e39bd5d23029

                            SHA256

                            793f719e5c764feb1651aff033b1e923e6716298328cfd3ba2fea3ddf4276db3

                            SHA512

                            3b458aebcbdc0f060ce0f24dfcaaf7607a85a3272943a3da703c242d1f31dadb9062f6fb7467824aa7b0d352fea06a05f149709785c3a3e72f112c4a97c1052f

                          • C:\Users\Admin\AppData\Local\Temp\MW-23bc4574-dc5e-42e3-ade9-76e3cc5ddeaa\msiwrapper.ini

                            Filesize

                            1KB

                            MD5

                            f5e476f67d5266c31e807a9d3624429f

                            SHA1

                            2f048c43fcbc444889590caa9eb8dd37eaec2741

                            SHA256

                            6c1ce166624907043edb02d4ef74287ae83629eec776d169433988ebd288962c

                            SHA512

                            2e345ec575d70c04115639531c17a0c3ce094de46c50448bd3fc759a323b5aed95f97d38779260ec2c4d4055bc80c9f3f67492562b844ef068ab8638ef893ab2

                          • C:\Users\Admin\AppData\Roaming\ccBhDFb

                            Filesize

                            32B

                            MD5

                            0414efb75349a4d8f83612bc069dc273

                            SHA1

                            d52c57a679b2695b53557ad798907baac09630b2

                            SHA256

                            2be8d204e4d2fb498f24d8f05774f4472031f3ba2ec48708049699dc8636ee28

                            SHA512

                            35e70eead964a2118b95eb874eec2aae78b7990d882d57c292e9a6fb0cf38e84357e8dd77ace07985dd72a7fcc8de03c101a2d42e46e5fdef876fc34fd248440

                          • C:\Windows\Installer\MSI5FF2.tmp

                            Filesize

                            208KB

                            MD5

                            d82b3fb861129c5d71f0cd2874f97216

                            SHA1

                            f3fe341d79224126e950d2691d574d147102b18d

                            SHA256

                            107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

                            SHA512

                            244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

                          • C:\temp\Autoit3.exe

                            Filesize

                            671KB

                            MD5

                            573280a4584734556775875388302598

                            SHA1

                            ebb014125027451d6225c6935c8942dabff370fc

                            SHA256

                            276c66e774c02b765c890a59707368d048abbba71b047375a89e68e5dd588e3b

                            SHA512

                            162d59cfbea9430dbc3e3af63f162636524f479ff43c766ffcafce7fb48b7b7e8a71091d7ceb3fccc01a8230f68a83900336ab0816438face879beeafba28ffc

                          • C:\temp\Overdue Account Letter Feb 13, 2023.pdf

                            Filesize

                            330KB

                            MD5

                            8c1721e9249b7b2aea4a6f4270d14420

                            SHA1

                            aa5b2c59d1f1e082e41c2d23d806c11a6ce8fced

                            SHA256

                            370d9a78649f181edbc0ca8026ce9caa415b99dbf8acfd90f64a9b9de370e0d5

                            SHA512

                            910584b2e034c2f02963754f982b31bdf8303f6f598badfc870c637219d70fa5413d3fbeca30bb5c4f2a9906469a9128ad4d048848bda71e7366e006e446bcf5

                          • C:\temp\cc.txt

                            Filesize

                            4B

                            MD5

                            254872a52d6847fa0f322983f0cca559

                            SHA1

                            24c1d179d715a3ee074aa91eeab74548ad2a8cd7

                            SHA256

                            5d0b4aa2c5a01698c7d70ad60c9cab292e2058fdb8d80a38fd8c7548c9c36ede

                            SHA512

                            ef8a668885df3c9b29821260b9eccff73cf49cbe5d800dfe9ddae8ac822962ca4e00d05b234b5fb36319bfaf99c68a67d50118befa5ecbf56c86db2dd7028b81

                          • C:\temp\fs.txt

                            Filesize

                            4B

                            MD5

                            2cd46e7acf790dc33aa20f9dbb9fffda

                            SHA1

                            1e3c52d91de1eae149e9193d272cc6ca33539659

                            SHA256

                            c5499a9e4adf26dd72f005a1d8de67a3b08d0a5dfd9fad9e0b9488ea021f7c79

                            SHA512

                            4195ad0eda68e9f90bf4401abd7b51d1fdf684ac8075fdd9724d96d730d6a87dceb30aad82f956855018e3a51c3fef593f013e53bbe295a34c0052589280d7b2

                          • C:\temp\lp.txt

                            Filesize

                            4B

                            MD5

                            801272ee79cfde7fa5960571fee36b9b

                            SHA1

                            3895a2d047f5d2c14122cb86a71d3172139ad644

                            SHA256

                            7fd052bd76eb71475b03f997dbdf5adf8c440ac0a6e1fced23a3d6b81826b103

                            SHA512

                            4030edca8e0e1d23dfbe3a7a4f30a4ff1d1e1338d6b8c9c8ba92370b9f2205605630679fbb95622d2318351bdf30c0987a6a245383c319ff5413e421f6e18283

                          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                            Filesize

                            1.4MB

                            MD5

                            fcada620244fd0f4e3ad2fbf1aaed1ab

                            SHA1

                            9e8747664f5d41eb4382b278a5a7ec0b31d45128

                            SHA256

                            d6ae968e893b4207920df5b3f30431a847c62e38de3823892befaeca39cfa542

                            SHA512

                            4398b33e3064754d8c0e4a467bc6dcee0ed5f9e7eda6a06454f7ef6a4318111f13629b004d74307564ed3baa41613aad879f0fd57b4852e60e0429b60ddec334

                          • \??\Volume{5d8a0f93-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{6ecab120-5855-40d5-86a1-bd27e2fb47dc}_OnDiskSnapshotProp

                            Filesize

                            6KB

                            MD5

                            a1e9b6e0e1dccec71f7fd432fed74589

                            SHA1

                            b8c29f3f866f7a050292d51bad26361b23684924

                            SHA256

                            fe25304c6203bcac2de1e20ffc1e35ece02a00d6238a0ec4b4ce42dbb04989b2

                            SHA512

                            a7fca2f0b1d1b74f77cabedc8fb760c02559cf70354ae07400335c4a3a8aa7b936c2445a39e19843ef04040dedf5b7858975d77f47dfdb9a7699d8c3ff6b0365

                          • \??\c:\temp\Autoit3.exe

                            Filesize

                            444KB

                            MD5

                            5a7c58de58b5980911448811be14e9c3

                            SHA1

                            bdb78c3501e4064643a14714eb540c79345b7534

                            SHA256

                            4733b3116c81898aa52cc47f82d5550ddc7f700317c8f59ba344761c197022de

                            SHA512

                            1181cd34f20568ce51fd0c1479aa2bfd06de6e01fd2b58704eb385ab5afbcdddf92890064d39fa41e55539d178e33366d11b4629be0bf1dce7c8d5b65f9ba16e

                          • \??\c:\temp\script.au3

                            Filesize

                            872KB

                            MD5

                            d860f4e78ffe4e5c77222042ba07d468

                            SHA1

                            c1ed7ab732fd29d2560187230335d33adbc00833

                            SHA256

                            ab9d18b25ca5bcde183d70cd7467bf8d1a00796fe26f83e38ab1d9253ef85c67

                            SHA512

                            9541ee57a45ea0fbf212a2ac205e87b202ae21c155637cc04adca6024867f5f888b487e9ec38a434cc8ca7800a4e0ce331bd2579e06795c0eba7bbd39b7a978b

                          • \??\c:\temp\test.txt

                            Filesize

                            76B

                            MD5

                            dd1c5f83309a94272996a07fcff8734d

                            SHA1

                            49e1d44a0a18668407abf825dba95cc8204ed359

                            SHA256

                            eaab4bcfc55463f2ba708eba2e3e4a707c6e75513d5b9e84075b89979ea132be

                            SHA512

                            10563c675cfa2b1133ac3c3624f142c35064494af052eb031ab7c82cbfc688e44e00e7095d84dc047b294ae5f9f98cc67cb3139453049ada7e7dbb60869cfbf5

                          • memory/2092-104-0x00000000029D0000-0x00000000029D1000-memory.dmp

                            Filesize

                            4KB

                          • memory/2092-107-0x0000000003E60000-0x0000000004602000-memory.dmp

                            Filesize

                            7.6MB

                          • memory/2092-114-0x0000000003E60000-0x0000000004602000-memory.dmp

                            Filesize

                            7.6MB

                          • memory/2092-117-0x0000000003E60000-0x0000000004602000-memory.dmp

                            Filesize

                            7.6MB

                          • memory/2092-259-0x0000000003E60000-0x0000000004602000-memory.dmp

                            Filesize

                            7.6MB

                          • memory/2092-119-0x0000000003E60000-0x0000000004602000-memory.dmp

                            Filesize

                            7.6MB

                          • memory/2092-122-0x0000000003E60000-0x0000000004602000-memory.dmp

                            Filesize

                            7.6MB

                          • memory/2632-287-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-383-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-123-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-116-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-125-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-118-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-569-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-162-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-563-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-557-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-551-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-258-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-545-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-260-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-266-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-272-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-281-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-539-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-293-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-299-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-305-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-311-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-317-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-323-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-329-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-335-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-341-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-347-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-353-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-359-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-365-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-371-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-377-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-120-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-389-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-395-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-401-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-407-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-413-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-419-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-425-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-431-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-437-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-443-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-449-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-455-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-461-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-467-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-473-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-479-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-485-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-491-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-497-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-503-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-509-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-515-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-521-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-527-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/2632-533-0x0000000000400000-0x0000000000470000-memory.dmp

                            Filesize

                            448KB

                          • memory/3004-89-0x0000000005A10000-0x0000000005D5E000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/3004-87-0x0000000004180000-0x0000000005150000-memory.dmp

                            Filesize

                            15.8MB

                          • memory/3004-109-0x0000000005A10000-0x0000000005D5E000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/4412-77-0x0000014302CD0000-0x0000014302EDC000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4412-86-0x0000000077AA0000-0x0000000077C3D000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/4412-88-0x0000014302CD0000-0x0000014302EDC000-memory.dmp

                            Filesize

                            2.0MB