Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 17:25

General

  • Target

    setup_installer.exe

  • Size

    4.8MB

  • MD5

    8e88e9762c2c7020225ef6c369f2ef0e

  • SHA1

    15eb5c3f205e19471d3e60322efbddc2e8b2792e

  • SHA256

    e847b7593382c56f6443caea1929e4657e8706a0e55deda227ab98231bde7667

  • SHA512

    3bdeebd9e7f0e1895eebd6d749e9195903fa5e9dfab620e2e50fa719878680106c1f03925cf3fdb4bebbe98b72b6350ccedba6405c03f367591a8741bf8e53da

  • SSDEEP

    98304:xRCvLUBsggNYhWYlw2Cs5llZA9PYJKmt6jFeQXhkYN3g0bM/1Tfe:x6LUCggNSlPllZAZI9t6sQ2fe

Malware Config

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

redline

Botnet

pub1

C2

viacetequn.site:80

Extracted

Family

smokeloader

Botnet

pub6

Extracted

Family

nullmixer

C2

http://sornx.xyz/

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Signatures

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 18 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3320
    • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3560
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2924
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1020
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon17a1622b32c19d79.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:808
        • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17a1622b32c19d79.exe
          Mon17a1622b32c19d79.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          PID:4068
          • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17a1622b32c19d79.exe
            "C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17a1622b32c19d79.exe" -a
            5⤵
            • Executes dropped EXE
            PID:2076
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon1729d1f65d.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon1729d1f65d.exe
          Mon1729d1f65d.exe
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:4376
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon178e2a4bb3.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4852
        • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon178e2a4bb3.exe
          Mon178e2a4bb3.exe
          4⤵
          • Executes dropped EXE
          PID:2968
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon1775222792.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3620
        • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon1775222792.exe
          Mon1775222792.exe
          4⤵
          • Executes dropped EXE
          PID:3676
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 1592
            5⤵
            • Program crash
            PID:1640
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon17fc3714aa3427.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:996
        • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17fc3714aa3427.exe
          Mon17fc3714aa3427.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1136
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon176198e28ea2.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4080
        • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon176198e28ea2.exe
          Mon176198e28ea2.exe
          4⤵
          • Executes dropped EXE
          PID:3956
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon1739ea489bd.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4408
        • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon1739ea489bd.exe
          Mon1739ea489bd.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3520
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon179660fc887.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3392
        • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon179660fc887.exe
          Mon179660fc887.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4484
          • C:\Windows\SysWOW64\dllhost.exe
            dllhost.exe
            5⤵
              PID:4328
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c cmd < Mummia.wmz
              5⤵
                PID:4672
                • C:\Windows\SysWOW64\cmd.exe
                  cmd
                  6⤵
                    PID:3652
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /V /R "^utIhAQXzKFfZwKOfdWFWGYOHgvUbutPplngusOenUcoCKjfoSNGytadifqZtVmhGQyOCcHYBTuwlPjXeuMFabKtSouQdPYDxoCLEbNMlPtkXdusrrWXoUUouqWxgRHLUDGwhAaEzZcDzniBeO$" Pensavo.wmz
                      7⤵
                        PID:4012
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com
                        Prendero.exe.com z
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:432
                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com
                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com z
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:4472
                      • C:\Windows\SysWOW64\PING.EXE
                        ping UMLCWGSL -n 30
                        7⤵
                        • Runs ping.exe
                        PID:2160
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Mon17adba8184e.exe
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:3672
                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17adba8184e.exe
                  Mon17adba8184e.exe
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:928
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 500
                3⤵
                • Program crash
                PID:632
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3560 -ip 3560
            1⤵
              PID:4496
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 3676 -ip 3676
              1⤵
                PID:3548
              • C:\Windows\system32\dwm.exe
                "dwm.exe"
                1⤵
                • Checks SCSI registry key(s)
                • Enumerates system info in registry
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:1256
              • C:\Windows\system32\dwm.exe
                "dwm.exe"
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4276
              • C:\Windows\system32\dwm.exe
                "dwm.exe"
                1⤵
                  PID:1216

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon1729d1f65d.exe

                  Filesize

                  273KB

                  MD5

                  3ef04768f662e3c02e9e8c8192d5afa1

                  SHA1

                  58371bb09f637e7d42c94f6365a434ca88b3874d

                  SHA256

                  b3fb54d410655eba5e22d8aec4876060a668377e0cdb10e66265ee09ff72e132

                  SHA512

                  07c0208061b2d03cecae2e0414bda700da07139bad62a078f9c873f0396c0ee005cf6f5eab4f299ecd48d2c90380f73a6565e419f42d95f4d968508858253ea7

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon1729d1f65d.exe

                  Filesize

                  192KB

                  MD5

                  7e4509799411374cb2afd0869338f9f2

                  SHA1

                  8278d5d33ff3ee2511648d7ea31e369923b2dc22

                  SHA256

                  c4c5d89f11f7cf93cd6e146a0572b556d3df1aadd36bed167fd02cbe4c91d07d

                  SHA512

                  7c3804ef1818988a9be13045bd07557c1e6c7367d1d3b78f65548032da3a9673c0ac23e637804436867bf88be06368416e3490a54ce7e90d686e915aec149d22

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon1739ea489bd.exe

                  Filesize

                  192KB

                  MD5

                  ea5d2a70de26a3f2ce92d1b02b2f3052

                  SHA1

                  66045b40d6aebc6a2930c76c6d492fb5fc81426f

                  SHA256

                  7abf7953b1532eec5dd50fb9098269a8cd7b65e9afc9d84031039ff9da63f909

                  SHA512

                  1437877ea36bf59eb74eef0415f820507fa55bb07b17b59679454e02a99bf48884bfdd0706175a168a005ce9a672b0fbdc904da7a35242402567f06bf22d322b

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon1739ea489bd.exe

                  Filesize

                  128KB

                  MD5

                  c1c707b4f03cf6ef7dbdb22167898de1

                  SHA1

                  dfade9a7a74fbe493c9766c5c38caaa1181ee321

                  SHA256

                  9c8aa9285ce4feb54f7e5d3a6e4af48720003c2fe7099162aa743be878428726

                  SHA512

                  aadcc707773e0aba187bc836609eb296881fe05fe867a05bcad070dfcfbfd4aaca264904d2b4d23d2f2672c876d58480c73c63b8b5319d67fa4520491e66dd2d

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon176198e28ea2.exe

                  Filesize

                  1.5MB

                  MD5

                  df80b76857b74ae1b2ada8efb2a730ee

                  SHA1

                  5653be57533c6eb058fed4963a25a676488ef832

                  SHA256

                  5545c43eb14b0519ab997673efa379343f98d2b6b1578d9fdeb369234789f9dd

                  SHA512

                  060b04536003ce4a91e5847d487701eed7e093408e427198be552f0af37aee498929586f3a0110c78173873a28d95c6c0a4cdd01c7218274f5849a4730f9efdd

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon176198e28ea2.exe

                  Filesize

                  320KB

                  MD5

                  b9e27f0c69611244890fd162db17d01b

                  SHA1

                  c858fb11b0dfe531c048ea5b9e9484192e775f6f

                  SHA256

                  0b245c7939f75076d2f2b1d28e8fb958bb060b9a9f8b04d8914836404c207172

                  SHA512

                  224b5335e0219e40283677a0c35bcb8331870c8bcbdc18fb77eb181acb438a54009c1d4eb5470dc72a9de647badfc1221812d75f5e84c47c7a69e83dcaf9f8aa

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon1775222792.exe

                  Filesize

                  608KB

                  MD5

                  42b6c78fd88e0ce139615ca4a975bfc7

                  SHA1

                  5ec215ade32285be9a6b3e73031a9e351a5e4fdb

                  SHA256

                  73da47aba40b72752b6562114348f823e70e33ef2a2eb5cb16c914e6feffe0d0

                  SHA512

                  a7368df6e22f42c1ab60599ab4ecf2eba1fac8def2a8c411491173c881bbfafd014eb11a97067da6fbd3ded2c0daa3ae0574d259d8e13f210ecf40f16e06e6f3

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon178e2a4bb3.exe

                  Filesize

                  900KB

                  MD5

                  0a0d22f1c9179a67d04166de0db02dbb

                  SHA1

                  106e55bd898b5574f9bd33dac9f3c0b95cecd90d

                  SHA256

                  a59457fbfaf3d1b2e17463d0ffd50680313b1905aff69f13694cfc3fffd5a4ac

                  SHA512

                  8abf8dc0da25c0fdbaa1ca39db057db80b9a135728fed9cd0f45b0f06d5652cee8d309b92e7cb953c0c4e8b38ffa2427c33f4865f1eb985a621316f9eb187b8b

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon178e2a4bb3.exe

                  Filesize

                  128KB

                  MD5

                  6d096c3596f28828dbfdd118312da435

                  SHA1

                  8cae01cfba1a7324ecbc72f18f22f79c2a7f271a

                  SHA256

                  c41d284694769824bcceab95e23f0e8f7e6bd6be89ee3a4f5a93b68b9f61789a

                  SHA512

                  43a77bdab2d15130328252fdc863d3507df7ab8b1d24b29b0bdf0bab8528d010d785d00ce3bd0a7c197c26669eded1115a1a6265943ffb73a206bbc4f5847bc3

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon179660fc887.exe

                  Filesize

                  1.3MB

                  MD5

                  12b8842dded9134ad0cae031c4f06530

                  SHA1

                  c0ecd0ac8cf3e4851661f62fe283ecec0e6ca25e

                  SHA256

                  abd87ec324df8d74245e1671f21e832b563eb8dc3c13b1688a9e85a2f809fe17

                  SHA512

                  967d70105549641beaa3283c42143aac22e016c911f99ab1c7ef5b4eff2577790fc679a74af6d2df14e87c278762e2c39c96bbdeabeaa1b62fb9072f0baa1825

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon179660fc887.exe

                  Filesize

                  256KB

                  MD5

                  e68b4db842f6c6b1a13602d76c03454a

                  SHA1

                  9894367c4710654d0005fa14c3d93c76e33395ed

                  SHA256

                  772e4cda047da825a0091ffbcd4ee9614baf36df81739123680c57bc6f9757e4

                  SHA512

                  9507b5d3dbc8d17fc4eeff74bd8f92cafb83f89a70c61e98e3e85b61527ec1b600ef7919547811465d7afc3f667c1b99bbdcffeafacad8cc3b7da3b74e8f4f57

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17a1622b32c19d79.exe

                  Filesize

                  56KB

                  MD5

                  3263859df4866bf393d46f06f331a08f

                  SHA1

                  5b4665de13c9727a502f4d11afb800b075929d6c

                  SHA256

                  9dcacda3913e30cafd92c909648b5bffde14b8e39e6adbfb15628006c0d4d3c2

                  SHA512

                  58205110a017f5d73dd131fefb1e3bbbcc670ed0c645aeefebe5281579c7b1dceffa56671cd7b186554bdb81710e21018ed0d7088a27517dfc5e48d6d3578cf6

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17adba8184e.exe

                  Filesize

                  8KB

                  MD5

                  4ffcfe89a6f218943793ff6ea9bb5e79

                  SHA1

                  8ff66c6fe276857ba0ce6f533d383813e5ce6943

                  SHA256

                  710c8df4e791a0f4ac8a7351c0c718a6ddb685a3d57abfd2c064c398617bb9b1

                  SHA512

                  8c62a4e43657a7477acc630708205db74ecad794569408b7b0a57ee1ff111f798917b48c929133e8c199312ad797929a61fc69505a636347307edcd2eef2a5cb

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17fc3714aa3427.exe

                  Filesize

                  248KB

                  MD5

                  d23c06e25b4bd295e821274472263572

                  SHA1

                  9ad295ec3853dc465ae77f9479f8c4f76e2748b8

                  SHA256

                  f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c

                  SHA512

                  122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\libcurl.dll

                  Filesize

                  218KB

                  MD5

                  d09be1f47fd6b827c81a4812b4f7296f

                  SHA1

                  028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                  SHA256

                  0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                  SHA512

                  857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\libcurlpp.dll

                  Filesize

                  54KB

                  MD5

                  e6e578373c2e416289a8da55f1dc5e8e

                  SHA1

                  b601a229b66ec3d19c2369b36216c6f6eb1c063e

                  SHA256

                  43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                  SHA512

                  9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\libgcc_s_dw2-1.dll

                  Filesize

                  113KB

                  MD5

                  9aec524b616618b0d3d00b27b6f51da1

                  SHA1

                  64264300801a353db324d11738ffed876550e1d3

                  SHA256

                  59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                  SHA512

                  0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\libstdc++-6.dll

                  Filesize

                  647KB

                  MD5

                  5e279950775baae5fea04d2cc4526bcc

                  SHA1

                  8aef1e10031c3629512c43dd8b0b5d9060878453

                  SHA256

                  97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                  SHA512

                  666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\libwinpthread-1.dll

                  Filesize

                  69KB

                  MD5

                  1e0d62c34ff2e649ebc5c372065732ee

                  SHA1

                  fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                  SHA256

                  509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                  SHA512

                  3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                • C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\setup_install.exe

                  Filesize

                  2.1MB

                  MD5

                  e063ed1ff826d9211d72dcd9b57c6db6

                  SHA1

                  73edb0e50951df71df4eee9bdf9ecc6b0101994a

                  SHA256

                  7e594b7d01a8cbc819f8527f7d1459b02cff4bf97f1a8bc69daea608f4274108

                  SHA512

                  a8e9d84d88254f2ba4f1e99cf624d4aff1738fb52044cce69500c32f45fbffd42d2d4578bb504dad9147845bf98f5080193eaeead9e84888e35dd9fa187139ee

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Copia.wmz

                  Filesize

                  700KB

                  MD5

                  042063eb8c427e1bfd233c7065936b65

                  SHA1

                  1b19f1d4bfc8a0435c7ab2c6e44bd88ecd79f833

                  SHA256

                  e0e82dd09d0d680f0dfcd750623ae8b1df71300f11ee107e6564160a17e21d3d

                  SHA512

                  178f47c4c5708a605ad0cc69197b4b52d8ef57d240fddff6b49451b3c3108df2d81b3958da249b151672b9e51d594fa7b19232dbde92b4f45c5594aafc81ce42

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mummia.wmz

                  Filesize

                  576B

                  MD5

                  6f6fe96279c933c2170e75f49cf43718

                  SHA1

                  bbe211eaebbeb120b9ca3cd204aacbbeef20cb7e

                  SHA256

                  e6919da4e2658c82ebbcca670053d77e1231a5a600bf5aeaba71e5852e09022f

                  SHA512

                  76160b79d3cbe2fca6d95b096043641a96b13007f287f8e55b94eab16cbb98691a8e8fa8d035da434e84f689bb8d36478f632976481b56c7170889553a629748

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pensavo.wmz

                  Filesize

                  773KB

                  MD5

                  ac9aabe0641c8de39ddb03bf259bb3d9

                  SHA1

                  0f0b52aecbc35aa3348db3f55b556ce539528053

                  SHA256

                  bb77739ba7a169c28248e11dcc0a947c959f66a20ccd5c443fbe7e7585529668

                  SHA512

                  9ac0d5a2ac54917e7eea4b5ef3ac4e877e1dce3694c6b2c04dbbaea7487c1f3130e0ef208b50bd0145333fcad3fe9eb69d1c93675d7629bbeabfbf9b39341a65

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com

                  Filesize

                  544KB

                  MD5

                  59b72032126c30718d4ecf2868ce8fcb

                  SHA1

                  3d9c171d764059325106bda6e2e1590ad31e9c76

                  SHA256

                  68a312dc124c6ee7afb9bed793035409f869409647f08a4b548b664bad925605

                  SHA512

                  299be91a62ac9d37f8ec211d1635610f73b7f9b7ffb14fa9d77eb8401a888ffb39fc4a95a102bdc96e0ecbed99ebc7b8d678504b7636ac8154c0deeacc1de4fa

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com

                  Filesize

                  49KB

                  MD5

                  8c1da89be800bc9a463c81ee79b40a23

                  SHA1

                  390d2e96e12afe8b4ca59810c60bb3b0b411446c

                  SHA256

                  c41d3421ae24b3edb325091ff9de1d0b680c03ef44a36f2acbdfc3707f896b95

                  SHA512

                  f030f72ae5d02f3884197f961256cb088483ae9553234e67a0d9e7b77da306b6a845934268f68aa83dce80776ecb428d06e480234daa1011f58a711ab62b6621

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com

                  Filesize

                  872KB

                  MD5

                  c56b5f0201a3b3de53e561fe76912bfd

                  SHA1

                  2a4062e10a5de813f5688221dbeb3f3ff33eb417

                  SHA256

                  237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                  SHA512

                  195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z

                  Filesize

                  440KB

                  MD5

                  97d6533fd24943920a726c7bde030ff6

                  SHA1

                  2de84ec79f54c7ade1537a50cc1a7c3684f20849

                  SHA256

                  7c38ce86368dc02b7df66b000be053609bd4e49d25995610ed99d2e942ff1b03

                  SHA512

                  e7fd9b167959ab8da8a44ee549536456cd10af4084502ec667aef88514c0fb7285cd95a3e880590fc957fac332fd7298f85282acf134fc08c833cdfc4d545e93

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kw2sd3n5.dyf.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • memory/928-81-0x0000000000180000-0x0000000000188000-memory.dmp

                  Filesize

                  32KB

                • memory/928-98-0x0000000002430000-0x0000000002440000-memory.dmp

                  Filesize

                  64KB

                • memory/928-85-0x00007FFADFD50000-0x00007FFAE0811000-memory.dmp

                  Filesize

                  10.8MB

                • memory/928-207-0x0000000002430000-0x0000000002440000-memory.dmp

                  Filesize

                  64KB

                • memory/1020-195-0x0000000007570000-0x0000000007578000-memory.dmp

                  Filesize

                  32KB

                • memory/1020-99-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                  Filesize

                  64KB

                • memory/1020-87-0x0000000002950000-0x0000000002986000-memory.dmp

                  Filesize

                  216KB

                • memory/1020-177-0x00000000071E0000-0x0000000007283000-memory.dmp

                  Filesize

                  652KB

                • memory/1020-89-0x0000000005300000-0x0000000005928000-memory.dmp

                  Filesize

                  6.2MB

                • memory/1020-175-0x00000000070B0000-0x00000000070CE000-memory.dmp

                  Filesize

                  120KB

                • memory/1020-184-0x0000000007910000-0x0000000007F8A000-memory.dmp

                  Filesize

                  6.5MB

                • memory/1020-165-0x000000006F5F0000-0x000000006F63C000-memory.dmp

                  Filesize

                  304KB

                • memory/1020-163-0x00000000070F0000-0x0000000007122000-memory.dmp

                  Filesize

                  200KB

                • memory/1020-164-0x000000007F750000-0x000000007F760000-memory.dmp

                  Filesize

                  64KB

                • memory/1020-194-0x0000000007580000-0x000000000759A000-memory.dmp

                  Filesize

                  104KB

                • memory/1020-160-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                  Filesize

                  64KB

                • memory/1020-193-0x0000000007490000-0x00000000074A4000-memory.dmp

                  Filesize

                  80KB

                • memory/1020-198-0x0000000073950000-0x0000000074100000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1020-192-0x0000000007480000-0x000000000748E000-memory.dmp

                  Filesize

                  56KB

                • memory/1020-188-0x0000000007450000-0x0000000007461000-memory.dmp

                  Filesize

                  68KB

                • memory/1020-187-0x00000000074C0000-0x0000000007556000-memory.dmp

                  Filesize

                  600KB

                • memory/1020-107-0x0000000004F50000-0x0000000004F72000-memory.dmp

                  Filesize

                  136KB

                • memory/1020-147-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                  Filesize

                  64KB

                • memory/1020-146-0x0000000073950000-0x0000000074100000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1020-111-0x00000000051F0000-0x0000000005256000-memory.dmp

                  Filesize

                  408KB

                • memory/1020-140-0x0000000004C70000-0x0000000004C8E000-memory.dmp

                  Filesize

                  120KB

                • memory/1020-186-0x00000000072D0000-0x00000000072DA000-memory.dmp

                  Filesize

                  40KB

                • memory/1020-126-0x0000000005930000-0x0000000005C84000-memory.dmp

                  Filesize

                  3.3MB

                • memory/1020-185-0x0000000007190000-0x00000000071AA000-memory.dmp

                  Filesize

                  104KB

                • memory/1020-113-0x0000000005260000-0x00000000052C6000-memory.dmp

                  Filesize

                  408KB

                • memory/1136-114-0x0000000073950000-0x0000000074100000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1136-101-0x0000000002F90000-0x0000000003090000-memory.dmp

                  Filesize

                  1024KB

                • memory/1136-127-0x0000000007F40000-0x0000000007F8C000-memory.dmp

                  Filesize

                  304KB

                • memory/1136-150-0x00000000049D0000-0x00000000049E0000-memory.dmp

                  Filesize

                  64KB

                • memory/1136-108-0x0000000000400000-0x0000000002CCD000-memory.dmp

                  Filesize

                  40.8MB

                • memory/1136-109-0x0000000007860000-0x0000000007E78000-memory.dmp

                  Filesize

                  6.1MB

                • memory/1136-131-0x00000000080D0000-0x00000000081DA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1136-120-0x00000000049D0000-0x00000000049E0000-memory.dmp

                  Filesize

                  64KB

                • memory/1136-91-0x0000000004BA0000-0x0000000004BC2000-memory.dmp

                  Filesize

                  136KB

                • memory/1136-110-0x0000000007EC0000-0x0000000007ED2000-memory.dmp

                  Filesize

                  72KB

                • memory/1136-105-0x0000000004C40000-0x0000000004C60000-memory.dmp

                  Filesize

                  128KB

                • memory/1136-148-0x00000000049D0000-0x00000000049E0000-memory.dmp

                  Filesize

                  64KB

                • memory/1136-102-0x0000000002E20000-0x0000000002E4F000-memory.dmp

                  Filesize

                  188KB

                • memory/1136-128-0x00000000049D0000-0x00000000049E0000-memory.dmp

                  Filesize

                  64KB

                • memory/1136-104-0x00000000072B0000-0x0000000007854000-memory.dmp

                  Filesize

                  5.6MB

                • memory/1136-112-0x0000000007EE0000-0x0000000007F1C000-memory.dmp

                  Filesize

                  240KB

                • memory/3276-176-0x0000000002790000-0x00000000027A6000-memory.dmp

                  Filesize

                  88KB

                • memory/3520-100-0x0000000000EE0000-0x0000000000F04000-memory.dmp

                  Filesize

                  144KB

                • memory/3520-103-0x0000000000F00000-0x0000000000F06000-memory.dmp

                  Filesize

                  24KB

                • memory/3520-144-0x00007FFADFD50000-0x00007FFAE0811000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3520-88-0x0000000000ED0000-0x0000000000ED6000-memory.dmp

                  Filesize

                  24KB

                • memory/3520-90-0x00007FFADFD50000-0x00007FFAE0811000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3520-121-0x000000001B5A0000-0x000000001B5B0000-memory.dmp

                  Filesize

                  64KB

                • memory/3520-86-0x0000000000800000-0x0000000000836000-memory.dmp

                  Filesize

                  216KB

                • memory/3560-138-0x000000006EB40000-0x000000006EB63000-memory.dmp

                  Filesize

                  140KB

                • memory/3560-60-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3560-51-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/3560-53-0x0000000000EE0000-0x0000000000F6F000-memory.dmp

                  Filesize

                  572KB

                • memory/3560-141-0x0000000000EE0000-0x0000000000F6F000-memory.dmp

                  Filesize

                  572KB

                • memory/3560-139-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3560-137-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/3560-136-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/3560-135-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB

                • memory/3560-134-0x0000000000400000-0x000000000051B000-memory.dmp

                  Filesize

                  1.1MB

                • memory/3560-54-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/3560-56-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3560-55-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB

                • memory/3560-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3560-62-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/3560-47-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/3560-52-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/3560-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3560-61-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/3676-149-0x0000000002690000-0x0000000002790000-memory.dmp

                  Filesize

                  1024KB

                • memory/3676-133-0x0000000003F30000-0x0000000003FCD000-memory.dmp

                  Filesize

                  628KB

                • memory/3676-145-0x0000000000400000-0x0000000002402000-memory.dmp

                  Filesize

                  32.0MB

                • memory/4376-182-0x0000000000400000-0x00000000023AE000-memory.dmp

                  Filesize

                  31.7MB

                • memory/4376-129-0x00000000024A0000-0x00000000025A0000-memory.dmp

                  Filesize

                  1024KB

                • memory/4376-130-0x00000000023F0000-0x00000000023F9000-memory.dmp

                  Filesize

                  36KB

                • memory/4376-142-0x0000000000400000-0x00000000023AE000-memory.dmp

                  Filesize

                  31.7MB