Analysis

  • max time kernel
    296s
  • max time network
    306s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/03/2024, 00:21

General

  • Target

    b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe

  • Size

    150KB

  • MD5

    5b9ea10c9f277c2a5c89df19044731fe

  • SHA1

    7327c3d7f737e96c37c7bf24100608ce7479d477

  • SHA256

    b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b

  • SHA512

    bf5170bb3ac64b8226c1c27ce05b2cc61ed439f5fb7e8d1f9f975451566c62e888de028716157d37e86070733dd77e187bdfc4d6821548857e436e6e55ab96ab

  • SSDEEP

    1536:0QkC/DSwveRrnxpGPM0aR4EM6VwAVXlVH/ANDJmEpjklo1CgC9VSJ4etRP:0QsRvv0aR41mwgTH/bzG1CcJ4etR

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

rc4.i32
rc4.i32

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

20.218.68.91:7690

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

lumma

C2

https://resergvearyinitiani.shop/api

https://associationokeo.shop/api

Extracted

Family

socks5systemz

C2

http://aakjbvi.ru/search/?q=67e28dd83a5afb7a460aac4a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa49e8889b5e4fa9281ae978f771ea771795af8e05c646db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608fff10c1e9929a3b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect ZGRat V1 2 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 2 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Pitou 2 IoCs

    Pitou.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Windows security bypass 2 TTPs 7 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 34 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 40 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe
    "C:\Users\Admin\AppData\Local\Temp\b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2020
  • C:\Users\Admin\AppData\Local\Temp\5F42.exe
    C:\Users\Admin\AppData\Local\Temp\5F42.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    PID:2344
  • C:\Users\Admin\AppData\Local\Temp\79D0.exe
    C:\Users\Admin\AppData\Local\Temp\79D0.exe
    1⤵
    • Executes dropped EXE
    • Writes to the Master Boot Record (MBR)
    PID:4904
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe
      "C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3808
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:5028
      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe
        "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3540
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3880
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4128
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:4836
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            4⤵
              PID:1892
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\681664450264_Desktop.zip' -CompressionLevel Optimal
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2724
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
          2⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:3268
        • C:\Users\Admin\AppData\Local\Temp\1000838001\judith.exe
          "C:\Users\Admin\AppData\Local\Temp\1000838001\judith.exe"
          2⤵
          • Executes dropped EXE
          PID:4552
          • C:\Users\Admin\AppData\Local\Temp\onefile_4552_133545903041313075\stub.exe
            "C:\Users\Admin\AppData\Local\Temp\1000838001\judith.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1652
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "ver"
              4⤵
                PID:3516
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                4⤵
                  PID:4432
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic path win32_VideoController get name
                    5⤵
                    • Detects videocard installed
                    PID:2628
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"
                  4⤵
                    PID:3304
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic computersystem get Manufacturer
                      5⤵
                        PID:1872
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "gdb --version"
                      4⤵
                        PID:2744
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "tasklist"
                        4⤵
                          PID:4532
                          • C:\Windows\system32\tasklist.exe
                            tasklist
                            5⤵
                            • Enumerates processes with tasklist
                            PID:2408
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"
                          4⤵
                            PID:4876
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic path Win32_ComputerSystem get Manufacturer
                              5⤵
                                PID:4712
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                              4⤵
                                PID:4728
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic csproduct get uuid
                                  5⤵
                                    PID:5012
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c "tasklist"
                                  4⤵
                                    PID:1304
                                    • C:\Windows\system32\tasklist.exe
                                      tasklist
                                      5⤵
                                      • Enumerates processes with tasklist
                                      PID:4500
                              • C:\Users\Admin\AppData\Local\Temp\1000858001\alex12341.exe
                                "C:\Users\Admin\AppData\Local\Temp\1000858001\alex12341.exe"
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                PID:1896
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                  3⤵
                                    PID:4056
                                    • C:\Users\Admin\AppData\Roaming\configurationValue\olehpsp.exe
                                      "C:\Users\Admin\AppData\Roaming\configurationValue\olehpsp.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      PID:2936
                                    • C:\Users\Admin\AppData\Roaming\configurationValue\TWO.exe
                                      "C:\Users\Admin\AppData\Roaming\configurationValue\TWO.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      PID:1508
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                                      4⤵
                                        PID:4968
                                        • C:\Windows\SysWOW64\choice.exe
                                          choice /C Y /N /D Y /T 3
                                          5⤵
                                            PID:4144
                                    • C:\Users\Admin\AppData\Local\Temp\1000865001\dais.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1000865001\dais.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      PID:3196
                                    • C:\Users\Admin\AppData\Local\Temp\1000871001\lastrovs.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1000871001\lastrovs.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      PID:4712
                                    • C:\Users\Admin\AppData\Local\Temp\1000872001\Reload.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1000872001\Reload.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      PID:3008
                                      • C:\Users\Admin\AppData\Local\Temp\1000872001\Reload.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000872001\Reload.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        PID:4740
                                    • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
                                      2⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      PID:3096
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1000874021\random.cmd" "
                                      2⤵
                                        PID:4648
                                      • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"
                                        2⤵
                                          PID:3220
                                          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                                            3⤵
                                              PID:5168
                                        • C:\Windows\system32\regsvr32.exe
                                          regsvr32 /s C:\Users\Admin\AppData\Local\Temp\488A.dll
                                          1⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:1568
                                          • C:\Windows\SysWOW64\regsvr32.exe
                                            /s C:\Users\Admin\AppData\Local\Temp\488A.dll
                                            2⤵
                                            • Loads dropped DLL
                                            PID:3148
                                        • C:\Users\Admin\AppData\Local\Temp\A273.exe
                                          C:\Users\Admin\AppData\Local\Temp\A273.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • Suspicious use of WriteProcessMemory
                                          PID:632
                                          • C:\Users\Admin\AppData\Local\Temp\A273.exe
                                            C:\Users\Admin\AppData\Local\Temp\A273.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Adds Run key to start application
                                            PID:1748
                                        • C:\Users\Admin\AppData\Local\Temp\E029.exe
                                          C:\Users\Admin\AppData\Local\Temp\E029.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of WriteProcessMemory
                                          PID:3364
                                          • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe
                                            "C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            PID:3736
                                            • C:\Users\Admin\AppData\Local\Temp\u2vs.0.exe
                                              "C:\Users\Admin\AppData\Local\Temp\u2vs.0.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Checks processor information in registry
                                              PID:3568
                                            • C:\Users\Admin\AppData\Local\Temp\u2vs.1.exe
                                              "C:\Users\Admin\AppData\Local\Temp\u2vs.1.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2244
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                                                4⤵
                                                  PID:1504
                                                  • C:\Windows\SysWOW64\chcp.com
                                                    chcp 1251
                                                    5⤵
                                                      PID:3000
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                                                      5⤵
                                                      • Creates scheduled task(s)
                                                      PID:1212
                                              • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                                                "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1892
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -nologo -noprofile
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5012
                                                • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                                                  3⤵
                                                  • Windows security bypass
                                                  • Executes dropped EXE
                                                  • Windows security modification
                                                  • Adds Run key to start application
                                                  • Checks for VirtualBox DLLs, possible anti-VM trick
                                                  • Drops file in Windows directory
                                                  • Modifies data under HKEY_USERS
                                                  PID:4576
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -nologo -noprofile
                                                    4⤵
                                                    • Drops file in System32 directory
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4216
                                                  • C:\Windows\System32\cmd.exe
                                                    C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                    4⤵
                                                      PID:2120
                                                      • C:\Windows\system32\netsh.exe
                                                        netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                        5⤵
                                                        • Modifies Windows Firewall
                                                        PID:196
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -nologo -noprofile
                                                      4⤵
                                                      • Drops file in System32 directory
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3176
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -nologo -noprofile
                                                      4⤵
                                                      • Drops file in System32 directory
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3032
                                                      • C:\Windows\System32\Conhost.exe
                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        5⤵
                                                          PID:2120
                                                      • C:\Windows\rss\csrss.exe
                                                        C:\Windows\rss\csrss.exe
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Manipulates WinMonFS driver.
                                                        • Drops file in Windows directory
                                                        PID:1604
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -nologo -noprofile
                                                          5⤵
                                                          • Drops file in System32 directory
                                                          • Modifies data under HKEY_USERS
                                                          PID:356
                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                          5⤵
                                                          • Creates scheduled task(s)
                                                          PID:4284
                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                          schtasks /delete /tn ScheduledUpdate /f
                                                          5⤵
                                                            PID:2320
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -nologo -noprofile
                                                            5⤵
                                                            • Drops file in System32 directory
                                                            • Modifies data under HKEY_USERS
                                                            PID:1300
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -nologo -noprofile
                                                            5⤵
                                                            • Drops file in System32 directory
                                                            • Modifies data under HKEY_USERS
                                                            PID:2344
                                                            • C:\Windows\System32\Conhost.exe
                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              6⤵
                                                                PID:356
                                                            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                                              5⤵
                                                              • Executes dropped EXE
                                                              PID:1324
                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                              5⤵
                                                              • Creates scheduled task(s)
                                                              PID:2740
                                                            • C:\Windows\windefender.exe
                                                              "C:\Windows\windefender.exe"
                                                              5⤵
                                                              • Executes dropped EXE
                                                              PID:2132
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                                6⤵
                                                                  PID:2792
                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                    sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                                    7⤵
                                                                    • Launches sc.exe
                                                                    PID:3216
                                                      • C:\Users\Admin\AppData\Local\Temp\ED3A.exe
                                                        C:\Users\Admin\AppData\Local\Temp\ED3A.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:2336
                                                        • C:\Users\Admin\AppData\Local\Temp\is-E0807.tmp\ED3A.tmp
                                                          "C:\Users\Admin\AppData\Local\Temp\is-E0807.tmp\ED3A.tmp" /SL5="$130066,1542094,56832,C:\Users\Admin\AppData\Local\Temp\ED3A.exe"
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of FindShellTrayWindow
                                                          PID:4228
                                                          • C:\Users\Admin\AppData\Local\Baby-Clock\babyclock32.exe
                                                            "C:\Users\Admin\AppData\Local\Baby-Clock\babyclock32.exe" -i
                                                            3⤵
                                                            • Executes dropped EXE
                                                            PID:4032
                                                          • C:\Users\Admin\AppData\Local\Baby-Clock\babyclock32.exe
                                                            "C:\Users\Admin\AppData\Local\Baby-Clock\babyclock32.exe" -s
                                                            3⤵
                                                            • Executes dropped EXE
                                                            PID:4464
                                                      • C:\Users\Admin\AppData\Local\Temp\194C.exe
                                                        C:\Users\Admin\AppData\Local\Temp\194C.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:4992
                                                      • C:\Users\Admin\AppData\Local\Temp\262E.exe
                                                        C:\Users\Admin\AppData\Local\Temp\262E.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Checks SCSI registry key(s)
                                                        • Suspicious behavior: MapViewOfSection
                                                        PID:3092
                                                      • C:\Windows\windefender.exe
                                                        C:\Windows\windefender.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Modifies data under HKEY_USERS
                                                        PID:1068
                                                      • C:\Users\Admin\AppData\Local\Temp\F537.exe
                                                        C:\Users\Admin\AppData\Local\Temp\F537.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:4580
                                                      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                        1⤵
                                                        • Drops file in Windows directory
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1364
                                                      • C:\Windows\system32\browser_broker.exe
                                                        C:\Windows\system32\browser_broker.exe -Embedding
                                                        1⤵
                                                          PID:4956
                                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                          1⤵
                                                            PID:3692
                                                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                            1⤵
                                                              PID:668
                                                            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                              1⤵
                                                                PID:2424
                                                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                1⤵
                                                                  PID:4552
                                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                  1⤵
                                                                    PID:3684

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\ProgramData\Are.docx

                                                                    Filesize

                                                                    11KB

                                                                    MD5

                                                                    a33e5b189842c5867f46566bdbf7a095

                                                                    SHA1

                                                                    e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                                    SHA256

                                                                    5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                                    SHA512

                                                                    f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                                  • C:\ProgramData\mozglue.dll

                                                                    Filesize

                                                                    5KB

                                                                    MD5

                                                                    59c7771738812384b7a68debb2a68cde

                                                                    SHA1

                                                                    ccb2f0be35cc65b84656180028aab53953df01f9

                                                                    SHA256

                                                                    1ded6484bb133ebdb9af656790722d8d3c55e213c80cec5e45b071e803329dca

                                                                    SHA512

                                                                    f46ed9f96680cb9d71a0925cac2dece436946a3e52bda8651844ba851cdaaff14db7d2a0007cd139f57c35d2a31e38b65ff51a78f82b3a7b4db19655e24f0f77

                                                                  • C:\Users\Admin\AppData\Local\Baby-Clock\babyclock32.exe

                                                                    Filesize

                                                                    485KB

                                                                    MD5

                                                                    5777c6e014eee5ce3bfeaf5e357f2978

                                                                    SHA1

                                                                    178ef69db7b74b304d11428f54800fdc11ac88d6

                                                                    SHA256

                                                                    2a3ff32c012b50b2f240bb022d5d311d75d2e4ffaf14aeef6993784575339370

                                                                    SHA512

                                                                    76a77a01be28180717c561d4e7bc914f41ee1200e4711c8739b005f777537a872355bf2ef10191619582598b6b3f12cd7a1f9718f6902867bd3cd0513ffcc649

                                                                  • C:\Users\Admin\AppData\Local\Baby-Clock\babyclock32.exe

                                                                    Filesize

                                                                    203KB

                                                                    MD5

                                                                    6c46081bc165a2387cbc7affc9e080bb

                                                                    SHA1

                                                                    efc196b45a2bbe61e7725818c19d30360b607f99

                                                                    SHA256

                                                                    ccabd223356495f9fb9d9ed146930843156fd68edf189c7cf87045d03c06c166

                                                                    SHA512

                                                                    3587e6b1ea9fff145cf5bdb84cc42c64e3177b8bb7b204e92c73bdc35dd32100c08e0c7b8bee15717237cc3d71b6d442a3ad749648965634f1249f9b25998a9b

                                                                  • C:\Users\Admin\AppData\Local\Baby-Clock\babyclock32.exe

                                                                    Filesize

                                                                    446KB

                                                                    MD5

                                                                    6bc99856e25225ac6dd5a2ba8bce492a

                                                                    SHA1

                                                                    2feb08968418fc46766985f6ed9300e51c063861

                                                                    SHA256

                                                                    c4b287bd5739ce1d4c28285eda7de2cac59f661b9766b5f365840e68d1c1ff04

                                                                    SHA512

                                                                    26a3813540551478f1266b5e303de580ec34266b4316c25d005f36df1934e6f7baf53497aec2066be650e0a5a0ad813f43b737228bd001c6eebd42eb9329353e

                                                                  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                                                    Filesize

                                                                    331KB

                                                                    MD5

                                                                    f5f35ba2df4ccecbea51715268aa5f19

                                                                    SHA1

                                                                    a5d48762ff5ef376b4d16120cc76414a353c6bec

                                                                    SHA256

                                                                    b4be9c99278669d02f0caaba8154aded8d99900b060dc99f5c0d2cb5b8c54457

                                                                    SHA512

                                                                    08685a433925c3697db63362914f9fa764d56c8990488f9645f6acb8a11020ef50e1c2bacc6260f068692ac83904188bccf12b41f3415ce9770752ab985a410d

                                                                  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    3bf261c0a00e880ee85c3e5d53f46e1e

                                                                    SHA1

                                                                    0e22830cd59a76ba4e7da643d1a4054deea4c7e5

                                                                    SHA256

                                                                    d0f4716356c11256ce372336dee85883a2696134f28b7b123e6fb76a6bf7fa3a

                                                                    SHA512

                                                                    538243d1b37f2b74c3fa5ab2d04ca379f743b758c268f11b5b16e2797427b3029ecf54896b9b5c0e67a7ae0c0de0c29cdb1f7f6ebb54aa059a4b1f3fbcab0d55

                                                                  • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe

                                                                    Filesize

                                                                    318KB

                                                                    MD5

                                                                    69c8535d268d104e0b48f04617980371

                                                                    SHA1

                                                                    a835c367b6f9b9e63605c6e8aaa742f9db7dcf40

                                                                    SHA256

                                                                    3c74e8c9c3694e4036fea99eb08ba0d3502ad3fe2158432d0efdfaacd9763c35

                                                                    SHA512

                                                                    93f35aa818391d06c4662796bec0dced2dc7a28b666c5c4bf6a6f68898ed52b77fa2ac7dd031b701b1ab8ae396e8941ade4ef0159765419788034742534a0c9e

                                                                  • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe

                                                                    Filesize

                                                                    555KB

                                                                    MD5

                                                                    e8947f50909d3fdd0ab558750e139756

                                                                    SHA1

                                                                    ea4664eb61ddde1b17e3b05e67d5928703a1b6f1

                                                                    SHA256

                                                                    0b01a984b362772a49cc7e99af1306a2bb00145b03ea8eca7db616c91f6cf445

                                                                    SHA512

                                                                    7d7f389af526ee2947693983bf4c1cf61064cfe8c75a9708c6e0780b24f5eb261a907eeb6fedfaefcd08d8cddc9afb04c1701b85992456d793b5236a5a981f58

                                                                  • C:\Users\Admin\AppData\Local\Temp\1000838001\judith.exe

                                                                    Filesize

                                                                    9.8MB

                                                                    MD5

                                                                    6373aea19e56f293f2a517d5c5ac8471

                                                                    SHA1

                                                                    65f14923a7c4b777d197f8e9a35c789039f058c4

                                                                    SHA256

                                                                    a0d2daac0c08575be8da1159d5369348aa6a21ca016b572abba1bb704a287c93

                                                                    SHA512

                                                                    4d76823c15c63924a067229e409f19f91d066296dfda0b7757d38c818ff604bd1fab3fb15f31351282ed584c760ca95e66be49be4f3acec31a226fc3fae91b59

                                                                  • C:\Users\Admin\AppData\Local\Temp\1000838001\judith.exe

                                                                    Filesize

                                                                    6.0MB

                                                                    MD5

                                                                    a74ba7d88a3a579d206a98eaf2cbe7dd

                                                                    SHA1

                                                                    b285982bf02baaefcd4d1b7643bd343acf4a5385

                                                                    SHA256

                                                                    08a6af1cb94afafabd9afdb4579091ea8956e595f16c36d1076fc60e25569f82

                                                                    SHA512

                                                                    f709977e84724d383baadebc62ba8d4641c57ca88dd368c61e00d34625b92a5312c1b90ab25a3faf989df45e2c3bb884117ea2d5c4c7ee1d58f033a0c0154cf0

                                                                  • C:\Users\Admin\AppData\Local\Temp\1000858001\alex12341.exe

                                                                    Filesize

                                                                    1.7MB

                                                                    MD5

                                                                    2b648280f8c5e94477ba7521982c0375

                                                                    SHA1

                                                                    c7d31fd2ae975ae8f409f47dfb044e3972e548c0

                                                                    SHA256

                                                                    0c3419ff8ddebff25027285ff876f30569e7915b993930411b230cfbf3e52214

                                                                    SHA512

                                                                    168265315dfcfd666cb681da84d0616fb74f9e389073a5a377acbca45320206097f59cc629ea93b8618ec8a265ef6a0a0d5e4a45f26ef133f53ca40234eb314f

                                                                  • C:\Users\Admin\AppData\Local\Temp\1000865001\dais.exe

                                                                    Filesize

                                                                    310KB

                                                                    MD5

                                                                    1f22a7e6656435da34317aa3e7a95f51

                                                                    SHA1

                                                                    8bec84fa7a4a5e4113ea3548eb0c0d95d050f218

                                                                    SHA256

                                                                    55fbfaaeee07219fa0c1854b2d594a4b334d94fad72e84f9f4b24f367628ca6c

                                                                    SHA512

                                                                    a263145b00ff21ecaf04214996f1b277db13bdc5013591c3c9cf25e9082fc99bc5e357f56aba4cea4dbcc68f85262fe7bbd7f1cec93cde81c0b30dae77f1b95e

                                                                  • C:\Users\Admin\AppData\Local\Temp\1000871001\lastrovs.exe

                                                                    Filesize

                                                                    148KB

                                                                    MD5

                                                                    7789d854c72417f4b49dcae6221348b0

                                                                    SHA1

                                                                    5d4a1f85c12db13735d924d5bee5fd65f88569e2

                                                                    SHA256

                                                                    67a8db376b3438977898afc7c53a01c041191f7e7631c2f14945d55393286185

                                                                    SHA512

                                                                    21e27ffed153cd5e70b81cfd69520316d447e91b6a5f33ddc544ed94efe4f3d1724d301335b8045a4e0997d598c02cf849a754a056021fe776893c34367a2cf9

                                                                  • C:\Users\Admin\AppData\Local\Temp\1000872001\Reload.exe

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    cd43563f128c43c3ecebd7c31e56457c

                                                                    SHA1

                                                                    83f0f5d8996b25182708187bd22c3de05730396d

                                                                    SHA256

                                                                    03bfb038c7a815aaff7d853e8efff4da1d56cb4cc7258ba5ef3d3bb9252b0ea8

                                                                    SHA512

                                                                    a882c02c3ab304ea39c37ebd77fb6e5294302f41d9ffc17cd0dde087915268a1268eaf8b0a211b4dda56bfd8b2d674f3e14e6e92a9df5cc4a36d673849138639

                                                                  • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                                                    Filesize

                                                                    3.0MB

                                                                    MD5

                                                                    b846ec063ea8877bccad51d8c84e80e8

                                                                    SHA1

                                                                    777854df5b1dd002d9c4b33603e4b0ad97f32189

                                                                    SHA256

                                                                    d8fd71efa4b023579e3af5a3c07aceda647d8352c5cb5f8d06fce0cab622011f

                                                                    SHA512

                                                                    d50c865a6f31502286edd3e48e4525942ba1d44527a243187a3d99881fd86fd8b3573ffeca7d04d1b07cbc2f408779b6c6ace6da01a24a9f22855799cb22425d

                                                                  • C:\Users\Admin\AppData\Local\Temp\1000874021\random.cmd

                                                                    Filesize

                                                                    104B

                                                                    MD5

                                                                    7ca00195b480ee284ddaebfea321f27e

                                                                    SHA1

                                                                    a9ef34c03c1285c450b0414a20fce7f9533f7fa6

                                                                    SHA256

                                                                    c133cb730f4483b60434981714e8544a30bdb422376495c74aabeb16b13fd5d6

                                                                    SHA512

                                                                    c78ba3153ac0999f71c1ab0e5c4738e2e46d03f6567045e8c5ec3bd7157adabe4ce61b56554c546ce6070f09c84f26a64354ffaef0bf32175a4b40c27d4a3035

                                                                  • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    657dd6ca05ec5e38b6adee1327bcbf38

                                                                    SHA1

                                                                    c2bb2937a782b8c1bf7b07b94402d667397c049a

                                                                    SHA256

                                                                    fe43c96a81a2c21e0285a8ea1e5cc635ceb6ba1f8081b20632d64c9db2f6dbb8

                                                                    SHA512

                                                                    59b968409cca78cb1a60442ef798a5787c5834196de46914186081dbee530a937b1459ac32e20c49acb4087ed7e7eda3623f2eb178216d84c120ca09f9733d32

                                                                  • C:\Users\Admin\AppData\Local\Temp\194C.exe

                                                                    Filesize

                                                                    271KB

                                                                    MD5

                                                                    7b54b391681027fb51711c824f593db1

                                                                    SHA1

                                                                    6f351034e261de0053d8e228b2e25069906037bc

                                                                    SHA256

                                                                    37c0c5800bc03cd65bf2331c341dcdd4449341c899cf512ac75b47b3ebe2be0f

                                                                    SHA512

                                                                    6bfdc1df86777b3fc305dfa7b59199d93172214739eb5840ce7e677d2327b6a8f3befd2a7bb2325bdf76aa1db479b6214dce8ad421467178bc741ac500276d38

                                                                  • C:\Users\Admin\AppData\Local\Temp\194C.exe

                                                                    Filesize

                                                                    374KB

                                                                    MD5

                                                                    1ea866fc1d0bdc24ccf315550fd84431

                                                                    SHA1

                                                                    e7cb42927cf8ade7134bde7a39dc8551218ee5e6

                                                                    SHA256

                                                                    ba8bc6751e192c9dfe590f036fc64acff9de711bc940e284a3462f8029347894

                                                                    SHA512

                                                                    16a1bc1c83072ae4de36205cc6950c475aa1ff210aff2d20a3d4317d938619c9b3f322f973dfe10e2ebbbce0f853ae72df70370a47bef28cefda4013afa38fe5

                                                                  • C:\Users\Admin\AppData\Local\Temp\262E.exe

                                                                    Filesize

                                                                    169KB

                                                                    MD5

                                                                    d13cd682374380b3a29076ba54e138f3

                                                                    SHA1

                                                                    61b56e0380a93e7bb347d4b954b7a4170bff0ff3

                                                                    SHA256

                                                                    b28db9f53e35e032f947ea02ab2b1f44c8504c5a9b1058b226aaebce82e60ea1

                                                                    SHA512

                                                                    2f853aaca0c44aec53df333e324c861b35d741e4395599f5f69c34ac517cbe737e5fbf29dff20950d930a7d65dbd1324ce4cd5cab01fb6c79380d8f931f8da24

                                                                  • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                                                    Filesize

                                                                    904KB

                                                                    MD5

                                                                    96891c2c5101824429aaf6f9395c7e4d

                                                                    SHA1

                                                                    313af341bc31398c718da49c2d751e7583009999

                                                                    SHA256

                                                                    f1486de1779898a1f92c8483f4e78ddef78700c356c93d505718629a69cd4b94

                                                                    SHA512

                                                                    e9143ab8b589c6b32b3418e658a6bb521dc0d37bb2c9c605f0fedd41446e27587dd1660b246ca1f689d5b935706557cc866655333817888bcbb2da00a886a77b

                                                                  • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                                                    Filesize

                                                                    797KB

                                                                    MD5

                                                                    183f0aa48a3d7e1ea1b26edcb9df2074

                                                                    SHA1

                                                                    1e905ce8551597a58eb85f036b9e78535ef69523

                                                                    SHA256

                                                                    192a396a8d384e8389917beeca5cd6e47da61e6eccba9056f6c86c8da2d4a1e3

                                                                    SHA512

                                                                    83229cfdb1267e96eeb7544ba03af63446ce1afc354ae2b5e4253159992505852d2c3903266a1224f65dc5935def855fbefef3101ffcdc07d574b758c7784cae

                                                                  • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                                                    Filesize

                                                                    115KB

                                                                    MD5

                                                                    3848bd494b95172c3b58911fb2835cea

                                                                    SHA1

                                                                    070340c4f0c8104a537de0e9e65318fc91caaf1c

                                                                    SHA256

                                                                    ac558156a9e8c71d6aa9be135ecc08b8fe43e5370f7d474dd49a9bbbcdbee0c3

                                                                    SHA512

                                                                    db13428ce20f024d25f11ef02ec9866fd3662117c4e92b212c746af04a0604046d0395e898f564565f6325ac1d739e0179b0ed5cf29ce5d4ebe98e26618c7455

                                                                  • C:\Users\Admin\AppData\Local\Temp\488A.dll

                                                                    Filesize

                                                                    1.3MB

                                                                    MD5

                                                                    ce8502602b0d336abf35d2d58e02a95c

                                                                    SHA1

                                                                    820bb7add66ce50f3677ab5243b459556b65b844

                                                                    SHA256

                                                                    c96a7437539ca25c69ed360def7af6fe49236f1c3c08fa3da62bfdcffdc0ca7a

                                                                    SHA512

                                                                    911a3cfd08c75544ca00eac7e3385dad2006e07db8a820e7cd4eb1a98fab0084ade15bed31f141d1fb85cd477b7e289bc943ad060c4a13c5794cb7071b35536b

                                                                  • C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdesc-consensus.tmp

                                                                    Filesize

                                                                    2.6MB

                                                                    MD5

                                                                    644af8539f55f0befd6a627315ca084d

                                                                    SHA1

                                                                    6eeace8ebdb33cf550da634c045636144567dc31

                                                                    SHA256

                                                                    95eeafb7b3034bad1aa6ecda9c81d21d510b6b38d521a2d31a76297573aad61d

                                                                    SHA512

                                                                    8c4a3b65404daafeda372439e350935088cf1d8e895da1a86a2b22b6367813bacc4be8c885fc4071dc39c4d6ff9404b4cd38a716c68e9deb09cf1ee70eeef33a

                                                                  • C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdescs.new

                                                                    Filesize

                                                                    2.1MB

                                                                    MD5

                                                                    f0468632e17d4a600bc3f1c1ef2bd17d

                                                                    SHA1

                                                                    55e2571f217fd9e32ffdd19d70da8392fdb9a4b3

                                                                    SHA256

                                                                    571dba33a259667a0f798e24beaf140ddff98a38ffc584fc8903230e84973302

                                                                    SHA512

                                                                    9db02bbf56b698aba1eb4ab06bd81e83a463adf8da7259af022de6e6f91aff90d30fff36e67ec5dab197e799cea457ea9e0bf9b9a96d6a599446877b5f2df32a

                                                                  • C:\Users\Admin\AppData\Local\Temp\5F42.exe

                                                                    Filesize

                                                                    1.4MB

                                                                    MD5

                                                                    7dab1822a011825172ec330d52d0c981

                                                                    SHA1

                                                                    cc6c8e544475daaa7a9c1d805f25acface990507

                                                                    SHA256

                                                                    674f8e49960827c86059f9a73cb0f672cbe90027eeff75f4b0010509229b8dff

                                                                    SHA512

                                                                    924aafd54fe9009ec369e930b49fe83e661f13b2a45393f69175df39ef8d41e667abfd32a9a00e1a07db73340d5ad19743b6eff590e3be224b4b34aaab03e64f

                                                                  • C:\Users\Admin\AppData\Local\Temp\5F42.exe

                                                                    Filesize

                                                                    1.5MB

                                                                    MD5

                                                                    003b1f37124396ae15d3920e03eb3d99

                                                                    SHA1

                                                                    195e9e1f3bf71e9f91dc67c6f06477bafb04b139

                                                                    SHA256

                                                                    db1928cd1ff8239540aba6987de87dcf7e80b71623817c7fe4787f708e14ec9e

                                                                    SHA512

                                                                    135b2d69440f5921f5ca824a8329a245edd6cc78e63c71e62027e6e8b4186efb4b9544e2543fa7658f1e8417f32926a3aba06b987ee0361f1d1bc40dc585992a

                                                                  • C:\Users\Admin\AppData\Local\Temp\79D0.exe

                                                                    Filesize

                                                                    554KB

                                                                    MD5

                                                                    a1b5ee1b9649ab629a7ac257e2392f8d

                                                                    SHA1

                                                                    dc1b14b6d57589440fb3021c9e06a3e3191968dc

                                                                    SHA256

                                                                    2bfd95260a4c52d4474cd51e74469fc3de94caed28937ff0ce99ded66af97e65

                                                                    SHA512

                                                                    50ccbb9fd4ea2da847c6be5988e1e82e28d551b06cc9122b921dbd40eff4b657a81a010cea76f29e88fda06f8c053090b38d04eb89a6d63ec4f42ef68b1cf82b

                                                                  • C:\Users\Admin\AppData\Local\Temp\A273.exe

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    996c2b1fb60f980ea6618aeefbe4cebf

                                                                    SHA1

                                                                    a8553f7f723132a1d35f7a57cae1a2e267cbc2ac

                                                                    SHA256

                                                                    f91c0a4753cdb98cce0ade020917fdefe7a8daf88d23b4c07595de741402ca50

                                                                    SHA512

                                                                    4af8fb921a332c5ac3d43b85bc23c859e431702e00852537bf1831c7af8b990d880808d044a1317873c77fbdecb1af7c97bed9edd9e2185bcbfa390c463f9056

                                                                  • C:\Users\Admin\AppData\Local\Temp\A273.exe

                                                                    Filesize

                                                                    1.0MB

                                                                    MD5

                                                                    2f0b489441fdf7dbc9e4a500d43ad609

                                                                    SHA1

                                                                    45aceb375ac5b10f2b1b95d234be37201fec1a41

                                                                    SHA256

                                                                    012aabd3609dc97d69ecda4d9d1a945784e5bf7f96300b078c5ea72ebc5b5ab4

                                                                    SHA512

                                                                    055ab64d8e921ff6d6f63b978e1cc2dba19bb9b4cfa724ce61b09a0d48afffdec87a63493dcf018c76d9c1767c08041c53145e989f9e7082a06ee821381aaa10

                                                                  • C:\Users\Admin\AppData\Local\Temp\E029.exe

                                                                    Filesize

                                                                    2.1MB

                                                                    MD5

                                                                    597926706396f3760f9af7cbf080e0f3

                                                                    SHA1

                                                                    34f5c9d56465e2935446afbd966f0781e780441f

                                                                    SHA256

                                                                    264f7076f6ec2b42014fd3004b0da6844581d17ba8366a8cfd502ec614fe04ed

                                                                    SHA512

                                                                    28ab5e71c5bd2738162af0fb492c23bbc40a9ac425c961ec602c7ecc0fbba6d30c40f37de348043097f2bc4d895df08a571382c3fd55108825e2a16f42582893

                                                                  • C:\Users\Admin\AppData\Local\Temp\E029.exe

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    54ce29ed42b9d1d5766fd5415dba0afc

                                                                    SHA1

                                                                    f76a8c5a07a7d184bb9b5ab0386a0578be56d890

                                                                    SHA256

                                                                    87915c381a535afdb1042872517904e4a582b4d36bad064dd8d234c5d2483197

                                                                    SHA512

                                                                    e232908e6575b977cee8ae1dcf98d96ab057eb3bd73f298f70ec97621e910d8c000d6d1753332d658f0deedcdf6b0bef96ebeb1cb5a5b16773b7a2910513a046

                                                                  • C:\Users\Admin\AppData\Local\Temp\ED3A.exe

                                                                    Filesize

                                                                    209KB

                                                                    MD5

                                                                    884ceb66120844aeb2892dd5d79b9bcd

                                                                    SHA1

                                                                    54a398df969663b685ccd915c37c3e3a3e115f69

                                                                    SHA256

                                                                    f76192d9e28ed53e565231bbb90791106afb25f80229a60cda5e5df4418ca4cb

                                                                    SHA512

                                                                    b720e6e224a76de7310f1684d9d5faeafe7ac69ab52b2de009bc4ab20edecbf8ea3614801aaedad0c537b9ff88559aa6d1285beb627dbca261bc9e515fb3b350

                                                                  • C:\Users\Admin\AppData\Local\Temp\ED3A.exe

                                                                    Filesize

                                                                    308KB

                                                                    MD5

                                                                    abc9257fb49e5eb767e56a78b8a9dd55

                                                                    SHA1

                                                                    4249cc8d8966d2db66dfac8df0053c2a56e33e07

                                                                    SHA256

                                                                    85877f7ed084e45faa17d44302b5c97af8d09ab32f575b1af184ed981b64e735

                                                                    SHA512

                                                                    4e67b6b9bfe9dbf119271b7f6376e43f373322f5d05569d48d283d253f17b472f53ff749b5c62db177d6efcc46a7efcbf579a3e0464690f25d64a75bedb4285a

                                                                  • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe

                                                                    Filesize

                                                                    331KB

                                                                    MD5

                                                                    4d07092a87d4212cd8b2bf4d7576c1a0

                                                                    SHA1

                                                                    bf5fe8140ff117b171efda94b25a5cd52e6c276d

                                                                    SHA256

                                                                    c659350d81f9bed61a7c300cf55ad211230a337a624424c0379f589de2bb20a1

                                                                    SHA512

                                                                    d1fe5eb758db5a34bd846c08e5240e0473b72b2604b846b5cfefa10c3b2ed7b0e948ccc26fddafa646ee526082b1445454f740767faa7488268082505b144bb4

                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ghgxarwb.yzl.ps1

                                                                    Filesize

                                                                    1B

                                                                    MD5

                                                                    c4ca4238a0b923820dcc509a6f75849b

                                                                    SHA1

                                                                    356a192b7913b04c54574d18c28d46e6395428ab

                                                                    SHA256

                                                                    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                    SHA512

                                                                    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                                    Filesize

                                                                    281KB

                                                                    MD5

                                                                    d98e33b66343e7c96158444127a117f6

                                                                    SHA1

                                                                    bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                                    SHA256

                                                                    5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                                    SHA512

                                                                    705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                                  • C:\Users\Admin\AppData\Local\Temp\is-E0807.tmp\ED3A.tmp

                                                                    Filesize

                                                                    105KB

                                                                    MD5

                                                                    ca63af5d23bf201e0866ac3803e084b4

                                                                    SHA1

                                                                    f0363c58f82f638769d2e2c5ae1b2214d8b53b62

                                                                    SHA256

                                                                    cff14ee8280ddfba78a986b1737d305e705f6fd493feac701d8d17ab7b5491ee

                                                                    SHA512

                                                                    54809d1fe244045ef0b7b3451c9ff2d62d6bf6a6c30ea626a61b6dbc62fe05f791725a8f47e70ddc1e67337b6185ca07afce826e19a042caafc404dc667ae4b2

                                                                  • C:\Users\Admin\AppData\Local\Temp\is-E0807.tmp\ED3A.tmp

                                                                    Filesize

                                                                    119KB

                                                                    MD5

                                                                    75c8c484762f880d50712a5f550b5191

                                                                    SHA1

                                                                    1b871c047f2879d07aa51eafca55033dbca1fca9

                                                                    SHA256

                                                                    cbeed4031fc764ee346a65fd71497ceebb22f6f2797e8ab28c1d78417dbe97c9

                                                                    SHA512

                                                                    ce80d783bab2bb68e283a3e63703afec96ead7135ef4179d5100b00fde4414e3be23d8169d8516a304b34c9c7fc65ff254b76f0bf2bbcf0a04277735b2626956

                                                                  • C:\Users\Admin\AppData\Local\Temp\onefile_4552_133545903041313075\VCRUNTIME140.dll

                                                                    Filesize

                                                                    96KB

                                                                    MD5

                                                                    f12681a472b9dd04a812e16096514974

                                                                    SHA1

                                                                    6fd102eb3e0b0e6eef08118d71f28702d1a9067c

                                                                    SHA256

                                                                    d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

                                                                    SHA512

                                                                    7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

                                                                  • C:\Users\Admin\AppData\Local\Temp\onefile_4552_133545903041313075\python310.dll

                                                                    Filesize

                                                                    3.6MB

                                                                    MD5

                                                                    726563d711d7f55ae03c54436008db28

                                                                    SHA1

                                                                    2be76064525953dc65a589d6752f5363c131540a

                                                                    SHA256

                                                                    b91a0ab9f8b280fb3cd54e21a5ca197c84aea54727c24fccf87785d384b0f048

                                                                    SHA512

                                                                    8ded9c3eb57d09f71d266c3f086b57e126a123615a41f0aa3266a3de4cb62af3c604d05a322843ee96a055f84df3f6c0ac92dba186ce8fc4abfd1a5d23bf7d4b

                                                                  • C:\Users\Admin\AppData\Local\Temp\onefile_4552_133545903041313075\stub.exe

                                                                    Filesize

                                                                    4.0MB

                                                                    MD5

                                                                    70ee08ec3a264f35769b6734474559ea

                                                                    SHA1

                                                                    fd3ac1c01793a5d70d28a4f1321631035970785e

                                                                    SHA256

                                                                    d5cdbc947915ebe745f2d3c54ddfd8a075aad8512f817bb02a55d50f8d7ccf2f

                                                                    SHA512

                                                                    1d8f2f7ecbb1edb4de4bb108769d8a58ad54c1bbf64a81667799d2018db6cd509aa458f575d3d932832e71e3e054ab4e1e5af5d44916d923a08f68f262e6adf2

                                                                  • C:\Users\Admin\AppData\Local\Temp\u2vs.0.exe

                                                                    Filesize

                                                                    108KB

                                                                    MD5

                                                                    8a9d3e3e39153e36bed6b8fe1b3c6454

                                                                    SHA1

                                                                    0353043dd3b9701a7a9306c2a617bff82e2ef8c3

                                                                    SHA256

                                                                    f0e422dc6bbb5b066df6701db4d032b21a9ecf0447576ea6ad074b2bea3ab9db

                                                                    SHA512

                                                                    bda93f5ee45b6c0b0ef8d82f5d7ddf78ed30b81ed045fb3047677bdedc2ac926de2f692a024b91b1953c2497b82d41656ad622888b5f0e2e5fe4614cb28df96e

                                                                  • C:\Users\Admin\AppData\Local\Temp\u2vs.0.exe

                                                                    Filesize

                                                                    106KB

                                                                    MD5

                                                                    61315b5f41324b0511965c69464fe034

                                                                    SHA1

                                                                    8e112f3f2efb15309804e30a4ea883d8ce67e6bc

                                                                    SHA256

                                                                    a94bbbcd74523d9d3912be4266101e9307a6b0525125b14ed7eb318826815684

                                                                    SHA512

                                                                    ea78fa60a7138e558acfd5a701abc394eefc3a6a052345ec686e2daeb5cc8a7483e7da6ffc7400bf32be3773cbbdc7565da100e2c11fec332cddc14580c80b65

                                                                  • C:\Users\Admin\AppData\Local\Temp\u2vs.1.exe

                                                                    Filesize

                                                                    352KB

                                                                    MD5

                                                                    90e897d7e99cca9f85deeeff3256fa61

                                                                    SHA1

                                                                    a7d422951f1e2b0776f83eba190359f9f5e49808

                                                                    SHA256

                                                                    69e188b67040891c1250552955734aedd26bdb2209ce6fde45c9a71f0b0a1a47

                                                                    SHA512

                                                                    6c140d9766081382eda1d99cfb8e64a04fa44fa09e86dd59d4e68d2858a3613c05b584e79f82042534bcbeb54094a195b29e0892c80a64d495d00fdcb51a76de

                                                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                                    Filesize

                                                                    109KB

                                                                    MD5

                                                                    2afdbe3b99a4736083066a13e4b5d11a

                                                                    SHA1

                                                                    4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                                                    SHA256

                                                                    8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                                                    SHA512

                                                                    d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                    Filesize

                                                                    589KB

                                                                    MD5

                                                                    11d99e0ad6a7a48d19184e65217d9a20

                                                                    SHA1

                                                                    9559d75cd1db48a91a9b7e55983230e37a27c759

                                                                    SHA256

                                                                    546cf542f058de05a02ce682edf53447b238bce29edee2879b7ee4acf5301d84

                                                                    SHA512

                                                                    741fe1f4e895bb8565febc285de9279b89a614e6bc1364873d5a98c0cde3cb56517486643415c81b7f44fa28f46cae3ef485f24bcc1368f8826f4caa98ed65f2

                                                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                    Filesize

                                                                    658KB

                                                                    MD5

                                                                    3d9c1b83dbf8ae0785f7876220a79542

                                                                    SHA1

                                                                    60cb4083077d1e6dfed3aa03a1c0794b4e96c0d7

                                                                    SHA256

                                                                    fc54cdd081f84c001953517294358601b93605a9a7359adbe900cb006953cc1c

                                                                    SHA512

                                                                    e6f98139c5eebd1b972dee459da00e2190b60a83b12ea96eedcad7883b0cffbf0989c693d75a2535e34764b3f5b23e25b07fc0f7d3d5c2e4710efaaef821bf9d

                                                                  • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                                                                    Filesize

                                                                    128B

                                                                    MD5

                                                                    11bb3db51f701d4e42d3287f71a6a43e

                                                                    SHA1

                                                                    63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                                                                    SHA256

                                                                    6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                                                                    SHA512

                                                                    907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    1c19c16e21c97ed42d5beabc93391fc5

                                                                    SHA1

                                                                    8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                                                    SHA256

                                                                    1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                                                    SHA512

                                                                    7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    90aa5c77523d829a8f26b0acd4e27e9e

                                                                    SHA1

                                                                    53b5ea3881370473646955371b684d0b3050e98a

                                                                    SHA256

                                                                    e76ae9ad219e5b3710e0f38465266c66140981b6bbeb33bce50c62ef0896639e

                                                                    SHA512

                                                                    cd7994a9e1aa619def8adf904211c1fc0a9298677f3f7e0017f3223befed77c87ca6397c253811560efa57f36e1e7234d43bdb176fc1fea4406b96ab47c4998e

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    5e36d8e50b79689c2ec8dcdcad33ed57

                                                                    SHA1

                                                                    bec720ac9d77fe73b680b2cc68206e8393e33d6a

                                                                    SHA256

                                                                    35b517589d03788e0df071aecb320658e69da41c2d937c9500769f85c11af915

                                                                    SHA512

                                                                    613d255532f018be9f2b7488c08e6f46d3b954a64ba5d24e3a70e2b4778ff2eadafa2027f4ae62ee39f5158d1ff2472232cd8cc3782ebd1d20aa57e7233f1c9a

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    7ddec1b20fe8da500272bcda73132bf4

                                                                    SHA1

                                                                    04bc5b47224fd1b53879d06f08d45de45eda33c3

                                                                    SHA256

                                                                    d8835cd32aec3952cc981d1b43d389e62124383573702c17c23675fe596a2d4f

                                                                    SHA512

                                                                    509f30835c96d997f5a0a8e4aae40dd2745bf28fcdf9367f3aaaa9e3f7ef913fd7b965d49f17a62edeaedeaa21f5d79a97db48c90f6637a353a52096f1239cf1

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    64d4193437678fe9dc82b9b2a4bb5b15

                                                                    SHA1

                                                                    c15b9ec64f81e6a22a171c052cb9f718a82d6fe8

                                                                    SHA256

                                                                    77aa9294f386f0c2a59d39725ea3f7f26f1eb153b8a4e6bbd9576c34d2c4b5b1

                                                                    SHA512

                                                                    3cbc96407ba74101f0d180a83daaa0adc3f12865f60f9e75c0865ea5ad7c6e3102b139e377fcc218a878e92662c2b4c243ebdfcb2e68e1946b15049c6ea86d7c

                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    bcdc3f0fff8be67a930583e8d24f4347

                                                                    SHA1

                                                                    b2036140f250764cec4fb5de622db25659c70231

                                                                    SHA256

                                                                    5d45c416990462240d7f00427f8294158fd67294fc58cfe29bf0fb7810551f62

                                                                    SHA512

                                                                    852a3f6877f46b7036a9c6e45e05bdbc3b0f0313fd07478bf3b206dd898a037d075588539c5ec28e1495730b5791a766d03aea32e5281b64863751d7529f4716

                                                                  • C:\Windows\rss\csrss.exe

                                                                    Filesize

                                                                    719KB

                                                                    MD5

                                                                    3fb54e3108e188b407e24605bf996552

                                                                    SHA1

                                                                    866b9d6949d5b0dc03727059fb6a9acc760fff90

                                                                    SHA256

                                                                    e006e26e7551c4994f224a507c979ee96fd7bce218df52560637f9e09f4573c0

                                                                    SHA512

                                                                    6602a07a939c68cb7faed4fb140d5216f7ae9f3983650634e6d169a3be3646f956b76cc2f4e1b0a487aef7347eaa1a254822590eb5ab99435971dd8592245a75

                                                                  • C:\Windows\rss\csrss.exe

                                                                    Filesize

                                                                    805KB

                                                                    MD5

                                                                    47811de28c5002954685fc8049141064

                                                                    SHA1

                                                                    d57cb6b2d2ffd83e5f7aae5712a870d0b86b67d2

                                                                    SHA256

                                                                    b5197f8c91bc411a5ea55522747c64aa53786cfd6fc20732e53b9839e4a13943

                                                                    SHA512

                                                                    48e59b5fe11cc2a626bc91b0f811ffde550bb5c1602fda4a3dd2745e4b89da6082fdb48753e8e9ea70aaa6181ffe88a1af7392df1c8b503ce27187d51934dc33

                                                                  • C:\Windows\rss\csrss.exe

                                                                    Filesize

                                                                    628KB

                                                                    MD5

                                                                    56d430609ebfa5d7e832e50e556e2954

                                                                    SHA1

                                                                    a4d5ef28ebccabb410776bd498bb8606d83dff5b

                                                                    SHA256

                                                                    6e73d4053acbc9994c41c37f2e44b6e7d2ddc3fe915e67d13c1e7d602b60a1ec

                                                                    SHA512

                                                                    a750c550b0808a0620fb5e4756e74a94839bbdc598c9539cd0cba2263d3612cc555a5803668f03bb3d0d95431e1de3f8fe596385cd31e2882a91ff928d611aff

                                                                  • C:\Windows\windefender.exe

                                                                    Filesize

                                                                    2.0MB

                                                                    MD5

                                                                    8e67f58837092385dcf01e8a2b4f5783

                                                                    SHA1

                                                                    012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                                    SHA256

                                                                    166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                                    SHA512

                                                                    40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                                  • \ProgramData\mozglue.dll

                                                                    Filesize

                                                                    93KB

                                                                    MD5

                                                                    0b70c28fa97583cb40f804796c52e7b5

                                                                    SHA1

                                                                    a33787509651f6fd3121b2c6608096d913dc9635

                                                                    SHA256

                                                                    c5ec019d72fbb67bc26910f1b4ffdf3f230654cbb705f8171a30ce7d66e36643

                                                                    SHA512

                                                                    37c9afec612538ef758ef66f47341cb33193353f152d2e6d36a00cec77dcff811f47c448f3b427b6e331e4d736d8198096ddf7cad6c302e8cf8b6e2069ee07c7

                                                                  • \ProgramData\nss3.dll

                                                                    Filesize

                                                                    162KB

                                                                    MD5

                                                                    c8f76c83268e74a5efccf9c050d245ea

                                                                    SHA1

                                                                    b828da5f4504e766d85157de6b7887b479202a2b

                                                                    SHA256

                                                                    cbb701fdb61cfdaa017b5ee5b585a082f783ff0ee64e96e3d354916e9b7a2295

                                                                    SHA512

                                                                    7964716e7509649f7d44b900c5bf1962dc5e4669263f4001faf73847310a924bf2dcf9d0653ca29b44d642bbde3ff0012955b0a727f3295d804de7a38df27595

                                                                  • \Users\Admin\AppData\Local\Temp\488A.dll

                                                                    Filesize

                                                                    977KB

                                                                    MD5

                                                                    dba033453bb140a22e96baedf366eead

                                                                    SHA1

                                                                    68d92dfa459ce5dbb875bf4b45e513903ef672ea

                                                                    SHA256

                                                                    856414761eb8894ddc6cc02d6ed1e16b99bf39dc147ba8e45630cadf952412f5

                                                                    SHA512

                                                                    84f16d54fd7e3ae56a22cfab92b834377091c963b030aa2e75e5c8e82891fc56401bcf94cbc6cb282ffea0f9bf1a6a114434487c0696bc47cda5525eb82f5b55

                                                                  • \Users\Admin\AppData\Local\Temp\488A.dll

                                                                    Filesize

                                                                    744KB

                                                                    MD5

                                                                    7e4cd7a82af4114a716c635fd574e356

                                                                    SHA1

                                                                    a1d2adcb78da5d47a9d48da715bbc6a9336e890e

                                                                    SHA256

                                                                    eecb6573352e054ceccb04d68946008ce2bed7ac0fc3456629ddd3925aaa9d15

                                                                    SHA512

                                                                    47f9d912df99dd6429b6243b0e28b71cd76ca6287f0d8a466fb3d5a36c35dd44949dca9429e868088f525bb2ea674ba268fcd97612a9edb40cd14ffc639d22e8

                                                                  • \Users\Admin\AppData\Local\Temp\is-PR8B7.tmp\_isetup\_iscrypt.dll

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    a69559718ab506675e907fe49deb71e9

                                                                    SHA1

                                                                    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                    SHA256

                                                                    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                    SHA512

                                                                    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                  • \Users\Admin\AppData\Local\Temp\onefile_4552_133545903041313075\python310.dll

                                                                    Filesize

                                                                    4.3MB

                                                                    MD5

                                                                    c80b5cb43e5fe7948c3562c1fff1254e

                                                                    SHA1

                                                                    f73cb1fb9445c96ecd56b984a1822e502e71ab9d

                                                                    SHA256

                                                                    058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

                                                                    SHA512

                                                                    faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

                                                                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                    Filesize

                                                                    464KB

                                                                    MD5

                                                                    1197685e9c0be29387c593136c7bd56d

                                                                    SHA1

                                                                    089a7c9310c7317ba31bd7ae2b4f15c3ea922b71

                                                                    SHA256

                                                                    f0993e387b8f116b5d8b4a793e1b1805494813ae4be1f5f031d3cca432d7f84a

                                                                    SHA512

                                                                    9ac21b33d3c9a8451339508153b20a17fabe54c72dc76f17e48f7ae786eafa37f5ee04270c8929f186a7d647e66561b7f5a43c5adaf27ae2a15b02eaaca28242

                                                                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                    Filesize

                                                                    337KB

                                                                    MD5

                                                                    fee90c5955a93f42000888c5ec7a6e77

                                                                    SHA1

                                                                    9cb073fefcc70b6af3a085a3f70b85ab121aba8c

                                                                    SHA256

                                                                    23b5ea73455a884a6e9c4f20f895d78100f8b53ff3f79a63d07366e7d7a0b475

                                                                    SHA512

                                                                    47b6587d0ec81b253cf0bf6c2efd2c9458709f2285fc26f463b367d4048e7f0949eace00de9e4a15c97c113f612f53d5cc6bddfceb9d7dc446b73e66c32d234e

                                                                  • memory/1748-244-0x0000000000400000-0x0000000000848000-memory.dmp

                                                                    Filesize

                                                                    4.3MB

                                                                  • memory/1748-243-0x0000000000400000-0x0000000000848000-memory.dmp

                                                                    Filesize

                                                                    4.3MB

                                                                  • memory/1748-265-0x0000000000400000-0x0000000000848000-memory.dmp

                                                                    Filesize

                                                                    4.3MB

                                                                  • memory/1748-258-0x0000000002F40000-0x000000000304F000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/1748-257-0x0000000002F40000-0x000000000304F000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/1748-254-0x0000000002F40000-0x000000000304F000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/1748-253-0x0000000002E10000-0x0000000002F3B000-memory.dmp

                                                                    Filesize

                                                                    1.2MB

                                                                  • memory/1748-239-0x0000000000400000-0x0000000000848000-memory.dmp

                                                                    Filesize

                                                                    4.3MB

                                                                  • memory/1748-248-0x0000000000400000-0x0000000000848000-memory.dmp

                                                                    Filesize

                                                                    4.3MB

                                                                  • memory/1748-648-0x0000000000400000-0x0000000000848000-memory.dmp

                                                                    Filesize

                                                                    4.3MB

                                                                  • memory/1748-247-0x0000000000400000-0x0000000000848000-memory.dmp

                                                                    Filesize

                                                                    4.3MB

                                                                  • memory/1892-650-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                    Filesize

                                                                    9.1MB

                                                                  • memory/1892-668-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                    Filesize

                                                                    9.1MB

                                                                  • memory/2020-3-0x0000000000400000-0x0000000001EFC000-memory.dmp

                                                                    Filesize

                                                                    27.0MB

                                                                  • memory/2020-1-0x0000000002250000-0x0000000002350000-memory.dmp

                                                                    Filesize

                                                                    1024KB

                                                                  • memory/2020-2-0x0000000002030000-0x000000000203B000-memory.dmp

                                                                    Filesize

                                                                    44KB

                                                                  • memory/2020-5-0x0000000000400000-0x0000000001EFC000-memory.dmp

                                                                    Filesize

                                                                    27.0MB

                                                                  • memory/2044-55-0x0000000004A70000-0x0000000004A71000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2044-263-0x00000000003B0000-0x0000000000854000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2044-103-0x00000000003B0000-0x0000000000854000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2044-85-0x00000000003B0000-0x0000000000854000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2044-84-0x00000000003B0000-0x0000000000854000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2044-333-0x00000000003B0000-0x0000000000854000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2044-227-0x00000000003B0000-0x0000000000854000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2044-54-0x0000000004A80000-0x0000000004A81000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2044-47-0x00000000003B0000-0x0000000000854000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2044-678-0x00000000003B0000-0x0000000000854000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2044-236-0x00000000003B0000-0x0000000000854000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2044-46-0x00000000003B0000-0x0000000000854000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2044-53-0x0000000004A00000-0x0000000004A01000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2044-48-0x0000000004A30000-0x0000000004A31000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2044-52-0x0000000004A10000-0x0000000004A11000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2044-51-0x00000000049F0000-0x00000000049F1000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2044-144-0x00000000003B0000-0x0000000000854000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2044-50-0x0000000004A50000-0x0000000004A51000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2044-49-0x0000000004A20000-0x0000000004A21000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2336-292-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                    Filesize

                                                                    80KB

                                                                  • memory/2344-17-0x00000000010E0000-0x0000000001584000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2344-20-0x00000000049A0000-0x00000000049A1000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2344-24-0x00000000049D0000-0x00000000049D1000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2344-31-0x00000000010E0000-0x0000000001584000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2344-23-0x0000000004950000-0x0000000004951000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2344-22-0x0000000004960000-0x0000000004961000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2344-16-0x0000000077C14000-0x0000000077C15000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2344-15-0x00000000010E0000-0x0000000001584000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2344-19-0x0000000004970000-0x0000000004971000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2344-18-0x0000000004980000-0x0000000004981000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2344-25-0x00000000049C0000-0x00000000049C1000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2344-21-0x0000000004940000-0x0000000004941000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/2724-210-0x00007FF8DCC10000-0x00007FF8DD5FC000-memory.dmp

                                                                    Filesize

                                                                    9.9MB

                                                                  • memory/2724-201-0x0000022A10720000-0x0000022A1072A000-memory.dmp

                                                                    Filesize

                                                                    40KB

                                                                  • memory/2724-148-0x0000022A105F0000-0x0000022A10612000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/2724-149-0x00007FF8DCC10000-0x00007FF8DD5FC000-memory.dmp

                                                                    Filesize

                                                                    9.9MB

                                                                  • memory/2724-152-0x0000022A28AD0000-0x0000022A28B46000-memory.dmp

                                                                    Filesize

                                                                    472KB

                                                                  • memory/2724-174-0x0000022A105E0000-0x0000022A105F0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/2724-188-0x0000022A28A50000-0x0000022A28A62000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/3148-138-0x0000000004760000-0x000000000486F000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/3148-107-0x0000000010000000-0x00000000102CE000-memory.dmp

                                                                    Filesize

                                                                    2.8MB

                                                                  • memory/3148-136-0x0000000004630000-0x000000000475B000-memory.dmp

                                                                    Filesize

                                                                    1.2MB

                                                                  • memory/3148-106-0x00000000003E0000-0x00000000003E6000-memory.dmp

                                                                    Filesize

                                                                    24KB

                                                                  • memory/3148-143-0x0000000004760000-0x000000000486F000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/3148-141-0x0000000004760000-0x000000000486F000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/3380-4-0x0000000000AF0000-0x0000000000B06000-memory.dmp

                                                                    Filesize

                                                                    88KB

                                                                  • memory/3540-125-0x0000000002A40000-0x0000000004A40000-memory.dmp

                                                                    Filesize

                                                                    32.0MB

                                                                  • memory/3540-235-0x0000000002A40000-0x0000000004A40000-memory.dmp

                                                                    Filesize

                                                                    32.0MB

                                                                  • memory/3540-124-0x0000000072D00000-0x00000000733EE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/3540-104-0x0000000072D00000-0x00000000733EE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/3540-102-0x0000000000640000-0x00000000006D2000-memory.dmp

                                                                    Filesize

                                                                    584KB

                                                                  • memory/3568-690-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                    Filesize

                                                                    972KB

                                                                  • memory/3736-656-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                    Filesize

                                                                    420KB

                                                                  • memory/3736-649-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                    Filesize

                                                                    420KB

                                                                  • memory/3808-70-0x0000000000020000-0x0000000000076000-memory.dmp

                                                                    Filesize

                                                                    344KB

                                                                  • memory/3808-71-0x0000000072D00000-0x00000000733EE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/3808-81-0x00000000022F0000-0x00000000042F0000-memory.dmp

                                                                    Filesize

                                                                    32.0MB

                                                                  • memory/3808-153-0x00000000022F0000-0x00000000042F0000-memory.dmp

                                                                    Filesize

                                                                    32.0MB

                                                                  • memory/3808-72-0x00000000048A0000-0x00000000048B0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/3808-79-0x0000000072D00000-0x00000000733EE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/3880-133-0x0000000005FD0000-0x00000000060DA000-memory.dmp

                                                                    Filesize

                                                                    1.0MB

                                                                  • memory/3880-225-0x00000000084C0000-0x0000000008682000-memory.dmp

                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/3880-132-0x0000000006380000-0x0000000006986000-memory.dmp

                                                                    Filesize

                                                                    6.0MB

                                                                  • memory/3880-127-0x0000000072D00000-0x00000000733EE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/3880-134-0x0000000005F00000-0x0000000005F12000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/3880-126-0x0000000005130000-0x00000000051C2000-memory.dmp

                                                                    Filesize

                                                                    584KB

                                                                  • memory/3880-114-0x0000000005630000-0x0000000005B2E000-memory.dmp

                                                                    Filesize

                                                                    5.0MB

                                                                  • memory/3880-111-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                    Filesize

                                                                    320KB

                                                                  • memory/3880-135-0x0000000005F60000-0x0000000005F9E000-memory.dmp

                                                                    Filesize

                                                                    248KB

                                                                  • memory/3880-230-0x0000000072D00000-0x00000000733EE000-memory.dmp

                                                                    Filesize

                                                                    6.9MB

                                                                  • memory/3880-226-0x0000000008BC0000-0x00000000090EC000-memory.dmp

                                                                    Filesize

                                                                    5.2MB

                                                                  • memory/3880-137-0x00000000060E0000-0x000000000612B000-memory.dmp

                                                                    Filesize

                                                                    300KB

                                                                  • memory/3880-131-0x00000000050D0000-0x00000000050DA000-memory.dmp

                                                                    Filesize

                                                                    40KB

                                                                  • memory/3880-224-0x00000000080A0000-0x00000000080F0000-memory.dmp

                                                                    Filesize

                                                                    320KB

                                                                  • memory/3880-212-0x0000000007BA0000-0x0000000007C06000-memory.dmp

                                                                    Filesize

                                                                    408KB

                                                                  • memory/4032-341-0x0000000000400000-0x00000000005C1000-memory.dmp

                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/4228-677-0x0000000000400000-0x00000000004BC000-memory.dmp

                                                                    Filesize

                                                                    752KB

                                                                  • memory/4464-680-0x0000000000400000-0x00000000005C1000-memory.dmp

                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/4904-41-0x0000000001CF0000-0x0000000001DF0000-memory.dmp

                                                                    Filesize

                                                                    1024KB

                                                                  • memory/4904-40-0x0000000000400000-0x0000000001A77000-memory.dmp

                                                                    Filesize

                                                                    22.5MB

                                                                  • memory/4904-39-0x0000000000400000-0x0000000001A77000-memory.dmp

                                                                    Filesize

                                                                    22.5MB

                                                                  • memory/4904-38-0x0000000003700000-0x000000000376B000-memory.dmp

                                                                    Filesize

                                                                    428KB

                                                                  • memory/4904-37-0x0000000001CF0000-0x0000000001DF0000-memory.dmp

                                                                    Filesize

                                                                    1024KB

                                                                  • memory/5028-80-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                    Filesize

                                                                    288KB

                                                                  • memory/5028-83-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                    Filesize

                                                                    288KB

                                                                  • memory/5028-75-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                    Filesize

                                                                    288KB

                                                                  • memory/5028-82-0x00000000013D0000-0x00000000013D1000-memory.dmp

                                                                    Filesize

                                                                    4KB