Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 22:45

General

  • Target

    a17cb3f0e417a2dd316f6367f1c55d33403a0fa66fa91d2f97970d38b9b62669.exe

  • Size

    223KB

  • MD5

    1daf51676edf7053884f8643c1a126de

  • SHA1

    865000f10c6395f072e9afa628a4a9b6abbd5e35

  • SHA256

    a17cb3f0e417a2dd316f6367f1c55d33403a0fa66fa91d2f97970d38b9b62669

  • SHA512

    199aba789dbc8962a90651cb91c89cd37c38f34282fdb9df6836803602830285a69be18dc7cbb78c2223b181a09afedd721a73993552aff313450bfde60a30b1

  • SSDEEP

    3072:Dxs+8iOxvXPIi/RedDfqRvPLXUC0TbML1P4kAu8TMGIn:DxsBfJXPLRedDqZU/AL1ZAuwnS

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://sajdfue.com/test1/get.php

Attributes
  • extension

    .vook

  • offline_id

    1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1

  • payload_url

    http://sdfjhuz.com/dl/build2.exe

    http://sajdfue.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0857PsawqS

rsa_pubkey.plain

Extracted

Family

vidar

Version

8.3

Botnet

82df9629d6ef6fc7fe54d6eb2bc6137b

C2

https://steamcommunity.com/profiles/76561199651834633

https://t.me/raf6ik

Attributes
  • profile_id_v2

    82df9629d6ef6fc7fe54d6eb2bc6137b

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0

Extracted

Family

amadey

Version

4.18

C2

http://5.42.64.44

Attributes
  • install_dir

    33945c4f34

  • install_file

    Dctooux.exe

  • strings_key

    c2f02f09a0f4b3b5748b3f5cd4fe9125

  • url_paths

    /BlsSwk93eX/index.php

rc4.plain

Extracted

Family

stealc

C2

http://185.172.128.145

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat 12 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Vidar Stealer 5 IoCs
  • Detected Djvu ransomware 14 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • UAC bypass 3 TTPs 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Windows security bypass 2 TTPs 7 IoCs
  • Detect binaries embedding considerable number of MFA browser extension IDs. 2 IoCs
  • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 2 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 5 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 4 IoCs
  • Detects executables (downlaoders) containing URLs to raw contents of a paste 1 IoCs
  • Detects executables Discord URL observed in first stage droppers 5 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 5 IoCs
  • Detects executables containing artifacts associated with disabling Widnows Defender 5 IoCs
  • Detects executables packed with or use KoiVM 1 IoCs
  • Detects executables referencing many varying, potentially fake Windows User-Agents 5 IoCs
  • UPX dump on OEP (original entry point) 2 IoCs
  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops startup file 8 IoCs
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Modifies boot configuration data using bcdedit 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 8 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • NSIS installer 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a17cb3f0e417a2dd316f6367f1c55d33403a0fa66fa91d2f97970d38b9b62669.exe
    "C:\Users\Admin\AppData\Local\Temp\a17cb3f0e417a2dd316f6367f1c55d33403a0fa66fa91d2f97970d38b9b62669.exe"
    1⤵
    • DcRat
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2328
  • C:\Windows\system32\cmd.exe
    cmd /c ""C:\Users\Admin\AppData\Local\Temp\6A47.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
      2⤵
        PID:2472
    • C:\Users\Admin\AppData\Local\Temp\7C14.exe
      C:\Users\Admin\AppData\Local\Temp\7C14.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Users\Admin\AppData\Local\Temp\7C14.exe
        C:\Users\Admin\AppData\Local\Temp\7C14.exe
        2⤵
        • DcRat
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:760
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\ec623f55-8e6c-4e0f-987d-fd54a5ff2c76" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          3⤵
          • Modifies file permissions
          PID:2828
        • C:\Users\Admin\AppData\Local\Temp\7C14.exe
          "C:\Users\Admin\AppData\Local\Temp\7C14.exe" --Admin IsNotAutoStart IsNotTask
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2884
          • C:\Users\Admin\AppData\Local\Temp\7C14.exe
            "C:\Users\Admin\AppData\Local\Temp\7C14.exe" --Admin IsNotAutoStart IsNotTask
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1996
            • C:\Users\Admin\AppData\Local\3b2e3c1f-37fe-4380-b3ae-513fb15e8165\build2.exe
              "C:\Users\Admin\AppData\Local\3b2e3c1f-37fe-4380-b3ae-513fb15e8165\build2.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2244
              • C:\Users\Admin\AppData\Local\3b2e3c1f-37fe-4380-b3ae-513fb15e8165\build2.exe
                "C:\Users\Admin\AppData\Local\3b2e3c1f-37fe-4380-b3ae-513fb15e8165\build2.exe"
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious use of WriteProcessMemory
                PID:1980
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 1420
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:568
    • C:\Users\Admin\AppData\Local\Temp\D9A.exe
      C:\Users\Admin\AppData\Local\Temp\D9A.exe
      1⤵
      • Executes dropped EXE
      PID:1312
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 124
        2⤵
        • Loads dropped DLL
        • Program crash
        PID:2600
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\127B.bat" "
      1⤵
        PID:2784
        • C:\Windows\system32\reg.exe
          reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
          2⤵
            PID:2608
        • C:\Users\Admin\AppData\Local\Temp\21B8.exe
          C:\Users\Admin\AppData\Local\Temp\21B8.exe
          1⤵
          • Executes dropped EXE
          PID:2740
        • C:\Users\Admin\AppData\Local\Temp\9091.exe
          C:\Users\Admin\AppData\Local\Temp\9091.exe
          1⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of SetThreadContext
          • System policy modification
          PID:2480
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\9091.exe" -Force
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1696
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
            2⤵
            • DcRat
            • Drops startup file
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:2956
            • C:\Users\Admin\Pictures\srWVeTGyzLkwwb1QBfnCcXzi.exe
              "C:\Users\Admin\Pictures\srWVeTGyzLkwwb1QBfnCcXzi.exe"
              3⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of FindShellTrayWindow
              PID:2928
            • C:\Users\Admin\Pictures\jK1HRDZ3A7KLdSimVOnZ4RqI.exe
              "C:\Users\Admin\Pictures\jK1HRDZ3A7KLdSimVOnZ4RqI.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2684
              • C:\Users\Admin\Pictures\jK1HRDZ3A7KLdSimVOnZ4RqI.exe
                "C:\Users\Admin\Pictures\jK1HRDZ3A7KLdSimVOnZ4RqI.exe"
                4⤵
                • Windows security bypass
                • Executes dropped EXE
                • Loads dropped DLL
                • Windows security modification
                • Adds Run key to start application
                • Checks for VirtualBox DLLs, possible anti-VM trick
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                PID:2752
                • C:\Windows\system32\cmd.exe
                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                  5⤵
                    PID:1660
                    • C:\Windows\system32\netsh.exe
                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      • Modifies data under HKEY_USERS
                      PID:2120
                  • C:\Windows\rss\csrss.exe
                    C:\Windows\rss\csrss.exe
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    • Manipulates WinMonFS driver.
                    • Drops file in Windows directory
                    • Modifies system certificate store
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1196
                    • C:\Windows\system32\schtasks.exe
                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                      6⤵
                      • DcRat
                      • Creates scheduled task(s)
                      PID:1360
                    • C:\Windows\system32\schtasks.exe
                      schtasks /delete /tn ScheduledUpdate /f
                      6⤵
                        PID:884
                      • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                        "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                        6⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:572
                      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                        C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                        6⤵
                        • Executes dropped EXE
                        PID:2924
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\Sysnative\bcdedit.exe /v
                        6⤵
                        • Modifies boot configuration data using bcdedit
                        PID:1944
                      • C:\Windows\system32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        6⤵
                        • DcRat
                        • Creates scheduled task(s)
                        PID:960
                      • C:\Windows\windefender.exe
                        "C:\Windows\windefender.exe"
                        6⤵
                        • Executes dropped EXE
                        PID:2460
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          7⤵
                            PID:1540
                            • C:\Windows\SysWOW64\sc.exe
                              sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                              8⤵
                              • Launches sc.exe
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2712
                  • C:\Users\Admin\Pictures\LyBen0R1Ao7idDzHyT9c1Fzu.exe
                    "C:\Users\Admin\Pictures\LyBen0R1Ao7idDzHyT9c1Fzu.exe"
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:1876
                    • C:\Users\Admin\AppData\Local\Temp\is-C2HDQ.tmp\LyBen0R1Ao7idDzHyT9c1Fzu.tmp
                      "C:\Users\Admin\AppData\Local\Temp\is-C2HDQ.tmp\LyBen0R1Ao7idDzHyT9c1Fzu.tmp" /SL5="$301AC,1871625,54272,C:\Users\Admin\Pictures\LyBen0R1Ao7idDzHyT9c1Fzu.exe"
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:2336
                  • C:\Users\Admin\Pictures\pWBGIfEREWc5oWoEmV5UenVZ.exe
                    "C:\Users\Admin\Pictures\pWBGIfEREWc5oWoEmV5UenVZ.exe"
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:1992
                    • C:\Users\Admin\AppData\Local\Temp\syncUpd.exe
                      C:\Users\Admin\AppData\Local\Temp\syncUpd.exe
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Checks processor information in registry
                      PID:1836
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\GIJECGDGCB.exe"
                        5⤵
                        • Loads dropped DLL
                        PID:2880
                        • C:\Users\Admin\AppData\Local\Temp\GIJECGDGCB.exe
                          "C:\Users\Admin\AppData\Local\Temp\GIJECGDGCB.exe"
                          6⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2472
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\GIJECGDGCB.exe
                            7⤵
                              PID:784
                              • C:\Windows\SysWOW64\PING.EXE
                                ping 2.2.2.2 -n 1 -w 3000
                                8⤵
                                • Runs ping.exe
                                PID:2460
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\GCBGCGHDGI.exe"
                          5⤵
                            PID:1584
                        • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
                          C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
                          4⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1636
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                            5⤵
                              PID:1140
                              • C:\Windows\SysWOW64\chcp.com
                                chcp 1251
                                6⤵
                                  PID:2924
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                                  6⤵
                                  • DcRat
                                  • Creates scheduled task(s)
                                  PID:2708
                          • C:\Users\Admin\Pictures\XbHzqb0as03VeT1jmorU5VXk.exe
                            "C:\Users\Admin\Pictures\XbHzqb0as03VeT1jmorU5VXk.exe"
                            3⤵
                            • Executes dropped EXE
                            PID:1008
                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                              4⤵
                                PID:2996
                            • C:\Users\Admin\Pictures\SIiXbH2AtpQ6J1Xgu1diXRQ5.exe
                              "C:\Users\Admin\Pictures\SIiXbH2AtpQ6J1Xgu1diXRQ5.exe"
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:2928
                              • C:\Users\Admin\AppData\Local\Temp\wfplwfs.exe
                                C:\Users\Admin\AppData\Local\Temp\wfplwfs.exe
                                4⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                PID:2256
                                • C:\Windows\SysWOW64\rundll32.exe
                                  C:\Windows\system32\rundll32.exe
                                  5⤵
                                  • Modifies Internet Explorer settings
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2796
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\Pictures\SIiXbH2AtpQ6J1Xgu1diXRQ5.exe"
                                4⤵
                                  PID:2080
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping 127.0.0.1 -n 3
                                    5⤵
                                    • Runs ping.exe
                                    PID:2416
                              • C:\Users\Admin\Pictures\Qg3s6nUq4KhkqbjIvrPmo7HO.exe
                                "C:\Users\Admin\Pictures\Qg3s6nUq4KhkqbjIvrPmo7HO.exe"
                                3⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                PID:1784
                                • C:\Users\Admin\AppData\Local\Temp\7zSED5B.tmp\Install.exe
                                  .\Install.exe
                                  4⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:500
                                  • C:\Users\Admin\AppData\Local\Temp\7zSFD52.tmp\Install.exe
                                    .\Install.exe /EdidNuqZ "385118" /S
                                    5⤵
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Drops file in System32 directory
                                    • Enumerates system info in registry
                                    PID:1764
                                    • C:\Windows\SysWOW64\forfiles.exe
                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
                                      6⤵
                                        PID:2652
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                                          7⤵
                                            PID:2580
                                            • \??\c:\windows\SysWOW64\reg.exe
                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                                              8⤵
                                                PID:2836
                                              • \??\c:\windows\SysWOW64\reg.exe
                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                                                8⤵
                                                  PID:1768
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
                                              6⤵
                                                PID:596
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                                                  7⤵
                                                    PID:3012
                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                                                      8⤵
                                                        PID:1340
                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                                                        8⤵
                                                          PID:1548
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /CREATE /TN "gbiXhMefH" /SC once /ST 10:32:31 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                      6⤵
                                                      • DcRat
                                                      • Creates scheduled task(s)
                                                      PID:2948
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /run /I /tn "gbiXhMefH"
                                                      6⤵
                                                        PID:2188
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /DELETE /F /TN "gbiXhMefH"
                                                        6⤵
                                                          PID:2668
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /CREATE /TN "bVJltUxuNruTzSXcXP" /SC once /ST 22:49:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\IglwyGcTzHYQuBNYW\xDQuDuBWcbEpSRL\nJffibd.exe\" Cu /Lssite_idHPQ 385118 /S" /V1 /F
                                                          6⤵
                                                          • DcRat
                                                          • Drops file in Windows directory
                                                          • Creates scheduled task(s)
                                                          PID:1680
                                                • C:\Windows\system32\WerFault.exe
                                                  C:\Windows\system32\WerFault.exe -u -p 2480 -s 924
                                                  2⤵
                                                  • Loads dropped DLL
                                                  PID:2260
                                              • C:\Windows\explorer.exe
                                                explorer.exe
                                                1⤵
                                                • Modifies Installed Components in the registry
                                                • Modifies registry class
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:820
                                              • C:\Windows\system32\makecab.exe
                                                "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240316224738.log C:\Windows\Logs\CBS\CbsPersist_20240316224738.cab
                                                1⤵
                                                • Drops file in Windows directory
                                                PID:1924
                                              • C:\Windows\system32\taskeng.exe
                                                taskeng.exe {18BA8B26-9EE9-4E87-A763-92B11D69D8A1} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]
                                                1⤵
                                                  PID:2080
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                    2⤵
                                                    • Drops file in System32 directory
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2536
                                                    • C:\Windows\system32\gpupdate.exe
                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                      3⤵
                                                        PID:1052
                                                  • C:\Windows\system32\gpscript.exe
                                                    gpscript.exe /RefreshSystemParam
                                                    1⤵
                                                      PID:3060
                                                    • C:\Windows\windefender.exe
                                                      C:\Windows\windefender.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:484

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      9f9c0c16a7e5ff1d2185415e3a3be1f5

                                                      SHA1

                                                      62d0cb5a113e8f7fc1dc45ffd97c220392cc945a

                                                      SHA256

                                                      b53c8b91e9ad700eb9d194308013baa0eb11cddfd9446c632fc06ba9bb956583

                                                      SHA512

                                                      f4ad40316b8b31fc5e917b0bbff5c5d5e40829a1f12c237c41ec7dd8305f5c20da7b3e7056fbed94f325d8e95cc626636503787dda72e251ea4d91b042f9db75

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      67KB

                                                      MD5

                                                      753df6889fd7410a2e9fe333da83a429

                                                      SHA1

                                                      3c425f16e8267186061dd48ac1c77c122962456e

                                                      SHA256

                                                      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

                                                      SHA512

                                                      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                                                      Filesize

                                                      724B

                                                      MD5

                                                      8202a1cd02e7d69597995cabbe881a12

                                                      SHA1

                                                      8858d9d934b7aa9330ee73de6c476acf19929ff6

                                                      SHA256

                                                      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                                                      SHA512

                                                      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      a266bb7dcc38a562631361bbf61dd11b

                                                      SHA1

                                                      3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                      SHA256

                                                      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                      SHA512

                                                      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                      Filesize

                                                      410B

                                                      MD5

                                                      ef4159c1763cfded44d57cc581e81256

                                                      SHA1

                                                      63a1f5e0428a2178712c55247f999a9310bda875

                                                      SHA256

                                                      36f0f690baced6a3609c09b3198f4c17d1d9e99e12dd52b71e922fb6c367d9b3

                                                      SHA512

                                                      09f35544fdafc9de4d45f61bf7e673045e1b8819df3854e8262493d12b59ac7c1181a750600ba43363cd05029dbab460f6ddbd04a5f04288bd5c7f1d9dd020d8

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      344B

                                                      MD5

                                                      e9b025c3f27bae9efb847a81a23a6041

                                                      SHA1

                                                      2e45615fa8e19e582a5255049ffedeb2aca416f5

                                                      SHA256

                                                      19021120bcbe9a10e42308bbd0108b182969338c80387c0cfda31cb4b1cd63b3

                                                      SHA512

                                                      0660b0eab04fae2e5c63f64e4e97707ae242738c8e6eace8dc48a785259711f556ed256fe9cfb62bd12e16a8d919d3fbda9a91dd86c75a382d7bd142ef500511

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      344B

                                                      MD5

                                                      86c5c89c27de04856b729b759ce99155

                                                      SHA1

                                                      8fedd312a921486109952cc2246653661f04ae0d

                                                      SHA256

                                                      13ebdbe68f8cbb89a979ce69e1678eb8967cc3e9d9e48b6c8e1b18aa801c5612

                                                      SHA512

                                                      57cd0c70f7f9bfc33dc71d5e6e2a0a7313f781bc96b10da12545f2435e80b646b68571fbbf16d01012a1fced894231b60ca923f22505a0f9ae1d65d27b877ea8

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                      Filesize

                                                      344B

                                                      MD5

                                                      e6d7f55d856afcd97b03c30e45fe8da3

                                                      SHA1

                                                      fc9047754fdcdd0ddac9d71c92983e4c1d7979a4

                                                      SHA256

                                                      bf481125fc6e6009642f47566c5f0f65b27ab96c108f7b88f2e30d64d31a3784

                                                      SHA512

                                                      b4c3eb0dbe0ba07294ba37209323d2a1d00e3e61b18abde289fe39dbc94d07b6ca667d48e0fef3fe1c8a1006ca1ecf0722bea3ec75252291fe69254e69b07f67

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                                                      Filesize

                                                      392B

                                                      MD5

                                                      a08b976d389af6f73d1b63d72196b688

                                                      SHA1

                                                      cc203d16eb41c24dd6cec6c372f398b2c2544395

                                                      SHA256

                                                      d1bf1042390f211416da962a6e56a6c89ea02731cd2f6c1efe9321e2ce5d3e8e

                                                      SHA512

                                                      49516e5fb3c27c66b65b11eef9b88d637848e3b2395b1e8faed78e56588d99e657786a487354955a669829fe0fd1825d3c7d2c3a83a6d14b1342cf06d75fe64e

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                      Filesize

                                                      242B

                                                      MD5

                                                      8f45038301d9a543c2906c347727a01c

                                                      SHA1

                                                      a70537c041109f980ae435256dbf77ccd1c9eb88

                                                      SHA256

                                                      90954114fdd66b3272da8db0bcd7c1ab4fe44f9b5217a76503b0ffea15a1b0ef

                                                      SHA512

                                                      dbdafad0d145917e2e29759c0d2ea7c3c6da1c9840c6f9046856f80a7ec6a46a17b064e57f2c36466e2438dfb553abb62e28e3b90f553571d8da2f4d8954cfbf

                                                    • C:\Users\Admin\AppData\Local\Temp\6A47.bat

                                                      Filesize

                                                      77B

                                                      MD5

                                                      55cc761bf3429324e5a0095cab002113

                                                      SHA1

                                                      2cc1ef4542a4e92d4158ab3978425d517fafd16d

                                                      SHA256

                                                      d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                                                      SHA512

                                                      33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                                                    • C:\Users\Admin\AppData\Local\Temp\7C14.exe

                                                      Filesize

                                                      738KB

                                                      MD5

                                                      e9e66ca0c2d7c85f190ed5fdaee06f8c

                                                      SHA1

                                                      a48a476063290315ec5f1d82cdcc6141bfa8c55a

                                                      SHA256

                                                      f38059946ee86b8d83a0c8441965dfe7469934b4befa0f6be352fa86d5ddf112

                                                      SHA512

                                                      24dee9c10ba4a25ed5ae2e21b4bbe5c2c31e62986a1295413e56e0f365e16f45501deea8fe1e0dad98ac2f0d9090eb086b75bfc828a8050ca1066b44d2d83c76

                                                    • C:\Users\Admin\AppData\Local\Temp\Cab9212.tmp

                                                      Filesize

                                                      65KB

                                                      MD5

                                                      ac05d27423a85adc1622c714f2cb6184

                                                      SHA1

                                                      b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                                      SHA256

                                                      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                                      SHA512

                                                      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                                    • C:\Users\Admin\AppData\Local\Temp\D9A.exe

                                                      Filesize

                                                      6.5MB

                                                      MD5

                                                      9e52aa572f0afc888c098db4c0f687ff

                                                      SHA1

                                                      ef7c2bb222e69ad0e10c8686eb03dcbee7933c2b

                                                      SHA256

                                                      4a40f9d491f09521f4b0c6076a0eb488f6d8e1cf4b67aa6569c2ccce13556443

                                                      SHA512

                                                      d0991e682ae8c954721e905753b56c01f91b85313beb9996331793c3efa8acc13d574ef5ba44853ecc3e05822931ed655bad1924fa11b774a43e015f42185f62

                                                    • C:\Users\Admin\AppData\Local\Temp\IglwyGcTzHYQuBNYW\xDQuDuBWcbEpSRL\nJffibd.exe

                                                      Filesize

                                                      6.7MB

                                                      MD5

                                                      079a2398eeefff2387756f754de68c07

                                                      SHA1

                                                      6c5fe1b28a0303ffd04d66c329ced2b9be107561

                                                      SHA256

                                                      9f95133e28720ab7a9a81f57bc400bccb55cb1fafbf3a4ca18dc491fbb5e9776

                                                      SHA512

                                                      52f2974159baebc492f1b3a3c89008a216d247180c7e4e5c8494addd9fe9694f2df2de8dfc64839320ddeb3954e8b467568b34541b37781dbf1ba651303677ef

                                                    • C:\Users\Admin\AppData\Local\Temp\TarA3A0.tmp

                                                      Filesize

                                                      171KB

                                                      MD5

                                                      9c0c641c06238516f27941aa1166d427

                                                      SHA1

                                                      64cd549fb8cf014fcd9312aa7a5b023847b6c977

                                                      SHA256

                                                      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                                                      SHA512

                                                      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                                                    • C:\Users\Admin\AppData\Local\Temp\TarA6A2.tmp

                                                      Filesize

                                                      175KB

                                                      MD5

                                                      dd73cead4b93366cf3465c8cd32e2796

                                                      SHA1

                                                      74546226dfe9ceb8184651e920d1dbfb432b314e

                                                      SHA256

                                                      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

                                                      SHA512

                                                      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

                                                    • C:\Users\Admin\AppData\Local\Temp\is-C2HDQ.tmp\LyBen0R1Ao7idDzHyT9c1Fzu.tmp

                                                      Filesize

                                                      677KB

                                                      MD5

                                                      d20d1fe001f3ac8063a9ee93110c7bef

                                                      SHA1

                                                      ebe566a075449a0448531e994d34883b782601ef

                                                      SHA256

                                                      f89d62a78858fc027813134d8f4f2dfbaeed3dd6ae21be332b9d9b32da159798

                                                      SHA512

                                                      ae30786bade29aa769269ce27b70f4325d55eb47ab2075aacefec7fde23d92bcb011ccc869437b59cb29137ab4e7249c35dce51da9fceb35928fed4d1366adf9

                                                    • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                                                      Filesize

                                                      5.3MB

                                                      MD5

                                                      1afff8d5352aecef2ecd47ffa02d7f7d

                                                      SHA1

                                                      8b115b84efdb3a1b87f750d35822b2609e665bef

                                                      SHA256

                                                      c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                                                      SHA512

                                                      e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                                                    • C:\Users\Admin\AppData\Local\Temp\osloader.exe

                                                      Filesize

                                                      591KB

                                                      MD5

                                                      e2f68dc7fbd6e0bf031ca3809a739346

                                                      SHA1

                                                      9c35494898e65c8a62887f28e04c0359ab6f63f5

                                                      SHA256

                                                      b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                                                      SHA512

                                                      26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                                                    • C:\Users\Admin\AppData\Local\Temp\syncUpd.exe

                                                      Filesize

                                                      239KB

                                                      MD5

                                                      d2641abf971bec9b4a55dbf0f6771166

                                                      SHA1

                                                      7af6613fc064d459e1d0eda6d5320acc858375f8

                                                      SHA256

                                                      a857deb8cbb2873951492416884cec4b9af865c1aab132339bfb738d34489436

                                                      SHA512

                                                      41a51c608962fbdb0850ee15703ce48d34db39d711c50df3993dca106b5ecd09ac0dd5aa667357394d0930745e4c3c9c2fdc7ae61fd41e7dd1c07b06043660aa

                                                    • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                                                      Filesize

                                                      128B

                                                      MD5

                                                      11bb3db51f701d4e42d3287f71a6a43e

                                                      SHA1

                                                      63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                                                      SHA256

                                                      6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                                                      SHA512

                                                      907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                                                    • C:\Users\Admin\Pictures\Qg3s6nUq4KhkqbjIvrPmo7HO.exe

                                                      Filesize

                                                      7.5MB

                                                      MD5

                                                      14c0603c8946fa2e62dc976fb782031c

                                                      SHA1

                                                      35c6336ba673c90d485b72245ff8418093e14297

                                                      SHA256

                                                      0f842740fdf12784374060c3501e31b8a98f00f1a961b2d128092b5e5d988379

                                                      SHA512

                                                      dc62a68feba1315c22cc2b3d11adfa2c3ebccf91f05f9bca47c83cecf3a15355d780545ba4a67d1dcbdeb7cff2f9c9958102d8d0323b041e27abc746bd5de5e5

                                                    • C:\Users\Admin\Pictures\SIiXbH2AtpQ6J1Xgu1diXRQ5.exe

                                                      Filesize

                                                      316KB

                                                      MD5

                                                      9d6ed6d2b71f0c76c005fb4326b33646

                                                      SHA1

                                                      eb6add00dd44d6c634da09a256af0ae1b81db870

                                                      SHA256

                                                      dc6d692930b4540400e19d965ce575b7660c8f1344e675a062536b1a0564916c

                                                      SHA512

                                                      3ef1ba4263479222b4fa13d0fefcde7c37efdbd3250595dcbadd6744ae79d3235cce5a7f974f06e733d8779e1892696ab77fd93619c40e60bc4b1ae63f0c605d

                                                    • C:\Users\Admin\Pictures\XbHzqb0as03VeT1jmorU5VXk.exe

                                                      Filesize

                                                      1.2MB

                                                      MD5

                                                      998606589342adbabdbfc9f8d3d6d365

                                                      SHA1

                                                      9e754f8ffedd8ef1e3ed9e7186a7f8b7b322f9e9

                                                      SHA256

                                                      5ea85ed4fc888ac0c3733baab85921fbedbc628a4b6048cdeb78f699a4b59795

                                                      SHA512

                                                      f9d788fe528e0994ea8bda826d282d5a75de7374ed3db540188da5a8bc5da5984252597e0aa4123ad8f1785340a6b9948746de7b113a624d0357d85203bb93c1

                                                    • C:\Users\Admin\Pictures\pWBGIfEREWc5oWoEmV5UenVZ.exe

                                                      Filesize

                                                      2.1MB

                                                      MD5

                                                      5b37b653b44c3fcdc15d1eb5c420998f

                                                      SHA1

                                                      fb7b395b625d1abbeea48f9bddb0e25f5f97456f

                                                      SHA256

                                                      4fb540e6ab5a0b93ab47fa7f83e0cf31d1fea5b4f36687819e89114392f25f02

                                                      SHA512

                                                      82eaaa5b74add49f3b3727763dc7096a6aa3449ed899605d67ee30152df08de043d351389eff5b4144fffc9461f71825e244b7655546f7096dcbaf6cb4db1d24

                                                    • \Users\Admin\AppData\Local\3b2e3c1f-37fe-4380-b3ae-513fb15e8165\build2.exe

                                                      Filesize

                                                      295KB

                                                      MD5

                                                      47704f454af8641dac1af2e2768d7881

                                                      SHA1

                                                      e3341bfdec84f69684aecde18cab2864519c7728

                                                      SHA256

                                                      a6a9375dd6e3b285bc6d65536a151a47dd136aced8180492f5ed6a391edf0d64

                                                      SHA512

                                                      9aea598ee30342a88fedf5eca2b104e8c5587cd284bd43229581b04497c60e6a71e5392a171a5dfbe88a2e41269434922e21c3f7f9682e2ea10b27b104606b25

                                                    • \Users\Admin\AppData\Local\Temp\21B8.exe

                                                      Filesize

                                                      11.8MB

                                                      MD5

                                                      450039a02217c53bd983eaf1fd34505a

                                                      SHA1

                                                      930ed58a2f58ca7bf3e39aaee43fb541f1c6eeda

                                                      SHA256

                                                      d2eacbc922f248856b860aa7c31476ae4123f97e82cf69760ef216d9dca321f0

                                                      SHA512

                                                      cf37a82ea7b64f4633ac82c73feff3f829dda279a7caeac32a4cde7b0f82a43b37f67e620677a87d2eccc0eee6f8d68d0175a086487b2174b4f30b66aa4fb080

                                                    • \Users\Admin\AppData\Local\Temp\9091.exe

                                                      Filesize

                                                      446KB

                                                      MD5

                                                      520c60053a4b992120659c860f1ca7d9

                                                      SHA1

                                                      a54e04cc8243e0770c9bf9f2330f11672c009a04

                                                      SHA256

                                                      662a0775782305aab0ab92f0e9bc678df59db91e4ec7b7f9e201d0307932ec45

                                                      SHA512

                                                      ef182bde4e0f4bcc9f20212413d8ebdfb8d5b422dca86e1ebfd8540792d97ea80e011f254d2766bc3385ffb892ecc78920c68a0215eb616efab0bd74b12f37c2

                                                    • \Users\Admin\AppData\Local\Temp\9091.exe

                                                      Filesize

                                                      384KB

                                                      MD5

                                                      b74d1c21e664119354a5a08fd83a539b

                                                      SHA1

                                                      f22576d257cc38c5c1475392b183d3d59e18c09f

                                                      SHA256

                                                      dfa377792d3c10ae0473a6bf34fc9996ce3c1af57b3cf0e20c30038c940744f8

                                                      SHA512

                                                      6fb35a1a309e4ced371d6d08c1b30e810fdf539870aa40d93da5d71dbb559e20fbf25d5d56f016053f8d1a1da8c05dc5292a016eabea0b5c38b597dacab2ade0

                                                    • \Users\Admin\AppData\Local\Temp\is-OL5H0.tmp\_isetup\_iscrypt.dll

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      a69559718ab506675e907fe49deb71e9

                                                      SHA1

                                                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                      SHA256

                                                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                      SHA512

                                                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                    • \Users\Admin\AppData\Local\Temp\is-OL5H0.tmp\_isetup\_shfoldr.dll

                                                      Filesize

                                                      22KB

                                                      MD5

                                                      92dc6ef532fbb4a5c3201469a5b5eb63

                                                      SHA1

                                                      3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                      SHA256

                                                      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                      SHA512

                                                      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                    • \Users\Admin\AppData\Local\Temp\nseB3A8.tmp\INetC.dll

                                                      Filesize

                                                      21KB

                                                      MD5

                                                      2b342079303895c50af8040a91f30f71

                                                      SHA1

                                                      b11335e1cb8356d9c337cb89fe81d669a69de17e

                                                      SHA256

                                                      2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

                                                      SHA512

                                                      550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

                                                    • \Users\Admin\Pictures\LyBen0R1Ao7idDzHyT9c1Fzu.exe

                                                      Filesize

                                                      2.1MB

                                                      MD5

                                                      845ae09cfea0a516ade36669ab230e74

                                                      SHA1

                                                      fc6631dd1c03754382dbad2662f81cd9099ef4c2

                                                      SHA256

                                                      d988c1053bf8d95a84f9e820210bf90efed58bfd616d15da0ebc0bcc1e5c3b2f

                                                      SHA512

                                                      6c16556b2ee22a38f40edf126344116837e817a6e5a817ee0af1e5a301a7d41db2534421bf02a5db53db1823663079d562f6ad31df283e5517bf9c29d424c77d

                                                    • \Users\Admin\Pictures\jK1HRDZ3A7KLdSimVOnZ4RqI.exe

                                                      Filesize

                                                      4.1MB

                                                      MD5

                                                      fe37f4054de69203a3a3776713200530

                                                      SHA1

                                                      4211777ec48284193348fc88300e92dc19dc1876

                                                      SHA256

                                                      673ab38fe3c91ca8eebf715c86b3aed149f259f511c86c2100c18c6bf0a03281

                                                      SHA512

                                                      2e092a1149d3c9a77a02e82831b0044153e7c5bb02ca9d9c49aa7bde2d92569abb35f411641d5f002b23be0fbce3545c5e613fd4253ca0502102303a7136b708

                                                    • \Users\Admin\Pictures\srWVeTGyzLkwwb1QBfnCcXzi.exe

                                                      Filesize

                                                      433KB

                                                      MD5

                                                      825441372bbba175c241a1cf4c798438

                                                      SHA1

                                                      84c1e2f2a24b338666dc98b64b266335b7fae5e9

                                                      SHA256

                                                      c307873c80fd5892e04c45d29ccc3f0ad506f0e77d768f20426851434df2f933

                                                      SHA512

                                                      08c009748b1e4167d933e4e8443dac4600a0b5d1281fbbb660a28fb26682d9d6da46f39f1640ee3ffa3bc5b3dd3ee87b400a9b007b98cffedbd75e360ec2ac18

                                                    • memory/572-911-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                      Filesize

                                                      5.9MB

                                                    • memory/760-60-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/760-37-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/760-36-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/760-33-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/760-31-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/820-348-0x0000000004320000-0x0000000004321000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/820-758-0x0000000004320000-0x0000000004321000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1196-902-0x0000000002780000-0x0000000002B78000-memory.dmp

                                                      Filesize

                                                      4.0MB

                                                    • memory/1196-903-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                      Filesize

                                                      9.1MB

                                                    • memory/1204-4-0x0000000002EE0000-0x0000000002EF6000-memory.dmp

                                                      Filesize

                                                      88KB

                                                    • memory/1312-197-0x0000000000C10000-0x00000000018F5000-memory.dmp

                                                      Filesize

                                                      12.9MB

                                                    • memory/1312-215-0x00000000000B0000-0x00000000000B1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1312-201-0x00000000000A0000-0x00000000000A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1312-210-0x00000000000A0000-0x00000000000A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1312-212-0x00000000000A0000-0x00000000000A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1312-226-0x00000000000D0000-0x00000000000D1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1312-223-0x00000000000C0000-0x00000000000C1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1312-221-0x00000000000C0000-0x00000000000C1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1312-218-0x00000000000B0000-0x00000000000B1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1312-200-0x0000000000090000-0x0000000000091000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1312-236-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1312-196-0x0000000000090000-0x0000000000091000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1312-249-0x0000000000C10000-0x00000000018F5000-memory.dmp

                                                      Filesize

                                                      12.9MB

                                                    • memory/1312-189-0x0000000000C10000-0x00000000018F5000-memory.dmp

                                                      Filesize

                                                      12.9MB

                                                    • memory/1312-194-0x0000000000090000-0x0000000000091000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1584-878-0x0000000000690000-0x0000000000691000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1636-684-0x0000000000400000-0x0000000000930000-memory.dmp

                                                      Filesize

                                                      5.2MB

                                                    • memory/1636-873-0x0000000000240000-0x0000000000241000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1636-857-0x0000000000400000-0x0000000000930000-memory.dmp

                                                      Filesize

                                                      5.2MB

                                                    • memory/1636-686-0x0000000000240000-0x0000000000241000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1696-281-0x0000000002710000-0x0000000002718000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/1696-291-0x00000000027E0000-0x0000000002860000-memory.dmp

                                                      Filesize

                                                      512KB

                                                    • memory/1696-294-0x00000000027EB000-0x0000000002852000-memory.dmp

                                                      Filesize

                                                      412KB

                                                    • memory/1696-272-0x000000001B4D0000-0x000000001B7B2000-memory.dmp

                                                      Filesize

                                                      2.9MB

                                                    • memory/1696-292-0x000007FEF0280000-0x000007FEF0C1D000-memory.dmp

                                                      Filesize

                                                      9.6MB

                                                    • memory/1696-290-0x000007FEF0280000-0x000007FEF0C1D000-memory.dmp

                                                      Filesize

                                                      9.6MB

                                                    • memory/1696-289-0x00000000027E4000-0x00000000027E7000-memory.dmp

                                                      Filesize

                                                      12KB

                                                    • memory/1836-670-0x0000000000220000-0x0000000000247000-memory.dmp

                                                      Filesize

                                                      156KB

                                                    • memory/1836-833-0x0000000000710000-0x0000000000810000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/1836-667-0x0000000000710000-0x0000000000810000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/1836-834-0x0000000000400000-0x000000000063B000-memory.dmp

                                                      Filesize

                                                      2.2MB

                                                    • memory/1836-671-0x0000000000400000-0x000000000063B000-memory.dmp

                                                      Filesize

                                                      2.2MB

                                                    • memory/1876-525-0x0000000000400000-0x0000000000414000-memory.dmp

                                                      Filesize

                                                      80KB

                                                    • memory/1876-773-0x0000000000400000-0x0000000000414000-memory.dmp

                                                      Filesize

                                                      80KB

                                                    • memory/1980-115-0x0000000000400000-0x0000000000644000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/1980-108-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1980-110-0x0000000000400000-0x0000000000644000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/1980-116-0x0000000000400000-0x0000000000644000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/1980-181-0x0000000000400000-0x0000000000644000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/1996-130-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1996-86-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1996-71-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1996-70-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1996-87-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1996-91-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1996-93-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1996-94-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1996-117-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2244-111-0x00000000002A0000-0x00000000003A0000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/2244-112-0x00000000003A0000-0x00000000003D1000-memory.dmp

                                                      Filesize

                                                      196KB

                                                    • memory/2256-764-0x0000000000400000-0x000000000047A000-memory.dmp

                                                      Filesize

                                                      488KB

                                                    • memory/2256-761-0x0000000000610000-0x0000000000710000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/2256-762-0x0000000000230000-0x0000000000269000-memory.dmp

                                                      Filesize

                                                      228KB

                                                    • memory/2328-1-0x00000000005B0000-0x00000000006B0000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/2328-3-0x0000000000400000-0x0000000000477000-memory.dmp

                                                      Filesize

                                                      476KB

                                                    • memory/2328-5-0x0000000000400000-0x0000000000477000-memory.dmp

                                                      Filesize

                                                      476KB

                                                    • memory/2328-2-0x0000000000220000-0x000000000022B000-memory.dmp

                                                      Filesize

                                                      44KB

                                                    • memory/2336-555-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2336-812-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2472-845-0x0000000001310000-0x000000000132E000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/2472-844-0x0000000072890000-0x0000000072F7E000-memory.dmp

                                                      Filesize

                                                      6.9MB

                                                    • memory/2480-267-0x000000001A940000-0x000000001A99C000-memory.dmp

                                                      Filesize

                                                      368KB

                                                    • memory/2480-260-0x0000000000AF0000-0x0000000000B62000-memory.dmp

                                                      Filesize

                                                      456KB

                                                    • memory/2480-262-0x000000001AFE0000-0x000000001B060000-memory.dmp

                                                      Filesize

                                                      512KB

                                                    • memory/2480-683-0x000000001AFE0000-0x000000001B060000-memory.dmp

                                                      Filesize

                                                      512KB

                                                    • memory/2480-666-0x000007FEF5160000-0x000007FEF5B4C000-memory.dmp

                                                      Filesize

                                                      9.9MB

                                                    • memory/2480-261-0x000007FEF5160000-0x000007FEF5B4C000-memory.dmp

                                                      Filesize

                                                      9.9MB

                                                    • memory/2684-765-0x0000000002750000-0x0000000002B48000-memory.dmp

                                                      Filesize

                                                      4.0MB

                                                    • memory/2684-763-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                      Filesize

                                                      9.1MB

                                                    • memory/2684-693-0x0000000002B50000-0x000000000343B000-memory.dmp

                                                      Filesize

                                                      8.9MB

                                                    • memory/2684-689-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                      Filesize

                                                      9.1MB

                                                    • memory/2684-688-0x0000000002750000-0x0000000002B48000-memory.dmp

                                                      Filesize

                                                      4.0MB

                                                    • memory/2752-810-0x00000000025D0000-0x00000000029C8000-memory.dmp

                                                      Filesize

                                                      4.0MB

                                                    • memory/2752-819-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                      Filesize

                                                      9.1MB

                                                    • memory/2752-811-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                      Filesize

                                                      9.1MB

                                                    • memory/2752-27-0x00000000002E0000-0x0000000000372000-memory.dmp

                                                      Filesize

                                                      584KB

                                                    • memory/2752-28-0x0000000001DD0000-0x0000000001EEB000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2752-26-0x00000000002E0000-0x0000000000372000-memory.dmp

                                                      Filesize

                                                      584KB

                                                    • memory/2796-774-0x0000000000400000-0x0000000000407000-memory.dmp

                                                      Filesize

                                                      28KB

                                                    • memory/2884-63-0x0000000000570000-0x0000000000602000-memory.dmp

                                                      Filesize

                                                      584KB

                                                    • memory/2884-62-0x0000000000570000-0x0000000000602000-memory.dmp

                                                      Filesize

                                                      584KB

                                                    • memory/2956-293-0x0000000000400000-0x0000000000408000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/2956-296-0x0000000072890000-0x0000000072F7E000-memory.dmp

                                                      Filesize

                                                      6.9MB

                                                    • memory/2956-297-0x0000000004E90000-0x0000000004ED0000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/2956-685-0x0000000072890000-0x0000000072F7E000-memory.dmp

                                                      Filesize

                                                      6.9MB