Analysis

  • max time kernel
    300s
  • max time network
    302s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-03-2024 22:22

General

  • Target

    2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe

  • Size

    223KB

  • MD5

    8668ee0ab6ea0e939b90f438b8bf52dc

  • SHA1

    6987b695c4b5cac1e2cd891804974f46e8d043ea

  • SHA256

    2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397

  • SHA512

    432e2a1727954716b8b61b6a52c43ad9f6e3b87254b44158a319178bb683646e31650921d1a7257d7d64be36db55996de6e05e58fcbdb4ad892a703a041291f7

  • SSDEEP

    3072:H/W6TRmXBVTfiIIiOJqGGFDJ/qpATXs3dBvTbML1P4kAu8TMGIn:H/WOwVOcOJqGE/CATSdNAL1ZAuwnS

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

http://nidoe.org/tmp/index.php

http://sodez.ru/tmp/index.php

http://uama.com.ua/tmp/index.php

http://talesofpirates.net/tmp/index.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

185.172.128.33:8970

Extracted

Family

lumma

C2

https://relevantvoicelesskw.shop/api

https://asleepfulltytarrtw.shop/api

https://resergvearyinitiani.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 8 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 6 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • Windows security bypass 2 TTPs 7 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 46 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 12 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 15 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe
    "C:\Users\Admin\AppData\Local\Temp\2c8274dc30618e8e8fbb69f4afcb5ffc75f13ac6aa731915b13ea4c4a82e8397.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2164
  • C:\Users\Admin\AppData\Local\Temp\D31F.exe
    C:\Users\Admin\AppData\Local\Temp\D31F.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:2340
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\DB9C.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\DB9C.dll
      2⤵
      • Loads dropped DLL
      PID:1604
  • C:\Users\Admin\AppData\Local\Temp\F8E9.exe
    C:\Users\Admin\AppData\Local\Temp\F8E9.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Users\Admin\AppData\Local\Temp\u1wg.0.exe
        "C:\Users\Admin\AppData\Local\Temp\u1wg.0.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:4940
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\GIEHJKEBAA.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4712
          • C:\Users\Admin\AppData\Local\Temp\GIEHJKEBAA.exe
            "C:\Users\Admin\AppData\Local\Temp\GIEHJKEBAA.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1652
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\GIEHJKEBAA.exe
              6⤵
                PID:960
                • C:\Windows\SysWOW64\PING.EXE
                  ping 2.2.2.2 -n 1 -w 3000
                  7⤵
                  • Runs ping.exe
                  PID:780
        • C:\Users\Admin\AppData\Local\Temp\u1wg.1.exe
          "C:\Users\Admin\AppData\Local\Temp\u1wg.1.exe"
          3⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2336
          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
            "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1252
      • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
        "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3952
        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
          "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
          3⤵
          • Windows security bypass
          • Executes dropped EXE
          • Windows security modification
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          PID:5384
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            PID:6004
          • C:\Windows\System32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            4⤵
              PID:5648
              • C:\Windows\system32\netsh.exe
                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                5⤵
                • Modifies Windows Firewall
                • Modifies data under HKEY_USERS
                PID:5500
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:204
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:5984
            • C:\Windows\rss\csrss.exe
              C:\Windows\rss\csrss.exe
              4⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Manipulates WinMonFS driver.
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              PID:5768
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:5248
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                5⤵
                • Creates scheduled task(s)
                PID:5760
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /delete /tn ScheduledUpdate /f
                5⤵
                  PID:5320
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:5728
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:5900
                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                  C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                  5⤵
                  • Executes dropped EXE
                  PID:5724
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  5⤵
                  • Creates scheduled task(s)
                  PID:3392
                • C:\Windows\windefender.exe
                  "C:\Windows\windefender.exe"
                  5⤵
                  • Executes dropped EXE
                  PID:5164
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                    6⤵
                      PID:2668
                      • C:\Windows\SysWOW64\sc.exe
                        sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                        7⤵
                        • Launches sc.exe
                        PID:1408
            • C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe
              "C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:704
              • C:\Users\Public\Music\EasyApp.exe
                "C:\Users\Public\Music\EasyApp.exe"
                3⤵
                • Executes dropped EXE
                PID:1020
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 572
                  4⤵
                  • Program crash
                  PID:4648
            • C:\Users\Admin\AppData\Local\Temp\april.exe
              "C:\Users\Admin\AppData\Local\Temp\april.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4580
              • C:\Users\Admin\AppData\Local\Temp\is-OD8B1.tmp\april.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-OD8B1.tmp\april.tmp" /SL5="$2027C,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:5116
          • C:\Users\Admin\AppData\Local\Temp\676.exe
            C:\Users\Admin\AppData\Local\Temp\676.exe
            1⤵
            • Executes dropped EXE
            PID:3044
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 988
              2⤵
              • Program crash
              PID:2276
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 988
              2⤵
              • Program crash
              PID:3284
          • C:\Users\Admin\AppData\Local\Temp\19B1.exe
            C:\Users\Admin\AppData\Local\Temp\19B1.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            PID:5048
          • C:\Users\Admin\AppData\Local\Temp\611B.exe
            C:\Users\Admin\AppData\Local\Temp\611B.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:2340
            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              2⤵
                PID:2836
            • C:\Users\Admin\AppData\Local\Temp\7272.exe
              C:\Users\Admin\AppData\Local\Temp\7272.exe
              1⤵
              • Executes dropped EXE
              • Writes to the Master Boot Record (MBR)
              PID:1596
            • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
              C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4988
              • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe
                "C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:3848
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                    PID:4548
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 1188
                      4⤵
                      • Program crash
                      PID:3024
                • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:3892
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    3⤵
                      PID:4628
                  • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
                    2⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    PID:2296
                  • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"
                    2⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Drops file in Windows directory
                    • Suspicious use of FindShellTrayWindow
                    PID:4256
                    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious use of SetThreadContext
                      PID:4704
                      • C:\Users\Admin\AppData\Local\Temp\1000022001\6c16cf44c9.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000022001\6c16cf44c9.exe"
                        4⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        PID:4228
                      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                        "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:5360
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                        4⤵
                        • Loads dropped DLL
                        PID:5480
                        • C:\Windows\system32\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                          5⤵
                          • Blocklisted process makes network request
                          • Loads dropped DLL
                          PID:5164
                          • C:\Windows\system32\netsh.exe
                            netsh wlan show profiles
                            6⤵
                              PID:5668
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\104443672357_Desktop.zip' -CompressionLevel Optimal
                              6⤵
                                PID:5504
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                            4⤵
                            • Blocklisted process makes network request
                            • Loads dropped DLL
                            PID:6084
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                        2⤵
                        • Loads dropped DLL
                        PID:2460
                        • C:\Windows\system32\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                          3⤵
                          • Blocklisted process makes network request
                          • Loads dropped DLL
                          PID:1452
                          • C:\Windows\system32\netsh.exe
                            netsh wlan show profiles
                            4⤵
                              PID:2764
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\104443672357_Desktop.zip' -CompressionLevel Optimal
                              4⤵
                                PID:2400
                          • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:4348
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              3⤵
                                PID:212
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 1136
                                  4⤵
                                  • Program crash
                                  PID:3076
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 1160
                                  4⤵
                                  • Program crash
                                  PID:4388
                            • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"
                              2⤵
                              • Executes dropped EXE
                              PID:4104
                            • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                              "C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"
                              2⤵
                              • Executes dropped EXE
                              PID:4420
                            • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
                              2⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:5228
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                3⤵
                                  PID:5420
                                  • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                                    "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    • Modifies system certificate store
                                    PID:5744
                                  • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                                    "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    PID:5764
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                                    4⤵
                                      PID:344
                                      • C:\Windows\SysWOW64\choice.exe
                                        choice /C Y /N /D Y /T 3
                                        5⤵
                                          PID:2836
                                  • C:\Windows\SysWOW64\rundll32.exe
                                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                                    2⤵
                                    • Blocklisted process makes network request
                                    • Loads dropped DLL
                                    PID:5524
                                  • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Checks SCSI registry key(s)
                                    • Suspicious behavior: MapViewOfSection
                                    PID:6096
                                  • C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    PID:5004
                                    • C:\Users\Admin\AppData\Local\Temp\u3v0.0.exe
                                      "C:\Users\Admin\AppData\Local\Temp\u3v0.0.exe"
                                      3⤵
                                      • Executes dropped EXE
                                      PID:1860
                                    • C:\Users\Admin\AppData\Local\Temp\u3v0.1.exe
                                      "C:\Users\Admin\AppData\Local\Temp\u3v0.1.exe"
                                      3⤵
                                      • Executes dropped EXE
                                      • Checks SCSI registry key(s)
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:6028
                                  • C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:5092
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 716
                                      3⤵
                                      • Program crash
                                      PID:1088
                                  • C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    PID:6136
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                      3⤵
                                        PID:1672
                                    • C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      PID:1196
                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                    C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    PID:5276
                                  • C:\Windows\windefender.exe
                                    C:\Windows\windefender.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Modifies data under HKEY_USERS
                                    PID:5004
                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                    C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    PID:5152
                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                    C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    PID:5892
                                  • C:\Users\Admin\AppData\Local\CanReuseTransform\auwdz\TypeId.exe
                                    C:\Users\Admin\AppData\Local\CanReuseTransform\auwdz\TypeId.exe
                                    1⤵
                                    • Executes dropped EXE
                                    PID:4256
                                  • C:\Users\Admin\AppData\Local\Temp\wzhtdvvb.exe
                                    C:\Users\Admin\AppData\Local\Temp\wzhtdvvb.exe
                                    1⤵
                                    • Executes dropped EXE
                                    PID:2460

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\ProgramData\Are.docx

                                    Filesize

                                    11KB

                                    MD5

                                    a33e5b189842c5867f46566bdbf7a095

                                    SHA1

                                    e1c06359f6a76da90d19e8fd95e79c832edb3196

                                    SHA256

                                    5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                    SHA512

                                    f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                  • C:\ProgramData\mozglue.dll

                                    Filesize

                                    576KB

                                    MD5

                                    d59c557dbf26c0d10b81c8ed2a83919b

                                    SHA1

                                    a4b24205b2f6b775453d42934bfddb3ec0325cef

                                    SHA256

                                    947b04110fc584fc7cf02f993cdef8509dd617dd648ec51deec2a97be6ea1a18

                                    SHA512

                                    8a2a89a45058fdebede4649843b547721b22eb733ddbfe9dc55b57e2d3d64c444d613fe724bb54199aef11c3be5640e92bf55d696f0f95054dafd2d7022820ed

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\osminog.exe.log

                                    Filesize

                                    425B

                                    MD5

                                    605f809fab8c19729d39d075f7ffdb53

                                    SHA1

                                    c546f877c9bd53563174a90312a8337fdfc5fdd9

                                    SHA256

                                    6904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556

                                    SHA512

                                    82cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RAFBLHFU\random[1].exe

                                    Filesize

                                    159KB

                                    MD5

                                    4ef18bf40c798f0a33590e2c5a871773

                                    SHA1

                                    ec661bc80319f5008c340f4870593b8aa2fd1aca

                                    SHA256

                                    5828481040b91f44f6b228d41de879303bd28bbab8c5f9bf2f2c77c409bea7e7

                                    SHA512

                                    a0628dd49e5d1ee8a4d5914ff374ca0fab6632ee29b5cd41efdbdb6396a2ff8304acc46c59abd53bd0e281e939bfab80017cca619f2b5d2abb77f094a5af4518

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                    Filesize

                                    45KB

                                    MD5

                                    0b5d94d20be9eecbaed3dddd04143f07

                                    SHA1

                                    c677d0355f4cc7301075a554adc889bce502e15a

                                    SHA256

                                    3c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c

                                    SHA512

                                    395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916

                                  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                    Filesize

                                    192KB

                                    MD5

                                    604e8136547e1620dbf8c66dc50eae04

                                    SHA1

                                    844ecc1376e576bc6c640834d4474695523b79e5

                                    SHA256

                                    76ee16a5524b77d56b19894763c3da3ecfc413cc807ddca0f43412daac898564

                                    SHA512

                                    61817482a11c395e875e3fc313b19432175d10af5f3da94fb775cbde27ae9aa282a458a53aa73bacc4b214455a45b767cb2ceca6db6ebbb34ea8099079e6fcc9

                                  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                    Filesize

                                    1.1MB

                                    MD5

                                    f67ac43d4273652b1a13268352666284

                                    SHA1

                                    d78d40ffad9d848a322796b846b08e70c09491d4

                                    SHA256

                                    ca41e77214da1af66a0775aab00f45000e5448eed2e58730c7d3f34b2409b645

                                    SHA512

                                    16f29e8ccb7f152341bc884194cd660ae9db125ef6a9a9f0faec1902cef51a53372266946a149454ecbda1a8967e32a99a975c4e1625ffa2c0f4909aac7009c2

                                  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                    Filesize

                                    384KB

                                    MD5

                                    1b5cc0ba6aef6e126317181a84e83f54

                                    SHA1

                                    205afa92fb9925e31e9687c40ededbe6a79028d2

                                    SHA256

                                    424b6e97152144ae00cc2cc5d99afb4506e01cc94a1fae13d9183aca1f4edf6a

                                    SHA512

                                    c91739daf73be847c86218420bdaf7b5921c6637b5ed7680a65531d5a3e639dca5f8bb82913c08c737f97c2539e48b4e9afa60698ff4f31d63f2a8afb6af53b8

                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                    Filesize

                                    753KB

                                    MD5

                                    32668fa6d3120698fac9b7e2710a9f28

                                    SHA1

                                    7f10dfb4ad4f795c0bb3804cc3dbfb4815fb93c6

                                    SHA256

                                    68c74420b9d9e5a0e29630ccbb9abcb2908b4a13cd06fcc6a6eb128595222db4

                                    SHA512

                                    63ab8c64059678b1e0639692faf9c9c7dc57540d529b7790da8488df9d3f93b6376c9e4e750e66d8b8b27e8ea69e61e42dce120f896278b2994356f004e168f3

                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                    Filesize

                                    479KB

                                    MD5

                                    1de611bf3722eb849d0c1479dcc12b2b

                                    SHA1

                                    0feb296e3a49a0be101351058d1b2acb266e2aac

                                    SHA256

                                    3ad665e39bfd2868e7d9272abdef967d76fe3a70dde0acea9c853fb7282a3c9f

                                    SHA512

                                    441f0ab5c88f70f1a46ac063a927bb341b61da9b0c70f2fb05191a507e84df2479e4da15afabd47d938cee7e9bd0682e445c9b203f924ae7d89cb886152464d1

                                  • C:\Users\Admin\AppData\Local\Temp\1000022001\6c16cf44c9.exe

                                    Filesize

                                    1.1MB

                                    MD5

                                    dda3fde0126666c0a99cca8d00cb5ed3

                                    SHA1

                                    d8dc2c21a4028108e1630a08bad5a1ab2708e655

                                    SHA256

                                    253e367385ea6e981bd51ff9906c6ce3fa1857c2c55bd35a9a33ede601e32d8c

                                    SHA512

                                    2b2c2db5839080cd21f06f0ea93b21158ef0991f2f41f87eb94c61e0705b9b2a791004ee5af340e958726ea345d948a9f34fe414bd291a19823dc81034680884

                                  • C:\Users\Admin\AppData\Local\Temp\1000022001\6c16cf44c9.exe

                                    Filesize

                                    1.1MB

                                    MD5

                                    c6e6412d059508b1edcd369cc260ac2a

                                    SHA1

                                    709aef6453fca7b4bb3d2ec114297aa776c7ee3f

                                    SHA256

                                    697d35e5db2691dd7a6686e16ec8b81c56f7d66aff9af0ae007ac093d1c60185

                                    SHA512

                                    0529a2bffd978ca3190c07ce3e643dbfc493fe760789e248c1886f69d9e8a5be6b20e26ef646fbaf9a21c44b8498073787a24384d1053952f6210a6788ae65f2

                                  • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe

                                    Filesize

                                    534KB

                                    MD5

                                    a3f8b60a08da0f600cfce3bb600d5cb3

                                    SHA1

                                    b00d7721767b717b3337b5c6dade4ebf2d56345e

                                    SHA256

                                    0c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb

                                    SHA512

                                    14f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d

                                  • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe

                                    Filesize

                                    464KB

                                    MD5

                                    c084d6f6ba40534fbfc5a64b21ef99ab

                                    SHA1

                                    0b4a17da83c0a8abbc8fab321931d5447b32b720

                                    SHA256

                                    afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                                    SHA512

                                    a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                                  • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe

                                    Filesize

                                    128KB

                                    MD5

                                    fb5258ebd7dff8b2260cfb91cc543dbf

                                    SHA1

                                    bb49bfd25cb813886215aee47bd9dd93f60afad3

                                    SHA256

                                    12e18747f7bc67fcd242dc4926f381369fb40e5d66623f9ec30c9f39b5712461

                                    SHA512

                                    203d172c924b791a68f1fead652ce48b144a021cef11e8a0d6162c2f06042aef63f8fd0d7ca21c8337a27a225e72a64a392ef3cf819ddbc29165cd961d014046

                                  • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                    Filesize

                                    242KB

                                    MD5

                                    eeca2261f078b18074f075bbfa876cc7

                                    SHA1

                                    c6b8bd5cd803764edfc9a5f340b9b04a3ac0708b

                                    SHA256

                                    a29df686f96f1c6a68b6768c6ec9c14f266afed67279b25e1cc5271cec263c6f

                                    SHA512

                                    15c309ec16d56c6219ae9bd8297eb082f24127dbe3a87945083aaf26f055d60edad9239cf71e339ffae55927b266b84656b800ee9354221ebc631b7fa110174d

                                  • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                    Filesize

                                    2.5MB

                                    MD5

                                    005e52bf609d20a29b3e19fce13a0628

                                    SHA1

                                    f84a71173b82a99b252f56f801dbe8b8ba31d188

                                    SHA256

                                    5271fe0541d6933df1e6ec3bca9abd35243189cbe9cfae215fb83d22931d2859

                                    SHA512

                                    b5de3f40d90966d80f024a11f1dce8def9c0e2d19ee361b74aeb46a93f1910c7001e17100b29c299ac7683956b4dacf8bf8f00e7b79e1d83bd1bfe84bd57cf88

                                  • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    d33a8d333de7f3b0b356fa22c1a07f1e

                                    SHA1

                                    2683295cf82e97f44be0a4a051f6771ef2696512

                                    SHA256

                                    6eccaf4fb54493431bcd55864c1fdae7722451bc3233ba7a5f6c1fbe7a5997c8

                                    SHA512

                                    2df7363ed3e26bf1c3a3cb1f6c1413e42e0280079a5c7040ea0aa328396a8b59fe77dcae6a88bd9d63a7abeeef3842dba501c35e4b32f39d94a73bf8320ef1f7

                                  • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    444532fcd858195a7e6e08dc42d9b119

                                    SHA1

                                    d6648434771b3072314ae6f170a771f0f1e9408d

                                    SHA256

                                    3c0f5360b66ae1e40769081558167c5dbc9cd849998c1cc49d921a74acd610d1

                                    SHA512

                                    4f39c26eba4edfa95129f11ab43e38d54a259955b353788d57e820986fbe5fddf84f5e43436e5e1a99bfdb75898aa2f977d77a48cd6bf6e153feb2cecc5f89b2

                                  • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                    Filesize

                                    1.1MB

                                    MD5

                                    e18078fb1ff38f2201e52f7032c4c1c0

                                    SHA1

                                    1258d732dc4a403958c86de45c2506201d95aae5

                                    SHA256

                                    e571d3ea825aa254593c8e58ddf7b0fa17f3382ce7c425ea7950cc48c01ac118

                                    SHA512

                                    a5db272c1329d12f249efa25c552b3173005586eddead7972d50e05b7d2dde4be20c4028ca4882b8dc4fad0207d8d5eae81e8d8162f7064d78d662ce82b4e90a

                                  • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                    Filesize

                                    562KB

                                    MD5

                                    ca429c8e95c57c58fdc7c9eba2f02e80

                                    SHA1

                                    f3d9f7d4725e337ae52a5e7bd1a084406752b3be

                                    SHA256

                                    223e905c8237cb7ffefd0ec90a7a0e15672d33c868ab2e3ee809fa8a361bae26

                                    SHA512

                                    22d33aa00085d73d6e595fa7141a1c314c9decb0f4bee218d3ba128e6ddcf705522f689fc717c70c6e40593084e74453fe1c75b80d464c56bc620e7334ed05d6

                                  • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe

                                    Filesize

                                    451KB

                                    MD5

                                    b2b60c50903a73efffcb4e33ce49238f

                                    SHA1

                                    9b6f27fc410748ae1570978d7a6aba95a1041eea

                                    SHA256

                                    29d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1

                                    SHA512

                                    2c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126

                                  • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe

                                    Filesize

                                    541KB

                                    MD5

                                    3b069f3dd741e4360f26cb27cb10320a

                                    SHA1

                                    6a9503aaf1e297f2696482ddf1bd4605a8710101

                                    SHA256

                                    f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e

                                    SHA512

                                    bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9

                                  • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe

                                    Filesize

                                    376KB

                                    MD5

                                    3ec85769b25ca32f769f63e703c428ef

                                    SHA1

                                    0c5fc214df5ed2a9930b05eefaffc259ecf88ae7

                                    SHA256

                                    5c3c27bf87664095db6961e3996c82b2a86f13fe37ab86fd3e09f1ce2a7d17dd

                                    SHA512

                                    a24222c9dd1d5517cf5738cca6d6f31c41041900175d45ce622abd38551de80dfe29c9d74de72f1b1edbac9ae0bc44b0e1526c3d7c0a0abb68141ba3224964f8

                                  • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe

                                    Filesize

                                    451KB

                                    MD5

                                    2bfb1ffd26850c5aec6d18055abcd8b2

                                    SHA1

                                    6d7ef34195923f361bc794fb39a2ef988e41a529

                                    SHA256

                                    ed67cc57a863302377b6b1080945ee5a6654632c56d2eb3df1aaec938c40df64

                                    SHA512

                                    57df46a617faba10e10a5ab1c24c5fdbfb775e7072f4487adfb008fb39d14f7b7c97e82e1f27a3467b92e566d5df93bcc248ffa006a3bbfcffa53b9101a76bdf

                                  • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                    Filesize

                                    291KB

                                    MD5

                                    2f6a49a393a2be8abd6c13b565aa904c

                                    SHA1

                                    83e6df44ee6616108aef90fae63dac7d3ab7bf66

                                    SHA256

                                    43163bfb66274c5d62a8e74cb38db352fa6c3785972db324dbec01c386b67c03

                                    SHA512

                                    cc0057d955a9566192dfadf83206c1ab01a4f66f5a8fbd604368a6c54de3635b949552ea0ec2b5f7bbf0db791c48aad33ffe9d2f34b6ac13281e2a4e48cc6dfe

                                  • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                    Filesize

                                    86KB

                                    MD5

                                    b86383677e82c4955d17a846e56227fa

                                    SHA1

                                    a453ae06ef52bde7f7ac0b69ddf158443a3a0c08

                                    SHA256

                                    14fe5e6ec2176251a5b1ccbf4e9652b20e424675ec58a623dd43b0fa8941441a

                                    SHA512

                                    5f1862b35b0c4334fb465f12e0298b9ec98e2e1a56c8d4d7bb55605eb8c62555ab2cb871c40302f74dbf3997a516da11316cefe4677d7aee47eef284821ca2b9

                                  • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    41f247f810c975a374d172d92d424d4a

                                    SHA1

                                    dba4089c8987353392337ba9c2fe0f2dbcbaeb44

                                    SHA256

                                    cf56d3f0b75d908c2b72e08d437214fc9e5983fd0f3eecfddf8b2617318df81d

                                    SHA512

                                    dcfb09b98d5ea0b17cafc82550a84c853b9424fe419cfb56f936e4e334a3d48263198a62f80240e85e8bdc6e034a0080d7240307f160ec94707bf67060bcf5bd

                                  • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe

                                    Filesize

                                    231KB

                                    MD5

                                    7381ea960bed2021a7761d78049d038b

                                    SHA1

                                    9ab316797a88ddfe7d95a0e74801b5e1851ff640

                                    SHA256

                                    39020badb933ada4d9889ed670aec8831b759047e245583029cabe1d309ea1ed

                                    SHA512

                                    52cfe3fc7e104ae7d5057c47e4487402a8cbf152cbb19b2c36a0f2f935a421cf8f7a128d9a61d49ad200166a377f648db121f5a33517ebaeb2510251b690b27c

                                  • C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe

                                    Filesize

                                    410KB

                                    MD5

                                    c2d63badae88b87da297268bf006b8a3

                                    SHA1

                                    b7983a8b1d5d438a80e401f5bc073aff8701735c

                                    SHA256

                                    db2589bbaa7edfece7d4bb233231b3cdeaa88ede4b1f34689adbfa35ca70de1d

                                    SHA512

                                    f1b9bec97e887f6eb9819ad61f99013cf77ced5570a51276ca90406675f5ae1458235b079ad5eeaed67fbf5be5177cc12508abe6f32455465d23ea2943c5fa20

                                  • C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe

                                    Filesize

                                    832KB

                                    MD5

                                    e3c0b0533534c6517afc94790d7b760c

                                    SHA1

                                    4de96db92debb740d007422089bed0bcddf0e974

                                    SHA256

                                    198edf9613054f8a569ac804bf23081fbfa8566270fff05bba9dc3c9a32d9952

                                    SHA512

                                    d12631796afca877c710b9308d1236fca1bfe3abe6582445d9df1bbb404160cff220316e3f600b3a87b46dd3bfb859734008b5c668e410466e82be9dc033249e

                                  • C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe

                                    Filesize

                                    322KB

                                    MD5

                                    3c30dbf2e7d57fdb7babdf49b87d8b31

                                    SHA1

                                    33e72f2e8e6b93a2ecffccba64650bda87e08e0d

                                    SHA256

                                    8d2c29f6d94f4375450e54b8d9fcd645beb7642d4240a4137e7c8539a57040d2

                                    SHA512

                                    c48c83d1d9d459720bea88aa7fb56c13d886fff9ab65deb0ace750d7d35a7b61c66b5d697e506ec152534d788f1641c51bcba38610ae66a6a8e08b0dabdc7657

                                  • C:\Users\Admin\AppData\Local\Temp\1001007001\blue2_A1.exe

                                    Filesize

                                    5.3MB

                                    MD5

                                    238f2215727c750702ae205d403277f9

                                    SHA1

                                    68e7db98bd5c017795f10bf5d3c53f893f72ef23

                                    SHA256

                                    cc06820c0579d364d478bee63d0406ebb31448b20e16bc9456707016cfe18b39

                                    SHA512

                                    859988b31d60020a517c49a3c64b4f95a5c8a4128ef0eeed773acf8d4ceb8790013f4113130fbeafe3ec4742d41ce8d462a28f3b26f09713448801a933d194e3

                                  • C:\Users\Admin\AppData\Local\Temp\19B1.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    cf03bdc20ea3733b3b7504b8c2b80c0c

                                    SHA1

                                    dc13cae80fe4c69c286ebd3c016d633a9e4ae5d3

                                    SHA256

                                    065e12d31345139cd23fd62e9b51f87bf9e0b4b6f9e12487b4b0bc6af375e98b

                                    SHA512

                                    b434905da512130b55b49e33ab6cdc3968400b6776461861512fb66a68f6e950c55dc18d7672f61e3091cd1fccd30b5a20578bd1d2e779e02c337bd83750d77c

                                  • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    6e8e85b7aab625442b10b0d0399cf830

                                    SHA1

                                    a8e58e102c4dc631f735b19e54bba5340e399137

                                    SHA256

                                    f8eef98214b481e5523ffe9fafc0e7929e200c5226030bf802448ca77fe1f434

                                    SHA512

                                    a877e3a72ff3be983e3236568b5e7960fc9c7de912c8fe88510a0a52e9af78f263f3e760adc31b6b17743ff040194e0c1969b3913a5b2bbdb1addab91d3b7f13

                                  • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                    Filesize

                                    704KB

                                    MD5

                                    d8074728893bd2208cd1085c0c6e3d91

                                    SHA1

                                    202457b027d45395af06921e66b11cf881a96622

                                    SHA256

                                    eabf6065fb1fc7ac4567d642b00f2d908bb44462515a657071b5cb2f894fd602

                                    SHA512

                                    30bc6b0f97186e677bde78f58c69fc8429acb0734cc39cd3af966ed86f4321a6b5f69c2c404852cd57bf397babc805d45d6a4feb90d0b259dc820f4376d1398b

                                  • C:\Users\Admin\AppData\Local\Temp\611B.exe

                                    Filesize

                                    563KB

                                    MD5

                                    cf4e6b309fbe283b1ffd523f11b35053

                                    SHA1

                                    d9660ecda657855b77b555db3fa8ae3b67ef3a62

                                    SHA256

                                    33eddf20f3cf6a0dcfa6476518db0d59002c36babdeb0a8ebe06b7acb3b38e33

                                    SHA512

                                    76855bc0ce6f92a4c08889485b6be45fe3c4f8cb6079e3fe027a24c95336d9aefc5d1b2fc1cdde00a5bc19a80a126fc300dee6fb7edbacb996c30d41dba2d5ce

                                  • C:\Users\Admin\AppData\Local\Temp\611B.exe

                                    Filesize

                                    325KB

                                    MD5

                                    8948a8fe0161df50cdf34d589d124032

                                    SHA1

                                    6723b3e7aa7d6145d8ba3552a765432844bb23b1

                                    SHA256

                                    5b56758dbf7a9bf06f73e74b48b70e78831a30043d2ca359a1ad43cce5beac58

                                    SHA512

                                    d04914c3a90b22e22c46f62085722f7e19639158faba15ad4fb70ffe25000291ac1f1850de8d71f4aafab30518f9eaac5fcea8de2645dd80439af1dde691abbd

                                  • C:\Users\Admin\AppData\Local\Temp\676.exe

                                    Filesize

                                    477KB

                                    MD5

                                    bcf66c00e3200a96710c140f6f8c2d0d

                                    SHA1

                                    db9209e4b023bf54ece02eb181aab447f44a5bdf

                                    SHA256

                                    c3f99a96dec11bbf3e12a0573883595ae114b39b89cacee8a7dcc86bf1591b6b

                                    SHA512

                                    0025b3ba37cc1935e14ad05c1066381e2dcdd325e52b3d83c59640054813e78c8be6c82ef85d2ff87d5562aff53682327a74026b2ba6082ba8e581135c80de52

                                  • C:\Users\Admin\AppData\Local\Temp\676.exe

                                    Filesize

                                    298KB

                                    MD5

                                    0dcb17f922d52917def80ccd20d4bfe9

                                    SHA1

                                    2faba75bf5321e6b475a3f9e296656b316f80ed5

                                    SHA256

                                    1285a66b357d6827aa1c1b655fb0b41534d43b6526152337ca35eb5c9dde7c21

                                    SHA512

                                    e690919eb3e6316204f8cdfb09cb2a0273ee7cefc07b24ba1861063d6b0a94d910fad78f5247776c324ea635d21e0f7a45f48fb3d86f5710171a546b9773b08f

                                  • C:\Users\Admin\AppData\Local\Temp\7272.exe

                                    Filesize

                                    1.1MB

                                    MD5

                                    679e0c9d77c16f8529e6a08486c3a9c1

                                    SHA1

                                    8e74ee4ac19b5653981a1d8378aeda9e6fc1b009

                                    SHA256

                                    585e21bcd0f3c05c51f4aa74f554e0a648370facb8b90134680c2e49b5fc272e

                                    SHA512

                                    54195de01cdbf53812f172931d66ff8ee510f78ac972737c71a57fbae1a3b8b7a295347bba81ff38fa0ab934eb4cb60c90e267acdd512ec1b9e90831db454acc

                                  • C:\Users\Admin\AppData\Local\Temp\D31F.exe

                                    Filesize

                                    232KB

                                    MD5

                                    c8eac1d34e880b19859663677cf6f469

                                    SHA1

                                    4a20b4a61b2172f675e5047b2ce82cc1cc9e7150

                                    SHA256

                                    47a23c0c61f2de27199085bde6f0d2f9b891e890d0e0ca9f7b37505ae7a0d69a

                                    SHA512

                                    bb42f71f910dab8dfe9f5c769a078bc48bc4d93fb301ee820bdbe37dea1916ac7828671a8f5b356697f154a6e6174da9fdc8c248d1149088e2763a1ff3d7acd2

                                  • C:\Users\Admin\AppData\Local\Temp\DB9C.dll

                                    Filesize

                                    2.2MB

                                    MD5

                                    e69125300a060d1eb870d352de33e4c3

                                    SHA1

                                    60f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea

                                    SHA256

                                    009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355

                                    SHA512

                                    257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9

                                  • C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe

                                    Filesize

                                    988KB

                                    MD5

                                    065760220981039db19b9701aaeffddf

                                    SHA1

                                    318170b5ca3673cff578d89b7de116f9d6fcd961

                                    SHA256

                                    cac5a59708cebec195aed03baf2c20b32b277ea73738d054ba40a072719160bf

                                    SHA512

                                    81bb505365d1a10dd902f76b24ec111b519d17c0ede500b5c47d6eab9f187f95ac2897b09e7004762455a17cfb068a47c854fd9c29957e13832bb108a6385895

                                  • C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe

                                    Filesize

                                    293KB

                                    MD5

                                    4aac0897e56ef30c2d3c7bfc2a9dcd0d

                                    SHA1

                                    96614e2cbd21ac23c12a474fb0a71ea6a6d51b73

                                    SHA256

                                    4a6b5184b5d4eea1cd1ff05a5f39867ba66e13f5164bd59ebc9b9d4a0561137c

                                    SHA512

                                    f75faaf0b8b78504063cf6e46106e0f10919665d43c905b8447b837044f3c824675422a2aad166e6cb06cbd55d1da32e7b1318d4eee472d3d512b8703d0154ae

                                  • C:\Users\Admin\AppData\Local\Temp\F8E9.exe

                                    Filesize

                                    704KB

                                    MD5

                                    3c14cfcc4c0b9ea67ff115f597f291c2

                                    SHA1

                                    b43e12216f6ecebace94c04cad12e216a387a008

                                    SHA256

                                    dc77dc05d3014248f84c4a2535a583b16fca493efc42e2cbe7808929372ed01e

                                    SHA512

                                    0cabc9c689ab199f59fdbc8fb67fb7e6bd44b16ab16c2184583de86e32911a23ed6061df49af387af3a856cf3f01c59dc4b9c835b44485f42ea3ac8ae949a87b

                                  • C:\Users\Admin\AppData\Local\Temp\F8E9.exe

                                    Filesize

                                    384KB

                                    MD5

                                    80d022da970a91b95bb1385e4516a188

                                    SHA1

                                    8d3209e22be06786bfd5f771a96498c3d72cae50

                                    SHA256

                                    082ae5c3b7be2d5a6a6e084140750bf79331f9130686818f676d4b732fd44713

                                    SHA512

                                    95d9cceeae01c79fbf60405f397f983413466bc42e116cb6974433d4ba76721c791d3a1928e97e91b46f4b96406a586ac037556df4032e2250fdf6466850cdd4

                                  • C:\Users\Admin\AppData\Local\Temp\GIEHJKEBAA.exe

                                    Filesize

                                    101KB

                                    MD5

                                    42b838cf8bdf67400525e128d917f6e0

                                    SHA1

                                    a578f6faec738912dba8c41e7abe1502c46d0cae

                                    SHA256

                                    0e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d

                                    SHA512

                                    f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0

                                  • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe

                                    Filesize

                                    404KB

                                    MD5

                                    383c48c7f64a6867db5b8577fa3abfbf

                                    SHA1

                                    926911f9581df56f5ac38fac01f6d45acdfb7dbd

                                    SHA256

                                    9b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9

                                    SHA512

                                    53b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442

                                  • C:\Users\Admin\AppData\Local\Temp\TmpF056.tmp

                                    Filesize

                                    2KB

                                    MD5

                                    1420d30f964eac2c85b2ccfe968eebce

                                    SHA1

                                    bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                    SHA256

                                    f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                    SHA512

                                    6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eifg5ie0.5ag.ps1

                                    Filesize

                                    1B

                                    MD5

                                    c4ca4238a0b923820dcc509a6f75849b

                                    SHA1

                                    356a192b7913b04c54574d18c28d46e6395428ab

                                    SHA256

                                    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                    SHA512

                                    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                  • C:\Users\Admin\AppData\Local\Temp\april.exe

                                    Filesize

                                    704KB

                                    MD5

                                    d7fff2b1c9dc7b49b5adb9a7f470a4ff

                                    SHA1

                                    38c4ba9d97761d7824a868ea31ee7136e2b835ed

                                    SHA256

                                    351f2f212b54a3266eb0fee59702c86779d6e37eeef1a50cc85482c6d7587ca8

                                    SHA512

                                    9e8d42b1880bab21b060343b7939228cf128e82c1240df564081f63e8b811e54e338eae529579542c07ba5b93284ed3aff48fad9777caefe16c10ea322f440d1

                                  • C:\Users\Admin\AppData\Local\Temp\april.exe

                                    Filesize

                                    473KB

                                    MD5

                                    41f9c135cd1dec75034a708470ce7868

                                    SHA1

                                    c5a79718d497358fa2a34d9b227e547206c84c10

                                    SHA256

                                    735b73ee97f29f3bbd9ca62490f8901e70de98172dd3963ef794c7dec80b867e

                                    SHA512

                                    a37b0afabd306f68e708cc21ee92ed364e655e39a842d6b7f916d093aff8f0b4896fcf210f3f0f545840f295ab429a31ab2462a9960800c2ec19da7387ea1b31

                                  • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                    Filesize

                                    4KB

                                    MD5

                                    dd2cf48cf5dec8f290bd795fa4c0b374

                                    SHA1

                                    517474c84a51649fb32250fd6defa2a6b418aa3f

                                    SHA256

                                    8d9db71a92cca9a73fccd7d171cb4aadbb51a89a72f96447f9847cc1852b68a4

                                    SHA512

                                    1226d7e2267043ef039e11ec1811c9cafbef3da5141cfb6ea28e4f67bf55e44cd570e2143ce6a77aea2a49404674fcca930b5267a0211a18fac103ec56855e66

                                  • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                    Filesize

                                    2KB

                                    MD5

                                    ea703acb7a3d12abd3d7fa2111cb356c

                                    SHA1

                                    74bcdc744b7e6fe77bc7c1d417151449556b6114

                                    SHA256

                                    79b5c71395076e91c108a302c91abdf9e253a3079415f9f12d59841ad98a9ca3

                                    SHA512

                                    5f618857b3b5228272fd60963dd1d5bfda6ebd943e3b4c50f50ded9ef4dcfa2e34d6bf6be7cb4513badcae55b099a4d727317239c8a25c44c3ecdc2a93e4ca05

                                  • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                    Filesize

                                    3KB

                                    MD5

                                    f786ebc26f57c501ca7af6b0a6d4dfbf

                                    SHA1

                                    ac2f0e933047ddde6da156741663e528c9e7ede9

                                    SHA256

                                    dd2079bb5f39283f698e15c9476e73c2befc25fe45f309a26596a4d41bb5c636

                                    SHA512

                                    3fd4067d44ae9cb3a9eb7ad4c0ea9c890df965f0ef33abd17b4359bc01f856331a481ca6f67cfbbadb9cb9a3c2c5b726e6996a01a274d9b8e3eda8608536de1f

                                  • C:\Users\Admin\AppData\Local\Temp\is-OD8B1.tmp\april.tmp

                                    Filesize

                                    677KB

                                    MD5

                                    8519bfba2d14dbdca979e73c62ed4b46

                                    SHA1

                                    388030278d4f7e4d88754adc3ff95df54e01eda9

                                    SHA256

                                    6848c671e27c33dd065e1d70c9be0a4205ad69ec9b4b4b356d03eb8dc73ddeb5

                                    SHA512

                                    a1bfd50e48a82f7b100de76674a082eb77ac385b7ccc5ba574f45b97e2e4a992541a992b979b266b9e6bd27eddec02f943b776ed0210d5b788954e15463921aa

                                  • C:\Users\Admin\AppData\Local\Temp\tmp1BCC.tmp

                                    Filesize

                                    46KB

                                    MD5

                                    02d2c46697e3714e49f46b680b9a6b83

                                    SHA1

                                    84f98b56d49f01e9b6b76a4e21accf64fd319140

                                    SHA256

                                    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                    SHA512

                                    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                  • C:\Users\Admin\AppData\Local\Temp\u1wg.0.exe

                                    Filesize

                                    64KB

                                    MD5

                                    99f32dec047491c545699798390fa2cc

                                    SHA1

                                    3588522d9b62cc04a0e91c845cb9955018380411

                                    SHA256

                                    775096c7ecf1f725773f3a35151546795ef62a9afcc670b07601bef01c0be94b

                                    SHA512

                                    4249f9cfa38278c8ea3d983e889870bda60ee01243ac2ed39807e0ed132bae1cff2f2a76ddf4406dfab4f67ac5590141096098f656c766f6d3f5e5c536908799

                                  • C:\Users\Admin\AppData\Local\Temp\u1wg.0.exe

                                    Filesize

                                    261KB

                                    MD5

                                    606625739201aa74813d211613b2aa82

                                    SHA1

                                    4409efa953358e31d940d698470bd0e2d952e8a7

                                    SHA256

                                    848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2

                                    SHA512

                                    d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1

                                  • C:\Users\Admin\AppData\Local\Temp\u1wg.1.exe

                                    Filesize

                                    2.7MB

                                    MD5

                                    fd8e2afba45d9b91dfd5fc4c05432558

                                    SHA1

                                    3e5a18713684fba318b890708825f86e2a8ce5db

                                    SHA256

                                    dde972473c80c774488d74e0efcdfb5c14c29f9cc03f8fb620e808c3576626c7

                                    SHA512

                                    b0135a7a300caee5059aa9c64f6a767ea676fbc7a7c5ce450973e896d483557a72d2b2e8ec320a2d16ddd9684007b6a138c87bc266d5d625e22f391d26066ef1

                                  • C:\Users\Admin\AppData\Local\Temp\u3v0.0.exe

                                    Filesize

                                    192KB

                                    MD5

                                    141b49056d1c6a3b8bc211ea5d001911

                                    SHA1

                                    e07f7577241a86975ea7098316d7163ff04c138b

                                    SHA256

                                    c519b483b6d7ef8f6f1ad81b513799a97fad546dc34e8995b76135cb9d75aa21

                                    SHA512

                                    0092ba1983711cd0670675d6b022a7478dca519282f56888ff53b02d9c151e4a0c671d6244bd0ce5e77fc21c6f1e8f8d6d15126d69b3e4b8e2ee6870681bee0a

                                  • C:\Users\Admin\AppData\Local\Temp\u3v0.1.exe

                                    Filesize

                                    1019KB

                                    MD5

                                    6c72b77b9bac38686a85b8dea949ce3c

                                    SHA1

                                    dc3d7a1d310f7e6f2d676210da917fa2836384b8

                                    SHA256

                                    a49691e24a0aa1c8069020e12f1cdc69e3906955142c9da71016616d51790ef5

                                    SHA512

                                    f31d9777aec974a517905075e9bd03aceb9da2d6ee9b9e80fb30562bdbe46815dfd0471cb214f1db7ff6a19d2feb7fc3df0dc1f3a24839b095fcbe165febbffb

                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                    Filesize

                                    109KB

                                    MD5

                                    2afdbe3b99a4736083066a13e4b5d11a

                                    SHA1

                                    4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                    SHA256

                                    8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                    SHA512

                                    d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                    Filesize

                                    765KB

                                    MD5

                                    f5f37d9d26740653466c41f2b01ab377

                                    SHA1

                                    f4fb36f2e20486890ddf2a0f41fa0efec5c7e1ac

                                    SHA256

                                    0422d6834860a2b4341a1ce607c0b5123966107140b29edcba69f3d24219b957

                                    SHA512

                                    2e7256913f07f8cd6ee1cb2b33c02d99f33ef9248f2ff53e44c6be4c187c2a7bb0c9cc85475f53e34e8e4a19bf6f713a62e23426f0c505e3b6796b9f0e6d5faa

                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                    Filesize

                                    407KB

                                    MD5

                                    f9e0444ba6878e098c9f0cdd28e8a49b

                                    SHA1

                                    d2ea876c3a21efd3c1a79e98b3f9fd7ce9c5298c

                                    SHA256

                                    57706e78148ed07f644c4d1a2118e0f5a644c12f838810ac9abd3b36df8496c1

                                    SHA512

                                    1cd69b5e59263724f14693332b11a967e89ef9feda9707888faaca5537f50db51f5e218deb4c83fe592c1b2b52e1d3fd6a412b26e563eed106ee1e31de3400e7

                                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                    Filesize

                                    109KB

                                    MD5

                                    726cd06231883a159ec1ce28dd538699

                                    SHA1

                                    404897e6a133d255ad5a9c26ac6414d7134285a2

                                    SHA256

                                    12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                    SHA512

                                    9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                    Filesize

                                    1.2MB

                                    MD5

                                    15a42d3e4579da615a384c717ab2109b

                                    SHA1

                                    22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                    SHA256

                                    3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                    SHA512

                                    1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                  • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                                    Filesize

                                    304KB

                                    MD5

                                    cc90e3326d7b20a33f8037b9aab238e4

                                    SHA1

                                    236d173a6ac462d85de4e866439634db3b9eeba3

                                    SHA256

                                    bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                                    SHA512

                                    b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                                  • C:\Users\Public\Music\EasyApp.exe

                                    Filesize

                                    341KB

                                    MD5

                                    0e49e66fd0e90ac46ad9f027df419048

                                    SHA1

                                    357559abc784e69245db2e4302c838913df618b2

                                    SHA256

                                    599fbee1c0335d5f8efae7ed35eed9700001841005158a1c8c6648b53a6e4bda

                                    SHA512

                                    38aa37d633795de8ad65749a11da261e9f3aa2e1f285cd95e89a895c76e28a7d1fb72e87776013e8b508b9201d1b7ce92462c85cb4e3d55d5cf9b5a802479fed

                                  • C:\Windows\rss\csrss.exe

                                    Filesize

                                    4.1MB

                                    MD5

                                    c8564b4d627953e836d0faab99740a6a

                                    SHA1

                                    74b37a34950bd081d10072b4dae88952a4c52178

                                    SHA256

                                    051b0fe6b1d01ab0cc4dee0e7270b4dd54040a5c1783b78ea612bbf37d0c6f31

                                    SHA512

                                    77af3dd58d16effa1a307c174add6cdd1006b2a08add287388162bb2b7b3245a77e15375da1e508bcce10f024ab0e888b16862f087941e7b165834e8ae406776

                                  • \??\c:\users\admin\appdata\local\temp\u1wg.1.exe

                                    Filesize

                                    384KB

                                    MD5

                                    bc0d1292d9bc0f1bb471721695c178c2

                                    SHA1

                                    039a7679de9769b4656a202cad86b3e172540914

                                    SHA256

                                    2be1c6eee936e18047a5cf2a4103299811a2dfa96ba2ffe06e930c50a53432c3

                                    SHA512

                                    af97f80ea0dd12c142eb2efe34d8988066121f6bc2630f888c93b50324cc7e1f931628df7931479013302bb56a49351b3f4a53aecb34753c2220f9fabcd44fac

                                  • \ProgramData\mozglue.dll

                                    Filesize

                                    512KB

                                    MD5

                                    5b1ffe1fafdf616817b2e7f9e3e274af

                                    SHA1

                                    81345d40f7aa88ac5e9c0c10716a130674f2000c

                                    SHA256

                                    15e8eac409a21d6c2aed07df62f05e45d6406c6fdbda863959b994d4e8a35ca4

                                    SHA512

                                    5726abae3fe337847bdfe3d5b4576b5fecdaa79d849cfa35400c8f9257dc378d502d8633ad8cd1955b31a279c1beb55e942d9b1f519366ab85df627cd259a189

                                  • \ProgramData\nss3.dll

                                    Filesize

                                    128KB

                                    MD5

                                    34772db675889069f256a8ad143554c2

                                    SHA1

                                    2e6ceda2c0267e8fe1d4f24860d46b26fdb63117

                                    SHA256

                                    e4eafcf079025ec65956c46c5294a5122fa18a3836569784507dd9e9b5a5afde

                                    SHA512

                                    e97495dbf030e37f52eb61ce9850d919ad09d0d8fa4200b88c213927b1f29fb7d29393d698943b68987a37c9d896b6d61eb6c7e631013b5c22566248f40480fd

                                  • \Users\Admin\AppData\Local\Temp\is-3T0U2.tmp\_isetup\_iscrypt.dll

                                    Filesize

                                    2KB

                                    MD5

                                    a69559718ab506675e907fe49deb71e9

                                    SHA1

                                    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                    SHA256

                                    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                    SHA512

                                    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                    Filesize

                                    243KB

                                    MD5

                                    a6cd294ed96c956ca993f3e3daba120f

                                    SHA1

                                    131b90f7cf01eba22b8f49182d259e61085c8dd3

                                    SHA256

                                    24cf8b52f7de9304dcaf6ac4e74507eee78acd68d562386b31161f22cc08ed77

                                    SHA512

                                    55109041503e40ba0a2c54b3d83d12584a492ccf3455137d5d085c77ecf49e11b0722cde3b8902a3fe41cacc922e489e6036d92ba18e2564182302a388d252bc

                                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                    Filesize

                                    154KB

                                    MD5

                                    62d5c87f2c212a102d49e876d6ef4b01

                                    SHA1

                                    ff505469ad9ff8b8c92f606b9d679f9f32a52e2f

                                    SHA256

                                    650e16a603cc81f6ea01c89636147fe6c0752f2084d77d173fa0a99ece084154

                                    SHA512

                                    812fed3f272c4d50c8cc5e6fc5b352d11479db370a15c39eb8c21a70385d1e1b99ad9d5834aedcfb7ca037d690a4326108dab2f134bb1e3fcc2011d8414bfa25

                                  • memory/1020-339-0x0000000000400000-0x0000000000558000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1020-321-0x0000000000400000-0x0000000000558000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1020-320-0x0000000002140000-0x0000000002188000-memory.dmp

                                    Filesize

                                    288KB

                                  • memory/1020-319-0x0000000000560000-0x0000000000660000-memory.dmp

                                    Filesize

                                    1024KB

                                  • memory/1080-289-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                    Filesize

                                    9.1MB

                                  • memory/1080-723-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                    Filesize

                                    9.1MB

                                  • memory/1080-400-0x0000000002B00000-0x0000000002EFA000-memory.dmp

                                    Filesize

                                    4.0MB

                                  • memory/1080-401-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                    Filesize

                                    9.1MB

                                  • memory/1080-461-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                    Filesize

                                    9.1MB

                                  • memory/1080-454-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                    Filesize

                                    9.1MB

                                  • memory/1080-75-0x0000000002B00000-0x0000000002EFA000-memory.dmp

                                    Filesize

                                    4.0MB

                                  • memory/1080-78-0x0000000002F00000-0x00000000037EB000-memory.dmp

                                    Filesize

                                    8.9MB

                                  • memory/1252-486-0x00007FF9CA040000-0x00007FF9CAA2C000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/1252-496-0x000002C823D20000-0x000002C823E2E000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/1252-494-0x000002C80B0F0000-0x000002C80B100000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1252-499-0x000002C80B2B0000-0x000002C80B2BC000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/1252-498-0x000002C80B290000-0x000002C80B2A0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1252-489-0x000002C805CD0000-0x000002C8095A2000-memory.dmp

                                    Filesize

                                    56.8MB

                                  • memory/1596-724-0x0000000000400000-0x0000000000512000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/1604-30-0x00000000045A0000-0x00000000046A8000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/1604-290-0x0000000010000000-0x0000000010239000-memory.dmp

                                    Filesize

                                    2.2MB

                                  • memory/1604-22-0x0000000000820000-0x0000000000826000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/1604-33-0x00000000045A0000-0x00000000046A8000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/1604-29-0x0000000004470000-0x0000000004593000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/1604-23-0x0000000010000000-0x0000000010239000-memory.dmp

                                    Filesize

                                    2.2MB

                                  • memory/2164-2-0x00000000004E0000-0x00000000004EB000-memory.dmp

                                    Filesize

                                    44KB

                                  • memory/2164-5-0x0000000000400000-0x0000000000477000-memory.dmp

                                    Filesize

                                    476KB

                                  • memory/2164-3-0x0000000000400000-0x0000000000477000-memory.dmp

                                    Filesize

                                    476KB

                                  • memory/2164-1-0x00000000005E0000-0x00000000006E0000-memory.dmp

                                    Filesize

                                    1024KB

                                  • memory/2336-488-0x0000000000400000-0x00000000008AD000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2336-353-0x0000000000A30000-0x0000000000A31000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2336-466-0x0000000000400000-0x00000000008AD000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2340-635-0x00007FF6F71C0000-0x00007FF6F7AF4000-memory.dmp

                                    Filesize

                                    9.2MB

                                  • memory/2340-18-0x0000000000400000-0x000000000053E000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2340-28-0x0000000000400000-0x000000000053E000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2340-16-0x00000000006B0000-0x00000000007B0000-memory.dmp

                                    Filesize

                                    1024KB

                                  • memory/2340-17-0x00000000001E0000-0x00000000001EB000-memory.dmp

                                    Filesize

                                    44KB

                                  • memory/2464-64-0x0000000000570000-0x0000000000670000-memory.dmp

                                    Filesize

                                    1024KB

                                  • memory/2464-348-0x0000000000400000-0x0000000000568000-memory.dmp

                                    Filesize

                                    1.4MB

                                  • memory/2464-72-0x0000000000400000-0x0000000000568000-memory.dmp

                                    Filesize

                                    1.4MB

                                  • memory/2464-68-0x00000000021B0000-0x000000000221F000-memory.dmp

                                    Filesize

                                    444KB

                                  • memory/3044-335-0x0000000000400000-0x0000000000558000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/3044-322-0x0000000001030000-0x00000000013D6000-memory.dmp

                                    Filesize

                                    3.6MB

                                  • memory/3044-328-0x0000000000400000-0x0000000000558000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/3044-330-0x0000000000400000-0x0000000000558000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/3044-331-0x0000000000400000-0x0000000000558000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/3044-332-0x0000000000400000-0x0000000000558000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/3044-334-0x0000000000400000-0x0000000000558000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/3400-25-0x0000000002830000-0x0000000002846000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3400-4-0x00000000008F0000-0x0000000000906000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3952-471-0x00000000064B0000-0x00000000064C0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3952-472-0x00000000064B0000-0x00000000064C0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3952-497-0x00000000078D0000-0x00000000078EC000-memory.dmp

                                    Filesize

                                    112KB

                                  • memory/3952-484-0x0000000007420000-0x0000000007486000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/3952-485-0x0000000007490000-0x00000000077E0000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/3952-465-0x0000000006420000-0x0000000006456000-memory.dmp

                                    Filesize

                                    216KB

                                  • memory/3952-481-0x0000000007380000-0x00000000073E6000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/3952-480-0x0000000006A40000-0x0000000006A62000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3952-468-0x0000000071830000-0x0000000071F1E000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/3952-467-0x0000000006AF0000-0x0000000007118000-memory.dmp

                                    Filesize

                                    6.2MB

                                  • memory/4580-73-0x0000000000400000-0x0000000000414000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/4580-62-0x0000000000400000-0x0000000000414000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/4580-390-0x0000000000400000-0x0000000000414000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/4656-39-0x0000000000D30000-0x0000000001470000-memory.dmp

                                    Filesize

                                    7.2MB

                                  • memory/4656-38-0x0000000072D00000-0x00000000733EE000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/4656-67-0x0000000072D00000-0x00000000733EE000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/4940-495-0x0000000000880000-0x0000000000980000-memory.dmp

                                    Filesize

                                    1024KB

                                  • memory/4940-457-0x0000000000400000-0x000000000063B000-memory.dmp

                                    Filesize

                                    2.2MB

                                  • memory/4940-337-0x0000000000400000-0x000000000063B000-memory.dmp

                                    Filesize

                                    2.2MB

                                  • memory/4940-606-0x0000000000400000-0x000000000063B000-memory.dmp

                                    Filesize

                                    2.2MB

                                  • memory/4940-336-0x00000000006A0000-0x00000000006C7000-memory.dmp

                                    Filesize

                                    156KB

                                  • memory/4940-654-0x0000000000400000-0x000000000063B000-memory.dmp

                                    Filesize

                                    2.2MB

                                  • memory/4940-350-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                    Filesize

                                    972KB

                                  • memory/4940-338-0x0000000000880000-0x0000000000980000-memory.dmp

                                    Filesize

                                    1024KB

                                  • memory/5048-403-0x0000000004CC0000-0x0000000004CC1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5048-407-0x0000000001260000-0x0000000001724000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/5048-372-0x0000000004CB0000-0x0000000004CB1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5048-360-0x0000000077224000-0x0000000077225000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5048-376-0x0000000004C60000-0x0000000004C61000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5048-378-0x0000000004CA0000-0x0000000004CA1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5048-370-0x0000000004C70000-0x0000000004C71000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5048-349-0x0000000001260000-0x0000000001724000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/5048-368-0x0000000004C90000-0x0000000004C91000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5048-366-0x0000000004C80000-0x0000000004C81000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5048-374-0x0000000004C50000-0x0000000004C51000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5048-364-0x0000000001260000-0x0000000001724000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/5048-391-0x0000000004CD0000-0x0000000004CD1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5116-456-0x0000000000400000-0x00000000004B8000-memory.dmp

                                    Filesize

                                    736KB

                                  • memory/5116-402-0x00000000005D0000-0x00000000005D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5116-298-0x00000000005D0000-0x00000000005D1000-memory.dmp

                                    Filesize

                                    4KB