Resubmissions

22-03-2024 02:20

240322-csfacsfb94 10

21-03-2024 22:41

240321-2l99laed5s 10

Analysis

  • max time kernel
    300s
  • max time network
    301s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-03-2024 22:41

General

  • Target

    a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe

  • Size

    208KB

  • MD5

    9b10a29569abdddb99d729e07f51d62a

  • SHA1

    c152b192772a1fdc2dcf17faf4319fb0173ce55d

  • SHA256

    a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef

  • SHA512

    237b5c3f390030d256cba7af05f8b4d45f0c7459127891a12d3a644b28df2da09109325e32457e83a1af93885abd75fc9da79bb4864157ebc15275f6673617b1

  • SSDEEP

    3072:PMCZ3MKPMkeED9EqQvbMaOnrDN08QKuV9w1RBeg8+/yGYV:kCZ5MiD9EqQvZOG8QKOkRBeA

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

http://nidoe.org/tmp/index.php

http://sodez.ru/tmp/index.php

http://uama.com.ua/tmp/index.php

http://talesofpirates.net/tmp/index.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

lumma

C2

https://asleepfulltytarrtw.shop/api

https://resergvearyinitiani.shop/api

https://relevantvoicelesskw.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 3 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 6 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • Windows security bypass 2 TTPs 7 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 39 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 10 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 15 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 14 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe
    "C:\Users\Admin\AppData\Local\Temp\a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4556
  • C:\Users\Admin\AppData\Local\Temp\12C8.exe
    C:\Users\Admin\AppData\Local\Temp\12C8.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:5028
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\22B7.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\22B7.dll
      2⤵
      • Loads dropped DLL
      PID:1020
  • C:\Users\Admin\AppData\Local\Temp\79FF.exe
    C:\Users\Admin\AppData\Local\Temp\79FF.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4604
      • C:\Users\Admin\AppData\Local\Temp\u3jw.0.exe
        "C:\Users\Admin\AppData\Local\Temp\u3jw.0.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        PID:4068
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JDAFHCGIJE.exe"
          4⤵
            PID:1484
            • C:\Users\Admin\AppData\Local\Temp\JDAFHCGIJE.exe
              "C:\Users\Admin\AppData\Local\Temp\JDAFHCGIJE.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:4384
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\JDAFHCGIJE.exe
                6⤵
                  PID:3156
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 2.2.2.2 -n 1 -w 3000
                    7⤵
                    • Runs ping.exe
                    PID:2508
          • C:\Users\Admin\AppData\Local\Temp\u3jw.1.exe
            "C:\Users\Admin\AppData\Local\Temp\u3jw.1.exe"
            3⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:776
            • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
              "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2496
        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
          "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1676
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3628
          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
            "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
            3⤵
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious use of WriteProcessMemory
            PID:4808
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:4780
            • C:\Windows\System32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2984
              • C:\Windows\system32\netsh.exe
                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                5⤵
                • Modifies Windows Firewall
                • Modifies data under HKEY_USERS
                PID:3348
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:4136
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:2184
            • C:\Windows\rss\csrss.exe
              C:\Windows\rss\csrss.exe
              4⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Manipulates WinMonFS driver.
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:8
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:3352
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                5⤵
                • Creates scheduled task(s)
                PID:4756
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /delete /tn ScheduledUpdate /f
                5⤵
                  PID:196
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:4824
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:1476
                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                  C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                  5⤵
                  • Executes dropped EXE
                  PID:1016
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  5⤵
                  • Creates scheduled task(s)
                  PID:1576
                • C:\Windows\windefender.exe
                  "C:\Windows\windefender.exe"
                  5⤵
                  • Executes dropped EXE
                  PID:3628
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                    6⤵
                      PID:1756
                      • C:\Windows\SysWOW64\sc.exe
                        sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                        7⤵
                        • Launches sc.exe
                        PID:1648
            • C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe
              "C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3092
              • C:\Users\Public\Music\EasyApp.exe
                "C:\Users\Public\Music\EasyApp.exe"
                3⤵
                • Executes dropped EXE
                PID:4836
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 956
                  4⤵
                  • Program crash
                  PID:700
            • C:\Users\Admin\AppData\Local\Temp\april.exe
              "C:\Users\Admin\AppData\Local\Temp\april.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:5092
              • C:\Users\Admin\AppData\Local\Temp\is-D5V9M.tmp\april.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-D5V9M.tmp\april.tmp" /SL5="$60116,1485356,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:4688
          • C:\Users\Admin\AppData\Local\Temp\B360.exe
            C:\Users\Admin\AppData\Local\Temp\B360.exe
            1⤵
            • Executes dropped EXE
            PID:3652
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 1016
              2⤵
              • Program crash
              PID:2420
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 1052
              2⤵
              • Program crash
              PID:4392
          • C:\Users\Admin\AppData\Local\Temp\C217.exe
            C:\Users\Admin\AppData\Local\Temp\C217.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            PID:4528
          • C:\Users\Admin\AppData\Local\Temp\5753.exe
            C:\Users\Admin\AppData\Local\Temp\5753.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:848
            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              2⤵
                PID:1048
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 520
                  3⤵
                  • Program crash
                  PID:648
            • C:\Users\Admin\AppData\Local\Temp\6667.exe
              C:\Users\Admin\AppData\Local\Temp\6667.exe
              1⤵
              • Executes dropped EXE
              • Writes to the Master Boot Record (MBR)
              PID:4608
            • C:\Windows\windefender.exe
              C:\Windows\windefender.exe
              1⤵
              • Executes dropped EXE
              • Modifies data under HKEY_USERS
              PID:4356
            • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
              C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              PID:2636
              • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe
                "C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:2256
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                    PID:3000
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    3⤵
                      PID:1572
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 1104
                        4⤵
                        • Program crash
                        PID:4296
                  • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:1376
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      3⤵
                        PID:4144
                    • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
                      2⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      PID:648
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                      2⤵
                      • Loads dropped DLL
                      PID:2416
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                        3⤵
                        • Blocklisted process makes network request
                        • Loads dropped DLL
                        PID:2064
                        • C:\Windows\system32\netsh.exe
                          netsh wlan show profiles
                          4⤵
                            PID:412
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\990815831200_Desktop.zip' -CompressionLevel Optimal
                            4⤵
                              PID:388
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          2⤵
                          • Blocklisted process makes network request
                          • Loads dropped DLL
                          PID:4144
                        • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"
                          2⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Drops file in Windows directory
                          PID:4716
                          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:3320
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                              4⤵
                              • Loads dropped DLL
                              PID:3012
                              • C:\Windows\system32\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                5⤵
                                • Blocklisted process makes network request
                                • Loads dropped DLL
                                PID:2184
                                • C:\Windows\system32\netsh.exe
                                  netsh wlan show profiles
                                  6⤵
                                    PID:2960
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\990815831200_Desktop.zip' -CompressionLevel Optimal
                                    6⤵
                                      PID:2668
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                  4⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  PID:3328
                            • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"
                              2⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:2588
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                3⤵
                                  PID:1028
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                  3⤵
                                    PID:3668
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 792
                                      4⤵
                                      • Program crash
                                      PID:2508
                                • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:2348
                                • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                                  "C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"
                                  2⤵
                                    PID:2416
                                  • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    PID:784
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                      3⤵
                                        PID:4080
                                        • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                                          "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          PID:5112
                                        • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                                          "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          • Modifies system certificate store
                                          PID:4696
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                                          4⤵
                                            PID:5440
                                            • C:\Windows\SysWOW64\choice.exe
                                              choice /C Y /N /D Y /T 3
                                              5⤵
                                                PID:5552
                                        • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Checks SCSI registry key(s)
                                          • Suspicious behavior: MapViewOfSection
                                          PID:5484
                                        • C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          PID:5596
                                          • C:\Users\Admin\AppData\Local\Temp\u4bg.0.exe
                                            "C:\Users\Admin\AppData\Local\Temp\u4bg.0.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            PID:5688
                                          • C:\Users\Admin\AppData\Local\Temp\u4bg.1.exe
                                            "C:\Users\Admin\AppData\Local\Temp\u4bg.1.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Checks SCSI registry key(s)
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:5640
                                        • C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          PID:5856
                                        • C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:6048
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            3⤵
                                              PID:6132
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 888
                                                4⤵
                                                • Program crash
                                                PID:1108
                                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                          C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:4796
                                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                          C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:4548

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\ProgramData\Are.docx

                                          Filesize

                                          11KB

                                          MD5

                                          a33e5b189842c5867f46566bdbf7a095

                                          SHA1

                                          e1c06359f6a76da90d19e8fd95e79c832edb3196

                                          SHA256

                                          5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                          SHA512

                                          f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                        • C:\ProgramData\mozglue.dll

                                          Filesize

                                          593KB

                                          MD5

                                          c8fd9be83bc728cc04beffafc2907fe9

                                          SHA1

                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                          SHA256

                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                          SHA512

                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\alex1234.exe.log

                                          Filesize

                                          425B

                                          MD5

                                          605f809fab8c19729d39d075f7ffdb53

                                          SHA1

                                          c546f877c9bd53563174a90312a8337fdfc5fdd9

                                          SHA256

                                          6904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556

                                          SHA512

                                          82cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3

                                        • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          3c44bfe54c1233d8645cb87101be526d

                                          SHA1

                                          dd7d94832980c162e5793dd27d2024e8aa1af18d

                                          SHA256

                                          990d288499b6945af3246331757db918f78d9d94889b973836b1289fa6cd1123

                                          SHA512

                                          c365a25e7c906458b960743a3221a632c0cf59d5b9bd73681444f1b6797973c1098953d50deaeee315f42aaa6949890cc281024e30258350f74a7959e2de80a3

                                        • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                          Filesize

                                          376KB

                                          MD5

                                          ffbf529797c810f214c313592ea7b904

                                          SHA1

                                          8e3b76884b2fa9983276294519edeb38b4f26f85

                                          SHA256

                                          ed09ed5ecd839b25c4810ba919abdaf03ba125981da555bf667022fb8af80459

                                          SHA512

                                          0051f4072b7400984fa09ad1431c50fe1e69754aefc9f313acfc6669b0b703034c2994d4ef2b62190adbce067c8c970c2d9b26589e7219d6eb5e6e2bf7226744

                                        • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe

                                          Filesize

                                          534KB

                                          MD5

                                          a3f8b60a08da0f600cfce3bb600d5cb3

                                          SHA1

                                          b00d7721767b717b3337b5c6dade4ebf2d56345e

                                          SHA256

                                          0c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb

                                          SHA512

                                          14f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d

                                        • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe

                                          Filesize

                                          464KB

                                          MD5

                                          c084d6f6ba40534fbfc5a64b21ef99ab

                                          SHA1

                                          0b4a17da83c0a8abbc8fab321931d5447b32b720

                                          SHA256

                                          afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                                          SHA512

                                          a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                                        • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                          Filesize

                                          2.9MB

                                          MD5

                                          aafc00662f8c68cbd45a08c885a2d6fc

                                          SHA1

                                          bd1f70f190579debb213bf3022a304c0d9ce6a9f

                                          SHA256

                                          8003cded35a962784da90078ec690fa1a6ee9d565d1d9da457811e292745d955

                                          SHA512

                                          20a61dbfa4ab76de740fea6d976e3ff3f48f7b2649dbe10c2f545c0c45a272652b951c6e7ca5a9d31a90ac157498a2368f0f0b72657348d23614d75da4207774

                                        • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          444532fcd858195a7e6e08dc42d9b119

                                          SHA1

                                          d6648434771b3072314ae6f170a771f0f1e9408d

                                          SHA256

                                          3c0f5360b66ae1e40769081558167c5dbc9cd849998c1cc49d921a74acd610d1

                                          SHA512

                                          4f39c26eba4edfa95129f11ab43e38d54a259955b353788d57e820986fbe5fddf84f5e43436e5e1a99bfdb75898aa2f977d77a48cd6bf6e153feb2cecc5f89b2

                                        • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                          Filesize

                                          685KB

                                          MD5

                                          0f8158981e75faa223828539fef97d5d

                                          SHA1

                                          d1a197895d2e0532bbb1b53895c6c58e04e7d3ba

                                          SHA256

                                          f9771bafaee88bdc68ecece1e0002da5098771a6f22935764c6d21b8f0ca9082

                                          SHA512

                                          20dae7c7daaf0492bdfa590a10b5e1c45da719ce4f575a411d8464bc0503560bf7c6ac0641f7a8e5509ce04aee20353dd1255e93142c9adee1114fffc2fce1c4

                                        • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe

                                          Filesize

                                          451KB

                                          MD5

                                          b2b60c50903a73efffcb4e33ce49238f

                                          SHA1

                                          9b6f27fc410748ae1570978d7a6aba95a1041eea

                                          SHA256

                                          29d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1

                                          SHA512

                                          2c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126

                                        • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe

                                          Filesize

                                          541KB

                                          MD5

                                          3b069f3dd741e4360f26cb27cb10320a

                                          SHA1

                                          6a9503aaf1e297f2696482ddf1bd4605a8710101

                                          SHA256

                                          f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e

                                          SHA512

                                          bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9

                                        • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                          Filesize

                                          1.7MB

                                          MD5

                                          85a15f080b09acace350ab30460c8996

                                          SHA1

                                          3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                          SHA256

                                          3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                          SHA512

                                          ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                        • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe

                                          Filesize

                                          231KB

                                          MD5

                                          7381ea960bed2021a7761d78049d038b

                                          SHA1

                                          9ab316797a88ddfe7d95a0e74801b5e1851ff640

                                          SHA256

                                          39020badb933ada4d9889ed670aec8831b759047e245583029cabe1d309ea1ed

                                          SHA512

                                          52cfe3fc7e104ae7d5057c47e4487402a8cbf152cbb19b2c36a0f2f935a421cf8f7a128d9a61d49ad200166a377f648db121f5a33517ebaeb2510251b690b27c

                                        • C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe

                                          Filesize

                                          410KB

                                          MD5

                                          c2d63badae88b87da297268bf006b8a3

                                          SHA1

                                          b7983a8b1d5d438a80e401f5bc073aff8701735c

                                          SHA256

                                          db2589bbaa7edfece7d4bb233231b3cdeaa88ede4b1f34689adbfa35ca70de1d

                                          SHA512

                                          f1b9bec97e887f6eb9819ad61f99013cf77ced5570a51276ca90406675f5ae1458235b079ad5eeaed67fbf5be5177cc12508abe6f32455465d23ea2943c5fa20

                                        • C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe

                                          Filesize

                                          832KB

                                          MD5

                                          e3c0b0533534c6517afc94790d7b760c

                                          SHA1

                                          4de96db92debb740d007422089bed0bcddf0e974

                                          SHA256

                                          198edf9613054f8a569ac804bf23081fbfa8566270fff05bba9dc3c9a32d9952

                                          SHA512

                                          d12631796afca877c710b9308d1236fca1bfe3abe6582445d9df1bbb404160cff220316e3f600b3a87b46dd3bfb859734008b5c668e410466e82be9dc033249e

                                        • C:\Users\Admin\AppData\Local\Temp\1001002001\lumma2.exe

                                          Filesize

                                          322KB

                                          MD5

                                          3c30dbf2e7d57fdb7babdf49b87d8b31

                                          SHA1

                                          33e72f2e8e6b93a2ecffccba64650bda87e08e0d

                                          SHA256

                                          8d2c29f6d94f4375450e54b8d9fcd645beb7642d4240a4137e7c8539a57040d2

                                          SHA512

                                          c48c83d1d9d459720bea88aa7fb56c13d886fff9ab65deb0ace750d7d35a7b61c66b5d697e506ec152534d788f1641c51bcba38610ae66a6a8e08b0dabdc7657

                                        • C:\Users\Admin\AppData\Local\Temp\12C8.exe

                                          Filesize

                                          232KB

                                          MD5

                                          c8eac1d34e880b19859663677cf6f469

                                          SHA1

                                          4a20b4a61b2172f675e5047b2ce82cc1cc9e7150

                                          SHA256

                                          47a23c0c61f2de27199085bde6f0d2f9b891e890d0e0ca9f7b37505ae7a0d69a

                                          SHA512

                                          bb42f71f910dab8dfe9f5c769a078bc48bc4d93fb301ee820bdbe37dea1916ac7828671a8f5b356697f154a6e6174da9fdc8c248d1149088e2763a1ff3d7acd2

                                        • C:\Users\Admin\AppData\Local\Temp\22B7.dll

                                          Filesize

                                          2.2MB

                                          MD5

                                          e69125300a060d1eb870d352de33e4c3

                                          SHA1

                                          60f2c2e6f2a4289a05b5c6212cdaf0d02dad82ea

                                          SHA256

                                          009de0571eb77c7ed594b9e5cda731e2953fd2198e00b25a0e2c4c4ef7414355

                                          SHA512

                                          257d3b61b2c85c1e71d2a80a5fbf44436e9734785fe6b0a643c1939dd01c1d8b98f1c454695296f7137ff035ec6c0118f053e4833e0be91618f2a9066a8cace9

                                        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                          Filesize

                                          381KB

                                          MD5

                                          b68bfe1a45f82c30690d06f0376a197b

                                          SHA1

                                          27b90e1cbe558348d8802718df46d00cdc613a49

                                          SHA256

                                          eb45b78e6cd6f67a3701efc7de6088489da9688c9b9fcdaa6ddaa3f8a71ee7e6

                                          SHA512

                                          ae739395c98abadcdee2c201f37419076f8ae66636df3b54dddb30f41bbb58ad6c1acc997bfc6d3033812d229c1ec0d8b2511569ffbc3578ba208e2864e9b59c

                                        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                          Filesize

                                          529KB

                                          MD5

                                          75949a76fffb8c514035093615772f79

                                          SHA1

                                          9bca8d4580649aa8e507f06174801d479adc9139

                                          SHA256

                                          06118be050fa5918ae3ef608285aa3198b325e3b8873c3894f69e9656208e621

                                          SHA512

                                          1c58b90795960a0d30a0a77d98f02bd5bd2483e2083b52f9f9b1babecf28b4f5f8526f69e9ee60ae581c8f2435cc7625085fcdf02255b2d9bacaaef29ccc20ab

                                        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                          Filesize

                                          3.4MB

                                          MD5

                                          5ceb157f2a5eb0d0312a2b20b8a6f1f9

                                          SHA1

                                          03f804c850bceb648e4498a9a4505c97e840ea8d

                                          SHA256

                                          f65434f2bc8fe3b975c53d11539a05d03d5fbb78502578d2bfb7a2d26ca7d317

                                          SHA512

                                          96dc77d3b1c17b9fda41c722d526e142d4cd759436e890e8edbad69c6e33461f11e7c5d6f6e8a124b8014480de1fbe6c97ed64c45a7c41828af9d1e1e1c6d202

                                        • C:\Users\Admin\AppData\Local\Temp\5753.exe

                                          Filesize

                                          7.4MB

                                          MD5

                                          79c85b9357c54c35202ba7e73e28db3f

                                          SHA1

                                          0edb3fee7862e3b69210526ac57308886842cd24

                                          SHA256

                                          2522dd6f9c5d2b2db495c5a250e74617b5598c7e9f61ee9c3af2d35a26dbe639

                                          SHA512

                                          f2a3cafb6de933bbdfe68beff92b865f00bceed4542e44bebcfe9bb8b145b401497c4dbd3eb6e19cb2a155f26880eef4a14fa033c09ff080f6e735c4acd2726e

                                        • C:\Users\Admin\AppData\Local\Temp\5753.exe

                                          Filesize

                                          7.2MB

                                          MD5

                                          d53a59820956572f89766fe450fa53fc

                                          SHA1

                                          34bbbc8536eaa9cf4147b03a4efe4274f5e55c5d

                                          SHA256

                                          e3622c1a1b6fc469921e22bb2b16fb81753a29fd91e2d6bdc489c7bfb234e002

                                          SHA512

                                          305670c01296123696dacd38ee6430c077395eaf9328b9cc555a563f08f0648c0ae3f1fb4a155d381ff943989d9ef85d560edf80bbf0dd83c03ea836807ae3d9

                                        • C:\Users\Admin\AppData\Local\Temp\6667.exe

                                          Filesize

                                          1.1MB

                                          MD5

                                          679e0c9d77c16f8529e6a08486c3a9c1

                                          SHA1

                                          8e74ee4ac19b5653981a1d8378aeda9e6fc1b009

                                          SHA256

                                          585e21bcd0f3c05c51f4aa74f554e0a648370facb8b90134680c2e49b5fc272e

                                          SHA512

                                          54195de01cdbf53812f172931d66ff8ee510f78ac972737c71a57fbae1a3b8b7a295347bba81ff38fa0ab934eb4cb60c90e267acdd512ec1b9e90831db454acc

                                        • C:\Users\Admin\AppData\Local\Temp\79FF.exe

                                          Filesize

                                          2.0MB

                                          MD5

                                          f9c778d8fd1d3db939959915dfa0defc

                                          SHA1

                                          8ca357c69a06db71b2e7b28ce89ba76bbc749cab

                                          SHA256

                                          a0eae0e1dccb94e0238f9fcc92f98c0079b13adf2513380550097b3b652a3d14

                                          SHA512

                                          f0ff30e613ec8db119f8caf08659cd76dcc652bf714d7e2089f576a776ccd2c98dff60c4f63d987e5455f0c9375a1d014abef4e612d0f02dc415c94fdf2029ed

                                        • C:\Users\Admin\AppData\Local\Temp\79FF.exe

                                          Filesize

                                          2.1MB

                                          MD5

                                          efac337a01b088461ab1899914935783

                                          SHA1

                                          e631afacca89ef16262a4a73829f25353e874789

                                          SHA256

                                          9d5cd40a68f05169ad6b118d491f154178a394c686d2f361cc9f2059b77f9dee

                                          SHA512

                                          3d5475769711d09fc2e869e5a805c91baf55652ce83ce93062b5ba1e22fd06943363a715dcc9502f3d01a97436e1db021012e07f5c28cb0c44e4f9164dd49e47

                                        • C:\Users\Admin\AppData\Local\Temp\B360.exe

                                          Filesize

                                          339KB

                                          MD5

                                          0212dfcb813b2cf81269a8acc2e5905f

                                          SHA1

                                          7cb15e5fb1cd0db852d3784ca282ded359780c53

                                          SHA256

                                          41ce9bd283dcaed4b69c0f28251bdd2e845049ae445081196ae3679ff0d1888a

                                          SHA512

                                          7205e5f50b538ba592f31ebff27f70ce1eed2d4c6c6c40e24ea1da2770e55eae2d5c88d7a172d9663c24886961bcebf064a9a3d9ae98130dda10dcaf72573646

                                        • C:\Users\Admin\AppData\Local\Temp\B360.exe

                                          Filesize

                                          195KB

                                          MD5

                                          45228044b6834706f06b764429030f26

                                          SHA1

                                          a04a507206a5e54450ff4d6c754d799eca52aa9d

                                          SHA256

                                          cfeac65052d810a1ea2d1801598b44b6b3daa0a90db99849a580842fa4802fb9

                                          SHA512

                                          ae2e6c9cc729a9a0d7a72b4133d1b53f9a56cd44998ed07b55b64f9c5b2d32f9a77ad1311b129740a73f81ae3a5f61f1f3ce8b6c643bbe3f3039533fc69dad92

                                        • C:\Users\Admin\AppData\Local\Temp\C217.exe

                                          Filesize

                                          436KB

                                          MD5

                                          97ba50a349c34c586218c4d257a274ab

                                          SHA1

                                          11d9354dc41d4c19d3a65fae148fb7b3491e9abd

                                          SHA256

                                          308c3b21cde74d72bf47e874c9493b8834d2346a75521546c9baaf59d917f107

                                          SHA512

                                          1fb8e8183bdb3c3a5e7ac57e3ac32422514c6aa570ac249605650f1bc5fa2ee80f7c72b57bb6a090ec2c1944b87be40c7d1c38d967c136cef0bebdb74bb26495

                                        • C:\Users\Admin\AppData\Local\Temp\C217.exe

                                          Filesize

                                          531KB

                                          MD5

                                          6a07ea74fd8becdd3c026331fd953793

                                          SHA1

                                          ac2300bbca961e2f51ac9a04f50713fca2d4893c

                                          SHA256

                                          cfe31120ac5ae138578330999820a53d14ce19a8e45b229d1482b46e85502c01

                                          SHA512

                                          56317988ed8561e48e7fe0302a433f4d7afc981d3e445bad9a97b2aa256d16cddd0d83061b387fa301976053229d6b28aa667d84a2411b16a483365a5abd64cb

                                        • C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe

                                          Filesize

                                          293KB

                                          MD5

                                          9e489b76a54ec9cc14b1bf6a63b64896

                                          SHA1

                                          c9dea0901839c9e7b303f5c69b1d194d743b50d6

                                          SHA256

                                          ac79b651217d6fa136eaf23e5961a4fd8c829933d1a814a5276a83d365393142

                                          SHA512

                                          e0ab19ca02289ad2d48ee022bb0504075863f86e6cc2bd0f1d5e990b90b108cf1857f7da3a0c9eb5d553ce369f8df10ad6dad0c4ec6b608edc7212f1aeabf995

                                        • C:\Users\Admin\AppData\Local\Temp\EasyAppns.exe

                                          Filesize

                                          22KB

                                          MD5

                                          8cf2dc677f5afe2dda3cdc3be61f07fe

                                          SHA1

                                          d8f55327641af3cd3be072aa12684e0946f08e57

                                          SHA256

                                          ae718054d80935ea3f44aacba922b2bf57ab86ff38550e194d1c1f4c683c7050

                                          SHA512

                                          a41530763eff4a520191b0ea762c2cb18b469385f198276950002959efb3a697c4612beb1844ec30aa6ae1399bc39671d49775908f9101ae9f93e1af301494ec

                                        • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe

                                          Filesize

                                          404KB

                                          MD5

                                          383c48c7f64a6867db5b8577fa3abfbf

                                          SHA1

                                          926911f9581df56f5ac38fac01f6d45acdfb7dbd

                                          SHA256

                                          9b37a304f33bda4707c0dae60a20ac7c76c75752b0d06ad9fb2d6f07f8edd1b9

                                          SHA512

                                          53b5d42ed93ad6f1163ed00be8cd1b66d367fadf25853c16d8c6fb710f69d9e8a32cb85d0dbf36d95c85da16b214de2a564bc0750c264bb0547dd8910a6f4442

                                        • C:\Users\Admin\AppData\Local\Temp\JDAFHCGIJE.exe

                                          Filesize

                                          101KB

                                          MD5

                                          42b838cf8bdf67400525e128d917f6e0

                                          SHA1

                                          a578f6faec738912dba8c41e7abe1502c46d0cae

                                          SHA256

                                          0e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d

                                          SHA512

                                          f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0

                                        • C:\Users\Admin\AppData\Local\Temp\Tmp831C.tmp

                                          Filesize

                                          2KB

                                          MD5

                                          1420d30f964eac2c85b2ccfe968eebce

                                          SHA1

                                          bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                          SHA256

                                          f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                          SHA512

                                          6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qn3rw4kz.zhp.ps1

                                          Filesize

                                          1B

                                          MD5

                                          c4ca4238a0b923820dcc509a6f75849b

                                          SHA1

                                          356a192b7913b04c54574d18c28d46e6395428ab

                                          SHA256

                                          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                          SHA512

                                          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                        • C:\Users\Admin\AppData\Local\Temp\april.exe

                                          Filesize

                                          517KB

                                          MD5

                                          1066a4a1534ef04cc843024da222e005

                                          SHA1

                                          29cad362b8201716de169e101e01da8e04bd85e2

                                          SHA256

                                          78d95f9184bb7bdf0c1fe1a33a5600cc7adcf57f88ad0c947582f877dc18b71a

                                          SHA512

                                          3f70c1fbac7c37e786f0306e4ed8e5f41e252aa71d4902b784ce7373aed4fa112abfdf65de8148dfa97de38447924869202389a2b0533f770cc51e1ab92dc706

                                        • C:\Users\Admin\AppData\Local\Temp\april.exe

                                          Filesize

                                          234KB

                                          MD5

                                          b1e038bc5fa9bec9c5f8fe88878653d1

                                          SHA1

                                          11ebfc04a44f617f70235d6b4182b44da99d12ba

                                          SHA256

                                          4cda132c93c770d464b417656da0f988a30a8557654532b893681d5b3636740c

                                          SHA512

                                          1badccc94009caa6d4484a246257d667f615d50f1561a644ae58b9e187b3092ccb81fa45c8f69938cef038a43d1e6bcb858a61dfc0ce2c937072e5b266adfe28

                                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                          Filesize

                                          281KB

                                          MD5

                                          d98e33b66343e7c96158444127a117f6

                                          SHA1

                                          bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                          SHA256

                                          5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                          SHA512

                                          705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                          Filesize

                                          4KB

                                          MD5

                                          a11bbc7b2af3bcd6d4bffd9286466a2f

                                          SHA1

                                          39b4385ee6cf80c24a94cd9df5205ce85ea4ecc8

                                          SHA256

                                          51459cf875f08f2b6cb30af4afcc3a825adb4b1528579e9cbe46e4f6f6b03710

                                          SHA512

                                          6d549e1b4b724411b523df89a3fde8261b44aa4202e4c4eb36b18ee503c3a149dbfb0e2d9e3507c9668e95e801239c2c078bf86ebf85edab551a4a5f837192b7

                                        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                          Filesize

                                          2KB

                                          MD5

                                          4760f0753f35b01abe92123deccae075

                                          SHA1

                                          a042f75cdb481286e534a93b6697c9e27bb3972e

                                          SHA256

                                          d310382ab6faed375126e81459cee16a091009a2619d4ab976c81165a00ea827

                                          SHA512

                                          4e821a67b410b7ff344d928877c37158f2c9c6bd5afeaf515ec40e8bc75f277ea0ede32fc6b45efefe25762a5913580d729ca473e9be480e3cba7463a4ed5495

                                        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                                          Filesize

                                          3KB

                                          MD5

                                          f85dcdd6cf746199a83000909e46d6c4

                                          SHA1

                                          03184110428e45d17d3e3d07f75e8fb9afeaea2b

                                          SHA256

                                          2e7990046b34907c6a60f150d002e9a090d3931b4259aac83b4cb950530a2328

                                          SHA512

                                          b536367b1d2678d06d07e129e23af31f120923bf8e95a505cf8490fccb947b0a8657d51506722f7b8587c0767f69c2c7e0aef18611276fb9f774cfc0747642d0

                                        • C:\Users\Admin\AppData\Local\Temp\is-D5V9M.tmp\april.tmp

                                          Filesize

                                          408KB

                                          MD5

                                          78114a6bfe98e8d5838f4ee1cc3f5e5c

                                          SHA1

                                          7c153f47f72149f5d6ba1b14d82512587f750bce

                                          SHA256

                                          ae17bdadd8de5436aca845251f28e702e1ea1334bd71af5e3a08fab44113ed45

                                          SHA512

                                          3dd3d5dc012093d53370132e4547e0100ecabcd804b18939f001b4fc888dd6bab52ec3adcbd678910ca937b7b8f6cad4149acfb7263996c8b6e64094b3642b6d

                                        • C:\Users\Admin\AppData\Local\Temp\is-D5V9M.tmp\april.tmp

                                          Filesize

                                          272KB

                                          MD5

                                          5042bb532ef5344d693f6ef470711351

                                          SHA1

                                          af255e8e0f24dc53148df2fdfa5780993b9de34a

                                          SHA256

                                          bda97300f120b5f32457171f676b52112ec1e0f80c7556bd6f50fd79b0ad59ab

                                          SHA512

                                          02a1aadc1949267fe32023fce99288b9d0595cd8032cd1748c580a0b6b8ccea875765ec256a108342bb2ddd19b6babefcc8742f90afb529075fb448ff3cb96a4

                                        • C:\Users\Admin\AppData\Local\Temp\tmp5B42.tmp

                                          Filesize

                                          46KB

                                          MD5

                                          02d2c46697e3714e49f46b680b9a6b83

                                          SHA1

                                          84f98b56d49f01e9b6b76a4e21accf64fd319140

                                          SHA256

                                          522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                          SHA512

                                          60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                        • C:\Users\Admin\AppData\Local\Temp\u3jw.0.exe

                                          Filesize

                                          261KB

                                          MD5

                                          606625739201aa74813d211613b2aa82

                                          SHA1

                                          4409efa953358e31d940d698470bd0e2d952e8a7

                                          SHA256

                                          848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2

                                          SHA512

                                          d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1

                                        • C:\Users\Admin\AppData\Local\Temp\u3jw.1.exe

                                          Filesize

                                          739KB

                                          MD5

                                          de004238b63ab3591c78817ecacac368

                                          SHA1

                                          5c9c2e8e418976fc4088904cf755771659ff1035

                                          SHA256

                                          890e308908d39683493b11830ee4b163b9b438aba3ecf2bdb625d05fd8326af1

                                          SHA512

                                          90e9f1b70d2f369dc5d3bb645f8fa6adca8bc8ea1094bc1571573b037c73bb5ecdf144582eeaf064349e20ec1195851533a095ceedf276bbfc6df1dfe1cf4db0

                                        • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                          Filesize

                                          109KB

                                          MD5

                                          2afdbe3b99a4736083066a13e4b5d11a

                                          SHA1

                                          4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                          SHA256

                                          8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                          SHA512

                                          d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                        • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                          Filesize

                                          1.2MB

                                          MD5

                                          92fbdfccf6a63acef2743631d16652a7

                                          SHA1

                                          971968b1378dd89d59d7f84bf92f16fc68664506

                                          SHA256

                                          b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                          SHA512

                                          b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                          Filesize

                                          109KB

                                          MD5

                                          726cd06231883a159ec1ce28dd538699

                                          SHA1

                                          404897e6a133d255ad5a9c26ac6414d7134285a2

                                          SHA256

                                          12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                          SHA512

                                          9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                          Filesize

                                          1.2MB

                                          MD5

                                          15a42d3e4579da615a384c717ab2109b

                                          SHA1

                                          22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                          SHA256

                                          3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                          SHA512

                                          1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                        • C:\Users\Public\Music\EasyApp.exe

                                          Filesize

                                          91KB

                                          MD5

                                          32723fc0026273b8a0af92bcb8bd95eb

                                          SHA1

                                          9fdd1a11248b489b7a727f7f734dec9df30ed744

                                          SHA256

                                          5263ac3a8fab70a3e814b09d33d180386e343c14a786782e084e03581bc483e7

                                          SHA512

                                          3771cba8fa9d599a53eb96271110726ec8a7b0c44a1983128fff9826df67efc43d3333e4e62f905800a61ca2b080dbde9eba14e80302711894ba62802efae8fb

                                        • C:\Users\Public\Music\EasyApp.exe

                                          Filesize

                                          55KB

                                          MD5

                                          8a77848d10389f444cf7ca480d123fd7

                                          SHA1

                                          51855cc8e24b22a159e61b77d4e5091168848d86

                                          SHA256

                                          e8ab77433d6ba70f6e992adfbd1f3865839f112e303de1f175bb1eca26dffc1b

                                          SHA512

                                          af963dc198aacb17e859fbd55a4371e7f15581eff5e5324814e40423ec3e1ac22e547caa35fb5e5957bc04bbc26e107e503c0adb7b10dcc3697287f11d3b98ca

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                          Filesize

                                          2KB

                                          MD5

                                          db01a2c1c7e70b2b038edf8ad5ad9826

                                          SHA1

                                          540217c647a73bad8d8a79e3a0f3998b5abd199b

                                          SHA256

                                          413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d

                                          SHA512

                                          c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                          Filesize

                                          18KB

                                          MD5

                                          1259baeb38860de9407751647e5104fd

                                          SHA1

                                          bfc0ffe7f18ac116370fc78b555e4bfb2af8ca43

                                          SHA256

                                          5c932f1a51090a94869b2e74afc3e61688346ab96d22a92785e0f62998cd7de0

                                          SHA512

                                          87bc2322a3e16717e186aab6d51a8006587ce983b860ffbbeb62ee193393abd7ce8d69083207e7d781658ac62eb0e06624aee5d07b4065410c90d3d0ae7f6c9b

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                          Filesize

                                          18KB

                                          MD5

                                          5f8b61b5fe42e4d7a9987a729dc4b1c8

                                          SHA1

                                          05133530cce2c79dd1d6fe469a42d52a0fbe2912

                                          SHA256

                                          13e332324b8023405f1863a936a3fffc1b6f261e118d67f0b1b9f2b3a07aaf7a

                                          SHA512

                                          b9461829d7d54ca7244b46e0fdbe7e8a8b9d60f030333f7a2df4e9b6e7ef5f39e5cd1a67822e0bc997fa7a18fe21b45fde9a810c7f1e28419a2431f00b2a33ff

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                          Filesize

                                          18KB

                                          MD5

                                          f422d18c0c01666b21377e86e5518b8c

                                          SHA1

                                          9741d34da6a9d3384b8da0978112abf9d439633f

                                          SHA256

                                          a2edc8e7a786ebee2df3a1f9fd6c55688f1f897d7526af1c72d65cefab6b9a6f

                                          SHA512

                                          50015945a34e63160fd93208a6c3e13c7da5d5c7ddb283cadf74ee545e354f99f2d308aa98abba9e320318973a25f9f639f93f9c31f581e78b32d1265a1cdbdb

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                          Filesize

                                          18KB

                                          MD5

                                          4cb731db45a8ae00e25258113d8908aa

                                          SHA1

                                          323d0ead8dfee0aaaf818180899ed520c8cb57d7

                                          SHA256

                                          ca932566c6f04fc83b4318ca6ec53978586058f3e99c53bae75f172c6fdd28d0

                                          SHA512

                                          aa116cd2323e46f93e6463316d4b8e8645d306e7c7714c4bf394c2fb6fdf5975debb886ef2414fb07caba39c9fac016b529ef2dfd9b4a76e01349ae4d51c23be

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                          Filesize

                                          18KB

                                          MD5

                                          d6e3984ac51d32367f2ee0e44183afb5

                                          SHA1

                                          592bc36c0746344d3b21296231d04e5a19c7d4d5

                                          SHA256

                                          58f24e356069ab66923d6a5d6dd1150c2b144216c485c9ef8da00f1c24939fb0

                                          SHA512

                                          49359e419ae852ce4d6441387ec0f3021cbf0004734353e845b1a8c6c8bb5b2d0082104098a58f062fbed4e7692e82d6929debcb0e0f74c8da66e7292936c71c

                                        • C:\Windows\rss\csrss.exe

                                          Filesize

                                          4.1MB

                                          MD5

                                          c8564b4d627953e836d0faab99740a6a

                                          SHA1

                                          74b37a34950bd081d10072b4dae88952a4c52178

                                          SHA256

                                          051b0fe6b1d01ab0cc4dee0e7270b4dd54040a5c1783b78ea612bbf37d0c6f31

                                          SHA512

                                          77af3dd58d16effa1a307c174add6cdd1006b2a08add287388162bb2b7b3245a77e15375da1e508bcce10f024ab0e888b16862f087941e7b165834e8ae406776

                                        • C:\Windows\rss\csrss.exe

                                          Filesize

                                          3.9MB

                                          MD5

                                          91cf4e145d69de3ac673fd76f6b434bb

                                          SHA1

                                          b2426f00fe14d3cb228f084882f9d455e973bb55

                                          SHA256

                                          38eeb2ca66424e0edb4181ea41deef423eadd6188308e2de7a8a0e5d4299bf7b

                                          SHA512

                                          3439f37c34c8fe25646289da6a5499dd4c3d849ff5e7f3824b912cbb5aff2dd743163944f5a8d76cbb9b48a5dabbed46ac8110309511293356387fcb03087688

                                        • C:\Windows\windefender.exe

                                          Filesize

                                          2.0MB

                                          MD5

                                          8e67f58837092385dcf01e8a2b4f5783

                                          SHA1

                                          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                          SHA256

                                          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                          SHA512

                                          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                        • \??\c:\users\admin\appdata\local\temp\u3jw.1.exe

                                          Filesize

                                          4.6MB

                                          MD5

                                          397926927bca55be4a77839b1c44de6e

                                          SHA1

                                          e10f3434ef3021c399dbba047832f02b3c898dbd

                                          SHA256

                                          4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

                                          SHA512

                                          cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

                                        • \ProgramData\nss3.dll

                                          Filesize

                                          2.0MB

                                          MD5

                                          1cc453cdf74f31e4d913ff9c10acdde2

                                          SHA1

                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                          SHA256

                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                          SHA512

                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                        • \Users\Admin\AppData\Local\Temp\is-5D0VR.tmp\_isetup\_iscrypt.dll

                                          Filesize

                                          2KB

                                          MD5

                                          a69559718ab506675e907fe49deb71e9

                                          SHA1

                                          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                          SHA256

                                          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                          SHA512

                                          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                        • memory/776-387-0x0000000002620000-0x0000000002621000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/776-511-0x0000000000400000-0x00000000008AD000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/776-527-0x0000000002620000-0x0000000002621000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1020-34-0x0000000010000000-0x0000000010239000-memory.dmp

                                          Filesize

                                          2.2MB

                                        • memory/1020-30-0x0000000005060000-0x0000000005168000-memory.dmp

                                          Filesize

                                          1.0MB

                                        • memory/1020-33-0x0000000005060000-0x0000000005168000-memory.dmp

                                          Filesize

                                          1.0MB

                                        • memory/1020-29-0x0000000004F30000-0x0000000005053000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/1020-607-0x0000000002D60000-0x0000000002D72000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/1020-542-0x0000000005F30000-0x0000000006027000-memory.dmp

                                          Filesize

                                          988KB

                                        • memory/1020-536-0x0000000005F30000-0x0000000006027000-memory.dmp

                                          Filesize

                                          988KB

                                        • memory/1020-24-0x00000000033B0000-0x00000000033B6000-memory.dmp

                                          Filesize

                                          24KB

                                        • memory/1020-526-0x0000000005E30000-0x0000000005F2A000-memory.dmp

                                          Filesize

                                          1000KB

                                        • memory/1020-523-0x0000000005170000-0x0000000005E22000-memory.dmp

                                          Filesize

                                          12.7MB

                                        • memory/1020-521-0x0000000005060000-0x0000000005168000-memory.dmp

                                          Filesize

                                          1.0MB

                                        • memory/1020-22-0x0000000010000000-0x0000000010239000-memory.dmp

                                          Filesize

                                          2.2MB

                                        • memory/1676-79-0x0000000002DE0000-0x00000000036CB000-memory.dmp

                                          Filesize

                                          8.9MB

                                        • memory/1676-81-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                          Filesize

                                          9.1MB

                                        • memory/1676-371-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                          Filesize

                                          9.1MB

                                        • memory/1676-395-0x00000000029E0000-0x0000000002DDB000-memory.dmp

                                          Filesize

                                          4.0MB

                                        • memory/1676-396-0x0000000002DE0000-0x00000000036CB000-memory.dmp

                                          Filesize

                                          8.9MB

                                        • memory/1676-425-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                          Filesize

                                          9.1MB

                                        • memory/1676-413-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                          Filesize

                                          9.1MB

                                        • memory/1676-74-0x00000000029E0000-0x0000000002DDB000-memory.dmp

                                          Filesize

                                          4.0MB

                                        • memory/2200-43-0x0000000000DC0000-0x0000000001500000-memory.dmp

                                          Filesize

                                          7.2MB

                                        • memory/2200-44-0x0000000073710000-0x0000000073DFE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2200-77-0x0000000073710000-0x0000000073DFE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/3336-4-0x0000000000DA0000-0x0000000000DB6000-memory.dmp

                                          Filesize

                                          88KB

                                        • memory/3336-25-0x0000000001010000-0x0000000001026000-memory.dmp

                                          Filesize

                                          88KB

                                        • memory/3628-503-0x0000000008B60000-0x0000000008BD6000-memory.dmp

                                          Filesize

                                          472KB

                                        • memory/3628-525-0x00000000099B0000-0x0000000009A55000-memory.dmp

                                          Filesize

                                          660KB

                                        • memory/3628-437-0x00000000079D0000-0x00000000079EC000-memory.dmp

                                          Filesize

                                          112KB

                                        • memory/3628-438-0x0000000007A70000-0x0000000007ABB000-memory.dmp

                                          Filesize

                                          300KB

                                        • memory/3628-435-0x00000000074A0000-0x0000000007506000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/3628-465-0x0000000008A20000-0x0000000008A5C000-memory.dmp

                                          Filesize

                                          240KB

                                        • memory/3628-428-0x0000000006D70000-0x0000000007398000-memory.dmp

                                          Filesize

                                          6.2MB

                                        • memory/3628-434-0x0000000006D00000-0x0000000006D66000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/3628-427-0x0000000004510000-0x0000000004546000-memory.dmp

                                          Filesize

                                          216KB

                                        • memory/3628-515-0x000000007F510000-0x000000007F520000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/3628-516-0x0000000072570000-0x00000000725BB000-memory.dmp

                                          Filesize

                                          300KB

                                        • memory/3628-517-0x00000000725C0000-0x0000000072910000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/3628-518-0x0000000009950000-0x000000000996E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/3628-514-0x0000000009970000-0x00000000099A3000-memory.dmp

                                          Filesize

                                          204KB

                                        • memory/3628-433-0x0000000006C40000-0x0000000006C62000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/3628-426-0x0000000006730000-0x0000000006740000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/3628-436-0x0000000007520000-0x0000000007870000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/3628-424-0x0000000071B10000-0x00000000721FE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/3628-528-0x0000000006730000-0x0000000006740000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/3628-432-0x0000000006730000-0x0000000006740000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/3652-367-0x0000000000F20000-0x00000000012C6000-memory.dmp

                                          Filesize

                                          3.6MB

                                        • memory/3652-375-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4068-330-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                          Filesize

                                          972KB

                                        • memory/4068-327-0x0000000000880000-0x00000000008A7000-memory.dmp

                                          Filesize

                                          156KB

                                        • memory/4068-374-0x0000000000400000-0x000000000063B000-memory.dmp

                                          Filesize

                                          2.2MB

                                        • memory/4068-430-0x0000000000400000-0x000000000063B000-memory.dmp

                                          Filesize

                                          2.2MB

                                        • memory/4068-429-0x0000000000930000-0x0000000000A30000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/4068-326-0x0000000000930000-0x0000000000A30000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/4068-328-0x0000000000400000-0x000000000063B000-memory.dmp

                                          Filesize

                                          2.2MB

                                        • memory/4528-403-0x00000000026F0000-0x00000000026F1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4528-399-0x0000000004A70000-0x0000000004A71000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4528-408-0x0000000004A80000-0x0000000004A81000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4528-401-0x0000000004A90000-0x0000000004A91000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4528-420-0x0000000000090000-0x0000000000545000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/4528-415-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4528-414-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4528-397-0x0000000077C34000-0x0000000077C35000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4528-398-0x0000000004A60000-0x0000000004A61000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4528-412-0x0000000000090000-0x0000000000545000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/4528-400-0x0000000004A50000-0x0000000004A51000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4528-402-0x00000000026E0000-0x00000000026E1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4528-393-0x0000000000090000-0x0000000000545000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/4556-5-0x0000000000400000-0x0000000000473000-memory.dmp

                                          Filesize

                                          460KB

                                        • memory/4556-1-0x0000000000690000-0x0000000000790000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/4556-3-0x0000000000400000-0x0000000000473000-memory.dmp

                                          Filesize

                                          460KB

                                        • memory/4556-2-0x0000000000680000-0x000000000068B000-memory.dmp

                                          Filesize

                                          44KB

                                        • memory/4604-370-0x0000000000400000-0x0000000000568000-memory.dmp

                                          Filesize

                                          1.4MB

                                        • memory/4604-54-0x00000000006C0000-0x00000000007C0000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/4604-57-0x0000000002200000-0x000000000226F000-memory.dmp

                                          Filesize

                                          444KB

                                        • memory/4604-63-0x0000000000400000-0x0000000000568000-memory.dmp

                                          Filesize

                                          1.4MB

                                        • memory/4604-382-0x0000000000400000-0x0000000000568000-memory.dmp

                                          Filesize

                                          1.4MB

                                        • memory/4688-422-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4688-303-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4688-373-0x0000000000400000-0x00000000004B8000-memory.dmp

                                          Filesize

                                          736KB

                                        • memory/4836-320-0x0000000000400000-0x0000000000558000-memory.dmp

                                          Filesize

                                          1.3MB

                                        • memory/4836-329-0x0000000000400000-0x0000000000558000-memory.dmp

                                          Filesize

                                          1.3MB

                                        • memory/4836-318-0x00000000007B0000-0x00000000008B0000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/4836-319-0x00000000006E0000-0x0000000000728000-memory.dmp

                                          Filesize

                                          288KB

                                        • memory/5028-28-0x0000000000400000-0x000000000053E000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/5028-17-0x0000000000630000-0x000000000063B000-memory.dmp

                                          Filesize

                                          44KB

                                        • memory/5028-18-0x0000000000400000-0x000000000053E000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/5028-16-0x0000000000790000-0x0000000000890000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/5092-372-0x0000000000400000-0x0000000000414000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/5092-71-0x0000000000400000-0x0000000000414000-memory.dmp

                                          Filesize

                                          80KB