Resubmissions

01-05-2024 23:16

240501-285bvshh8z 10

01-05-2024 23:03

240501-21vsfshg4w 10

Analysis

  • max time kernel
    299s
  • max time network
    299s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-05-2024 23:03

General

  • Target

    4a8ea5d13abdfd006f58897cbe55773cdc98df31133c1e1ad6ba2b13140e2f94.exe

  • Size

    1.8MB

  • MD5

    b7f0c6b555edf8d1f5afce5984f1a104

  • SHA1

    47f76e4001898764b207ef278c388d819bed0951

  • SHA256

    4a8ea5d13abdfd006f58897cbe55773cdc98df31133c1e1ad6ba2b13140e2f94

  • SHA512

    b7f8e6e6cfe63cb3d3317c4e0847dda3e5844f144b86671fbe34234dd4b45eda6fbfcea34f129b6e2f4c88c3445fdc965b503ca645abcbce68952960930939e1

  • SSDEEP

    49152:R3/bnbOKjNxk7gYTrR86fvtsZZecPKlMW+:Rjnb/MgUd8QqZcG

Malware Config

Extracted

Family

amadey

Version

4.20

C2

http://193.233.132.139

Attributes
  • install_dir

    5454e6f062

  • install_file

    explorta.exe

  • strings_key

    c7a869c5ba1d72480093ec207994e2bf

  • url_paths

    /sev56rkm/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

redline

Botnet

Test1234

C2

185.215.113.67:26260

Extracted

Family

stealc

C2

http://52.143.157.84

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

risepro

C2

147.45.47.93:58709

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

185.172.128.33:8970

Extracted

Family

lumma

C2

https://affordcharmcropwo.shop/api

https://cleartotalfisherwo.shop/api

https://worryfillvolcawoi.shop/api

https://enthusiasimtitleow.shop/api

https://dismissalcylinderhostw.shop/api

https://diskretainvigorousiw.shop/api

https://communicationgenerwo.shop/api

https://pillowbrocccolipe.shop/api

https://productivelookewr.shop/api

https://incredibleextedwj.shop/api

https://tolerateilusidjukl.shop/api

https://shatterbreathepsw.shop/api

https://shortsvelventysjo.shop/api

https://alcojoldwograpciw.shop/api

https://liabilitynighstjsko.shop/api

https://demonstationfukewko.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 6 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Stealc

    Stealc is an infostealer written in C++.

  • Windows security bypass 2 TTPs 7 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 30 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 44 IoCs
  • Identifies Wine through registry keys 2 TTPs 15 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 10 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a8ea5d13abdfd006f58897cbe55773cdc98df31133c1e1ad6ba2b13140e2f94.exe
    "C:\Users\Admin\AppData\Local\Temp\4a8ea5d13abdfd006f58897cbe55773cdc98df31133c1e1ad6ba2b13140e2f94.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
      "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
        "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
        3⤵
          PID:5096
        • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe
          "C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2140
          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4480
            • C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe
              "C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2036
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                6⤵
                  PID:2360
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 836
                  6⤵
                  • Program crash
                  PID:4332
              • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                "C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe"
                5⤵
                • Executes dropped EXE
                PID:2604
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe" /F
                  6⤵
                  • Creates scheduled task(s)
                  PID:1268
                • C:\Users\Admin\AppData\Local\Temp\1000231001\ISetup8.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000231001\ISetup8.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:4464
                  • C:\Users\Admin\AppData\Local\Temp\u3g0.0.exe
                    "C:\Users\Admin\AppData\Local\Temp\u3g0.0.exe"
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Checks processor information in registry
                    PID:5124
                  • C:\Users\Admin\AppData\Local\Temp\u3g0.2\run.exe
                    "C:\Users\Admin\AppData\Local\Temp\u3g0.2\run.exe"
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of SetWindowsHookEx
                    PID:6108
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\SysWOW64\cmd.exe
                      8⤵
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      PID:5396
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        9⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:6096
                  • C:\Users\Admin\AppData\Local\Temp\u3g0.3.exe
                    "C:\Users\Admin\AppData\Local\Temp\u3g0.3.exe"
                    7⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious use of SendNotifyMessage
                    PID:1652
                    • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
                      "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
                      8⤵
                        PID:4744
                  • C:\Users\Admin\AppData\Local\Temp\1000232001\toolspub1.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000232001\toolspub1.exe"
                    6⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:4748
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 492
                      7⤵
                      • Program crash
                      PID:5744
                  • C:\Users\Admin\AppData\Local\Temp\1000233001\4767d2e713f2021e8fe856e3ea638b58.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000233001\4767d2e713f2021e8fe856e3ea638b58.exe"
                    6⤵
                    • Executes dropped EXE
                    PID:5652
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      7⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5912
                    • C:\Users\Admin\AppData\Local\Temp\1000233001\4767d2e713f2021e8fe856e3ea638b58.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000233001\4767d2e713f2021e8fe856e3ea638b58.exe"
                      7⤵
                      • Windows security bypass
                      • Executes dropped EXE
                      • Windows security modification
                      • Adds Run key to start application
                      • Checks for VirtualBox DLLs, possible anti-VM trick
                      • Drops file in Windows directory
                      • Modifies data under HKEY_USERS
                      PID:5532
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        8⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        PID:1328
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                        8⤵
                          PID:6852
                          • C:\Windows\system32\netsh.exe
                            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                            9⤵
                            • Modifies Windows Firewall
                            • Modifies data under HKEY_USERS
                            PID:6892
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          8⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          PID:6928
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          8⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          PID:6844
                        • C:\Windows\rss\csrss.exe
                          C:\Windows\rss\csrss.exe
                          8⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Manipulates WinMonFS driver.
                          • Drops file in Windows directory
                          PID:6700
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            9⤵
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            PID:6060
                          • C:\Windows\SYSTEM32\schtasks.exe
                            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                            9⤵
                            • Creates scheduled task(s)
                            PID:5900
                          • C:\Windows\SYSTEM32\schtasks.exe
                            schtasks /delete /tn ScheduledUpdate /f
                            9⤵
                              PID:6904
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              9⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              PID:6876
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              9⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              PID:6828
                            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                              9⤵
                              • Executes dropped EXE
                              PID:6796
                            • C:\Windows\SYSTEM32\schtasks.exe
                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                              9⤵
                              • Creates scheduled task(s)
                              PID:7064
                            • C:\Windows\windefender.exe
                              "C:\Windows\windefender.exe"
                              9⤵
                              • Executes dropped EXE
                              PID:4640
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                10⤵
                                  PID:5288
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                    11⤵
                                    • Launches sc.exe
                                    PID:1380
                      • C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe"
                        5⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Modifies system certificate store
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:600
                        • C:\Users\Admin\AppData\Local\Temp\svrht.exe
                          "C:\Users\Admin\AppData\Local\Temp\svrht.exe"
                          6⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Checks processor information in registry
                          PID:2640
                      • C:\Users\Admin\AppData\Local\Temp\1000073001\swiiii.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000073001\swiiii.exe"
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:3532
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          6⤵
                            PID:4776
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            6⤵
                            • Checks processor information in registry
                            PID:4296
                        • C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe"
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5536
                        • C:\Users\Admin\AppData\Local\Temp\1000077001\jfesawdr.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000077001\jfesawdr.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:5848
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "
                            6⤵
                              PID:5944
                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exe
                                work.exe -priverdD
                                7⤵
                                • Executes dropped EXE
                                PID:6000
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\podaw.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX1\podaw.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5248
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                            5⤵
                            • Loads dropped DLL
                            PID:6068
                            • C:\Windows\system32\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                              6⤵
                              • Blocklisted process makes network request
                              • Loads dropped DLL
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6096
                              • C:\Windows\system32\netsh.exe
                                netsh wlan show profiles
                                7⤵
                                  PID:5136
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\699363923187_Desktop.zip' -CompressionLevel Optimal
                                  7⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5428
                            • C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe"
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:2896
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                6⤵
                                  PID:5340
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 516
                                  6⤵
                                  • Program crash
                                  PID:5324
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                5⤵
                                • Blocklisted process makes network request
                                • Loads dropped DLL
                                PID:1600
                              • C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe
                                "C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe"
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                PID:5824
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                  6⤵
                                    PID:5812
                                    • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe
                                      "C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5440
                                    • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe
                                      "C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5416
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                                      7⤵
                                        PID:5760
                                        • C:\Windows\SysWOW64\choice.exe
                                          choice /C Y /N /D Y /T 3
                                          8⤵
                                            PID:4396
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5824 -s 504
                                        6⤵
                                        • Program crash
                                        PID:5928
                                • C:\Users\Admin\AppData\Local\Temp\1000020001\92f880c3ee.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1000020001\92f880c3ee.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4672
                                • C:\Users\Admin\1000021002\5048d8fe87.exe
                                  "C:\Users\Admin\1000021002\5048d8fe87.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of WriteProcessMemory
                                  PID:3732
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
                                    4⤵
                                    • Enumerates system info in registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of WriteProcessMemory
                                    PID:4060
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffedcc9758,0x7fffedcc9768,0x7fffedcc9778
                                      5⤵
                                        PID:4024
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1544 --field-trial-handle=2332,i,4042295981124441331,588989322558019200,131072 /prefetch:2
                                        5⤵
                                          PID:2012
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=2332,i,4042295981124441331,588989322558019200,131072 /prefetch:8
                                          5⤵
                                            PID:4660
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1868 --field-trial-handle=2332,i,4042295981124441331,588989322558019200,131072 /prefetch:8
                                            5⤵
                                              PID:4068
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=2332,i,4042295981124441331,588989322558019200,131072 /prefetch:1
                                              5⤵
                                                PID:3404
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=2332,i,4042295981124441331,588989322558019200,131072 /prefetch:1
                                                5⤵
                                                  PID:4812
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4424 --field-trial-handle=2332,i,4042295981124441331,588989322558019200,131072 /prefetch:1
                                                  5⤵
                                                    PID:4560
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=2332,i,4042295981124441331,588989322558019200,131072 /prefetch:8
                                                    5⤵
                                                      PID:5236
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4788 --field-trial-handle=2332,i,4042295981124441331,588989322558019200,131072 /prefetch:8
                                                      5⤵
                                                        PID:5244
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=2332,i,4042295981124441331,588989322558019200,131072 /prefetch:8
                                                        5⤵
                                                          PID:5360
                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                  1⤵
                                                    PID:2152
                                                  • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                    C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5288
                                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                    C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5280
                                                  • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                    C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:5836
                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                    1⤵
                                                    • Drops file in Windows directory
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:3648
                                                  • C:\Windows\system32\browser_broker.exe
                                                    C:\Windows\system32\browser_broker.exe -Embedding
                                                    1⤵
                                                    • Modifies Internet Explorer settings
                                                    PID:5316
                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                    1⤵
                                                    • Modifies registry class
                                                    • Suspicious behavior: MapViewOfSection
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:3128
                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                    1⤵
                                                    • Drops file in Windows directory
                                                    • Modifies Internet Explorer settings
                                                    • Modifies registry class
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:6024
                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                    1⤵
                                                    • Drops file in Windows directory
                                                    • Modifies registry class
                                                    PID:1212
                                                  • C:\Windows\system32\browser_broker.exe
                                                    C:\Windows\system32\browser_broker.exe -Embedding
                                                    1⤵
                                                    • Modifies Internet Explorer settings
                                                    PID:5312
                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                    1⤵
                                                    • Modifies registry class
                                                    PID:4636
                                                  • C:\Windows\system32\browser_broker.exe
                                                    C:\Windows\system32\browser_broker.exe -Embedding
                                                    1⤵
                                                      PID:4980
                                                    • C:\Windows\system32\browser_broker.exe
                                                      C:\Windows\system32\browser_broker.exe -Embedding
                                                      1⤵
                                                      • Modifies Internet Explorer settings
                                                      PID:1432
                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                      1⤵
                                                      • Modifies registry class
                                                      PID:5952
                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                      1⤵
                                                      • Modifies registry class
                                                      PID:5760
                                                    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:5220
                                                    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                      C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:5196
                                                    • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                      C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:4464
                                                    • C:\Windows\windefender.exe
                                                      C:\Windows\windefender.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      • Modifies data under HKEY_USERS
                                                      PID:3404
                                                    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                      C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:6172
                                                    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:5492
                                                    • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                      C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:6572
                                                    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                      C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:7112
                                                    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:5172
                                                    • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                      C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:6820
                                                    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                      C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:6504
                                                    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:6508
                                                    • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                      C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:6888

                                                    Network

                                                    MITRE ATT&CK Matrix ATT&CK v13

                                                    Execution

                                                    Scheduled Task/Job

                                                    1
                                                    T1053

                                                    Persistence

                                                    Create or Modify System Process

                                                    1
                                                    T1543

                                                    Windows Service

                                                    1
                                                    T1543.003

                                                    Boot or Logon Autostart Execution

                                                    1
                                                    T1547

                                                    Registry Run Keys / Startup Folder

                                                    1
                                                    T1547.001

                                                    Scheduled Task/Job

                                                    1
                                                    T1053

                                                    Privilege Escalation

                                                    Create or Modify System Process

                                                    1
                                                    T1543

                                                    Windows Service

                                                    1
                                                    T1543.003

                                                    Boot or Logon Autostart Execution

                                                    1
                                                    T1547

                                                    Registry Run Keys / Startup Folder

                                                    1
                                                    T1547.001

                                                    Scheduled Task/Job

                                                    1
                                                    T1053

                                                    Defense Evasion

                                                    Impair Defenses

                                                    3
                                                    T1562

                                                    Disable or Modify Tools

                                                    2
                                                    T1562.001

                                                    Disable or Modify System Firewall

                                                    1
                                                    T1562.004

                                                    Modify Registry

                                                    5
                                                    T1112

                                                    Virtualization/Sandbox Evasion

                                                    2
                                                    T1497

                                                    Subvert Trust Controls

                                                    1
                                                    T1553

                                                    Install Root Certificate

                                                    1
                                                    T1553.004

                                                    Credential Access

                                                    Unsecured Credentials

                                                    5
                                                    T1552

                                                    Credentials In Files

                                                    4
                                                    T1552.001

                                                    Credentials in Registry

                                                    1
                                                    T1552.002

                                                    Discovery

                                                    Query Registry

                                                    9
                                                    T1012

                                                    Virtualization/Sandbox Evasion

                                                    2
                                                    T1497

                                                    System Information Discovery

                                                    7
                                                    T1082

                                                    Peripheral Device Discovery

                                                    1
                                                    T1120

                                                    Collection

                                                    Data from Local System

                                                    5
                                                    T1005

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\ProgramData\Are.docx
                                                      Filesize

                                                      11KB

                                                      MD5

                                                      a33e5b189842c5867f46566bdbf7a095

                                                      SHA1

                                                      e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                      SHA256

                                                      5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                      SHA512

                                                      f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                    • C:\ProgramData\CheckpointDebug.txt
                                                      Filesize

                                                      1.3MB

                                                      MD5

                                                      0d1c2c993512d32978fe538f3938d72e

                                                      SHA1

                                                      df667af1bc0858f20fb6063f7b1df4ddfc2dce2e

                                                      SHA256

                                                      31a54990d290ea57bed002b0e821e4c51ee96fff05c0b6e1dd6e488c521cd446

                                                      SHA512

                                                      71521917a6c174b2b5cc818fe99656dc354dadb11f1575470037ce44d49925b0a283fdfe13c15ea0c4935fbcfe9a6623bd76026713899b02ab5c92c34f51807f

                                                    • C:\ProgramData\ClearSelect.docx
                                                      Filesize

                                                      970KB

                                                      MD5

                                                      97d40f921b940fa818c789f577e69887

                                                      SHA1

                                                      292eca517d9a773d061df942e80babff85a6fc5b

                                                      SHA256

                                                      9a7ee0296c2ffd3019df99bd410a64c3f1912232c33660c679544bbfaa11e68b

                                                      SHA512

                                                      142cdce699b8b8c8a5076fbe755acc6081af851c534dc2d67c27942b6e546ec051dfb7ffd63794fdbc6670268c7d2b15ab2eb1fd99114ce4c73fa4c14a9a5acd

                                                    • C:\ProgramData\JEHIIDGC
                                                      Filesize

                                                      92KB

                                                      MD5

                                                      55d8864e58f075cbe2dbd43a1b2908a9

                                                      SHA1

                                                      0d7129d95fa2ddb7fde828b22441dc53dffc5594

                                                      SHA256

                                                      e4e07f45a83a87aff5e7f99528464abaad495499e9e2e3e0fcd5897819f88581

                                                      SHA512

                                                      89ce123d2685448826f76dce25292b2d2d525efd8b78fd9235d1e357ad7ae2d4b3461ef903e2994cd2b8e28f56b0cc50137dd90accdd3f281472e488f6c7cf2e

                                                    • C:\ProgramData\RegisterCheckpoint.txt
                                                      Filesize

                                                      1.0MB

                                                      MD5

                                                      ac2cba4d1c49c8dd20123cf2ab9f36b6

                                                      SHA1

                                                      8c3737b67289e624e6b844d71b57050a8eab0230

                                                      SHA256

                                                      87e1d160dcc62f1ea7bf9a93c660263e1d3cb52bd14fc23855c1601b9bd848af

                                                      SHA512

                                                      0167c5926671a5c1fc0bae503a0a5b2cbf285af46e5b8cab9e291db13835ddd6a07036f5ace40e3020ac40d47a8622687a38d2e1bac868e8ee747eba6a1fec11

                                                    • C:\ProgramData\mozglue.dll
                                                      Filesize

                                                      593KB

                                                      MD5

                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                      SHA1

                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                      SHA256

                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                      SHA512

                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                    • C:\ProgramData\nss3.dll
                                                      Filesize

                                                      2.0MB

                                                      MD5

                                                      1cc453cdf74f31e4d913ff9c10acdde2

                                                      SHA1

                                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                      SHA256

                                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                      SHA512

                                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                    • C:\Users\Admin\1000021002\5048d8fe87.exe
                                                      Filesize

                                                      1.1MB

                                                      MD5

                                                      0c9f4a1781dfe8a2e969e56b913a6140

                                                      SHA1

                                                      f9023a60deb493938af0f693ff01767e5498cf4c

                                                      SHA256

                                                      4f547822854b13ee46adafb4f03b690ff891031e2391f31bb945baa0db58ac65

                                                      SHA512

                                                      4b012d026587e69e2aad0e85d3b9cf51973f0ab6e52cb17e0cbd5f4144f9d57409befcfc5fbadeda78029c87b15381e4bff5aa84b8efbfdb0c21777f98bba1dd

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
                                                      Filesize

                                                      216B

                                                      MD5

                                                      ea434d313c8e97a557c987fea4938e3f

                                                      SHA1

                                                      55ba8c8404bf49a42a7a391cd7915013ef16a731

                                                      SHA256

                                                      cb85ec4d78881ce4627c9781c2ee3ac6578c0e4c60fccd848a3471e4b51cd775

                                                      SHA512

                                                      fa4e2cebf0dc44ac6ba3c1077b7876a5e4162899ba031706ea37a1191913c947590bbb4605508a9e14deeb7cf981e893a7fcbf93d15d53809f62de0ce2568676

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                      Filesize

                                                      707B

                                                      MD5

                                                      0907170db6740099f0ae1ba182fdb92b

                                                      SHA1

                                                      afc451fa31ef6d583965c6cfa2087b39ffa5bd51

                                                      SHA256

                                                      2295ba413e5f349bd6e0bd20ce2390ebbc93029141848a75fbbdc636c75cdae8

                                                      SHA512

                                                      1d8cb188f6fee6e87cd61ae2aca57e44177bfee920d5c6562ecd0e5cfc376974cfa935f8c31da2da1f5cd24a2fc58c6dffaf0f9609d88fed09bac1f73308ddb3

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                      Filesize

                                                      6KB

                                                      MD5

                                                      67c6ba3f1ae373e7b074346d6f3e08f2

                                                      SHA1

                                                      c24daf25dd5fd900bd2f0537cf7335dd78a02f13

                                                      SHA256

                                                      ce48916836b8a41928c49de8d0c0bb76a99909108a16fd3f04a58182deac2886

                                                      SHA512

                                                      bfb205816c0d919248be9de9a23b36be954c0dc95f1367e108ef55860d5681314a8aa2585a40149220c11a9e3b053f83dd0ca4d199174c8421bcb8d39b5ed72d

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
                                                      Filesize

                                                      12KB

                                                      MD5

                                                      e1b0ec2cfd58a9f40851e626ac4b56fd

                                                      SHA1

                                                      50547e310879858415be428803c618e7146c2288

                                                      SHA256

                                                      443771d1938900e56d548b2a7dfc91bd828551bd541dede0e6fe0d2311515562

                                                      SHA512

                                                      b5603f7d8d67cc4b53415c0cc17aef3f2c75ed790a483ffc43ef8478f3a5f1eed878587420a15a2f6c9b516f79447539c9768b351f081d970fb440d9a279459b

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                      Filesize

                                                      272KB

                                                      MD5

                                                      d4b2e0fc3de12160ab2bc11a24cde840

                                                      SHA1

                                                      c23edaacbdc0caf7d66cc3e7e084276a383249d5

                                                      SHA256

                                                      57b6b7bd9e9c2557c278770abc9cc0eeb9514b45be8c33ef1951034df2818303

                                                      SHA512

                                                      17a51dc0ddb1db3d56b96172299da56491a0bfde5c2825fa8c2c93a96be2935adbd92e5ea793d93f0fa4d61973c66cc8f7f78781b98e2f4c3f8425dde84b45ce

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
                                                      Filesize

                                                      2B

                                                      MD5

                                                      99914b932bd37a50b983c5e7c90ae93b

                                                      SHA1

                                                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                      SHA256

                                                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                      SHA512

                                                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WFQ509M6\edgecompatviewlist[1].xml
                                                      Filesize

                                                      74KB

                                                      MD5

                                                      d4fc49dc14f63895d997fa4940f24378

                                                      SHA1

                                                      3efb1437a7c5e46034147cbbc8db017c69d02c31

                                                      SHA256

                                                      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                                                      SHA512

                                                      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\CA6891RA\suggestions[1].en-US
                                                      Filesize

                                                      17KB

                                                      MD5

                                                      5a34cb996293fde2cb7a4ac89587393a

                                                      SHA1

                                                      3c96c993500690d1a77873cd62bc639b3a10653f

                                                      SHA256

                                                      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                      SHA512

                                                      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\JP474AK4\favicon[2].png
                                                      Filesize

                                                      2KB

                                                      MD5

                                                      18c023bc439b446f91bf942270882422

                                                      SHA1

                                                      768d59e3085976dba252232a65a4af562675f782

                                                      SHA256

                                                      e0e71acef1efbfab69a1a60cd8fadded948d0e47a0a27c59a0be7033f6a84482

                                                      SHA512

                                                      a95ad7b48596bc0af23d05d1e58681e5d65e707247f96c5bc088880f4525312a1834a89615a0e33aea6b066793088a193ec29b5c96ea216f531c443487ae0735

                                                    • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe
                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      ded748a2dc4c933ef3cdd0e5f229473f

                                                      SHA1

                                                      537dc8c0d89f435016a1f51ce1eb92a80708d008

                                                      SHA256

                                                      d22051811029da582348dbb0a166d9b5bb27eac5a2c0e45e067cdb279c09e24e

                                                      SHA512

                                                      d6996308e86d2b0464b165274025b68c59b38b5557cce2db942a37d566f0e5a5fae30ea1cd8f121071e5c5a974cf4a8916699e1652b3cc0f4acaef6f16df6dc1

                                                    • C:\Users\Admin\AppData\Local\Temp\1000020001\92f880c3ee.exe
                                                      Filesize

                                                      2.3MB

                                                      MD5

                                                      e8dcc58adb90bf7961a7d870ea702230

                                                      SHA1

                                                      ab6effa5eaaadaaf9c925ec4515153c5f0074888

                                                      SHA256

                                                      4689092bad6b1ac29d2569679fa463268455c35fce69e6b905b0f2dda011e74c

                                                      SHA512

                                                      87be87b9cc8cbd0020ea499882b35ebbc68cca0aa3e09e2aadd123bde0b137a7e3e4007cc03ee67d5c209659c579a8a442fdd62e4829c78232cea443ae7b2d14

                                                    • C:\Users\Admin\AppData\Local\Temp\1000066001\swiiiii.exe
                                                      Filesize

                                                      321KB

                                                      MD5

                                                      1c7d0f34bb1d85b5d2c01367cc8f62ef

                                                      SHA1

                                                      33aedadb5361f1646cffd68791d72ba5f1424114

                                                      SHA256

                                                      e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                                      SHA512

                                                      53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                                    • C:\Users\Admin\AppData\Local\Temp\1000069001\NewB.exe
                                                      Filesize

                                                      418KB

                                                      MD5

                                                      0099a99f5ffb3c3ae78af0084136fab3

                                                      SHA1

                                                      0205a065728a9ec1133e8a372b1e3864df776e8c

                                                      SHA256

                                                      919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                      SHA512

                                                      5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                    • C:\Users\Admin\AppData\Local\Temp\1000071001\jok.exe
                                                      Filesize

                                                      304KB

                                                      MD5

                                                      8510bcf5bc264c70180abe78298e4d5b

                                                      SHA1

                                                      2c3a2a85d129b0d750ed146d1d4e4d6274623e28

                                                      SHA256

                                                      096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6

                                                      SHA512

                                                      5ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d

                                                    • C:\Users\Admin\AppData\Local\Temp\1000073001\swiiii.exe
                                                      Filesize

                                                      158KB

                                                      MD5

                                                      586f7fecacd49adab650fae36e2db994

                                                      SHA1

                                                      35d9fb512a8161ce867812633f0a43b042f9a5e6

                                                      SHA256

                                                      cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e

                                                      SHA512

                                                      a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772

                                                    • C:\Users\Admin\AppData\Local\Temp\1000075001\file300un.exe
                                                      Filesize

                                                      392KB

                                                      MD5

                                                      ccc754d02cc1188f0a0477b306539065

                                                      SHA1

                                                      8a73b2e84fbdcadfaa98cc325c2222096bdc309b

                                                      SHA256

                                                      2dd429b06b920140fe9186608b47d7d80697191b089117769912d81f6c39ff38

                                                      SHA512

                                                      6cabd1b19ddd94280528e4c2512e222bacc9bea6806e1df5610ffd3d993f52c4599e65fc7573d3d426e4d6d8c3756244e3e242b55b499796222f971b15ca8e0a

                                                    • C:\Users\Admin\AppData\Local\Temp\1000077001\jfesawdr.exe
                                                      Filesize

                                                      6.1MB

                                                      MD5

                                                      9fb56dd5b5beb0b9c5d0102f22373c0b

                                                      SHA1

                                                      5559dc162d09c11c1ed80aedf8e9fa86fd531e4c

                                                      SHA256

                                                      a65b290aa9ebfb82746cf75440c19956169f48d7dcbebafde6996c9b46039539

                                                      SHA512

                                                      ab6c88acddf3350f4da37e20e38fc1bd4ac56433d5320fa071649ddf261cf1b6bb4692b54791e08e47b9e887a87ba5704afde6cb9aa9220c1da7f27c85400a1c

                                                    • C:\Users\Admin\AppData\Local\Temp\1000079001\gold.exe
                                                      Filesize

                                                      460KB

                                                      MD5

                                                      b22521fb370921bb5d69bf8deecce59e

                                                      SHA1

                                                      3d4486b206e8aaac14a3cf201c5ac152a2a7d4ea

                                                      SHA256

                                                      b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158

                                                      SHA512

                                                      1f7d64ba5266314ed18f577f0984706c21f4f48e8cdb069130e4435c2bcdf219f8dd27e4d3bf3a373f4db4c01e30efe8d7f4d87f4d8cbbbeaf9c7043f685994c

                                                    • C:\Users\Admin\AppData\Local\Temp\1000080001\alexxxxxxxx.exe
                                                      Filesize

                                                      2.7MB

                                                      MD5

                                                      31841361be1f3dc6c2ce7756b490bf0f

                                                      SHA1

                                                      ff2506641a401ac999f5870769f50b7326f7e4eb

                                                      SHA256

                                                      222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee

                                                      SHA512

                                                      53d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019

                                                    • C:\Users\Admin\AppData\Local\Temp\1000231001\ISetup8.exe
                                                      Filesize

                                                      433KB

                                                      MD5

                                                      824300cf5cafbe498e22648c44e24185

                                                      SHA1

                                                      cd42a721c21a774fc5c5419ee790afe0e2077c12

                                                      SHA256

                                                      cc7481436aadeae5a18e3cedc012768e0fd428e9076d1d246ae9faf85266f58c

                                                      SHA512

                                                      49ee87fbe5735d8867b2c90e1684442c00942f8eaa91f03cbad4168d09e5c1c8b7e2369266d106c87c1055c927f57c7ecda2d8986b7154bfad2a2821d6f69176

                                                    • C:\Users\Admin\AppData\Local\Temp\1000232001\toolspub1.exe
                                                      Filesize

                                                      260KB

                                                      MD5

                                                      cf2a49424928afff26947ff8ad128f77

                                                      SHA1

                                                      8cdf0834e2d1cae732c76e37f6058ebf37e06aa4

                                                      SHA256

                                                      37316eae376e8e8c5281b5016d2ab4a65b0201ed139edef72ac4ba102eaf41cb

                                                      SHA512

                                                      6924ea2c5bcb0a3371405e9bf0d0166d512f839be0310d723b21e1acf8e6e7232857e20af800d1331c38f40bbe27a02c4145e661ed6da350a486ad7f1301ba49

                                                    • C:\Users\Admin\AppData\Local\Temp\1000233001\4767d2e713f2021e8fe856e3ea638b58.exe
                                                      Filesize

                                                      4.2MB

                                                      MD5

                                                      8a3fe4db1e83d59cb6c6645b3c8679bf

                                                      SHA1

                                                      50867ff7f9225e23d62929cd63cd586518d34f4e

                                                      SHA256

                                                      5afd9cbe92416d134533742271298245510430fc6b98da57869ffc37344a5ff1

                                                      SHA512

                                                      d24f898852d528c837acdedad77cff1161ecb04a8ce854a442ddc4491dc7ee2be5ffc00c9a141b42950d29bd857492b85eef32715c9ebbda026175a8c075e258

                                                    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      b7f0c6b555edf8d1f5afce5984f1a104

                                                      SHA1

                                                      47f76e4001898764b207ef278c388d819bed0951

                                                      SHA256

                                                      4a8ea5d13abdfd006f58897cbe55773cdc98df31133c1e1ad6ba2b13140e2f94

                                                      SHA512

                                                      b7f8e6e6cfe63cb3d3317c4e0847dda3e5844f144b86671fbe34234dd4b45eda6fbfcea34f129b6e2f4c88c3445fdc965b503ca645abcbce68952960930939e1

                                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat
                                                      Filesize

                                                      35B

                                                      MD5

                                                      ff59d999beb970447667695ce3273f75

                                                      SHA1

                                                      316fa09f467ba90ac34a054daf2e92e6e2854ff8

                                                      SHA256

                                                      065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2

                                                      SHA512

                                                      d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d

                                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exe
                                                      Filesize

                                                      5.8MB

                                                      MD5

                                                      8eeea65d388106b4489d07e025e17fed

                                                      SHA1

                                                      96651968f724c7daec51e74476403899bc7bf8c2

                                                      SHA256

                                                      69efe73bf8f9669427fb25962d104fb63ae7a4fdb4fb2f0022c7541a72c8a2c3

                                                      SHA512

                                                      1c5966906a89b8e7e83bf382c382e5ece1cf6827e7ba7e4ab4fc0ba0c91284bf398bf4822c53aab250520f7ffde231090a9e44d11493b6be8921899fb6d944d7

                                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\podaw.exe
                                                      Filesize

                                                      5.5MB

                                                      MD5

                                                      125c7efdef3f11c70b514739b1bab646

                                                      SHA1

                                                      526560d1ff7636ea4f0404eb74f5da68f7eb8e23

                                                      SHA256

                                                      2ca04fad5b8a81264292bb9877cb9c1c9f7a484cd03815ec9bb686ddf70edefa

                                                      SHA512

                                                      e08218e2415a051b9b8b7e6d28e6822341227fc5256f418c22b2b39f6d3d89e763f58b77dbbdfc792f8a8a17870136be5757c736db1c98d3437e76500f768261

                                                    • C:\Users\Admin\AppData\Local\Temp\Tmp8F11.tmp
                                                      Filesize

                                                      2KB

                                                      MD5

                                                      1420d30f964eac2c85b2ccfe968eebce

                                                      SHA1

                                                      bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                      SHA256

                                                      f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                      SHA512

                                                      6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_omalxlen.t2b.ps1
                                                      Filesize

                                                      1B

                                                      MD5

                                                      c4ca4238a0b923820dcc509a6f75849b

                                                      SHA1

                                                      356a192b7913b04c54574d18c28d46e6395428ab

                                                      SHA256

                                                      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                      SHA512

                                                      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                    • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
                                                      Filesize

                                                      3KB

                                                      MD5

                                                      a286f7c0b3d58a819d35032ad0bb9121

                                                      SHA1

                                                      27f1ab8d87f854b88732f599dcb71576e5e653a1

                                                      SHA256

                                                      6f39e99ed33fe17d8a45bb37584a901b2497807d175b098a6a6bf661c01c3a78

                                                      SHA512

                                                      82e0b289e8d717f197ef3532a8ee6e616e32ce82feba4891b38cbb466a5d129aac8f74df61df910da568b7fe97d91baa24f26ec1992e924c8e2c586a5433b426

                                                    • C:\Users\Admin\AppData\Local\Temp\svrht.exe
                                                      Filesize

                                                      346KB

                                                      MD5

                                                      f42bdef761c1ca4496542cdc8024073e

                                                      SHA1

                                                      5990c707a5bf75f76eb84aedaca381d854c4fbf9

                                                      SHA256

                                                      f09c622512228d56ad3555f21d6ae45549a8d25847c81385c081e5d6bfd9d813

                                                      SHA512

                                                      41fa338c987676883c29b9911459a3eb38b4cd21b16da4971945a5accc000d72c5aae4175982a4209526d103b5b3d29b8505346af444677aa8ae605300ce1b1b

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpF3A4.tmp
                                                      Filesize

                                                      20KB

                                                      MD5

                                                      c9ff7748d8fcef4cf84a5501e996a641

                                                      SHA1

                                                      02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                                                      SHA256

                                                      4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                                                      SHA512

                                                      d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                                                    • C:\Users\Admin\AppData\Local\Temp\u3g0.0.exe
                                                      Filesize

                                                      289KB

                                                      MD5

                                                      652681cfc42cc05b4812c914e4f02ba9

                                                      SHA1

                                                      39118acf00963bb2b9bafc13072cc4a3f6ce9c48

                                                      SHA256

                                                      7d417991d6a5a0d30421d721168db76c170c4a022c53a5deece2fd9d072e4246

                                                      SHA512

                                                      10dc092ec21e06efbbfa6e0fc5d286c272160d71430f3facf2c5c15f264965c052a5dac3bc516c3d514c372ca77e8f9bac9a86ffa28b8f59c4c60510ff9af0b6

                                                    • C:\Users\Admin\AppData\Local\Temp\u3g0.1.zip
                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      78d3ca6355c93c72b494bb6a498bf639

                                                      SHA1

                                                      2fa4e5df74bfe75c207c881a1b0d3bc1c62c8b0e

                                                      SHA256

                                                      a1dd547a63b256aa6a16871ed03f8b025226f7617e67b8817a08444df077b001

                                                      SHA512

                                                      1b2df7bee2514aee7efd3579f5dd33c76b40606d07dba69a34c45747662fad61174db4931bca02b058830107959205e889fee74f8ccc9f6e03f9fd111761f4ea

                                                    • C:\Users\Admin\AppData\Local\Temp\u3g0.2\run.exe
                                                      Filesize

                                                      2.4MB

                                                      MD5

                                                      9fb4770ced09aae3b437c1c6eb6d7334

                                                      SHA1

                                                      fe54b31b0db8665aa5b22bed147e8295afc88a03

                                                      SHA256

                                                      a05b592a971fe5011554013bcfe9a4aaf9cfc633bdd1fe3a8197f213d557b8d3

                                                      SHA512

                                                      140fee6daf23fe8b7e441b3b4de83554af804f00ecedc421907a385ac79a63164bd9f28b4be061c2ea2262755d85e14d3a8e7dc910547837b664d78d93667256

                                                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                                                      Filesize

                                                      109KB

                                                      MD5

                                                      726cd06231883a159ec1ce28dd538699

                                                      SHA1

                                                      404897e6a133d255ad5a9c26ac6414d7134285a2

                                                      SHA256

                                                      12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                      SHA512

                                                      9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                                                      Filesize

                                                      1.2MB

                                                      MD5

                                                      15a42d3e4579da615a384c717ab2109b

                                                      SHA1

                                                      22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                      SHA256

                                                      3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                      SHA512

                                                      1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                    • C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe
                                                      Filesize

                                                      304KB

                                                      MD5

                                                      0c582da789c91878ab2f1b12d7461496

                                                      SHA1

                                                      238bd2408f484dd13113889792d6e46d6b41c5ba

                                                      SHA256

                                                      a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67

                                                      SHA512

                                                      a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a

                                                    • C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe
                                                      Filesize

                                                      750KB

                                                      MD5

                                                      20ae0bb07ba77cb3748aa63b6eb51afb

                                                      SHA1

                                                      87c468dc8f3d90a63833d36e4c900fa88d505c6d

                                                      SHA256

                                                      daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d

                                                      SHA512

                                                      db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2

                                                    • C:\Users\Public\Desktop\Google Chrome.lnk
                                                      Filesize

                                                      2KB

                                                      MD5

                                                      bbd926e228027517d5c6176c85a68569

                                                      SHA1

                                                      ba334fd2111fe358cc710598cc23a28c680beecf

                                                      SHA256

                                                      1a7def19519d17495270381b82f955f870ec38e4e9c8835dc59d2edf2572b865

                                                      SHA512

                                                      7a0f9a22fe40acdb41f6524d7a0c70c81fbe79170cb2016153c90aba05924bc0963f59d0eee77917c39b77b7355ef4e41ca9807d070649d55fec55f48ca29044

                                                    • C:\Users\Public\Desktop\Google Chrome.lnk
                                                      Filesize

                                                      2KB

                                                      MD5

                                                      0bec956918559002fc1b8e16decd87ed

                                                      SHA1

                                                      a44676aacf97442a5e361f25a217440e0c416613

                                                      SHA256

                                                      5dfcc41af9821d7d22151155f04904fce08c103200f6acc165e5debb33489de4

                                                      SHA512

                                                      4e7594359d6b2dde6f352bc40930f8a25a288f79887785a394b4859ae85f31edaafee957d59b56fc661f257e05af5c8bec110c831a11cf24ec472062e691e908

                                                    • \??\pipe\crashpad_4060_LNOWNASPGBATVNCJ
                                                      MD5

                                                      d41d8cd98f00b204e9800998ecf8427e

                                                      SHA1

                                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                      SHA256

                                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                      SHA512

                                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                    • memory/600-209-0x0000000006370000-0x000000000638E000-memory.dmp
                                                      Filesize

                                                      120KB

                                                    • memory/600-224-0x0000000006610000-0x000000000671A000-memory.dmp
                                                      Filesize

                                                      1.0MB

                                                    • memory/600-225-0x0000000006540000-0x0000000006552000-memory.dmp
                                                      Filesize

                                                      72KB

                                                    • memory/600-226-0x00000000065A0000-0x00000000065DE000-memory.dmp
                                                      Filesize

                                                      248KB

                                                    • memory/600-227-0x0000000006720000-0x000000000676B000-memory.dmp
                                                      Filesize

                                                      300KB

                                                    • memory/600-503-0x0000000009100000-0x0000000009150000-memory.dmp
                                                      Filesize

                                                      320KB

                                                    • memory/600-502-0x0000000009980000-0x0000000009EAC000-memory.dmp
                                                      Filesize

                                                      5.2MB

                                                    • memory/600-221-0x0000000006AA0000-0x00000000070A6000-memory.dmp
                                                      Filesize

                                                      6.0MB

                                                    • memory/600-501-0x0000000009280000-0x0000000009442000-memory.dmp
                                                      Filesize

                                                      1.8MB

                                                    • memory/600-187-0x0000000005940000-0x00000000059B6000-memory.dmp
                                                      Filesize

                                                      472KB

                                                    • memory/600-170-0x0000000004DF0000-0x0000000004DFA000-memory.dmp
                                                      Filesize

                                                      40KB

                                                    • memory/600-169-0x0000000004E60000-0x0000000004EF2000-memory.dmp
                                                      Filesize

                                                      584KB

                                                    • memory/600-168-0x00000000052C0000-0x00000000057BE000-memory.dmp
                                                      Filesize

                                                      5.0MB

                                                    • memory/600-278-0x0000000006850000-0x00000000068B6000-memory.dmp
                                                      Filesize

                                                      408KB

                                                    • memory/600-167-0x0000000000520000-0x0000000000572000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/1212-577-0x0000019D10740000-0x0000019D10840000-memory.dmp
                                                      Filesize

                                                      1024KB

                                                    • memory/1212-582-0x0000019D20AA0000-0x0000019D20AA2000-memory.dmp
                                                      Filesize

                                                      8KB

                                                    • memory/2036-92-0x0000000000930000-0x0000000000982000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/2140-53-0x0000000001060000-0x0000000001510000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/2140-43-0x0000000001060000-0x0000000001510000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/2360-97-0x0000000000400000-0x000000000044C000-memory.dmp
                                                      Filesize

                                                      304KB

                                                    • memory/2360-95-0x0000000000400000-0x000000000044C000-memory.dmp
                                                      Filesize

                                                      304KB

                                                    • memory/3424-563-0x0000000000340000-0x00000000007F4000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/3424-20-0x0000000000340000-0x00000000007F4000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/3424-21-0x0000000004CB0000-0x0000000004CB1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3424-23-0x0000000004CA0000-0x0000000004CA1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3424-24-0x0000000004CE0000-0x0000000004CE1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3424-246-0x0000000000340000-0x00000000007F4000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/3424-289-0x0000000000340000-0x00000000007F4000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/3424-22-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3424-109-0x0000000000340000-0x00000000007F4000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/3424-27-0x0000000004D10000-0x0000000004D11000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3424-434-0x0000000000340000-0x00000000007F4000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/3424-26-0x0000000004C90000-0x0000000004C91000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3424-25-0x0000000004C80000-0x0000000004C81000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3424-28-0x0000000004D00000-0x0000000004D01000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3532-210-0x0000000000640000-0x000000000066E000-memory.dmp
                                                      Filesize

                                                      184KB

                                                    • memory/3648-520-0x00000225C5520000-0x00000225C5530000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/3648-504-0x00000225C5420000-0x00000225C5430000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/3648-539-0x00000225C28F0000-0x00000225C28F2000-memory.dmp
                                                      Filesize

                                                      8KB

                                                    • memory/4296-220-0x0000000000400000-0x000000000063B000-memory.dmp
                                                      Filesize

                                                      2.2MB

                                                    • memory/4296-217-0x0000000000400000-0x000000000063B000-memory.dmp
                                                      Filesize

                                                      2.2MB

                                                    • memory/4480-431-0x0000000000C00000-0x00000000010B0000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/4480-54-0x0000000000C00000-0x00000000010B0000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/4480-543-0x0000000000C00000-0x00000000010B0000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/4480-274-0x0000000000C00000-0x00000000010B0000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/4480-433-0x0000000000C00000-0x00000000010B0000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/4672-290-0x0000000000040000-0x0000000000620000-memory.dmp
                                                      Filesize

                                                      5.9MB

                                                    • memory/4672-67-0x0000000000040000-0x0000000000620000-memory.dmp
                                                      Filesize

                                                      5.9MB

                                                    • memory/4672-544-0x0000000000040000-0x0000000000620000-memory.dmp
                                                      Filesize

                                                      5.9MB

                                                    • memory/4672-432-0x0000000000040000-0x0000000000620000-memory.dmp
                                                      Filesize

                                                      5.9MB

                                                    • memory/4744-1272-0x000001F34D560000-0x000001F34D5DA000-memory.dmp
                                                      Filesize

                                                      488KB

                                                    • memory/4744-1273-0x000001F34D5E0000-0x000001F34D642000-memory.dmp
                                                      Filesize

                                                      392KB

                                                    • memory/4744-1269-0x000001F334710000-0x000001F33471A000-memory.dmp
                                                      Filesize

                                                      40KB

                                                    • memory/4744-1270-0x000001F34CF20000-0x000001F34CFD2000-memory.dmp
                                                      Filesize

                                                      712KB

                                                    • memory/4744-1263-0x000001F334730000-0x000001F334744000-memory.dmp
                                                      Filesize

                                                      80KB

                                                    • memory/4744-1262-0x000001F34CE80000-0x000001F34CE8C000-memory.dmp
                                                      Filesize

                                                      48KB

                                                    • memory/4744-1271-0x000001F34D530000-0x000001F34D55A000-memory.dmp
                                                      Filesize

                                                      168KB

                                                    • memory/4744-1261-0x000001F3346E0000-0x000001F3346F0000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/4744-1260-0x000001F34D1F0000-0x000001F34D300000-memory.dmp
                                                      Filesize

                                                      1.1MB

                                                    • memory/4744-1264-0x000001F34CEE0000-0x000001F34CF04000-memory.dmp
                                                      Filesize

                                                      144KB

                                                    • memory/4744-1274-0x000001F334720000-0x000001F33472A000-memory.dmp
                                                      Filesize

                                                      40KB

                                                    • memory/4744-1278-0x000001F34D740000-0x000001F34DA40000-memory.dmp
                                                      Filesize

                                                      3.0MB

                                                    • memory/4744-1284-0x000001F351900000-0x000001F351908000-memory.dmp
                                                      Filesize

                                                      32KB

                                                    • memory/4744-1285-0x000001F352790000-0x000001F3527C8000-memory.dmp
                                                      Filesize

                                                      224KB

                                                    • memory/4744-1286-0x000001F352A80000-0x000001F352A8A000-memory.dmp
                                                      Filesize

                                                      40KB

                                                    • memory/4744-1287-0x000001F352A90000-0x000001F352AB2000-memory.dmp
                                                      Filesize

                                                      136KB

                                                    • memory/4744-1256-0x000001F32F080000-0x000001F332978000-memory.dmp
                                                      Filesize

                                                      57.0MB

                                                    • memory/4812-4-0x0000000004B70000-0x0000000004B71000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4812-19-0x0000000001250000-0x0000000001704000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/4812-9-0x0000000004B90000-0x0000000004B91000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4812-8-0x0000000004BA0000-0x0000000004BA1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4812-5-0x0000000004B10000-0x0000000004B11000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4812-6-0x0000000004B30000-0x0000000004B31000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4812-7-0x0000000004B20000-0x0000000004B21000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4812-0-0x0000000001250000-0x0000000001704000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/4812-1-0x0000000076F84000-0x0000000076F85000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4812-2-0x0000000004B40000-0x0000000004B41000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/4812-3-0x0000000004B50000-0x0000000004B51000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/5196-1268-0x0000000000340000-0x00000000007F4000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/5220-1267-0x0000000000C00000-0x00000000010B0000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/5248-361-0x0000000000130000-0x0000000000A21000-memory.dmp
                                                      Filesize

                                                      8.9MB

                                                    • memory/5248-359-0x0000000000F20000-0x0000000000F21000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/5280-454-0x0000000000C00000-0x00000000010B0000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/5280-452-0x0000000000C00000-0x00000000010B0000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/5288-453-0x0000000000340000-0x00000000007F4000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/5288-456-0x0000000000340000-0x00000000007F4000-memory.dmp
                                                      Filesize

                                                      4.7MB

                                                    • memory/5340-353-0x0000000000400000-0x000000000044E000-memory.dmp
                                                      Filesize

                                                      312KB

                                                    • memory/5340-351-0x0000000000400000-0x000000000044E000-memory.dmp
                                                      Filesize

                                                      312KB

                                                    • memory/5416-480-0x0000000000F50000-0x0000000000FA2000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/5428-415-0x000002D1C4D50000-0x000002D1C4D5A000-memory.dmp
                                                      Filesize

                                                      40KB

                                                    • memory/5428-402-0x000002D1C4DF0000-0x000002D1C4E02000-memory.dmp
                                                      Filesize

                                                      72KB

                                                    • memory/5428-366-0x000002D1C4D70000-0x000002D1C4DE6000-memory.dmp
                                                      Filesize

                                                      472KB

                                                    • memory/5428-363-0x000002D1C49C0000-0x000002D1C49E2000-memory.dmp
                                                      Filesize

                                                      136KB

                                                    • memory/5440-564-0x000000001D720000-0x000000001D82A000-memory.dmp
                                                      Filesize

                                                      1.0MB

                                                    • memory/5440-500-0x0000000000460000-0x0000000000520000-memory.dmp
                                                      Filesize

                                                      768KB

                                                    • memory/5440-566-0x000000001B480000-0x000000001B4BE000-memory.dmp
                                                      Filesize

                                                      248KB

                                                    • memory/5440-565-0x000000001B140000-0x000000001B152000-memory.dmp
                                                      Filesize

                                                      72KB

                                                    • memory/5440-567-0x000000001B460000-0x000000001B47E000-memory.dmp
                                                      Filesize

                                                      120KB

                                                    • memory/5440-568-0x000000001DE00000-0x000000001DFC2000-memory.dmp
                                                      Filesize

                                                      1.8MB

                                                    • memory/5440-569-0x000000001F060000-0x000000001F586000-memory.dmp
                                                      Filesize

                                                      5.1MB

                                                    • memory/5536-275-0x0000028B3D260000-0x0000028B3D26A000-memory.dmp
                                                      Filesize

                                                      40KB

                                                    • memory/5536-259-0x0000028B3B610000-0x0000028B3B61A000-memory.dmp
                                                      Filesize

                                                      40KB

                                                    • memory/5536-276-0x0000028B3D2F0000-0x0000028B3D34E000-memory.dmp
                                                      Filesize

                                                      376KB

                                                    • memory/5812-470-0x0000000000400000-0x0000000000592000-memory.dmp
                                                      Filesize

                                                      1.6MB

                                                    • memory/5912-873-0x000000006D8B0000-0x000000006DC00000-memory.dmp
                                                      Filesize

                                                      3.3MB

                                                    • memory/5912-871-0x000000000A6C0000-0x000000000A6F3000-memory.dmp
                                                      Filesize

                                                      204KB

                                                    • memory/5912-806-0x00000000083C0000-0x0000000008710000-memory.dmp
                                                      Filesize

                                                      3.3MB

                                                    • memory/5912-805-0x00000000081D0000-0x0000000008236000-memory.dmp
                                                      Filesize

                                                      408KB

                                                    • memory/5912-804-0x0000000007990000-0x00000000079B2000-memory.dmp
                                                      Filesize

                                                      136KB

                                                    • memory/5912-803-0x0000000007AA0000-0x00000000080C8000-memory.dmp
                                                      Filesize

                                                      6.2MB

                                                    • memory/5912-802-0x00000000072E0000-0x0000000007316000-memory.dmp
                                                      Filesize

                                                      216KB

                                                    • memory/5912-808-0x0000000008730000-0x000000000874C000-memory.dmp
                                                      Filesize

                                                      112KB

                                                    • memory/5912-834-0x0000000009780000-0x00000000097BC000-memory.dmp
                                                      Filesize

                                                      240KB

                                                    • memory/5912-809-0x0000000008750000-0x000000000879B000-memory.dmp
                                                      Filesize

                                                      300KB

                                                    • memory/5912-872-0x000000006D860000-0x000000006D8AB000-memory.dmp
                                                      Filesize

                                                      300KB

                                                    • memory/5912-1090-0x000000000A860000-0x000000000A868000-memory.dmp
                                                      Filesize

                                                      32KB

                                                    • memory/5912-879-0x000000000A700000-0x000000000A7A5000-memory.dmp
                                                      Filesize

                                                      660KB

                                                    • memory/5912-874-0x000000000A6A0000-0x000000000A6BE000-memory.dmp
                                                      Filesize

                                                      120KB

                                                    • memory/5912-1085-0x000000000A880000-0x000000000A89A000-memory.dmp
                                                      Filesize

                                                      104KB

                                                    • memory/5912-880-0x000000000A920000-0x000000000A9B4000-memory.dmp
                                                      Filesize

                                                      592KB

                                                    • memory/6024-557-0x0000025676B80000-0x0000025676C80000-memory.dmp
                                                      Filesize

                                                      1024KB