Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/05/2024, 02:59

240502-dg26eshb97 10

02/05/2024, 02:36

240502-c3k9csef7t 10

Analysis

  • max time kernel
    297s
  • max time network
    301s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 02:59

General

  • Target

    a ton of ya/ya - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy -.exe

  • Size

    63KB

  • MD5

    222c2d239f4c8a1d73c736c9cc712807

  • SHA1

    c3aa61bd6f8cc640bcfa74c40d9283c9c08c7b3c

  • SHA256

    ff43049677c57277f12a1d97f02af3029d7b75b5ad40303a28f1b0452997969d

  • SHA512

    1f2fea85e45e93916306c234b916d6b4b200dac9656e44f4555f825dd8677cb5e927bd5e7a74bf2fb2f6972a3e6e2d294a6104add162ba3d53a0e6cfedef6a02

  • SSDEEP

    1536:tJc/5q1qoR5PDdAZcIED4VuCkbFybjQ9f0jQRmONww+W:7c/iqoJekbFEQ9W+mONP+W

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:23638

209.25.140.1:5525:23638

bring-recorder.gl.at.ply.gg:23638

action-yesterday.gl.at.ply.gg:23638

147.185.221.19:23638

then-wheel.gl.at.ply.gg::23638

then-wheel.gl.at.ply.gg:23638

teen-modes.gl.at.ply.gg:23638

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    uwumonster.exe

Signatures

  • Detect Xworm Payload 5 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 30 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a ton of ya\ya - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy -.exe
    "C:\Users\Admin\AppData\Local\Temp\a ton of ya\ya - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy - Copy -.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "uwumonster" /tr "C:\Users\Admin\AppData\Local\uwumonster.exe"
      2⤵
      • Creates scheduled task(s)
      PID:2600
    • C:\Users\Admin\AppData\Local\Temp\rfdhct.exe
      "C:\Users\Admin\AppData\Local\Temp\rfdhct.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Users\Admin\AppData\Local\Temp\rfdhct.exe
        "C:\Users\Admin\AppData\Local\Temp\rfdhct.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:568
      • C:\Users\Admin\AppData\Local\Temp\rfdhct.exe
        "C:\Users\Admin\AppData\Local\Temp\rfdhct.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1408
      • C:\Users\Admin\AppData\Local\Temp\rfdhct.exe
        "C:\Users\Admin\AppData\Local\Temp\rfdhct.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2324
      • C:\Users\Admin\AppData\Local\Temp\rfdhct.exe
        "C:\Users\Admin\AppData\Local\Temp\rfdhct.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:108
      • C:\Users\Admin\AppData\Local\Temp\rfdhct.exe
        "C:\Users\Admin\AppData\Local\Temp\rfdhct.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1732
      • C:\Users\Admin\AppData\Local\Temp\rfdhct.exe
        "C:\Users\Admin\AppData\Local\Temp\rfdhct.exe" /main
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Windows\SysWOW64\notepad.exe
          "C:\Windows\System32\notepad.exe" \note.txt
          4⤵
            PID:3048
          • C:\Windows\SysWOW64\taskmgr.exe
            "C:\Windows\System32\taskmgr.exe"
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:1436
          • C:\Windows\SysWOW64\regedit.exe
            "C:\Windows\System32\regedit.exe"
            4⤵
            • Runs regedit.exe
            PID:1624
          • C:\Windows\SysWOW64\taskmgr.exe
            "C:\Windows\System32\taskmgr.exe"
            4⤵
              PID:2988
        • C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe
          "C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1956
          • C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe
            "C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe" /watchdog
            3⤵
            • Executes dropped EXE
            PID:1008
          • C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe
            "C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe" /watchdog
            3⤵
            • Executes dropped EXE
            PID:1976
          • C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe
            "C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe" /watchdog
            3⤵
            • Executes dropped EXE
            PID:2920
          • C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe
            "C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe" /watchdog
            3⤵
            • Executes dropped EXE
            PID:2908
          • C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe
            "C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe" /watchdog
            3⤵
            • Executes dropped EXE
            PID:1572
          • C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe
            "C:\Users\Admin\AppData\Local\Temp\tuwjpk.exe" /main
            3⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            PID:2076
            • C:\Windows\SysWOW64\notepad.exe
              "C:\Windows\System32\notepad.exe" \note.txt
              4⤵
                PID:2220
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe" http://google.co.ck/search?q=bonzi+buddy+download+free
                4⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                PID:2584
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:2
                  5⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2952
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:472067 /prefetch:2
                  5⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2916
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:406549 /prefetch:2
                  5⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:1916
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:406573 /prefetch:2
                  5⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2116
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:865310 /prefetch:2
                  5⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:1628
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:865344 /prefetch:2
                  5⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:1244
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:1061935 /prefetch:2
                  5⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2948
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {E0DC3ADB-4362-4973-B362-90EC41F78AB2} S-1-5-21-481678230-3773327859-3495911762-1000:UIBNQNMA\Admin:Interactive:[1]
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Users\Admin\AppData\Local\uwumonster.exe
            C:\Users\Admin\AppData\Local\uwumonster.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2632
          • C:\Users\Admin\AppData\Local\uwumonster.exe
            C:\Users\Admin\AppData\Local\uwumonster.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1696
          • C:\Users\Admin\AppData\Local\uwumonster.exe
            C:\Users\Admin\AppData\Local\uwumonster.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2016
          • C:\Users\Admin\AppData\Local\uwumonster.exe
            C:\Users\Admin\AppData\Local\uwumonster.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1928
          • C:\Users\Admin\AppData\Local\uwumonster.exe
            C:\Users\Admin\AppData\Local\uwumonster.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1444
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x4e4
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2696

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          1KB

          MD5

          a240d3899f5c942fa4d758eaa3f6cffd

          SHA1

          ab28b7e179d0b320b32b40f9302c6692bab2f06e

          SHA256

          fd668a44e7e00cb370d96f1ed1de4a6853f0fe2679fbb5e9cc211450d7cd6111

          SHA512

          8d774eda4fba5de333e50be8503c902c5f8aa6bc4516a0cad95f8cb8d697924fb88696b22cc712c6468ee9e8866a29c71d24f16d4e19dd0ded38069602babeee

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

          Filesize

          724B

          MD5

          ac89a852c2aaa3d389b2d2dd312ad367

          SHA1

          8f421dd6493c61dbda6b839e2debb7b50a20c930

          SHA256

          0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

          SHA512

          c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_D7C1EE155B4C5E8C9EE3042DF21F688A

          Filesize

          472B

          MD5

          d82886e4da51cd825189e243de66e640

          SHA1

          edc8290b23161653889b252b37f19ec019720941

          SHA256

          3d47798cbe8f8488ea79b1ef3fa8e9c89a17ccea4f2305be794601878e3cde73

          SHA512

          ba84e29c4e2a374bb2b836e4dc40ff52db54159c0145f4b1f90927953e285d72a25f358f4ada1450ac4f09f48d7dcb1d7ff77aac5670fea4678094bb3a3c5ed4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          410B

          MD5

          ac8a657c0f36af9465897e357586552a

          SHA1

          6dc4ce7cfcff05f2418ae0d4676755014b835a27

          SHA256

          c446e349a63f95b8ab7073321b5d1cab4ed25a482c39de2e45907e18bd3d2ec2

          SHA512

          553718ef22848577b17432b5a8dd5397ad4b2ce3feff0e5110fd325259ece9311a4694cc339078eb43e3658e3495f66c9842d1de94aacba1178f89b67e190ccc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ad3a87f73938f54e96d9e8aee80bf4b3

          SHA1

          33c117d9ed7f64cf165e654a23dd2ca84673e66d

          SHA256

          07068d11e0fa291945c3c55f0fc20631adab7ac5ff3edb260edeb206f510e337

          SHA512

          90855b45831fde248b7eba25c37133722041725234fdd9aa73daa066f696722da9e3a3259614d6c76edeb3228f8733fd5b3cb03b149673cdf9c162042ee59b7f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ed1276c9c6ca5e420a5f46a8e8f35fba

          SHA1

          54a640b0d9ae98d2a178852d3ea492096efb89ea

          SHA256

          766f30f3b2231f2dd30056ac2dbd5033e195d8e147adf78fe89543c1036a4abc

          SHA512

          4f6c275af537a38117f8b3b105afcd7d7e72f4d318591211cceae129418556f89fb5d59d8162bf849349e2d062645d0f521855981223bf35e6827347516607a0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a116a35ee4e32fb02260680b8ce1b66d

          SHA1

          a8895df73cf0469d3ca3cbd1f8d3c79ca4142515

          SHA256

          21e5987d41c9e8c53f329ddca452c025a848f050757cc609fa6f534ab1b28ef6

          SHA512

          e128f672b972dffa65d6ca5d8233a3649831d8db378458f85f691f484222bc80a4f901a525c551af2f0440efd6d8ea9b257caf3e0811cded09dafd337ea055a8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          cb240c034775d1e0e5f2c67180da7162

          SHA1

          b3e577c5aacc7822b5a6cac67349fc6ce8b9d7fe

          SHA256

          5eae0d662e0f23fecd33fd640847560aa3a6d8a2a6e29aa1ff76de076f067e0f

          SHA512

          6cfa137a1a7406fe9ccbb9c0e9a9b5253dcf2e9021baa7cdadc5bd0d1f019cb27170f6a585878819f8d6cbcd3ecedd252c76bef6f792aab5f0a5d0e8c9b6fe48

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0b63e4c121632049f9a13b1285092cf3

          SHA1

          95781b4a01ba4e2cdb262325a03bad74a80ae69c

          SHA256

          14327a110332b4dfdbcbeb484cbf3e9878448046977751dfbc27b53ba534d1ea

          SHA512

          c631e2674ab9cc82bba99978e127560ba7011635cc7128b58f2c8b290c8bf2b75fee72e1b0cdaf8da979d4c0c80c4cb4ded4fcd7a910dbdccf91cb54e3bd54f4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5c44f289488a7891ecc2a06aa1002d31

          SHA1

          8c20210ecee4652ae1e76e49971c25585f8ed567

          SHA256

          c974ea37e55e6642186a5598625496de9c0443f901bed9cc5ebc50bdc93d2865

          SHA512

          36e0b8da83a4867b1e1b5106b3ea5cc8377309a87c9eebb52f3bcdea58f51109f4c92836300b507497a7d0d0b85978c0acdc4af4c249c4a43c34e88b17197787

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7d0aec012851da5822c4277cdfbff5ba

          SHA1

          0cfdf774d29da7275b3237c2eb404f7b5828d4e3

          SHA256

          480b023e1c68a40eae69efbacf5264666904b50383adfc12a65a942a01e151b4

          SHA512

          41dc4d42f9277e79fc160c7c6e4f8c7653c4f74e4271931e45871c70ff22e3edf6f2b6a0784bfdf9677fa73644909d7b3ca7f97f0a3069fedd00ec5b5005706f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

          Filesize

          392B

          MD5

          60e9091e65c42e06666c87008a0422fe

          SHA1

          a4e6e3a0891e5e784503939001e1a1b83a9d0975

          SHA256

          9b8502a80052b4ed001f30ce9033aff449baf9f3fb9817ddc8e900c0dcc3ce7f

          SHA512

          971c117a24379b74bdc122f0b96ef999fd8871beba3f0842d05d90ae853c217e45fad6269b7841c5df53b7797a940cd4102c59cb2d60ca4ad87180dc8da40caa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_D7C1EE155B4C5E8C9EE3042DF21F688A

          Filesize

          414B

          MD5

          a9d560a8d5121604d1c3955e0b85d888

          SHA1

          96ecda7c104a03c659c75f64db21baa9a35fac61

          SHA256

          abc7e6b95c25cf43709e78ea80050976300d8e0d6574922f505679fc6773ac5c

          SHA512

          c045f38274d14b4115d735871f5eb0d9f513c2e758c72dc83937ff0f5f35bfce287ec31649c2b1451863cb1646deeea6407be22c1c1c1ba3e7d9825740b5947b

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\wi962z5\imagestore.dat

          Filesize

          5KB

          MD5

          fcbef3ec2c9a818f7adf2b21fe26ab2b

          SHA1

          71c09570fa783eaa8fd3881c23ea3790e6d8d3c2

          SHA256

          45356c74a49aeacc75ae05dde7c314ff8f1d8ed3f0d1cb54cdb04d307f0d4688

          SHA512

          f8ee6b7d0bde003ba14c6076aa739ccf04874d75c5d253e89f84f32906522f72837c134f770ec5d8f8729247a4dfe50c810c1c8fb4878022dd8420b9c0df78e4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\api[1].js

          Filesize

          850B

          MD5

          ee87fd4035a91d937ff13613982b4170

          SHA1

          e897502e3a58c6be2b64da98474f0d405787f5f7

          SHA256

          7649b605b4f35666df5cbcbb03597306d9215f53f61c2a097f085fa39af9859f

          SHA512

          9e27179bdedb6fe008ab8dc0827d479c674e7e21ad44081c78782f29dd5b91ad2d5bf4f6912d6d1ad3275eedce659e26ace02f769c6b7f4b1f660a3c628feab3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KRMHFE1W\favicon[1].ico

          Filesize

          5KB

          MD5

          f3418a443e7d841097c714d69ec4bcb8

          SHA1

          49263695f6b0cdd72f45cf1b775e660fdc36c606

          SHA256

          6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

          SHA512

          82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OV51DDG5\styles__ltr[1].css

          Filesize

          55KB

          MD5

          2c00b9f417b688224937053cd0c284a5

          SHA1

          17b4c18ebc129055dd25f214c3f11e03e9df2d82

          SHA256

          1e754b107428162c65a26d399b66db3daaea09616bf8620d9de4bc689ce48eed

          SHA512

          8dc644d4c8e6da600c751975ac4a9e620e26179167a4021ddb1da81b452ecf420e459dd1c23d1f2e177685b4e1006dbc5c8736024c447d0ff65f75838a785f57

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PH7CXNA3\recaptcha__en[1].js

          Filesize

          505KB

          MD5

          e2e79d6b927169d9e0e57e3baecc0993

          SHA1

          1299473950b2999ba0b7f39bd5e4a60eafd1819d

          SHA256

          231336ed913a5ebd4445b85486e053caf2b81cab91318241375f3f7a245b6c6b

          SHA512

          d6a2ed7b19e54d1447ee9bbc684af7101b48086945a938a5f9b6ae74ace30b9a98ca83d3183814dd3cc40f251ab6433dc7f8b425f313ea9557b83e1c2e035dff

        • C:\Users\Admin\AppData\Local\Temp\Cab3CB2.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar8C78.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\rfdhct.exe

          Filesize

          16KB

          MD5

          1d5ad9c8d3fee874d0feb8bfac220a11

          SHA1

          ca6d3f7e6c784155f664a9179ca64e4034df9595

          SHA256

          3872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff

          SHA512

          c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1

        • C:\Users\Admin\AppData\Local\uwumonster.exe

          Filesize

          63KB

          MD5

          222c2d239f4c8a1d73c736c9cc712807

          SHA1

          c3aa61bd6f8cc640bcfa74c40d9283c9c08c7b3c

          SHA256

          ff43049677c57277f12a1d97f02af3029d7b75b5ad40303a28f1b0452997969d

          SHA512

          1f2fea85e45e93916306c234b916d6b4b200dac9656e44f4555f825dd8677cb5e927bd5e7a74bf2fb2f6972a3e6e2d294a6104add162ba3d53a0e6cfedef6a02

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BOW28O4N.txt

          Filesize

          124B

          MD5

          0be51b79a2203996b529515d3d007ae4

          SHA1

          d63e632b7450e5e97c1c41eb374393caee030837

          SHA256

          b72b0c03ce9bd94f8d396f87366e273448f53bd245e72f51f27ebbcb63758f43

          SHA512

          fb6d84d16eca7f0fcd3208e3473d02df6d3ae80540b6f369201871371ec502715a7da13ed25534c3355e760ab7f35147ad4bd358a49ba9e15235371b90bea3d8

        • C:\note.txt

          Filesize

          218B

          MD5

          afa6955439b8d516721231029fb9ca1b

          SHA1

          087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

          SHA256

          8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

          SHA512

          5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf

        • memory/1444-630-0x0000000001250000-0x0000000001266000-memory.dmp

          Filesize

          88KB

        • memory/2016-37-0x0000000001130000-0x0000000001146000-memory.dmp

          Filesize

          88KB

        • memory/2632-10-0x00000000010E0000-0x00000000010F6000-memory.dmp

          Filesize

          88KB

        • memory/2752-0-0x000007FEF5343000-0x000007FEF5344000-memory.dmp

          Filesize

          4KB

        • memory/2752-12-0x000007FEF5340000-0x000007FEF5D2C000-memory.dmp

          Filesize

          9.9MB

        • memory/2752-11-0x000007FEF5343000-0x000007FEF5344000-memory.dmp

          Filesize

          4KB

        • memory/2752-6-0x000007FEF5340000-0x000007FEF5D2C000-memory.dmp

          Filesize

          9.9MB

        • memory/2752-1-0x0000000000E30000-0x0000000000E46000-memory.dmp

          Filesize

          88KB