Analysis Overview
SHA256
ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af
Threat Level: Known bad
The file ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af was found to be: Known bad.
Malicious Activity Summary
PurpleFox
Gh0st RAT payload
Detect PurpleFox Rootkit
Gh0strat
Server Software Component: Terminal Services DLL
Drops file in Drivers directory
Sets service image path in registry
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
UPX packed file
Drops file in System32 directory
Drops file in Program Files directory
Enumerates physical storage devices
Unsigned PE
Suspicious behavior: LoadsDriver
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SendNotifyMessage
Suspicious use of FindShellTrayWindow
Suspicious behavior: EnumeratesProcesses
Checks processor information in registry
Runs ping.exe
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-25 17:05
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-25 17:05
Reported
2024-06-25 17:08
Platform
win10v2004-20240508-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
Detect PurpleFox Rootkit
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Gh0st RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Gh0strat
PurpleFox
Drops file in Drivers directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\system32\drivers\QAssist.sys | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
Server Software Component: Terminal Services DLL
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\240612062.txt" | C:\Users\Admin\AppData\Local\Temp\R.exe | N/A |
Sets service image path in registry
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe | N/A |
Executes dropped EXE
Loads dropped DLL
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\240612062.txt | C:\Users\Admin\AppData\Local\Temp\R.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\ini.ini | C:\Users\Admin\AppData\Local\Temp\R.exe | N/A |
| File created | C:\Windows\SysWOW64\Remote Data.exe | C:\Windows\SysWOW64\svchost.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\Remote Data.exe | C:\Windows\SysWOW64\svchost.exe | N/A |
| File created | C:\Windows\SysWOW64\TXPlatfor.exe | C:\Users\Admin\AppData\Local\Temp\N.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\TXPlatfor.exe | C:\Users\Admin\AppData\Local\Temp\N.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | C:\Users\Admin\AppData\Local\Temp\ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
Enumerates physical storage devices
Checks processor information in registry
Modifies system certificate store
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 | C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
Runs ping.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\PING.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe
"C:\Users\Admin\AppData\Local\Temp\ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe"
C:\Users\Admin\AppData\Local\Temp\R.exe
C:\Users\Admin\AppData\Local\Temp\\R.exe
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe -k "Remote Data"
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe -k "Remote Data"
C:\Users\Admin\AppData\Local\Temp\N.exe
C:\Users\Admin\AppData\Local\Temp\\N.exe
C:\Windows\SysWOW64\TXPlatfor.exe
C:\Windows\SysWOW64\TXPlatfor.exe -auto
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul
C:\Windows\SysWOW64\TXPlatfor.exe
C:\Windows\SysWOW64\TXPlatfor.exe -acsi
C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe
C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe
C:\Windows\SysWOW64\PING.EXE
ping -n 2 127.0.0.1
C:\Windows\SysWOW64\Remote Data.exe
"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\240612062.txt",MainThread
C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe
C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe "-lang=zh_CN" "-cachedir=C:\Users\Admin\AppData\Local\Steam\htmlcache" "-steampid=6596" "-buildid=1718904340" "-steamid=0" "-logdir=C:\Users\Admin\AppData\Local\Temp\logs" "-uimode=7" "-startcount=0" "-userdatadir=C:\Users\Admin\AppData\Local\Steam\cefdata" "-steamuniverse=Public" "-realm=China" "-clientui=C:\Users\Admin\AppData\Local\Temp\clientui" "-steampath=C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe" "-launcher=7" --valve-enable-site-isolation --enable-smooth-scrolling --enable-direct-write "--log-file=C:\Users\Admin\AppData\Local\Temp\logs\cef_log.txt" --disable-quick-menu "--disable-features=SpareRendererForSitePerProcess,DcheckIsFatal"
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe --type=crashpad-handler /prefetch:7 --max-uploads=5 --max-db-size=20 --max-db-age=5 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\dumps "--metrics-dir=C:\Users\Admin\AppData\Local\CEF\User Data" --url=https://crash.steampowered.com/submit --annotation=platform=win64 --annotation=product=cefwebhelper --annotation=version=1718904340 --initial-client-data=0x368,0x36c,0x370,0x344,0x374,0x7ffa84e3ee38,0x7ffa84e3ee48,0x7ffa84e3ee58
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe
"C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe" --type=gpu-process --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1718904340 --steamid=0 --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\logs\cef_log.txt" --mojo-platform-channel-handle=1596 --field-trial-handle=1728,i,14730120840470981649,9685529799696179327,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:2
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe
"C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1718904340 --steamid=0 --log-file="C:\Users\Admin\AppData\Local\Temp\logs\cef_log.txt" --mojo-platform-channel-handle=2192 --field-trial-handle=1728,i,14730120840470981649,9685529799696179327,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:8
C:\Windows\system32\AUDIODG.EXE
C:\Windows\system32\AUDIODG.EXE 0x51c 0x518
C:\Users\Admin\AppData\Local\Temp\bin\gldriverquery64.exe
.\bin\gldriverquery64.exe
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe
"C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1718904340 --steamid=0 --log-file="C:\Users\Admin\AppData\Local\Temp\logs\cef_log.txt" --mojo-platform-channel-handle=2508 --field-trial-handle=1728,i,14730120840470981649,9685529799696179327,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:8
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe
"C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe" --type=renderer --user-agent-product="Valve Steam Client" --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1718904340 --steamid=0 --first-renderer-process --log-file="C:\Users\Admin\AppData\Local\Temp\logs\cef_log.txt" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1728,i,14730120840470981649,9685529799696179327,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:1
C:\Users\Admin\AppData\Local\Temp\bin\gldriverquery.exe
.\bin\gldriverquery.exe
C:\Users\Admin\AppData\Local\Temp\bin\vulkandriverquery64.exe
.\bin\vulkandriverquery64.exe
C:\Users\Admin\AppData\Local\Temp\bin\vulkandriverquery.exe
.\bin\vulkandriverquery.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | media.st.dl.eccdnx.com | udp |
| CN | 61.170.98.100:443 | media.st.dl.eccdnx.com | tcp |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | cdn.steamstatic.com | udp |
| BE | 23.14.90.74:443 | cdn.steamstatic.com | tcp |
| US | 8.8.8.8:53 | r11.o.lencr.org | udp |
| BE | 23.14.90.106:80 | r11.o.lencr.org | tcp |
| US | 8.8.8.8:53 | 74.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 32.25.90.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 106.90.14.23.in-addr.arpa | udp |
| BE | 23.14.90.74:443 | r11.o.lencr.org | tcp |
| BE | 23.14.90.74:443 | r11.o.lencr.org | tcp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 36.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | 80.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | test.steampowered.com | udp |
| US | 8.8.8.8:53 | api.steampowered.com | udp |
| US | 8.8.8.8:53 | my.steamchina.com | udp |
| US | 8.8.8.8:53 | ipv6check-udp.steamserver.net | udp |
| BE | 23.14.90.80:80 | test.steampowered.com | tcp |
| CN | 101.226.183.180:443 | my.steamchina.com | tcp |
| US | 8.8.8.8:53 | ipv6check-http.steamserver.net | udp |
| N/A | 127.0.0.1:52073 | tcp | |
| N/A | 127.0.0.1:52072 | tcp | |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.8.8:53 | dns.google | udp |
| US | 8.8.4.4:443 | dns.google | tcp |
| US | 8.8.4.4:443 | dns.google | tcp |
| US | 8.8.8.8:53 | 4.4.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | 98.58.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.4.4:443 | dns.google | udp |
| GB | 216.58.204.67:443 | tcp | |
| US | 8.8.8.8:53 | 67.204.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | 123.35.104.34.in-addr.arpa | udp |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
Files
C:\Users\Admin\AppData\Local\Temp\R.exe
| MD5 | 8dc3adf1c490211971c1e2325f1424d2 |
| SHA1 | 4eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5 |
| SHA256 | bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c |
| SHA512 | ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d |
C:\Windows\SysWOW64\240612062.txt
| MD5 | 6bcb113c31a2d825b24dacf253e73678 |
| SHA1 | 878f118b448192d995a07b77c93afbf818319dc6 |
| SHA256 | ff421e36470a5aef89dffe030236af2f485d74784c2a623948840a13ae57aab3 |
| SHA512 | 4429ebe871cf64ac879abe4feff43ef4f4b11620a8886c9ae0ffc6ede6a50bed9c9ef09cd60b686708df4e1b598d846d4d9aa8e996422afe17d5c0678016e034 |
C:\Users\Admin\AppData\Local\Temp\N.exe
| MD5 | 4a36a48e58829c22381572b2040b6fe0 |
| SHA1 | f09d30e44ff7e3f20a5de307720f3ad148c6143b |
| SHA256 | 3de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8 |
| SHA512 | 5d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0 |
memory/2108-17-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/2108-19-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/2108-23-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/2108-20-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/1984-29-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/1984-28-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/1984-26-0x0000000010000000-0x00000000101B6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe
| MD5 | 6dd5b507d48f4373a461dce21dd3e211 |
| SHA1 | 2334e279b734ebb56038e49274e418a8fe02b076 |
| SHA256 | 5246c4fa8566a4fba0e2c551fe336f4173e2f29e9e2f7a4445697ba573569c9a |
| SHA512 | 621a03a4fd5b57b5662d950350e6014b1f81abbbcb0eb92bf5358bb41cd57d768d817121f6274b59c3f86f41099e9ccc47778ba7b151e30221b09dcd9763c1fd |
C:\Users\Admin\AppData\Local\Temp\HD_X.dat
| MD5 | c7710663300b940f645bdc9fa9d3eced |
| SHA1 | 50389f5c75ebcf05efc3fa68c717406fd0def908 |
| SHA256 | 2cdb4add0b421dba3fe97acc2d1eac61b7c26940f00191c84d7200c8e992dfce |
| SHA512 | 59e0516c9e94f95a8cc02481b96c60fdd918640e01c8fb88a5c1703b2ee063426a234a7a094b0d7655d6ad84b05df0f89646dcbf097f9f967cfb4425659a8e52 |
memory/2176-50-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/2176-55-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/2176-56-0x0000000010000000-0x00000000101B6000-memory.dmp
C:\Windows\SysWOW64\Remote Data.exe
| MD5 | 889b99c52a60dd49227c5e485a016679 |
| SHA1 | 8fa889e456aa646a4d0a4349977430ce5fa5e2d7 |
| SHA256 | 6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910 |
| SHA512 | 08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641 |
C:\Users\Admin\AppData\Local\Temp\package\tmp\graphics\[email protected]_
| MD5 | 577b7286c7b05cecde9bea0a0d39740e |
| SHA1 | 144d97afe83738177a2dbe43994f14ec11e44b53 |
| SHA256 | 983aa3928f15f5154266be7063a75e1fce87238bbe81a910219dea01d5376824 |
| SHA512 | 8cd55264a6e973bb6683c6f376672b74a263b48b087240df8296735fd7ae6274ee688fdb16d7febad14288a866ea47e78b114c357a9b03471b1e72df053ebcb0 |
C:\Users\Admin\AppData\Local\Temp\package\tmp\graphics\icon_button_news_mousedown.tga_
| MD5 | 00bf35778a90f9dfa68ce0d1a032d9b5 |
| SHA1 | de6a3d102de9a186e1585be14b49390dcb9605d6 |
| SHA256 | cab3a68b64d8bf22c44080f12d7eab5b281102a8761f804224074ab1f6130fe2 |
| SHA512 | 342c9732ef4185dee691c9c8657a56f577f9c90fc43a4330bdc173536750cee1c40af4adac4f47ac5aca6b80ab347ebe2d31d38ea540245b38ab72ee8718a041 |
C:\Users\Admin\AppData\Local\Temp\package\tmp\resource\filter_clean_bulgarian.txt.gz_
| MD5 | 836dd6b25a8902af48cd52738b675e4b |
| SHA1 | 449347c06a872bedf311046bca8d316bfba3830b |
| SHA256 | 6feb83ca306745d634903cf09274b7baf0ac38e43c6b3fab1a608be344c3ef64 |
| SHA512 | 6ab1e4a7fa9da6d33cee104344ba2ccb3e85cd2d013ba3e4c6790fd7fd482c85f5f76e9ae38c5190cdbbe246a48dae775501f7414bec4f6682a05685994e6b80 |
C:\Users\Admin\AppData\Local\Temp\logs\bootstrap_log.txt
| MD5 | 97bfe2791af6683049b6a6305b9b65f7 |
| SHA1 | 148d3f0fd8d87dd2d8ababf6e6eb675f75e82e54 |
| SHA256 | 517b3a2a082915f88812d00f0080ed1e1754d6903fea3271f1332ba0a343a29c |
| SHA512 | eed53b5c98e851f97a5400223ecfb3cba27bbf3b81a9fdca93606f34df82c7565021daefe6fe4665859aa7b8003e665d453ea2fb85a79de1ef29625b6fd150ab |
C:\Users\Admin\AppData\Local\Temp\package\steamchina_win32.manifest
| MD5 | 9d453904a43017b173c75ef7e4b47812 |
| SHA1 | 9e72d479c20c53c60cdbb4368a3e04df4110edf5 |
| SHA256 | 5a06b4abe63c6fd8f5421d090730cbeb96ffb1f0da5669783d64418010ba11f5 |
| SHA512 | acc0ece74bcf2cf43460992af5143646ab6eaea98f6c6ca1b5cf9aced4e53799027128819fbe6e0efc0f1449efd2901cac1dcb305a8be7e71c8b18197d05a163 |
C:\Users\Admin\AppData\Local\Temp\crashhandler.dll
| MD5 | 9734b8f1dbde2e34f012deaad3d0cd54 |
| SHA1 | ab2498ba3976fc5f1b1debf1861a49bb5d31458a |
| SHA256 | b0878682d846a4a3d8b953f237304a43961fda731f063b39c01c95bada04a091 |
| SHA512 | 7deb0cd1192111ae92f2b2c624ba23db4e5821d305b08e9839120a874c83cb2ca6c48bca85ec2b91300dcc0145472dbf54345c6b6457a84fc62ae9f635282f21 |
C:\Users\Admin\AppData\Local\Temp\public\steambootstrapper_schinese.txt
| MD5 | 56dcf7b68f70826262a6ffaffe6b1c49 |
| SHA1 | 12e4272ba0e4eabc610670cdc6941f942da1eb6a |
| SHA256 | 948cad1bb27109e008f2457248880c759d3fa98b92c5b4033b94f455cb8ac43f |
| SHA512 | c3fd9caf0bd4c303a7cc300faada9cfe6dd752e82d67625b31f4c0c2c091596508bb477fe19f758fdf79b25b8ac3f5320a8785d2b6705b9bcc28a054a59454e2 |
C:\Users\Admin\AppData\Local\Temp\package\steamchina_metrics.bin
| MD5 | e0f00c1979bfda7a25803e0e18c07a6d |
| SHA1 | 52dfcdfbd5c7017daa66127a19ad4319a8a17929 |
| SHA256 | d45f13aeb9ea1b303ee7f7e8d50bee3a4fd9e510e7cd48cfeebc69927beb8d45 |
| SHA512 | 8102b5ef34b5f10e397de45c73ad4843aff3860a92ad17e8be34a54a33f10fb88b0271bc62f38ceac192ee55ad65f74d7892bc1a39602ba2621f678991508c78 |
C:\Users\Admin\AppData\Local\Temp\aom.dll
| MD5 | d764264518e77cc546a5876c3bcebad4 |
| SHA1 | ea17d45b396fa193a851bfd345e2b2c20ad60e12 |
| SHA256 | e78492de0ab575add50b925bfd44216d224d09904a9b14c17087a92fdcbc15cd |
| SHA512 | 7cf132ea5254a55c08186ffcf5e47360ef5ddd57d03d7051171f6753b22e3925304d183c2037bfd320ad56c08e079f9b2c4640db8cb3dbd38ff500c7a39e997f |
C:\Users\Admin\AppData\Local\Temp\package\steamchina_win32.installed
| MD5 | 9a8a6dd7ad5ac03e70aca43d66023d42 |
| SHA1 | 25ec3159163e592a614164785ffb091c6ab5f0db |
| SHA256 | 4282a444ecd2f55e0a4b5c9715cfb912d71207c087cee3990f833b9d424867fa |
| SHA512 | 5bb2955f55ce91c5a63717dab14457f93b56381397a0297481b215a47afa0bf52559e26c26feb886bd03ec08bbf9f37306ea069c1ff9c0aa4d0e68d52b39b3bd |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-stdio-l1-1-0.dll
| MD5 | 977d803ac9d935b15fbb8d96f920bf3b |
| SHA1 | 558ae5c0bb4daa27e4e97a0e07a729c379777181 |
| SHA256 | 509e51146b6a3e77b82cb786e17d4d52e398064446c469a45ad0c087ac5df270 |
| SHA512 | 03237327bc1e9534c9d82671938d3f019be7785f8727772d901cf03a3175b0118d6952c32ce49bd2b12160077e997e41ff140b848199bbf24051d5299a6ad74c |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-runtime-l1-1-0.dll
| MD5 | af184e36ef33584a5af2e23ce8d90c91 |
| SHA1 | 5b518eb0bb17d45e5c7e2cb3ae16d5cf981a54ce |
| SHA256 | b350748aa75d4f06e11c228161e1e94019b38aab9f5b59ca84db27acac00442d |
| SHA512 | 4190753f181c24592839bc52427ef65237ee8ed21c58d04dc9d5d4c52f0f9a00bc98443e1608ea665cf0fbf9dbec5b9be7c1d174c687b0ef8c47541605b2bff0 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-process-l1-1-0.dll
| MD5 | 39cd364433575b3811f032005c229e5c |
| SHA1 | 6f8789d3191cd227375395b3d47837cc21d2baa0 |
| SHA256 | 17394645fbccf060d02902c9aa9522626383437c1dd83554e3ac564e50f62716 |
| SHA512 | 0fc2e80f5656624c2bdd7d847a4eba23cff81e47313d97da09ef76e9287ca96cbc60809232417957cd2c3078b87f8da353ba11c62a37df3a2d17369cd8d7ddec |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-private-l1-1-0.dll
| MD5 | 9a786144e410dfa13579eb73a375d918 |
| SHA1 | 811d783ea1d4b799e6ad51ec5720fa9e9b60f158 |
| SHA256 | c9dd515e999f64af123f396d3deddc49012011060c843e5edb4223345143b0c5 |
| SHA512 | 3877ebbfc62ea741f77ac1ef04e969855af17ccaa2e3df9a18895b794ac6a3dc2bb4ebb8b46aae5cfc5bc032741f3dcb8a6df8631bf169ef7457b13c8b277620 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-multibyte-l1-1-0.dll
| MD5 | d099dba2a0c6e5a6e53bd09c4d09a23d |
| SHA1 | e925991619eefffbef71fef5374cb4f29c0c046f |
| SHA256 | 3b6f668eaa9efcdb8b36d57747666fe76aa4f3b7873ae83bece0099f105bc145 |
| SHA512 | 0c73c00a134895bbc563676f9314ab2190fed2db9b02d5c9500b0f735dcd37b46c262920550eb6959324499dc9d0337fde731e1221f8d1185023737401d51745 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-math-l1-1-0.dll
| MD5 | 8f8dbf4eafbef6a3c488bfca1529e06d |
| SHA1 | a8c916c20326aa6960e46608daaa39fe09fa8138 |
| SHA256 | f1d44a0a83fa84f5fc9a05008f57174930d42db834ddadb3e9df7650042961fc |
| SHA512 | ebcff256e4f9a6035a02b05dd6ba6d1c652151d76a5b553495925b692496c18663677dbf39a7d7827af9d13cdb81c4064d9e21b0fc0123a65e0432736192c3e4 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-locale-l1-1-0.dll
| MD5 | 74add032773802678bbfec4d07c2f95a |
| SHA1 | f30cd5da7d9768696d0d57cde1ba7141804ffb0d |
| SHA256 | f55be8b606d5715e54cb795b822aa295c4e0e92170359fedf0f72c1fe07057f1 |
| SHA512 | 7f2e74a2d158588aff68ea5a23237f5a08d75ee1dfc72c2b8ba4c1a172cfa826eb71ed3dafe524dc6ca4eb4d96e2d1fffc6a39e85caff5aeb3925af761623da9 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-heap-l1-1-0.dll
| MD5 | 295a7f69076e8e789860bb3d566caa0c |
| SHA1 | 4d7ee1025ac08ce85f95c620949f9af9a0b8ad3d |
| SHA256 | 516dc0852025a741cf5cfc6be3e4ad791d4a5aa692fa35498ba7b5f146d54a1e |
| SHA512 | 959d1171c77a0c7267d69737c781c0e66cd9f513a6267e8e5c986677aaec4facae8e024bdd0a3a6ed4905df116e5d80f706d51da0a3cf26cafda2b13bcd86c14 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-filesystem-l1-1-0.dll
| MD5 | d2b88081e89aa26e825b04c15ed158e4 |
| SHA1 | 3d6073d8ca42ef7fd671856cbe7eec20bd78da23 |
| SHA256 | 9da16f7fb466e63a5ccc24eb7ee95a80ed4216e925545a59fd6fb5d7236211f3 |
| SHA512 | 4544ee07592758723947b039e7f4712c0658ef40942355e3424838aab6382c110366c9013cbd042a605bfca73b6535cedcd146db8a6e850bdb5a50f4132135a5 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-environment-l1-1-0.dll
| MD5 | c1da1a8ee38c89a989b8a892edf48099 |
| SHA1 | 0a65c36944a2c2e210d96ca394f5065dae34f665 |
| SHA256 | f2d19e04a9fe1a382fe5c492501236a0cadc9f106036af8496a8f24457a3feb2 |
| SHA512 | 085acf718846bed78e73908481aa61b3bc64ff8dd7117baa556a535b5f32d304a2f6d20cae06b0c43ecb5c934bcff4758095a0638aac428a98036e91d3047908 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-convert-l1-1-0.dll
| MD5 | 75f7dd0261c0a7e89abe0971a6f7fad1 |
| SHA1 | a657010c0896034178caac01093430a9b550745b |
| SHA256 | d8f04afab237a0177bc3062c6508c57f884c23013985d3c48af26b7c25028949 |
| SHA512 | 07960af507910ed1366feb86487b3eb0d942f638eaeba85e1fb1bcf1dba09359c95ca93488cde969259b7e0b78df8a418e62848f49f40d3cceb8cd5f52bd5760 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-crt-conio-l1-1-0.dll
| MD5 | 09a4172deab1aab62c3eabfe126b2cd1 |
| SHA1 | 5ecfb94c505258be83a471a22979f7f85960bb02 |
| SHA256 | 56fb8c7b7d12814ab0f5fc2eb69dfe98c3e9d00dc554a5e00f2ffdf9fc8728d8 |
| SHA512 | e31adafece4e16a76e1cb54d92d82edf441e5c5e3a9c8c68d63bda6f9014705b3a9eee4502bb492b09e3384029878ebb28b82e5c9caf95f8fcae8347aba6dadf |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-util-l1-1-0.dll
| MD5 | 27262395d098572d6babe49373d357cf |
| SHA1 | b6c3bcecc99ad8d03a4b8672422a5aa5199eb297 |
| SHA256 | 8b2197d96a4a01465e0062d5854a940232734123536ebd3c4f4116efae772688 |
| SHA512 | 42e1b4ae70cd97a50b6459ba0f9375de0e1586930c8b9cc12884794de1da905fc7d766811785a98f81f13dc77cf8ba6aaa5ad8592cab4a5b873df9027fbccc82 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-timezone-l1-1-0.dll
| MD5 | b4bfb5cd23ca6f9ef9dfd43f70e8bba7 |
| SHA1 | 2ad09fc7c204d74b4c3c67710a72e10b699d7345 |
| SHA256 | e3d05dd8f99995cb289b3f86eaaadd99a0b1ca2e12f0a0db22feec335a938111 |
| SHA512 | 023d892f449f578c68074a77b46f7fabc4688a276fb0ced6b1eb6c91037f296776e2ddfd81e71c4f8976285b2e1d5d35bad2fe0ee93ff661b78d45fd34cdf476 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-sysinfo-l1-1-0.dll
| MD5 | d2716cd25fd6ac67580982c8efb5629a |
| SHA1 | 199c6b5208331881e9425904e345feaf1af45b82 |
| SHA256 | 329149e3a2360b9e4231ebae9fc3c467d3c560195fc3bc5d2fd31c6a5fd65da5 |
| SHA512 | cfca74a6b909bb7d1e20487c4c3bb8e20e9970b49b14fe9d693c5b75fc4b83d8dcfa4ac085fc8db4ed76382266c934939b4e41a70d4ec5308fd8c7f065ccd95a |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-synch-l1-2-0.dll
| MD5 | 747bedc394cb41b6a0e1b94b6ea8693e |
| SHA1 | e6388ae7dcd0df0396e6cfabe65be85789bf72db |
| SHA256 | ac30c50dc71795c7e0419389f15bf7676718e23f4b786da2ccd4103f24198656 |
| SHA512 | 15814d5a904fd9d8fba2eb451b27c0f15d892afe98edca36e3adf55fd2df5d516012eb104035aaff0885c5dacc784c44a1f2df3f8a59324483bcb86c8b213bf0 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-synch-l1-1-0.dll
| MD5 | 94eb94712d2eca213b446f17c62380f3 |
| SHA1 | 90a32ddb5c5c3e8757670ebc75ffc237de12f2bc |
| SHA256 | 902ae18339560e5142c87f97e9574864b518a0ca4572298b418acadecd8ac6ad |
| SHA512 | a9d68a3f68532f8b3e698ad6aa7303ad9c5fb838bd61444f415e20537c76f463d849d3b458f5fdd8f133e46083a3dff93ec6bf48d77495beea27ce342b1f84dc |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-string-l1-1-0.dll
| MD5 | 6e55ff194d5bc03a8ebe89c7b237e10e |
| SHA1 | fec152c0e14bdcee73ce234be9b5bb1608b85fd1 |
| SHA256 | 9f3a2d40be41b0c47fb03df21c4f7e4120cbb348553b642c5c80b92c64b3b357 |
| SHA512 | 18d8353f171a34e29674dcbff59f4db7e74857c3bb2155215d4179c7c94be7d85d43552f256b002d0e72fcfc3f9d9c4999ae83bf4599c4e68c808419e1618d8a |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-rtlsupport-l1-1-0.dll
| MD5 | 189af34aa567cd8ca0d18c1dededd39a |
| SHA1 | 0f6d013f294b267a0aa082ec3d422cf7eec2ba96 |
| SHA256 | bb2576e861a0c507db9ab2a29577803d7258eff03e52dc5f36faa51249c892d2 |
| SHA512 | e294e462cde5f099f2b3b6ac14b3771ada2ca1ec26ef485712698a98e5f4c4298a4ffed2e8cb99dfb096adf48e368ef50f30d7a5652a67fa16b250c7653d8580 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-profile-l1-1-0.dll
| MD5 | 724d2fe0b0268b30e7db9a7488f2b306 |
| SHA1 | 6cccc9bab72e205f18bb5485619dd3ccfe58202e |
| SHA256 | 074a6052a889456895d4eb8d592088b1d3858d3f6cecb884c528e74400710079 |
| SHA512 | 37e6f1ddb7d57aea23da10d13a3690740babbd3634d2966a3377c59248e75982a7fe2ed5197c1ba97d7d77906235c87d78067a3430c6d45dc8a4e5fa4d7e6409 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-processthreads-l1-1-1.dll
| MD5 | 2da80fbfb025423ba529e0ed5d396caa |
| SHA1 | 94eddff83c93411c0fb48101177b238f2cbabdb6 |
| SHA256 | a074cc02be4cfa314ddd7223c288b1a71fe74143c3229c7cd30fb309419d7aa6 |
| SHA512 | c23e38776c826f1f2c9bec5ba2b0fd0366d1afdb06b805749814472a362f0fffaa5231bd678af17ecd7640333c5af4f2607d976521f649053ea3d24c8e7e9c9d |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-processthreads-l1-1-0.dll
| MD5 | fbb8d74d5ca41920f285ed9d4634d501 |
| SHA1 | b1157ff444075b76bc3533b036793bda4afd96e4 |
| SHA256 | 7748f69d1f67fb4afa2ebb9712687d0b9235346d35909fee80dd5cb776ce7638 |
| SHA512 | a7d6ca4666eeedc5c4bb3db07919c4d08efa67638d0cbde7cbaaa5f40a59f2c61745fc129e882d47a39a561ea78aa7ff309286921945d940ef26d121bc865cf1 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-processenvironment-l1-1-0.dll
| MD5 | 3d9d3eaad4d1f94fd099877e3c3574ee |
| SHA1 | 3dc985619b35e8d8bda17bbffe3fb9d73c697998 |
| SHA256 | 0986c9945e4db6c7e5bf42556f28ae54afafe5d991573590bffb9c494deaebdb |
| SHA512 | 5fa46bbd7eb1df2f5c233c70f5a4adc316b24e1de7e91c608d52f537a1ffa6d5cc8b1b4c6b4880b33acefb8236d7676ef50527b737ac23be968e5bdbdcd2f368 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-namedpipe-l1-1-0.dll
| MD5 | 38949794f4b5ed88fc604583ae0c9b1a |
| SHA1 | ffe2baaa0dcf56b56a726e314795e70d23149fe5 |
| SHA256 | 2dcec9017298d32b92223c0b9125ecf15cf330973414b3e181a9dbbbd74145d4 |
| SHA512 | 001f460d03b71f52cda97f5305b15c5fc40c1abe8c6deb429ecbd15d06a4ed26f7bc8cc491629cea14492cf13e22c1817312978b6095ee06b1592004a361818f |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-memory-l1-1-0.dll
| MD5 | c5c07cce6b571f4d566fbb2dfcfb009f |
| SHA1 | 4379f23072f145b3c31631faebba76321713e454 |
| SHA256 | dfcea447a3436a3b36287becb215633e73760de7d1df88dd24ce0f998aadf597 |
| SHA512 | d7d53c04459d373659056ed8535982ad6c558cac6239e9fef51074e8479b8777eb2dbdbf63678868f5902b6414a446b46d9d9acb9d70f3bd3dba5cba9512d982 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-localization-l1-2-0.dll
| MD5 | b20db974fdaf13d7a6c518c8cc4d124e |
| SHA1 | 3939b029019a583c3a65ae0e3bc2926f0889cc11 |
| SHA256 | c7253d57e123911ca6a0cdc8c74f103fc048399224393e97bf5a2a993cc13fdc |
| SHA512 | 5dde8bc5f30b69c98eec6d4d279bf1b1747ae119b8ddf8e96515d503c7937154e74bb88d7a01ebcb2b15b0f3fc2e74344c8f0df7add45af944028e3b3cba8245 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-libraryloader-l1-1-0.dll
| MD5 | f51c295b1f6d6845be84a53ac650e0bc |
| SHA1 | edf0d80ea2c7de134af5d1da1f07f7cd33d9d972 |
| SHA256 | 6d85722c07e91050b89692e647c8c9c6fec8c39a998286e0084a4a20619d956e |
| SHA512 | f84224a40bf12cc61ee47607fb3d367135205d7f26667de6ac930e7fda064d8322c0279fe2d67da92d8e017b9ede8a14ff26c050c35347112052e9fa840c5c3e |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-interlocked-l1-1-0.dll
| MD5 | 64350026ead6e66e58759314ab2b2c8d |
| SHA1 | e81696c0cdd81af0af47c696806e745283538c94 |
| SHA256 | f30dff7c389fc5143475a99945eaf9f2e36f2f50709e256c990b10459e32b8be |
| SHA512 | 6f55429adaa2107680c9d67a15b8094346b5bf295603ec7b2cbde7698d1e1f18436b6b2303b08b83f0177c77f877a33c16cd88cad13681616c0f9c3d751eb7bc |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-heap-l1-1-0.dll
| MD5 | 1b292e0f2b2d1a67d2032b5414c280a7 |
| SHA1 | 3f42ab6ad2c6fc52d11d677c1287c58bee3d0a37 |
| SHA256 | 60fa39cc05a21ce16a8651331445da1dd0e5e6c0194de819b4fa6a245f517396 |
| SHA512 | b9f6da412491d9919cb8a33483147c608d30cfa9651f326aceb96c85cf5163dd85a434ed8421cbe9a6d355df650564252cbae46a4b340459bb3d30f616e244ed |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-handle-l1-1-0.dll
| MD5 | a6c34ff1ecc9abc954922c5e569d7912 |
| SHA1 | 910709fc703f559d37ea6d7d75ee13b62cbb4290 |
| SHA256 | b71658e60bfa69f0bbcafbc8df40b118e9fc5df747e2069db0ac18b66aaab818 |
| SHA512 | c0612a7cfe143c22d9945e287a4be0378b808e974a845ba762bbff028080eb6149bf5451d1f7aa0c2cea74499b82007dc730ad51b0b2db4b0f8fc11c03f8e20d |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-file-l2-1-0.dll
| MD5 | b3a3f902a5fe7b70c988aebd0e523d53 |
| SHA1 | 6fb07024c76cd0c4e07c3d0efa088b74998d59b1 |
| SHA256 | 61365671b9fccbc10c06ccc0d4c8875dd98ca51e8d3eb77e91069b1bd11e4a96 |
| SHA512 | 3bc057781870932f9703561bed8f786af9306a6a237582551edd12220e95521b8433a507ce702fa929654e930d0cba976eb0fc72fbe567d44620232e18390ce9 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-file-l1-2-0.dll
| MD5 | 2bfcd1d1b70eef1a10c939a4eeab5403 |
| SHA1 | 12656ee086124eaf205a9eb470a78bc5e3d2512e |
| SHA256 | b0919c80eb88d5d6aeb7a6eb42344f40ebf6bf0914a45045d9606e2469f15132 |
| SHA512 | 9143ffd7e00f4168f78f72e9e08e6a901ffc57a1bdc07531d73f0d4fc59ae2a114d939bf2a60313ac34aa835e6c297168f255685cbd795c748fe9c8906d2215c |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-file-l1-1-0.dll
| MD5 | d218fcedc1bee50c45f4e786c6d60564 |
| SHA1 | c4371579afbfae000e5b9a0ce07472be17badc9f |
| SHA256 | 13266c9674e9c663252ff2dc1a014a86cbaa42801d210f408269bd1dff681440 |
| SHA512 | efc30d116515ee000084db671a4c2d68551035b5512e7117c3c53d6ceb2b0418ee2ccdb5f76fa267be48e37d21a950e20423f95fc4e1c4d2c9e5fb47b692c882 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-fibers-l1-1-0.dll
| MD5 | b72dcda47e269f98aa6998df1b27b3e5 |
| SHA1 | 8a68318787497d2ed4ee6d981de825c874bcb603 |
| SHA256 | b9aefe9709a17fcaf8b85168c68f42e2b57f8214e7456a82c74495b815dc5bfe |
| SHA512 | 17b00481db67db8bf8f07035c760eb7adff65d59c532711d918bb1f2bbdbb6230cd0c583f3418102b80b6a085d45d3e3efe9a641e7dfa821c8a18505e9bb1420 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-errorhandling-l1-1-0.dll
| MD5 | 649e3b7d4b114213383aebd2dda0308d |
| SHA1 | ba1ba5acb362cbab817c5e1a3126d6ebf600740b |
| SHA256 | b15dd0c332b261d62a0b37b8981980a15e47b4682e6985e26f155a85f19e1466 |
| SHA512 | e667462ba457d44982337edda451a5d78eb4b6eab2e6a696ca333bdcd6688873e2c50b45e464e333ecf9f5b07dc35412bc746ff187b99e8139f9b8ef0456849c |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-debug-l1-1-0.dll
| MD5 | df9e90a38a99d1f609ba721a3d329195 |
| SHA1 | ad8859c5ec7f591800c0d4b6453eb10167ae142d |
| SHA256 | ba17d3a66e3df85fbf8b82b500f1360f8598cd48a814fda3e552cdd995e6f449 |
| SHA512 | e41ba10d2c679754627c348232bd8124a01eceedfe30c88b6f7ed257895a7b59e5149d448a68415c4d2cc1a5c2c32a575f032b764a14a2330d62f08ccb87de85 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-datetime-l1-1-0.dll
| MD5 | e763390e8aebf15cb2b9b5b8c9cc4e9e |
| SHA1 | 0f9f6544903700fa26c8892ff7e4881c56238282 |
| SHA256 | 5963b1cdb894ce297e52844741047f74f8d86fa7e97437e26d9bc8f0094e1003 |
| SHA512 | 4c8089029c0d97ef1a1570dc47a8eda08f2071332521cdb54b5b52786d078c19bf0324fa43b9d1c49b942f8eedf7a6dab606b25a3913a80f6c8d7bb97d28a768 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-console-l1-2-0.dll
| MD5 | f9bf7d30ea5a945b77910a06151ff620 |
| SHA1 | 3158c9ab3fd9b6fed40e77abe39eb53234151977 |
| SHA256 | b4ff5467266a4f8e5d8998525a8948b8b86d51a23c2f4f7023c505c8db341802 |
| SHA512 | 07e01ebde7c80fa3937f2169da9dc496f0a5efbbbc9c305e7772e28e334906054c14747fe10cca0ac1f1f275d95a08801ae7c44ca1cbddae1c1e008bf428d1a4 |
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\api-ms-win-core-console-l1-1-0.dll
| MD5 | 4cbad862a3ff6e7ac0f33a904d247536 |
| SHA1 | 57ed831d8f3739aee41735fce679641862c36076 |
| SHA256 | 32a70082cf3496745580c0e4b7d1bdbe925013300f0573ccef466e7a1915a51c |
| SHA512 | 355e5f5081588c2460b6c21818172eea17b18f6d94a958902db57a585409c8a2231a2666bc12548316a041bfce8a2eeeef2e4759a9e38900550b6a7c96d7ed2a |
C:\Users\Admin\AppData\Local\Temp\bin\audio.dll
| MD5 | 1f2d6a54ee20a1fc3e421f4617e11fee |
| SHA1 | 8faacf81b34ff7eb54c70520a15b53954ad27565 |
| SHA256 | 8683b6868f2fa1f29aa4d800a11b8cf628cda3b3651575c147b1e51e89a19309 |
| SHA512 | 4f52fa530755fd3dc775861f880729e9ca9a892408707e816d89f25f1ec03b17779945b3ebda228ca83a320c167523a9801afdcb526420b314df6861b9f97f06 |
C:\Users\Admin\AppData\Local\Temp\avif-16.dll
| MD5 | a09c5fa842fa4456a0b53b46f1050225 |
| SHA1 | 9e4677f19e77bf55e7d0e2e82d8c27f79dbbd78e |
| SHA256 | 3d7ba6fedfdfd6e751693d718a21438304690b754d1c5d13c847a829b2423b8b |
| SHA512 | 71c962da6ed6894209891513bf9f0132a5eab6c65a5d9ba334efcaf73463be5625665a060863a106d59fad1949f6191f641aa4c59ddb0e825701bef08ef9b5a5 |
memory/7288-11352-0x00007FFAA1B10000-0x00007FFAA1B11000-memory.dmp
memory/7288-11353-0x00007FFAA2D60000-0x00007FFAA2D61000-memory.dmp
C:\Users\Admin\AppData\Local\Steam\htmlcache\Session Storage\MANIFEST-000001
| MD5 | 5af87dfd673ba2115e2fcf5cfdb727ab |
| SHA1 | d5b5bbf396dc291274584ef71f444f420b6056f1 |
| SHA256 | f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4 |
| SHA512 | de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b |
C:\Users\Admin\AppData\Local\Steam\htmlcache\Local Storage\leveldb\000001.dbtmp
| MD5 | 46295cac801e5d4857d09837238a6394 |
| SHA1 | 44e0fa1b517dbf802b18faf0785eeea6ac51594b |
| SHA256 | 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443 |
| SHA512 | 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23 |
memory/6596-11399-0x000000006F5B0000-0x0000000070929000-memory.dmp
memory/7288-11406-0x000001C0DAA40000-0x000001C0DB17F000-memory.dmp
memory/7340-11407-0x000001FC37560000-0x000001FC37C9F000-memory.dmp
memory/6596-11412-0x000000006F5B0000-0x0000000070929000-memory.dmp
C:\Users\Admin\AppData\Local\Steam\htmlcache\Code Cache\js\index-dir\the-real-index
| MD5 | 1ae8c9fade8af1fe769a8c006899cb85 |
| SHA1 | 3dc10f5bac66df5a0734fe8359caca772c586126 |
| SHA256 | 7781bb819f8a560549670ec2f46f6b0832173e0c7981126f8c0b8bf71ddbcd65 |
| SHA512 | ecc43c9c7fda35678811e45b51eaf28134ff79992daf8c22a2a01bb4f1297611f560043cc61d86db7990900286dae000f9c630d37e3766295d17e3e3068f3c2e |
C:\Users\Admin\AppData\Local\Steam\htmlcache\Code Cache\js\index-dir\the-real-index~RFe58cdda.TMP
| MD5 | 34f2227e476c3903a9f3d756a0db0361 |
| SHA1 | 6b8be831f1ddb53bf2a889c8919d7234413c3f9c |
| SHA256 | b682031b1bca7f0e37b1fb2258e63cc7bdb86e8c1a1e2c2684ee1e1f86314374 |
| SHA512 | 152f3e4e1902d4e42b8cd98305e00b76dca30ccf85850c74218175ef9601de2f8a6ecf6f4bd33b4b7bcc31c9eb3a16fdf0769f087e4281f779e671f61213d240 |
memory/6596-11424-0x000000006F5B0000-0x0000000070929000-memory.dmp
memory/6596-11429-0x000000006F5B0000-0x0000000070929000-memory.dmp
memory/6596-11432-0x000000006F5B0000-0x0000000070929000-memory.dmp
memory/6596-11438-0x000000006F5B0000-0x0000000070929000-memory.dmp
memory/6596-11441-0x000000006F5B0000-0x0000000070929000-memory.dmp
C:\Users\Admin\AppData\Local\Steam\htmlcache\LocalPrefs.json
| MD5 | ba13c35530687ea9ad7eb5553a841cd0 |
| SHA1 | cc01c5eda1aa1828adbe59352eb6b55163fd01a0 |
| SHA256 | b62be29a7eec9b68c84ac0124d838d9afd4cead07cacf8641ead778b243179d8 |
| SHA512 | c4dbe0be9f499be9a98a4348235d9809a356a7417454f40b6d488e612ecb848a06dc7edf2cd0e0fc02c6ab3ece4c15b731e0741410cc0ae50b3666287868aefb |
C:\Users\Admin\AppData\Local\Steam\htmlcache\LocalPrefs.json~RFe5988be.TMP
| MD5 | f9db61c2d00669df9b278d3805581dfc |
| SHA1 | 3d9a623f07222d016724f469597dcead02c23d46 |
| SHA256 | 14565cbd003d02445a823d44068caf18343ca36d42350dab4ec8872ca1de2be8 |
| SHA512 | 4a17d5b9d4259a028b33b74b670f7bd5e26c2b4e42aa429d1138ec65d04ec8155a0eef283e08de82e7df3b391121159aebf268189571f55ae472a9be19d1bfff |
C:\Users\Admin\AppData\Local\Steam\htmlcache\Network\Network Persistent State
| MD5 | a987393f4b76d1220906e0758fcdb3bc |
| SHA1 | b41708f48c90432fd8bf673ee24810cfbcbf8a6e |
| SHA256 | f5f5bea8ef404cebb5f27d7b38320ccdc018a3d3057deff36326fd2657ed9eeb |
| SHA512 | 640bdf656e47f48caccd6fd042c4f116e0b202866fa55d501c47df96510adb51c9190761fda7d344890ce2daae2e6a8e34160419ebc97856d18a76e72f4c647a |
C:\Users\Admin\AppData\Local\Steam\htmlcache\Network\Network Persistent State~RFe599c75.TMP
| MD5 | 2800881c775077e1c4b6e06bf4676de4 |
| SHA1 | 2873631068c8b3b9495638c865915be822442c8b |
| SHA256 | 226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974 |
| SHA512 | e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b |
memory/6596-11464-0x000000006F5B0000-0x0000000070929000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-25 17:05
Reported
2024-06-25 17:08
Platform
win7-20240419-en
Max time kernel
150s
Max time network
120s
Command Line
Signatures
Detect PurpleFox Rootkit
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Gh0st RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Gh0strat
PurpleFox
Drops file in Drivers directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\system32\drivers\QAssist.sys | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
Server Software Component: Terminal Services DLL
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\259397900.txt" | C:\Users\Admin\AppData\Local\Temp\R.exe | N/A |
Sets service image path in registry
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\R.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\N.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\Remote Data.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\R.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\svchost.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\Remote Data.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\259397900.txt | C:\Users\Admin\AppData\Local\Temp\R.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\ini.ini | C:\Users\Admin\AppData\Local\Temp\R.exe | N/A |
| File created | C:\Windows\SysWOW64\Remote Data.exe | C:\Windows\SysWOW64\svchost.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\Remote Data.exe | C:\Windows\SysWOW64\svchost.exe | N/A |
| File created | C:\Windows\SysWOW64\TXPlatfor.exe | C:\Users\Admin\AppData\Local\Temp\N.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\TXPlatfor.exe | C:\Users\Admin\AppData\Local\Temp\N.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
Modifies system certificate store
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 | C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
Runs ping.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\PING.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\N.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
| Token: 33 | N/A | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
| Token: 33 | N/A | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\SysWOW64\TXPlatfor.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe
"C:\Users\Admin\AppData\Local\Temp\ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe"
C:\Users\Admin\AppData\Local\Temp\R.exe
C:\Users\Admin\AppData\Local\Temp\\R.exe
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe -k "Remote Data"
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe -k "Remote Data"
C:\Users\Admin\AppData\Local\Temp\N.exe
C:\Users\Admin\AppData\Local\Temp\\N.exe
C:\Windows\SysWOW64\TXPlatfor.exe
C:\Windows\SysWOW64\TXPlatfor.exe -auto
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul
C:\Windows\SysWOW64\TXPlatfor.exe
C:\Windows\SysWOW64\TXPlatfor.exe -acsi
C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe
C:\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe
C:\Windows\SysWOW64\PING.EXE
ping -n 2 127.0.0.1
C:\Windows\SysWOW64\Remote Data.exe
"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\259397900.txt",MainThread
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | hackerinvasion.f3322.net | udp |
| US | 8.8.8.8:53 | media.st.dl.eccdnx.com | udp |
| CN | 61.170.98.67:443 | media.st.dl.eccdnx.com | tcp |
| US | 8.8.8.8:53 | cdn.steamstatic.com | udp |
| BE | 23.14.90.81:443 | cdn.steamstatic.com | tcp |
| US | 8.8.8.8:53 | r11.o.lencr.org | udp |
| BE | 23.14.90.74:80 | r11.o.lencr.org | tcp |
| BE | 23.14.90.81:443 | cdn.steamstatic.com | tcp |
| BE | 23.14.90.81:443 | cdn.steamstatic.com | tcp |
| US | 8.8.8.8:53 | cdn.steamstatic.com | udp |
Files
\Users\Admin\AppData\Local\Temp\R.exe
| MD5 | 8dc3adf1c490211971c1e2325f1424d2 |
| SHA1 | 4eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5 |
| SHA256 | bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c |
| SHA512 | ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d |
\Windows\SysWOW64\259397900.txt
| MD5 | 6bcb113c31a2d825b24dacf253e73678 |
| SHA1 | 878f118b448192d995a07b77c93afbf818319dc6 |
| SHA256 | ff421e36470a5aef89dffe030236af2f485d74784c2a623948840a13ae57aab3 |
| SHA512 | 4429ebe871cf64ac879abe4feff43ef4f4b11620a8886c9ae0ffc6ede6a50bed9c9ef09cd60b686708df4e1b598d846d4d9aa8e996422afe17d5c0678016e034 |
\Users\Admin\AppData\Local\Temp\N.exe
| MD5 | 4a36a48e58829c22381572b2040b6fe0 |
| SHA1 | f09d30e44ff7e3f20a5de307720f3ad148c6143b |
| SHA256 | 3de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8 |
| SHA512 | 5d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0 |
memory/2780-18-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/2780-21-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/2780-20-0x0000000010000000-0x00000000101B6000-memory.dmp
\Users\Admin\AppData\Local\Temp\HD_ef7d7782e384a5d106ca3f989539260f24b27f23ef737472b96414a6ad0855af.exe
| MD5 | 6dd5b507d48f4373a461dce21dd3e211 |
| SHA1 | 2334e279b734ebb56038e49274e418a8fe02b076 |
| SHA256 | 5246c4fa8566a4fba0e2c551fe336f4173e2f29e9e2f7a4445697ba573569c9a |
| SHA512 | 621a03a4fd5b57b5662d950350e6014b1f81abbbcb0eb92bf5358bb41cd57d768d817121f6274b59c3f86f41099e9ccc47778ba7b151e30221b09dcd9763c1fd |
memory/2840-43-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/2840-47-0x0000000010000000-0x00000000101B6000-memory.dmp
memory/2840-48-0x0000000010000000-0x00000000101B6000-memory.dmp
\Windows\SysWOW64\Remote Data.exe
| MD5 | 51138beea3e2c21ec44d0932c71762a8 |
| SHA1 | 8939cf35447b22dd2c6e6f443446acc1bf986d58 |
| SHA256 | 5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124 |
| SHA512 | 794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d |
C:\Users\Admin\AppData\Local\Temp\HD_X.dat
| MD5 | c7710663300b940f645bdc9fa9d3eced |
| SHA1 | 50389f5c75ebcf05efc3fa68c717406fd0def908 |
| SHA256 | 2cdb4add0b421dba3fe97acc2d1eac61b7c26940f00191c84d7200c8e992dfce |
| SHA512 | 59e0516c9e94f95a8cc02481b96c60fdd918640e01c8fb88a5c1703b2ee063426a234a7a094b0d7655d6ad84b05df0f89646dcbf097f9f967cfb4425659a8e52 |