Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/07/2024, 22:59 UTC

240703-2yn7wszhlp 10

03/07/2024, 16:13 UTC

240703-tn93lsyglf 10

03/07/2024, 16:11 UTC

240703-tm84xsyfma 10

10/05/2024, 16:25 UTC

240510-tw1h5shh47 10

24/08/2023, 11:16 UTC

230824-nda8msdf8z 10

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 22:59 UTC

General

  • Target

    42f972925508a82236e8533567487761.exe

  • Size

    3.7MB

  • MD5

    9d2a888ca79e1ff3820882ea1d88d574

  • SHA1

    112c38d80bf2c0d48256249bbabe906b834b1f66

  • SHA256

    8b5b38085f12d51393ed5a481a554074d3c482d53ecd917f2f5dffdf3d2ee138

  • SHA512

    17a9f74ecf9f118ed0252fa0bc6ce0f9758a4dc75f238cae304def9c37cd94623818dd4aef38826642ff9e549b7e6047318f8bf6de7edff2d61a298d0bf5c840

  • SSDEEP

    98304:Nn1CVf+y/EFc7DvOUxlpq2JdnQ+O2M7hlXKUmkbtT2TMI:A/EqaUFqItO2M7PXKUmkbtT2T

Malware Config

Extracted

Family

warzonerat

C2

sandyclark255.hopto.org:5200

Extracted

Family

babylonrat

C2

sandyclark255.hopto.org

Extracted

Family

asyncrat

Version

0.5.6A

C2

sandyclark255.hopto.org:6606

sandyclark255.hopto.org:8808

sandyclark255.hopto.org:7707

Mutex

adweqsds56332

Attributes
  • delay

    5

  • install

    true

  • install_file

    prndrvest.exe

  • install_folder

    %AppData%

aes.plain
1
DStgwPf5qCYAcWWcPg3CaZBkDbYF3HQo

Extracted

Family

darkcomet

Botnet

2020NOV1

C2

sandyclark255.hopto.org:35887

Mutex

DC_MUTEX-6XT818D

Attributes
  • InstallPath

    excelsl.exe

  • gencode

    n7asq0Dbu7D2

  • install

    true

  • offline_keylogger

    true

  • password

    hhhhhh

  • persistence

    true

  • reg_key

    office

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Async RAT payload 1 IoCs
  • Warzone RAT payload 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 20 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 5 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42f972925508a82236e8533567487761.exe
    "C:\Users\Admin\AppData\Local\Temp\42f972925508a82236e8533567487761.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\PsGjFAxomTZjPqNX.exe
      "C:\Users\Admin\AppData\Local\Temp\PsGjFAxomTZjPqNX.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2312
      • C:\Windows\svehosts.exe
        "C:\Windows\svehosts.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:1484
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Windows\svehosts.exe" "svehosts.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:4696
    • C:\Users\Admin\AppData\Local\Temp\Vz2OXxsU0BghW3Y5.exe
      "C:\Users\Admin\AppData\Local\Temp\Vz2OXxsU0BghW3Y5.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3172
      • C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe
        "C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1564
        • C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe
          "C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe" 1564
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2972
          • C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe
            "C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe"
            5⤵
            • Executes dropped EXE
            PID:1912
          • C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe
            "C:\Users\Admin\AppData\Local\Temp\RJCisDErBR6WU7D5\svbhost.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4064
    • C:\Users\Admin\AppData\Local\Temp\3ntQl2w4pVJOpWSS.exe
      "C:\Users\Admin\AppData\Local\Temp\3ntQl2w4pVJOpWSS.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3632
      • C:\Users\Admin\AppData\Local\Temp\heCYMLXIPI2fpGWa\svuhost.exe
        "C:\Users\Admin\AppData\Local\Temp\heCYMLXIPI2fpGWa\svuhost.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Drops file in Drivers directory
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3880
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
            PID:4376
          • C:\Users\Admin\Documents\excelsl.exe
            "C:\Users\Admin\Documents\excelsl.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1596
            • C:\Users\Admin\AppData\Local\Temp\heCYMLXIPI2fpGWa\svuhost.exe
              "C:\Users\Admin\AppData\Local\Temp\heCYMLXIPI2fpGWa\svuhost.exe"
              5⤵
              • Executes dropped EXE
              PID:1880
            • C:\Users\Admin\AppData\Local\Temp\heCYMLXIPI2fpGWa\svuhost.exe
              "C:\Users\Admin\AppData\Local\Temp\heCYMLXIPI2fpGWa\svuhost.exe"
              5⤵
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:3952
              • C:\Windows\SysWOW64\notepad.exe
                notepad
                6⤵
                  PID:3784
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 1152
                5⤵
                • Program crash
                PID:4124
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 1148
            3⤵
            • Program crash
            PID:1932
        • C:\Users\Admin\AppData\Local\Temp\cakSy6zedqv48yMn.exe
          "C:\Users\Admin\AppData\Local\Temp\cakSy6zedqv48yMn.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1240
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'prndrvest"' /tr "'C:\Users\Admin\AppData\Roaming\prndrvest.exe"'
            3⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2856
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp16FE.tmp.bat""
            3⤵
              PID:2272
              • C:\Windows\SysWOW64\timeout.exe
                timeout 3
                4⤵
                • Delays execution with timeout.exe
                PID:2508
              • C:\Users\Admin\AppData\Roaming\prndrvest.exe
                "C:\Users\Admin\AppData\Roaming\prndrvest.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:1412
          • C:\Users\Admin\AppData\Local\Temp\MTH6CHwmIbOylYwW.exe
            "C:\Users\Admin\AppData\Local\Temp\MTH6CHwmIbOylYwW.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3644
            • C:\Users\Admin\AppData\Local\Temp\fI87ltOJhCNhEwlw\eridjeht.exe
              "C:\Users\Admin\AppData\Local\Temp\fI87ltOJhCNhEwlw\eridjeht.exe"
              3⤵
              • Executes dropped EXE
              PID:4628
            • C:\Users\Admin\AppData\Local\Temp\fI87ltOJhCNhEwlw\eridjeht.exe
              "C:\Users\Admin\AppData\Local\Temp\fI87ltOJhCNhEwlw\eridjeht.exe"
              3⤵
              • Executes dropped EXE
              PID:956
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 1164
              3⤵
              • Program crash
              PID:4616
          • C:\Users\Admin\AppData\Local\Temp\VY7zPcf0cEXHzOww.exe
            "C:\Users\Admin\AppData\Local\Temp\VY7zPcf0cEXHzOww.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2268
            • C:\Users\Admin\AppData\Local\Temp\9Wr8gF4Xq79ka0w0\svrhost.exe
              "C:\Users\Admin\AppData\Local\Temp\9Wr8gF4Xq79ka0w0\svrhost.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: GetForegroundWindowSpam
              PID:1692
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 1148
              3⤵
              • Program crash
              PID:1224
          • C:\Users\Admin\AppData\Local\Temp\6ax0Yc8236t6EQMa\svthost.exe
            "C:\Users\Admin\AppData\Local\Temp\6ax0Yc8236t6EQMa\svthost.exe"
            2⤵
            • Executes dropped EXE
            PID:2252
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 1728
            2⤵
            • Program crash
            PID:1780
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2340 -ip 2340
          1⤵
            PID:2064
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2268 -ip 2268
            1⤵
              PID:2360
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3644 -ip 3644
              1⤵
                PID:1052
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3632 -ip 3632
                1⤵
                  PID:4992
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1596 -ip 1596
                  1⤵
                    PID:1940

                  Network

                  • flag-us
                    DNS
                    82.90.14.23.in-addr.arpa
                    Remote address:
                    8.8.8.8:53
                    Request
                    82.90.14.23.in-addr.arpa
                    IN PTR
                    Response
                    82.90.14.23.in-addr.arpa
                    IN PTR
                    a23-14-90-82deploystaticakamaitechnologiescom
                  • flag-us
                    DNS
                    58.55.71.13.in-addr.arpa
                    Remote address:
                    8.8.8.8:53
                    Request
                    58.55.71.13.in-addr.arpa
                    IN PTR
                    Response
                  • flag-us
                    DNS
                    134.32.126.40.in-addr.arpa
                    Remote address:
                    8.8.8.8:53
                    Request
                    134.32.126.40.in-addr.arpa
                    IN PTR
                    Response
                  • flag-us
                    DNS
                    sandyclark255.hopto.org
                    svuhost.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    sandyclark255.hopto.org
                    IN A
                    Response
                    sandyclark255.hopto.org
                    IN A
                    0.0.0.0
                  • flag-us
                    DNS
                    86.23.85.13.in-addr.arpa
                    Remote address:
                    8.8.8.8:53
                    Request
                    86.23.85.13.in-addr.arpa
                    IN PTR
                    Response
                  • flag-us
                    DNS
                    sandyclark255.hopto.org
                    svuhost.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    sandyclark255.hopto.org
                    IN A
                    Response
                    sandyclark255.hopto.org
                    IN A
                    0.0.0.0
                  • flag-us
                    DNS
                    198.187.3.20.in-addr.arpa
                    Remote address:
                    8.8.8.8:53
                    Request
                    198.187.3.20.in-addr.arpa
                    IN PTR
                    Response
                  • flag-us
                    DNS
                    sandyclark255.hopto.org
                    svuhost.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    sandyclark255.hopto.org
                    IN A
                    Response
                    sandyclark255.hopto.org
                    IN A
                    0.0.0.0
                  • flag-us
                    DNS
                    92.12.20.2.in-addr.arpa
                    Remote address:
                    8.8.8.8:53
                    Request
                    92.12.20.2.in-addr.arpa
                    IN PTR
                    Response
                    92.12.20.2.in-addr.arpa
                    IN PTR
                    a2-20-12-92deploystaticakamaitechnologiescom
                  • flag-us
                    DNS
                    0.204.248.87.in-addr.arpa
                    Remote address:
                    8.8.8.8:53
                    Request
                    0.204.248.87.in-addr.arpa
                    IN PTR
                    Response
                    0.204.248.87.in-addr.arpa
                    IN PTR
                    https-87-248-204-0lhrllnwnet
                  • flag-us
                    DNS
                    11.227.111.52.in-addr.arpa
                    Remote address:
                    8.8.8.8:53
                    Request
                    11.227.111.52.in-addr.arpa
                    IN PTR
                    Response
                  • flag-us
                    DNS
                    98.58.20.217.in-addr.arpa
                    Remote address:
                    8.8.8.8:53
                    Request
                    98.58.20.217.in-addr.arpa
                    IN PTR
                    Response
                  • flag-us
                    DNS
                    174.117.168.52.in-addr.arpa
                    Remote address:
                    8.8.8.8:53
                    Request
                    174.117.168.52.in-addr.arpa
                    IN PTR
                    Response
                  No results found
                  • 8.8.8.8:53
                    82.90.14.23.in-addr.arpa
                    dns
                    70 B
                    133 B
                    1
                    1

                    DNS Request

                    82.90.14.23.in-addr.arpa

                  • 8.8.8.8:53
                    58.55.71.13.in-addr.arpa
                    dns
                    70 B
                    144 B
                    1
                    1

                    DNS Request

                    58.55.71.13.in-addr.arpa

                  • 8.8.8.8:53
                    134.32.126.40.in-addr.arpa
                    dns
                    72 B
                    158 B
                    1
                    1

                    DNS Request

                    134.32.126.40.in-addr.arpa

                  • 8.8.8.8:53
                    sandyclark255.hopto.org
                    dns
                    svuhost.exe
                    69 B
                    85 B
                    1
                    1

                    DNS Request

                    sandyclark255.hopto.org

                    DNS Response

                    0.0.0.0

                  • 8.8.8.8:53
                    86.23.85.13.in-addr.arpa
                    dns
                    70 B
                    144 B
                    1
                    1

                    DNS Request

                    86.23.85.13.in-addr.arpa

                  • 8.8.8.8:53
                    sandyclark255.hopto.org
                    dns
                    svuhost.exe
                    69 B
                    85 B
                    1
                    1

                    DNS Request

                    sandyclark255.hopto.org

                    DNS Response

                    0.0.0.0

                  • 8.8.8.8:53
                    198.187.3.20.in-addr.arpa
                    dns
                    71 B
                    157 B
                    1
                    1

                    DNS Request

                    198.187.3.20.in-addr.arpa

                  • 8.8.8.8:53
                    sandyclark255.hopto.org
                    dns
                    svuhost.exe
                    69 B
                    85 B
                    1
                    1

                    DNS Request

                    sandyclark255.hopto.org

                    DNS Response

                    0.0.0.0

                  • 8.8.8.8:53
                    92.12.20.2.in-addr.arpa
                    dns
                    69 B
                    131 B
                    1
                    1

                    DNS Request

                    92.12.20.2.in-addr.arpa

                  • 8.8.8.8:53
                    0.204.248.87.in-addr.arpa
                    dns
                    71 B
                    116 B
                    1
                    1

                    DNS Request

                    0.204.248.87.in-addr.arpa

                  • 8.8.8.8:53
                    11.227.111.52.in-addr.arpa
                    dns
                    72 B
                    158 B
                    1
                    1

                    DNS Request

                    11.227.111.52.in-addr.arpa

                  • 8.8.8.8:53
                    98.58.20.217.in-addr.arpa
                    dns
                    71 B
                    131 B
                    1
                    1

                    DNS Request

                    98.58.20.217.in-addr.arpa

                  • 8.8.8.8:53
                    174.117.168.52.in-addr.arpa
                    dns
                    73 B
                    147 B
                    1
                    1

                    DNS Request

                    174.117.168.52.in-addr.arpa

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\excelsl.exe.log

                    Filesize

                    400B

                    MD5

                    0a9b4592cd49c3c21f6767c2dabda92f

                    SHA1

                    f534297527ae5ccc0ecb2221ddeb8e58daeb8b74

                    SHA256

                    c7effe9cb81a70d738dee863991afefab040290d4c4b78b4202383bcb9f88fcd

                    SHA512

                    6b878df474e5bbfb8e9e265f15a76560c2ef151dcebc6388c82d7f6f86ffaf83f5ade5a09f1842e493cb6c8fd63b0b88d088c728fd725f7139f965a5ee332307

                  • C:\Users\Admin\AppData\Local\Temp\3ntQl2w4pVJOpWSS.exe

                    Filesize

                    742KB

                    MD5

                    3e804917c454ca31c1cbd602682542b7

                    SHA1

                    1df3e81b9d879e21af299f5478051b98f3cb7739

                    SHA256

                    f9f7b6f7b8c5068f9e29a5b50afca609018c50ffd61929e1b78124f5381868f1

                    SHA512

                    28e59bc545179c2503771b93d947930bd56f8ebd0402ecbb398335c5ac89f40051e93fbfd84d35b8c625b253bb4cafea6a5360914b8d54d1bc121977f1eadbaf

                  • C:\Users\Admin\AppData\Local\Temp\6ax0Yc8236t6EQMa\svthost.exe

                    Filesize

                    3.7MB

                    MD5

                    9d2a888ca79e1ff3820882ea1d88d574

                    SHA1

                    112c38d80bf2c0d48256249bbabe906b834b1f66

                    SHA256

                    8b5b38085f12d51393ed5a481a554074d3c482d53ecd917f2f5dffdf3d2ee138

                    SHA512

                    17a9f74ecf9f118ed0252fa0bc6ce0f9758a4dc75f238cae304def9c37cd94623818dd4aef38826642ff9e549b7e6047318f8bf6de7edff2d61a298d0bf5c840

                  • C:\Users\Admin\AppData\Local\Temp\MTH6CHwmIbOylYwW.exe

                    Filesize

                    366KB

                    MD5

                    f07d2c33e4afe36ec6f6f14f9a56e84a

                    SHA1

                    3ebed0c1a265d1e17ce038dfaf1029387f0b53ee

                    SHA256

                    309385e6cd68c0dd148905c3147f77383edaf35da9609c0717da7df1a894e3ca

                    SHA512

                    b4fbf0e6b8e7e8e1679680039e4ac0aebdf7967a9cc36d9ddac35fa31d997253384a51656d886afb2ded9f911b7b8b44c2dcb8ebe71962e551c5025a4d75ebe2

                  • C:\Users\Admin\AppData\Local\Temp\PsGjFAxomTZjPqNX.exe

                    Filesize

                    472KB

                    MD5

                    2819e45588024ba76f248a39d3e232ba

                    SHA1

                    08a797b87ecfbee682ce14d872177dae1a5a46a2

                    SHA256

                    b82b23059e398b39f183ec833d498200029033b0fd3a138b6c2064a6fa3c4b93

                    SHA512

                    a38b58768daf58fa56ca7b8c37826d57e9dbfcd2dedf120a5b7b9aa36c4e10f64ec07c11dbd77b5861236c005fe5d453523911906dd77a302634408f1d78503a

                  • C:\Users\Admin\AppData\Local\Temp\VY7zPcf0cEXHzOww.exe

                    Filesize

                    336KB

                    MD5

                    e87459f61fd1f017d4bd6b0a1a1fc86a

                    SHA1

                    30838d010aad8c9f3fd0fc302e71b4cbe6f138c0

                    SHA256

                    ec1b56551036963a425f6a0564d75980054e01d251c88eb29c81c1b2182f5727

                    SHA512

                    dd13993174d234d60ec98124b71bfefcf556c069e482a2e1f127f81f6738b71cd37cee95bf0119d3a61513c01438055767d480e26d6ed260ee16a96533d0cfa2

                  • C:\Users\Admin\AppData\Local\Temp\Vz2OXxsU0BghW3Y5.exe

                    Filesize

                    801KB

                    MD5

                    9133c2a5ebf3e25aceae5a001ca6f279

                    SHA1

                    319f911282f3cded94de3730fa0abd5dec8f14be

                    SHA256

                    7c3615c405f7a11f1c217b9ecd1000cf60a37bca7da1f2d12da21cc110b16b4d

                    SHA512

                    1d1af3fcfcdba41874e3eb3e2571d25798acfd49b63b7fcf9393be2f59c9ba77e563da1717abcd6445fc52fd6d948bf4c0dd5978a192c8e32e0a9279fd0be33e

                  • C:\Users\Admin\AppData\Local\Temp\cakSy6zedqv48yMn.exe

                    Filesize

                    376KB

                    MD5

                    590acb5fa6b5c3001ebce3d67242aac4

                    SHA1

                    5df39906dc4e60f01b95783fc55af6128402d611

                    SHA256

                    7bf9b7b25cf1671e5640f8eeac149f9a4e8c9f6c63415f4bd61bccb10ddf8509

                    SHA512

                    4ac518140ee666491132525853f2843357d622fe351e59cca7ce3b054d665f77ad8987adddd601e6b1afe6903222d77cf3c41a5aa69e8caf0dcdc7656a43e9ba

                  • C:\Users\Admin\AppData\Local\Temp\tmp16FE.tmp.bat

                    Filesize

                    153B

                    MD5

                    ca12e723d8c36ecf501ebc6e0fa64e1f

                    SHA1

                    eb6b2322802319a5a1b41e6d4f6aecc9bcf499e1

                    SHA256

                    2d35ae86cd30f545424e8076770083d9d564783a7432ef1f72e84859772f89dd

                    SHA512

                    c84550fdb49f291239a93d265446cf99e4941cbc3a697d6ad26e009b1416b466e60a1f6cb389bccd47876d8fb9c8497e63a7973772c56516c0ea594cf7d989c1

                  • C:\Users\Admin\AppData\Roaming\prndrvest.exe

                    Filesize

                    42.1MB

                    MD5

                    cd6afc90359310b82fc5d6390cfa8766

                    SHA1

                    c81fc04b74b65485443c7aa21b359052d244c4ed

                    SHA256

                    aded27964e4f0970aa833bd8a132328c429eaad756b4188b8a38ec7217fc6adc

                    SHA512

                    4b9ad59bd43cf9230f2fe7e29fb328730370ef781e314ec76544f34b1f4ebe8d48dbb08b9b831b625ae64e659a85a138e1dc82b6d72b4aa2e53518cd2c3f1171

                  • memory/956-99-0x0000000000400000-0x0000000000554000-memory.dmp

                    Filesize

                    1.3MB

                  • memory/956-97-0x0000000000400000-0x0000000000554000-memory.dmp

                    Filesize

                    1.3MB

                  • memory/1240-79-0x0000000000280000-0x00000000002E4000-memory.dmp

                    Filesize

                    400KB

                  • memory/1240-129-0x00000000044E0000-0x00000000044F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1240-82-0x0000000004B60000-0x0000000004BF2000-memory.dmp

                    Filesize

                    584KB

                  • memory/1240-83-0x0000000004D10000-0x0000000004D1A000-memory.dmp

                    Filesize

                    40KB

                  • memory/1240-219-0x00000000092E0000-0x000000000937C000-memory.dmp

                    Filesize

                    624KB

                  • memory/1240-218-0x0000000008F60000-0x0000000008FC6000-memory.dmp

                    Filesize

                    408KB

                  • memory/1240-87-0x0000000009D90000-0x0000000009DB4000-memory.dmp

                    Filesize

                    144KB

                  • memory/1240-86-0x0000000006150000-0x0000000006174000-memory.dmp

                    Filesize

                    144KB

                  • memory/1240-81-0x0000000005030000-0x00000000055D4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/1564-124-0x0000000000400000-0x00000000004C2000-memory.dmp

                    Filesize

                    776KB

                  • memory/1564-125-0x0000000000400000-0x00000000004C2000-memory.dmp

                    Filesize

                    776KB

                  • memory/1564-122-0x0000000000400000-0x00000000004C2000-memory.dmp

                    Filesize

                    776KB

                  • memory/1564-216-0x0000000000400000-0x00000000004C2000-memory.dmp

                    Filesize

                    776KB

                  • memory/1564-112-0x0000000000400000-0x00000000004C2000-memory.dmp

                    Filesize

                    776KB

                  • memory/1564-233-0x0000000000400000-0x00000000004C2000-memory.dmp

                    Filesize

                    776KB

                  • memory/1564-121-0x0000000000400000-0x00000000004C2000-memory.dmp

                    Filesize

                    776KB

                  • memory/1564-105-0x0000000000400000-0x00000000004C2000-memory.dmp

                    Filesize

                    776KB

                  • memory/1564-110-0x0000000000400000-0x00000000004C2000-memory.dmp

                    Filesize

                    776KB

                  • memory/1564-108-0x0000000000400000-0x00000000004C2000-memory.dmp

                    Filesize

                    776KB

                  • memory/1692-96-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/1692-92-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2252-77-0x0000000000400000-0x00000000004BA000-memory.dmp

                    Filesize

                    744KB

                  • memory/2312-57-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/2312-207-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/2312-54-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/2340-85-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/2340-1-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/2340-0-0x0000000074D92000-0x0000000074D93000-memory.dmp

                    Filesize

                    4KB

                  • memory/2340-33-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/2340-2-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/2340-73-0x0000000074D92000-0x0000000074D93000-memory.dmp

                    Filesize

                    4KB

                  • memory/3172-248-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/3172-72-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/3172-71-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/3632-184-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/3632-80-0x0000000074D90000-0x0000000075341000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/3784-229-0x0000000000C70000-0x0000000000C71000-memory.dmp

                    Filesize

                    4KB

                  • memory/3880-115-0x0000000000400000-0x00000000004BA000-memory.dmp

                    Filesize

                    744KB

                  • memory/3880-120-0x0000000000400000-0x00000000004BA000-memory.dmp

                    Filesize

                    744KB

                  • memory/3880-118-0x0000000000400000-0x00000000004BA000-memory.dmp

                    Filesize

                    744KB

                  • memory/3952-231-0x0000000000400000-0x00000000004BA000-memory.dmp

                    Filesize

                    744KB

                  • memory/3952-230-0x0000000000400000-0x00000000004BA000-memory.dmp

                    Filesize

                    744KB

                  • memory/3952-228-0x0000000000400000-0x00000000004BA000-memory.dmp

                    Filesize

                    744KB

                  • memory/3952-226-0x0000000000400000-0x00000000004BA000-memory.dmp

                    Filesize

                    744KB

                  • memory/4064-214-0x0000000000400000-0x00000000004C2000-memory.dmp

                    Filesize

                    776KB

                  • memory/4376-132-0x0000000001060000-0x0000000001061000-memory.dmp

                    Filesize

                    4KB

                  We care about your privacy.

                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.