Resubmissions

04-07-2024 17:22

240704-vxyavazeql 10

04-07-2024 17:19

240704-vv7rhazenr 10

Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 17:19

General

  • Target

    [DemonArchives]7a8bde6d1942443bdbf09e610eb1b794.exe

  • Size

    2.5MB

  • MD5

    7a8bde6d1942443bdbf09e610eb1b794

  • SHA1

    a8df45ba7bd1e298d3316f835f2ab0ce7bc25777

  • SHA256

    77658f9e6d7b6d68c1bfc54bd4a11e1342667703c10e2154112713e25d987bc0

  • SHA512

    dcc60d789fcf4ac36be5d5d3f6d4df71cbe722f6f846023692e2c09d970e248598b751f5ffc933d87ad9fbdb31cd2bef4fb19894ea9d3a839bb6dd6211ed02f7

  • SSDEEP

    49152:CYhLIsUWnzD6H4to9mVefnCQ8wGVy6H2FXa2kjcCHJ3:zhI/WnzDlo9e6n0rCq2EJ3

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[DemonArchives]7a8bde6d1942443bdbf09e610eb1b794.exe
    "C:\Users\Admin\AppData\Local\Temp\[DemonArchives]7a8bde6d1942443bdbf09e610eb1b794.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2920
    • \??\c:\users\admin\appdata\local\temp\[demonarchives]7a8bde6d1942443bdbf09e610eb1b794.exe 
      c:\users\admin\appdata\local\temp\[demonarchives]7a8bde6d1942443bdbf09e610eb1b794.exe 
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Users\Admin\AppData\Local\Temp\is-5TDJC.tmp\[demonarchives]7a8bde6d1942443bdbf09e610eb1b794.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-5TDJC.tmp\[demonarchives]7a8bde6d1942443bdbf09e610eb1b794.tmp" /SL5="$201EC,1960956,141824,c:\users\admin\appdata\local\temp\[demonarchives]7a8bde6d1942443bdbf09e610eb1b794.exe "
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Program Files (x86)\Secret Disk\SecretDisk.exe
          "C:\Program Files (x86)\Secret Disk\SecretDisk.exe" uf_sub_runonsetup
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2524
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" https://privacyroot.com/apps/scripts/uframework-web.pl?scn=sede&version=2304.00&fipr=53c256a7f5677b14a7c22ba4882475f6&pcid=d4b5ac8a4c2db14daa88729580464ecf&location=appInstalled&iso2=en&iso2ui=en&lang_sede=en
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:644
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:644 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2196
          • C:\Program Files (x86)\Secret Disk\SecretDisk.exe
            "C:\Program Files (x86)\Secret Disk\SecretDisk.exe" uf_sub_downloadSetup
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1488
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2596
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2868
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2680
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2468
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2968
            • C:\Windows\SysWOW64\at.exe
              at 17:25 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:2936
              • C:\Windows\SysWOW64\at.exe
                at 17:26 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                6⤵
                  PID:768
                • C:\Windows\SysWOW64\at.exe
                  at 17:27 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  6⤵
                    PID:2404

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Secret Disk\Application\defaultDisk.png

          Filesize

          5KB

          MD5

          9111eb0ef8791a318be2148221d46500

          SHA1

          b7f650357ec45fc900fca371c822373b495136d6

          SHA256

          c2c40c4427d9f2632aa5b3ba13674066e56a30861b681cae311f7d9113ab7b62

          SHA512

          dc6457661d27f138c290a1288662786ebb5f2794a9d70ea1e79209d8ebb29d6227926713efa0dea8fe894039d95eb3105591ed913b9f6348da35c2df333fde95

        • C:\Program Files (x86)\Secret Disk\Framework\Interface\colors.ini

          Filesize

          703B

          MD5

          109bca6c9ed654d5d684290fc909bed1

          SHA1

          fb6f36ff383cb4b5b718b307594afa02071c5897

          SHA256

          f11600d990ce9320da8997bec908cbfa649a44074db5a8f1c7f77a731f74fb60

          SHA512

          1b2c1a0b5178d9174df03f46b6db70b7f33500e100e616bd0a2942c48497695bbceb4bef90d24e3c53d281aae9bb01a9aea8eaa1ac00d8d8b9e6a79040a68366

        • C:\Program Files (x86)\Secret Disk\SecretDisk.exe.config

          Filesize

          186B

          MD5

          72a9c8b79a6577721302be0a9a75f53a

          SHA1

          b98675b937dabac285d37ed8dbf4d3755fb76777

          SHA256

          87451e21db5e08cdbd746570d3b2e61e9e7dddf3db87420dd751b23777f6b910

          SHA512

          b3bf9709bf210c431598bad84a5f8b8a53c41374e1c27e70459e0c5805a9fe480fab2e6ad6c1c4e190e7b36df1830ae68e12f8b2756c6f54c4b0977c830b0797

        • C:\ProgramData\WindowsHardwareTelemetry.ini

          Filesize

          1KB

          MD5

          5897b207a5385c605934fe2b559018eb

          SHA1

          f48f5a143ffdddb64d138560cbf3f41f68245b96

          SHA256

          5b5c7fefacd9735dd246484a0eaad99385c8e6d4bfad29e13d4c857d9dd1d305

          SHA512

          14363ed8ccad83f67b91ebf197deedd3335b810c03397d8b8c95326646681bf86eb156d9df1e50d996aa845748f44a89e3dcb99bfd278fb7051ef884f7d6292b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

          Filesize

          854B

          MD5

          8d1040b12a663ca4ec7277cfc1ce44f0

          SHA1

          b27fd6bbde79ebdaee158211a71493e21838756b

          SHA256

          3086094d4198a5bbd12938b0d2d5f696c4dfc77e1eae820added346a59aa8727

          SHA512

          610c72970856ef7a316152253f7025ac11635078f1aea7b84641715813792374d2447b1002f1967d62b24073ee291b3e4f3da777b71216a30488a5d7b6103ac1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          1KB

          MD5

          4d18cabb9261024e3ac55edadc6e70e6

          SHA1

          d229b5b311347f63bcd69808f276e5fe51310a90

          SHA256

          0819700fc5b16e7c422a9f9baf8ba06555318bee710ae56bd5afffabcb51e7be

          SHA512

          958c054e20ada9bfde2053df637a551ce5a363f174c655e37f3f022ff91d112169985f40769a8a10fd77db33b64e4b4b48302151fd7bc1abeb0a432efe116b70

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

          Filesize

          170B

          MD5

          936be35e591839e3d07031d973db3a39

          SHA1

          de9e7fc2457bd636983f17bf09937e76ca2ab71f

          SHA256

          b0a90ef2eca314d3525230ecbc66b90e82967d4e24b4f34afe98101cb9fada8e

          SHA512

          08f5a9e7bb8cff2ff5b0db070fb9cf8267bc1988e0bfd8562eacb4f17a394028106bbead42b5d9d4322857d6e2ce05d9040dc3e66c9146b07066ec29f33ce880

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          eea1e892827d90b5f9b07251dfb1cc2e

          SHA1

          ab6a17e77392743198de9e598121d85fa5fd08d0

          SHA256

          137a3f05817d6c613de35af5a4f181ba50e366813f6debaf32cb9b2cbe4e308a

          SHA512

          f3701c40b5b9abefa5ef449263f17bb25d6f931c28e4a3511b0a2f1b1e3bfa66ef4073c6f2d4c04055bd7a641f7c2192494f1b57f8e84e618685619352eeecb9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1ee385a6e91301f82be32573121f85a3

          SHA1

          dca6d19bdee17d6d15aaffa19e504f26e4904df0

          SHA256

          f48f4238bec6349ee8267ce11eb95886aeaa37ac5205902142e6112b7bbe1f58

          SHA512

          4a30338ae9b707c661bfffa7f770ca92548a5a22f51677bfeac1b80760a056ae41cfaa12c6aebe0caadbdbca8bb72cc0180507db6ca9de7ded50518f4380b9cc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4b091f45a010b80d5ff4a4417d90595f

          SHA1

          ac781517b8df7db729532f676c0169a112da5b1f

          SHA256

          2aa386bb69019527b1edb0302d1a4f6f0906726b6a12de2ae708d0ab9ddf466a

          SHA512

          ff9497dea6f19842612eb344889397e2b86a40dd7bf2c05806d75137850c0ce0dac13c742e5b03dc5813fa44fe337e3a4c46915c10ca39cbd39fde9457f54020

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ba34a4d88b3c911b03591b14949c4cb4

          SHA1

          27fd193b47777a952621476f4b09f418852cf785

          SHA256

          bdbae502b88d720ee3bff1a19c5ac273eedeac2e3c76cc6ac1a6a53b4e6bd771

          SHA512

          41a9f320ca28f61d3cd58fff3df724c329c8b87ff00f50e71540daf607b4c99fe9c5384a30c52731754d6550bc549b5d52e91a86d37b48d68981a96627a6f5a2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          72866bd85ea0630fa5053b7c6adccfcc

          SHA1

          cda7678f64bada74600f8a4d246e1f1bb46ea48c

          SHA256

          810fc0cd32ef57c7e4ca8ba04618c2879ff7530e53779d49ad9b21b1ffc4c6a0

          SHA512

          9e5870f8cfcf7e3d434e7c3b9bb508b22b6dbe177b1f8bb478f95878236f7eddb2b4bfe813b32f7e11d4d9d446a153aa6bc3738d336a471109f6e3155fce78d5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          09dcd8b12f75d32f2c5b2a3a6e647a2f

          SHA1

          e3c31662fbd4d9991ac6d6dd388ef420170dfdb3

          SHA256

          dde8877b9028eefa170b7aa19aaa018564931708dc768fb14d631512e75fd554

          SHA512

          d9c61c84e131c5e4e72553eb4c964323d59aa263da279bad456119c02484786b6e9d3c832bd566eba4bca48d7b58658ae7bbb205dfbd3ae2f91adc88ffced748

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          13db1a369d358e987a8620417ce04802

          SHA1

          d44b60e19f9336e03b0cab624faf0332152096d2

          SHA256

          5c60b6017a4e5be43fd2b59feae5b9f8c5fa664fe202879871950262930c4d29

          SHA512

          4cbcaf571ed9e320d460a92ab32a9a71a7b698d909626cd082ffd77e7a0a95c2e6aedd0813a91596d52830a33a72018a9571d263d1b1174a8eb63be0f0278b69

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          10173dcfd11fd6b606aeae5e355bc9f9

          SHA1

          8defac42e3c9ef1cfa2856412b5fb37a781c32df

          SHA256

          16b7c611944a46d27dc7c5689728ee9ff36f830d1b1f49de3909b1c754c51d58

          SHA512

          af31bb95ec71e120d8c93ab70baa009558c59501a3cb9ee97a602316a51d05bc83d4678d91142d28123c5c0ee7cef24df07e53b41221f67e6cd91fe90f2db053

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c6d86a8c9102381a7163eacd4ef937a6

          SHA1

          a478d2eb615b63963a3d09beb061f686ee825197

          SHA256

          899821e0665fde3a59a4805fc4ff2b0671d39ba5b72d36a1a11a1c2d806393dc

          SHA512

          3b09e0d8e0c156c4815d03892f12a40d23d94f59f7726d484a13ab9bd461a12a4cb24c5475f278ce72d7362fcabebde6690dcc7fea9dd82759eb55f8407aeb93

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ee9b44fa324a0ef4b644e1c822336656

          SHA1

          ce2811ab8e9d6db2491c3b6c842ed263f4615013

          SHA256

          91546cb4b65c52715ab5102e02beb388de5ad780b9ff5c5dedafe056bcaba94c

          SHA512

          4094819c4126730a0cf54a6e3906ffeb86fb9fcaf7f94a5bafbd9f469d51e4eab0652abb57f7d98d2e6b9ce4976aac48e1cfffc6b197a10ff417d28308f5b092

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\2UMW7JE7\privacyroot[1].xml

          Filesize

          13B

          MD5

          c1ddea3ef6bbef3e7060a1a9ad89e4c5

          SHA1

          35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

          SHA256

          b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

          SHA512

          6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\2UMW7JE7\privacyroot[1].xml

          Filesize

          2KB

          MD5

          00fc869386f63af3219a75719fe190c7

          SHA1

          27adec9f76b1c5f5dbf43b71585f78d29ae8f125

          SHA256

          c14bb8f1fc06699825c20219d84eddd6aeab3b58e449aa59eca6c206813008ff

          SHA512

          7ede710654648005602f16824bb2e5f9122d9becb795fae313296a92d671282f8547d95ddf1b458a09b33b02a14c38c1a1b42051e2a17eead5f3f94cc274ba9f

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\sxsuh4u\imagestore.dat

          Filesize

          1KB

          MD5

          578b897a06365a714723e729a5bec938

          SHA1

          88746a45e9161aa2b2d17b91f17e165140c0218b

          SHA256

          1138784e1dc8dee0cf4b28cb47e516ff4b3f664af383ca61c9cdf4fd74aa1d69

          SHA512

          1dc459bf0ef46b689c77f9d94758d6c19a25a2a2d18876dff233a74de741033f372464e2ca6c55f00613dc6ca7fea63ca8116e687e1048084e451d8441f6c9b9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\b8bba7bdb82ef259240353901c7e809d[1].js

          Filesize

          53KB

          MD5

          b8bba7bdb82ef259240353901c7e809d

          SHA1

          21dcc6e7e851ab028b170f51cc6b0d7ccd9ca21c

          SHA256

          0db452a3899f692171a46ee2afb30b6e1847a3f4cdbb4079a83a24192b60f562

          SHA512

          bc6ead5ae524722bfb21cb6a8cc99610b5d2b20a4d4021907741b07866dfe52e644c1c760e4abe587ea20c79d10caec5c63f2230a29e3de18244a9b46d8c8e93

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\f[1].txt

          Filesize

          188KB

          MD5

          4c317b5dd4ae3df3de4f5675f16e2075

          SHA1

          fe30af119fa971c3655a88946894b487732370fe

          SHA256

          a3184b29dfbaff815b9fa0380e70fbd8b5137044617b26c79e881652c457ad7f

          SHA512

          55545bc70d72ee09ea11444593a7f18eb7f2b5b72b02117cdd1ee18825ef09eb46e1be914e18aa7738abc66ae9fd89f7ec1dcfcb7a70ff8f468e5bf53fc7efc2

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5OCCPTL4\f[1].txt

          Filesize

          30KB

          MD5

          c5d98f3b3d6c098f208620d93db87bac

          SHA1

          71f225bc244b7fe625ef8c7f893ac5978cba8364

          SHA256

          35f10e930001942305150e2cd414336f02d9365cc6ce3b94c9ef2bac90d70e3f

          SHA512

          8cbc2827710bb44518da75607b539d2416eb443ef8c7f4c331d55db8122642981150692615fd57a49db6b8bbd1e38f08d4dcb5fdbbc4a160cdc5c9aae86b48f0

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5OCCPTL4\f[2].txt

          Filesize

          204KB

          MD5

          8b4778bb22dcfcd74d1860041722ea01

          SHA1

          6c2676fbb1b8a70a46ec0d518d3364c906d0149c

          SHA256

          066bf781659af09bb40a24a7d87dd2310c2324c9619e347c6d6d05c00ffeb182

          SHA512

          99ef210ba36ec1ee9d5b4787e84d05fd9f2a7f0f8bb677437e95483077d6d66940002f3b0aa211bff34ea4727be82a54e0b88db49012a020823726270a9a6691

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5OCCPTL4\f[3].txt

          Filesize

          2KB

          MD5

          cc47d2de85d243938c1e5277f7be2cbd

          SHA1

          df36c30bc0dc38b9aab1a2e9ca9fd12447ea2a74

          SHA256

          2897afa8893463a77bfde7d06c22334a7c2b4b671d2bbdaafc06396d6d4a50c0

          SHA512

          bbb56750c63e11583a48e82357bc0a2e95bd92d612d282981216ebb7b453841f272dea552fa963da632ddc1d111494d417801817574972b49c58d70be444baf3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\f[4].txt

          Filesize

          29KB

          MD5

          f416882800cc296b68958feedf9ef161

          SHA1

          9fd69a05ab7790b6c10d01e64b11b97ac1e94dac

          SHA256

          afa54fabfaae17d3edc7d8bb75c1b965ec3577240647443c50f01a12063679be

          SHA512

          9a05b89b990ea7d89e94fcc4829059866074df7437fd2e8e71b5ae5aef239a358c1a51f3a8c59398533123c8f7df147a108bdd2ae4fafa8a15482aba730c147d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\f[5].txt

          Filesize

          2KB

          MD5

          98408a561a774e2414e19971eec1f993

          SHA1

          f51216ceb3dc42de1416511664a7ab3bf7ef6b55

          SHA256

          bc7ef6c5abc6ad9f53e4b766c83bd5f57fce9d43db9cca546b1187e4a0583ef1

          SHA512

          a81646843f0d44a52db9e04debcd5262d8892827aa0608fa3a9284f3963e9177cbf3ae99538c28692dcfa78ed6240ace96486e9e6eab6562a6b8d9e1b545f844

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\favicon[1].ico

          Filesize

          1KB

          MD5

          f71b6e7ab28f5e24a6225f0f939da836

          SHA1

          4c1514f1cab04f4b04e05a9114a7466d41b897fb

          SHA256

          a7186adefa0e27f35bdeb48b423f74e51ad0facdc46cdc79a85c7c34ba32c3d4

          SHA512

          b2658328882bab3f7fddcd0ebdeb5713d78946acb1e1fafa6c7d2669ab2a60776a9c601d642694dab72b45ec1c040e0af05004c7633b879427b2b272eddb37d8

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\k0kJUtooLGrAjtticTzb3PiTJm-aoHcIwmi1z8c6a4E[1].js

          Filesize

          53KB

          MD5

          abe2bb22ae186de6c0d07888386c2d8c

          SHA1

          2152e7aff9b04fd10e227c851f17828ad2fce673

          SHA256

          93490952da282c6ac08edb62713cdbdcf893266f9aa07708c268b5cfc73a6b81

          SHA512

          c5454b41d5ee4736c1948d6c719af156b2dadc7e6010d66252a7fa283f103e94bc08d3c474cbc4eb19ee43306c40ccf998edd52d3b25cea472ac2c44f7454b74

        • C:\Users\Admin\AppData\Local\Temp\Cab1A94.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Cab31BF.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar30C4.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Local\Temp\Tar31D4.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          d4ceb1da5b9f5a66f7acc7d9f4e33831

          SHA1

          59dd559eccc02b89efa9fe994f21cdd801546a2a

          SHA256

          188a2b5d2373bd8d6089433c732fc682949f092e5048e07dc80269630e28c358

          SHA512

          62900000236753b44fec68680eeeafbaf9567b5f634ddb047c2c5cadd5ee6d5400d456bc8dff102e6cddd9f2ddba06015f92b8616892c2f75d7a51d630d872e7

        • C:\Users\Admin\AppData\Roaming\sede2021\Settings\ServerResponse.ini

          Filesize

          214B

          MD5

          134e9d5c6d1fde22cbedd8e2e966487e

          SHA1

          b3de151e422489b353a68080b532ebe4d0604580

          SHA256

          8ef6eab36a7b3f0badaac057e5f5eab82e7ef9de369ae37d05af8df67ce86954

          SHA512

          46fcfd1f8cce2f38e496ae9b226200949d753537666f9628a153141b829aabd1cd4f92d25ed1bb1cf3c18ac4109c29763fc6f1014b0f81730eaabfc3eba65958

        • C:\Users\Admin\AppData\Roaming\sede2021\Settings\UF.ini

          Filesize

          84B

          MD5

          492546c4a6ba9a2a248859664eaf212c

          SHA1

          427ef5742d80735c8440e2e60d64990042198a13

          SHA256

          abc61a2f295d9586626653c61b1aa0d9dd24e2eead762ae21913a52e337a0f1b

          SHA512

          607b15b5c992528994fb18c18b2f52c2ea3c2057b80669bcc7ca689abc00e377e6184fdb65efb95bd3fecd6b8110d4ee4fe2bb8879a0b23bd5aaceef2d1e51c9

        • \Program Files (x86)\Secret Disk\SecretDisk.exe

          Filesize

          345KB

          MD5

          0993af9fb027555fd6b193cccb598669

          SHA1

          2f4ef4c2e2be03237e49916836c124d1d39658b1

          SHA256

          ec9c3458cad121c98e61ba244d2be4d5648afcf43308308241e29a285aa47300

          SHA512

          aff8911a1c41accb1691e7e802fc7e244512821968d30ddde6c98c9856371395ad9f1512e450b9295d7902de16f5057b9963d323fdddcfde82a0305a9106fc5e

        • \Users\Admin\AppData\Local\Temp\[demonarchives]7a8bde6d1942443bdbf09e610eb1b794.exe 

          Filesize

          2.3MB

          MD5

          534ec08b9bfd57bfcb50bb752a9b0038

          SHA1

          f0f5b2d974d7705b8b76886bcccd1ead68c7ea5a

          SHA256

          a82533cdde30e8b190795d597d010ead44c0d60fa23c9f611b1e4d8e8de933f9

          SHA512

          2a6e99916caf4de91d0e7655fe12947144cbfc30ee238151b66382ed5edbf1f8f932655e384e055f8506d7b8074e27f0b5aef27770576699a217c21e0f87fb30

        • \Users\Admin\AppData\Local\Temp\is-5TDJC.tmp\[demonarchives]7a8bde6d1942443bdbf09e610eb1b794.tmp

          Filesize

          1.2MB

          MD5

          fa346d3f0303eb72713c2d74e4a05010

          SHA1

          4df622aaa1fc46ede116a9ac3ef83c86c24c36e5

          SHA256

          5005f89fd3ef769006bddee4a28c2763e2c99ce693d8ab3797d77413236356b1

          SHA512

          2ef2ec3fac6659098a779dc79358d234ceb896b4a3b32def68ab627b63bc20204a45eb721521dd0b2bbcca582f17c5213ad024db0fe53feaa6378bc52737091b

        • \Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          206KB

          MD5

          9e6fdb9151e4ed23dbf0bef34dff23c0

          SHA1

          1c3f513c7ae0f0a8ac0b75d869778e72437f2bf9

          SHA256

          610a9602e410cb28887fb9e92c7fe8ef8078a1792be3b789a801d2815801a1a2

          SHA512

          d4bb12254b535e0bdeb44b3011fa32b44eee2c8eeb85a6b31faaf9f832149a57621982b48cc6e152ea3cd171714d7ac76c93a62b0a5d568edc0230ad0cbee27d

        • \Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          edd1af054084952a6fd030b96f112310

          SHA1

          3e75efafc682c1d386c19e1e7b8c0f793bf8b680

          SHA256

          d0966b5906f1189f43b911264821ec080d7f29adb40fc937eba05d3384e759d7

          SHA512

          11fe3180ea3c56ff0fc12d019c768092cea264bd03db7018cb5e5fa30a57c81d99115f1aec55320c3b84612867edaf67ebb6babddeddc2d801c1c708d0ed2357

        • \Windows\system\spoolsv.exe

          Filesize

          207KB

          MD5

          cefd5cf1b18fe5da0416da7f0c957bb1

          SHA1

          b7bdc1b4e77f9e344a4f077fb65792e082529a53

          SHA256

          e54a753c826e0f96972ce2eff06443620243382432a6d1b994be53daa87cc226

          SHA512

          e8d61c3d29942f9afd47226d13180e1e946f3b58456a5e3eb1d5f1145e102d472c82bb002b88ae09e988044c566bb9415a8a620cbbfa88558883d1dd3ebf857a

        • \Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          e30215bd20ccfb8fddcccb1bac93dbdd

          SHA1

          29c8931c360c473f518f1f11e995e4ba64cd481e

          SHA256

          2ab4e8509d58dfa530658c2c834709ed47ad715da0fbc9b7f65de0e8fc4e0e37

          SHA512

          19d10304ef758ee630874098c494011c0a086377d46d2abf9eeeb946c5dc52a609820c75874b2b25e8c91fd276912764043d79b0016bf21e637bc9a1ca6a1002

        • memory/2468-566-0x0000000003780000-0x00000000047E2000-memory.dmp

          Filesize

          16.4MB

        • memory/2468-450-0x00000000003D0000-0x00000000003D2000-memory.dmp

          Filesize

          8KB

        • memory/2524-356-0x00000000000C0000-0x0000000000118000-memory.dmp

          Filesize

          352KB

        • memory/2536-10-0x0000000000400000-0x000000000042D000-memory.dmp

          Filesize

          180KB

        • memory/2536-1123-0x0000000000400000-0x000000000042D000-memory.dmp

          Filesize

          180KB

        • memory/2536-89-0x0000000000400000-0x000000000042D000-memory.dmp

          Filesize

          180KB

        • memory/2536-13-0x0000000000401000-0x0000000000412000-memory.dmp

          Filesize

          68KB

        • memory/2548-90-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/2548-541-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/2548-1122-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/2548-33-0x0000000000400000-0x0000000000533000-memory.dmp

          Filesize

          1.2MB

        • memory/2596-44-0x0000000000550000-0x0000000000590000-memory.dmp

          Filesize

          256KB

        • memory/2596-28-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2596-86-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2680-72-0x0000000003060000-0x00000000030A0000-memory.dmp

          Filesize

          256KB

        • memory/2868-59-0x0000000003240000-0x0000000003280000-memory.dmp

          Filesize

          256KB

        • memory/2920-27-0x0000000001F70000-0x0000000001FB0000-memory.dmp

          Filesize

          256KB

        • memory/2920-21-0x0000000001F70000-0x0000000001FB0000-memory.dmp

          Filesize

          256KB

        • memory/2920-0-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2920-87-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2968-83-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB