Malware Analysis Report

2024-10-18 23:08

Sample ID 240710-jsd6mawapk
Target e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5
SHA256 e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5
Tags
guloader downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5

Threat Level: Known bad

The file e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5 was found to be: Known bad.

Malicious Activity Summary

guloader downloader

Guloader,Cloudeye

Loads dropped DLL

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of NtCreateThreadExHideFromDebugger

Suspicious use of SetThreadContext

Drops file in Program Files directory

Enumerates physical storage devices

Program crash

Unsigned PE

NSIS installer

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: MapViewOfSection

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-10 07:55

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-10 07:55

Reported

2024-07-10 07:58

Platform

win10v2004-20240709-en

Max time kernel

93s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe"

Signatures

Guloader,Cloudeye

downloader guloader

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Common Files\overtyde.ini C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe N/A

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe

"C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe"

C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe

"C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1784 -ip 1784

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 204

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 se.bphx0.ru.com udp
US 172.93.120.134:80 se.bphx0.ru.com tcp
US 8.8.8.8:53 134.120.93.172.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\nstB577.tmp\System.dll

MD5 e23600029d1b09bdb1d422fb4e46f5a6
SHA1 5d64a2f6a257a98a689a3db9a087a0fd5f180096
SHA256 7342b73593b3aa1b15e3731bfb1afd1961802a5c66343bac9a2c737ee94f4e38
SHA512 c971f513142633ce0e6ec6a04c754a286da8016563dab368c3fac83aef81fa3e9df1003c4b63d00a46351a9d18eaa7ae7645caef172e5e1d6e29123ab864e7ac

C:\Users\Admin\AppData\Local\Temp\nsaB9DE.tmp

MD5 8ce4b16b22b58894aa86c421e8759df3
SHA1 13fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA256 8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA512 2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

C:\Users\Admin\AppData\Local\Temp\nsaB9DE.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nsaB9DE.tmp

MD5 4e27f2226785e9abbe046fc592668860
SHA1 28b18a7f383131df509f7191f946a32c5a2e410c
SHA256 01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA512 2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

C:\Users\Admin\AppData\Local\Temp\nsaB9DE.tmp

MD5 cde63b34c142af0a38cbe83791c964f8
SHA1 ece2b194b486118b40ad12c1f0e9425dd0672424
SHA256 65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d
SHA512 0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

C:\Users\Admin\AppData\Local\Temp\nsaB9DE.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nsaB9DE.tmp

MD5 50484c19f1afdaf3841a0d821ed393d2
SHA1 c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA256 6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512 d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

C:\Users\Admin\AppData\Local\Temp\nsaB9DE.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nsaB9DE.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nsaB9DE.tmp

MD5 2b3884fe02299c565e1c37ee7ef99293
SHA1 d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256 ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512 aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

C:\Users\Admin\AppData\Local\Temp\nsaB9DE.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

C:\Program Files (x86)\Common Files\overtyde.ini

MD5 0588a5641b3acef5cd5e0fced8286529
SHA1 c4465e00f4260c677c678f27924352e70706d1ad
SHA256 d802a2ae71bb03d382576bfb3f3cb9dcf58387cdc7d8577614fc0a6b3eb071a1
SHA512 faa408f26430d05a6263b8ee22cf64eebf2148708a161f91458b10b826e3c9b7773ec6e089cc0eb59acb6c7d94aebea8c5ddd70241457c0b89ca69e1df8b6b32

C:\Users\Admin\AppData\Local\Spumoid.lnk

MD5 d9583505e03c52483f6d3a9221cd4044
SHA1 6a76a675015d30c6ca7aa053e7a790e0aaaa42f8
SHA256 bbb7c2c7bc1b1a126db6ab4456dca7853d0e0805fc4e380ee275789786b0a330
SHA512 d6a0dff19c34c330d5b040af946915c2ae96e2272741b028befcf705ceeba62cdd5269d2906789abbe0d34a52ee8f3688d8515fa4bb605950bba16b816211fbe

memory/4208-579-0x00000000777C1000-0x00000000778E1000-memory.dmp

memory/4208-580-0x0000000074415000-0x0000000074416000-memory.dmp

memory/1784-581-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-582-0x0000000077848000-0x0000000077849000-memory.dmp

memory/1784-584-0x0000000077865000-0x0000000077866000-memory.dmp

memory/1784-583-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-586-0x0000000000401000-0x0000000000402000-memory.dmp

memory/1784-587-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-588-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-585-0x0000000001660000-0x000000000537D000-memory.dmp

memory/1784-589-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-590-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-591-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-592-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-593-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-594-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-595-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-596-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-597-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-598-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-599-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-600-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-601-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-602-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-603-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-604-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-605-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-606-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-607-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-608-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-609-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-610-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-611-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-612-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-613-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-614-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-615-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-616-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-620-0x0000000000400000-0x0000000000446000-memory.dmp

memory/1784-621-0x00000000777C1000-0x00000000778E1000-memory.dmp

memory/1784-617-0x0000000000400000-0x0000000001654000-memory.dmp

memory/1784-618-0x0000000001660000-0x000000000537D000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-10 07:55

Reported

2024-07-10 07:58

Platform

win11-20240709-en

Max time kernel

138s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe"

Signatures

Guloader,Cloudeye

downloader guloader

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Common Files\overtyde.ini C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe N/A

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe

"C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe"

C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe

"C:\Users\Admin\AppData\Local\Temp\e0452ab52309304cd0da107eabf8cf7e15887f977a0e59c22166bcb7383f10d5.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1032 -ip 1032

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 1028

Network

Country Destination Domain Proto
US 8.8.8.8:53 4.181.190.20.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 172.93.120.134:80 se.bphx0.ru.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\nswE1F6.tmp\System.dll

MD5 e23600029d1b09bdb1d422fb4e46f5a6
SHA1 5d64a2f6a257a98a689a3db9a087a0fd5f180096
SHA256 7342b73593b3aa1b15e3731bfb1afd1961802a5c66343bac9a2c737ee94f4e38
SHA512 c971f513142633ce0e6ec6a04c754a286da8016563dab368c3fac83aef81fa3e9df1003c4b63d00a46351a9d18eaa7ae7645caef172e5e1d6e29123ab864e7ac

C:\Users\Admin\AppData\Local\Temp\nsbE216.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

C:\Users\Admin\AppData\Local\Temp\nsbE301.tmp

MD5 8ce4b16b22b58894aa86c421e8759df3
SHA1 13fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA256 8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA512 2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

C:\Users\Admin\AppData\Local\Temp\nsbE301.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nsbE301.tmp

MD5 4e27f2226785e9abbe046fc592668860
SHA1 28b18a7f383131df509f7191f946a32c5a2e410c
SHA256 01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA512 2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

C:\Users\Admin\AppData\Local\Temp\nsbE301.tmp

MD5 cde63b34c142af0a38cbe83791c964f8
SHA1 ece2b194b486118b40ad12c1f0e9425dd0672424
SHA256 65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d
SHA512 0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

C:\Users\Admin\AppData\Local\Temp\nsbE301.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nsbE301.tmp

MD5 50484c19f1afdaf3841a0d821ed393d2
SHA1 c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA256 6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512 d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

C:\Users\Admin\AppData\Local\Temp\nsbE301.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nsbE301.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nsrE3FC.tmp

MD5 2b3884fe02299c565e1c37ee7ef99293
SHA1 d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256 ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512 aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

C:\Users\Admin\AppData\Local\Temp\nsrE3FC.tmp

MD5 3ad35e1651d29fa2f6dcd7722f5ca36f
SHA1 fb94d43c8fec12db5ea14f5af04c1c4e657202d9
SHA256 ba19c5bc80f1f84e8bddbae4185dfd07c997855b22f9ecffe37f96e4bf0d7517
SHA512 84bf1fc1454252d9fcbf350ddfa041f8656b1d91bb4975b04ba8f2c36294f51e597dedfdd689bca711ea338df4b60826c3339aac3ae611dcb591c3d4e71fcd58

C:\Users\Admin\AppData\Local\Temp\nsrE3FC.tmp

MD5 5787a2346828199ab555a6601dd3ac13
SHA1 2012c7dfb295b91fce617d017910edacc6939c92
SHA256 16b141e97dfe13b432dbd47f3c5abd15b261bad23fb09aa68d4e37242ce2dc0e
SHA512 3bee21d69ff539b48e31a55a272dc0f2b55c01ec1df5778772dd3d4414211f0a9fc6d40567eeeb4c1e5179c5934ac52c13d74af4e42bc294dccbb254f98190d9

C:\Users\Admin\AppData\Local\Temp\nsrE3FC.tmp

MD5 d608041f2d4e46c4f3efc3a3309f281c
SHA1 2337bea2ad09dfe5cd373e6e4c6d07ec36a7d157
SHA256 72cd66dc2937e704030cdf57118094c507358c325f3878c235f956cb47fe7cb3
SHA512 1e8117006aeefbebd7cd32e2e439c9b78e01a6e6cbbde5c3442ff2c17602230b19941bc94f4957b15b239fe1e80b39577e8c142489eff12d645dd15f4131a3c6

C:\Users\Admin\AppData\Local\Spumoid.lnk

MD5 9fe8ae43ba1fd9ad0e3d91b572e96dcd
SHA1 432a91635d1a4810cc8e9dde62d824ad99a479ab
SHA256 755b6eb14fe74268678c971c4b1909fd389100784119f0caf871edbb83f48504
SHA512 80995cdde1e5856dc48010d3f74f4517d1c48fbed6b9b3490f4e16b31787e8bf3614f91bc976d8062076b6f480a60dc40b22ed5c6226fbdf1bc113bf3062798b

C:\Program Files (x86)\Common Files\overtyde.ini

MD5 0588a5641b3acef5cd5e0fced8286529
SHA1 c4465e00f4260c677c678f27924352e70706d1ad
SHA256 d802a2ae71bb03d382576bfb3f3cb9dcf58387cdc7d8577614fc0a6b3eb071a1
SHA512 faa408f26430d05a6263b8ee22cf64eebf2148708a161f91458b10b826e3c9b7773ec6e089cc0eb59acb6c7d94aebea8c5ddd70241457c0b89ca69e1df8b6b32

memory/3908-579-0x00007FFD9F441000-0x00007FFD9F56A000-memory.dmp

memory/3908-580-0x00007FFD9F440000-0x00007FFD9F649000-memory.dmp

memory/1032-581-0x0000000000400000-0x0000000001717000-memory.dmp

memory/1032-582-0x00007FFD9F440000-0x00007FFD9F649000-memory.dmp

memory/1032-584-0x00007FFD9F440000-0x00007FFD9F649000-memory.dmp

memory/1032-583-0x0000000001720000-0x000000000543D000-memory.dmp

memory/1032-585-0x0000000001720000-0x000000000543D000-memory.dmp