Analysis

  • max time kernel
    93s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2024 03:46

General

  • Target

    setup.exe

  • Size

    5.5MB

  • MD5

    4277d47d6916af0a7d3a1c1583112df7

  • SHA1

    e8cdd4ceb3476ef0e69387ad3f759bc2a7da36a6

  • SHA256

    ed95fe802a065e28b952131fb08b43d6bde7c1aa54f88ac927ea4176e005fae1

  • SHA512

    5c97f427cd3ef8916bfebdfecdb8eeeb4e31a556950b8fde7c6e0d97381efdaf7dad7593114d1bf65dc2738fb4b34ed2eddf1373cea304821bd19dbaef571d43

  • SSDEEP

    49152:NIaTHKNhze5p5D/oEhXbVuE6lUIdsQKTeXIqPgYxtX8IdiSsnffMlCJso:NI8HKy57cApoUMsQKT9qFD5iSsn

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

77.105.135.107:3445

Extracted

Family

risepro

C2

194.110.13.70

77.105.133.27

Signatures

  • Modifies firewall policy service 3 TTPs 1 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 62 IoCs
  • Suspicious use of SendNotifyMessage 62 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Modifies firewall policy service
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\Documents\piratemamm\qkfCzLq17mRJf_eWZddEpY62.exe
      C:\Users\Admin\Documents\piratemamm\qkfCzLq17mRJf_eWZddEpY62.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4664
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        3⤵
        • Power Settings
        PID:2908
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        3⤵
        • Power Settings
        PID:4604
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        3⤵
        • Power Settings
        PID:688
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        3⤵
        • Power Settings
        PID:660
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe delete "CIFUBVHI"
        3⤵
        • Launches sc.exe
        PID:4876
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe create "CIFUBVHI" binpath= "C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe" start= "auto"
        3⤵
        • Launches sc.exe
        PID:1864
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop eventlog
        3⤵
        • Launches sc.exe
        PID:5068
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start "CIFUBVHI"
        3⤵
        • Launches sc.exe
        PID:4828
    • C:\Users\Admin\Documents\piratemamm\StlF6kWMqAD21wM1jXgvv4Ar.exe
      C:\Users\Admin\Documents\piratemamm\StlF6kWMqAD21wM1jXgvv4Ar.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1636
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2148
    • C:\Users\Admin\Documents\piratemamm\k1L2XEOChJ4DrFgc9oZolQGi.exe
      C:\Users\Admin\Documents\piratemamm\k1L2XEOChJ4DrFgc9oZolQGi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 1256
        3⤵
        • Program crash
        PID:3168
    • C:\Users\Admin\Documents\piratemamm\Fs3cAZRoLgoGZ1_H3rSzXASO.exe
      C:\Users\Admin\Documents\piratemamm\Fs3cAZRoLgoGZ1_H3rSzXASO.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2876
    • C:\Users\Admin\Documents\piratemamm\eLkBIGH8iGA_TNVMoQM3QOcm.exe
      C:\Users\Admin\Documents\piratemamm\eLkBIGH8iGA_TNVMoQM3QOcm.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3308
      • C:\Users\Admin\AppData\Local\Temp\is-6P617.tmp\is-2IMFI.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-6P617.tmp\is-2IMFI.tmp" /SL4 $70116 "C:\Users\Admin\Documents\piratemamm\eLkBIGH8iGA_TNVMoQM3QOcm.exe" 6765812 52224
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:3300
        • C:\Users\Admin\AppData\Local\MP3 CD Ripper Beta\mp3cdripperbeta32_64.exe
          "C:\Users\Admin\AppData\Local\MP3 CD Ripper Beta\mp3cdripperbeta32_64.exe" -i
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4088
        • C:\Users\Admin\AppData\Local\MP3 CD Ripper Beta\mp3cdripperbeta32_64.exe
          "C:\Users\Admin\AppData\Local\MP3 CD Ripper Beta\mp3cdripperbeta32_64.exe" -s
          4⤵
            PID:2044
      • C:\Users\Admin\Documents\piratemamm\Rm8DG5gpCJbTxcIX4uRDB_yw.exe
        C:\Users\Admin\Documents\piratemamm\Rm8DG5gpCJbTxcIX4uRDB_yw.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4724
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EHCGIJDHDGDB" & exit
            4⤵
              PID:4528
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                5⤵
                • Delays execution with timeout.exe
                PID:3080
        • C:\Users\Admin\Documents\piratemamm\XODKyrRtoiWNcSS45ZSSRAf1.exe
          C:\Users\Admin\Documents\piratemamm\XODKyrRtoiWNcSS45ZSSRAf1.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4480
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4928
        • C:\Users\Admin\Documents\piratemamm\se8dOl6JODxBSiHqh68Wp12X.exe
          C:\Users\Admin\Documents\piratemamm\se8dOl6JODxBSiHqh68Wp12X.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1996
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            3⤵
              PID:3056
              • C:\ProgramData\CAAKKFHCFI.exe
                "C:\ProgramData\CAAKKFHCFI.exe"
                4⤵
                  PID:3624
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    5⤵
                      PID:4988
                  • C:\ProgramData\CAKFIJDHJE.exe
                    "C:\ProgramData\CAKFIJDHJE.exe"
                    4⤵
                      PID:4128
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        5⤵
                          PID:2088
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\IIECFHDBAAEC" & exit
                        4⤵
                          PID:4780
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout /t 10
                            5⤵
                            • Delays execution with timeout.exe
                            PID:868
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:928
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                      1⤵
                        PID:988
                      • C:\Windows\system32\taskmgr.exe
                        "C:\Windows\system32\taskmgr.exe" /4
                        1⤵
                        • Checks SCSI registry key(s)
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:2668
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3624 -ip 3624
                        1⤵
                          PID:1804
                        • C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe
                          C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe
                          1⤵
                            PID:3948
                            • C:\Windows\system32\powercfg.exe
                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                              2⤵
                              • Power Settings
                              PID:3604
                            • C:\Windows\system32\powercfg.exe
                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                              2⤵
                              • Power Settings
                              PID:4928
                            • C:\Windows\system32\powercfg.exe
                              C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                              2⤵
                              • Power Settings
                              PID:3064
                            • C:\Windows\system32\powercfg.exe
                              C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                              2⤵
                              • Power Settings
                              PID:4996
                            • C:\Windows\system32\conhost.exe
                              C:\Windows\system32\conhost.exe
                              2⤵
                                PID:1732
                              • C:\Windows\system32\svchost.exe
                                svchost.exe
                                2⤵
                                  PID:2864

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\ProgramData\CAAKKFHCFI.exe

                                Filesize

                                4.7MB

                                MD5

                                8e5286e3caa11c78e275892a38f2e772

                                SHA1

                                ddada2f646640b394c04e7166db04200d226281b

                                SHA256

                                9f619f332a9e5bd74a345778e86a871e9efb087bfea43ade7cbf9f63a12151b0

                                SHA512

                                4f180892333915a52f5e2ee7a69d0ba628ed3d6c6425e2ba4b41f0ed5a06898b25bc0a0432dc6372add0c811b16e74d636a6466ba64fd9ccc34a93e900b5f5ce

                              • C:\ProgramData\CAKFIJDHJE.exe

                                Filesize

                                4.9MB

                                MD5

                                675737d9b22bcfefe651c11bd47d404c

                                SHA1

                                4b49f56572b458873b52eaa990f09556d37a54a1

                                SHA256

                                8b020cde39d33b53f4c48a8c7ea30fb1f7854b13562508c0a1665ffd1397f7fc

                                SHA512

                                0f25d1cc861c781a2baba08f0297963672df51a328a37038455aaabd8953f3ad38b04fbea473139fc6cd16004905556368b919325f0b72faeb16d0dcfae8d2a2

                              • C:\ProgramData\IIECFHDBAAEC\BGHIDG

                                Filesize

                                114KB

                                MD5

                                93033b50faaecfc1f3413dd113d4f365

                                SHA1

                                a04840585ab5160bad05c13aabe2a875416b0d79

                                SHA256

                                51ac570ca79b6f12f89240532e24cf26a9cab7e982b6570e54b10769c6f60e25

                                SHA512

                                986351814483f2072bf4b83a5bcd221be88f888f90f85ce588807e354b9716e96e0f238735740b6217bfd28ffc75eedeabb2d56d1a10a384ced5501b346611ce

                              • C:\ProgramData\IIECFHDBAAEC\EGCBAF

                                Filesize

                                160KB

                                MD5

                                f310cf1ff562ae14449e0167a3e1fe46

                                SHA1

                                85c58afa9049467031c6c2b17f5c12ca73bb2788

                                SHA256

                                e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                SHA512

                                1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                              • C:\ProgramData\IIECFHDBAAEC\IEHJDG

                                Filesize

                                124KB

                                MD5

                                9618e15b04a4ddb39ed6c496575f6f95

                                SHA1

                                1c28f8750e5555776b3c80b187c5d15a443a7412

                                SHA256

                                a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                                SHA512

                                f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                              • C:\ProgramData\IIECFHDBAAEC\JEBKEC

                                Filesize

                                8KB

                                MD5

                                9fcb238ed2e1ee02332b1fe663490e89

                                SHA1

                                83e0b9296a69a6b87c299522a838a72a1d66a396

                                SHA256

                                3e7d9df9c620ed53b6f7b0b4d8b38302404bd76c5fe3a0eb946ad0c4a359d3e4

                                SHA512

                                7fe6cff7d6ae7b1c3808fa6ba7a5c75e8e66870cca0204dcaacb0ecfbe1e8d098c724b836fcc5160f5eab1e8bcfdef03b1e6573605a512886033e5014a20d465

                              • C:\ProgramData\IIECFHDBAAEC\JEHIJJ

                                Filesize

                                116KB

                                MD5

                                f70aa3fa04f0536280f872ad17973c3d

                                SHA1

                                50a7b889329a92de1b272d0ecf5fce87395d3123

                                SHA256

                                8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                SHA512

                                30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                              • C:\ProgramData\IJKJDAFHJDHI\GCBGCA

                                Filesize

                                40KB

                                MD5

                                a182561a527f929489bf4b8f74f65cd7

                                SHA1

                                8cd6866594759711ea1836e86a5b7ca64ee8911f

                                SHA256

                                42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                SHA512

                                9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                              • C:\ProgramData\IJKJDAFHJDHI\JKECFC

                                Filesize

                                20KB

                                MD5

                                a603e09d617fea7517059b4924b1df93

                                SHA1

                                31d66e1496e0229c6a312f8be05da3f813b3fa9e

                                SHA256

                                ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

                                SHA512

                                eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

                              • C:\ProgramData\freebl3.dll

                                Filesize

                                669KB

                                MD5

                                550686c0ee48c386dfcb40199bd076ac

                                SHA1

                                ee5134da4d3efcb466081fb6197be5e12a5b22ab

                                SHA256

                                edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa

                                SHA512

                                0b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e

                              • C:\ProgramData\mozglue.dll

                                Filesize

                                593KB

                                MD5

                                c8fd9be83bc728cc04beffafc2907fe9

                                SHA1

                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                SHA256

                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                SHA512

                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                              • C:\ProgramData\msvcp140.dll

                                Filesize

                                439KB

                                MD5

                                5ff1fca37c466d6723ec67be93b51442

                                SHA1

                                34cc4e158092083b13d67d6d2bc9e57b798a303b

                                SHA256

                                5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

                                SHA512

                                4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

                              • C:\ProgramData\nss3.dll

                                Filesize

                                2.0MB

                                MD5

                                1cc453cdf74f31e4d913ff9c10acdde2

                                SHA1

                                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                SHA256

                                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                SHA512

                                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                              • C:\ProgramData\softokn3.dll

                                Filesize

                                251KB

                                MD5

                                4e52d739c324db8225bd9ab2695f262f

                                SHA1

                                71c3da43dc5a0d2a1941e874a6d015a071783889

                                SHA256

                                74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a

                                SHA512

                                2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6

                              • C:\ProgramData\vcruntime140.dll

                                Filesize

                                78KB

                                MD5

                                a37ee36b536409056a86f50e67777dd7

                                SHA1

                                1cafa159292aa736fc595fc04e16325b27cd6750

                                SHA256

                                8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

                                SHA512

                                3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

                              • C:\Users\Admin\AppData\Local\MP3 CD Ripper Beta\mp3cdripperbeta32_64.exe

                                Filesize

                                3.1MB

                                MD5

                                969b33e0941fcd6a0e503c358f0ba03e

                                SHA1

                                28c81cc5df08c18b0f0e469510be8a9c9e3f402f

                                SHA256

                                44a960a466af20797daf0c7732a04d0195bea638242430d52cc387deda87b6f3

                                SHA512

                                ea007d6fcf7d2dd4b3d566195ba2c6450a623b78587a56c7494f32911ebcdb634d25293dfd47ef8eae698525b67c137392cce41a1d8faaea74c4b65a99009b88

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log

                                Filesize

                                2KB

                                MD5

                                60ad21e008a8447fc1130a9c9c155148

                                SHA1

                                5dfa21d14dc33de3cc93a463688fe1d640b01730

                                SHA256

                                bb65e24fd8681e7af464e115fba42ff7713e933683cbd654a124c0e564530bb9

                                SHA512

                                42a2753f717a4984967907fa69200e8a464068a6d4a226803cf9503ffb7fee540ffc611b4c905cc84f3623639a6aa93003b390f9c38e601b59f171a9e90bd9b6

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\CWF229A2\76561199747278259[1].htm

                                Filesize

                                33KB

                                MD5

                                ad303cf93c557cdfccbef7fe8e46f531

                                SHA1

                                9f66694a2612a87b2b531d2b2f03954d6766c1e3

                                SHA256

                                7a79d476f5a729084c5de943699b7626dad81fa852dab9e10af8bc3f4912ccc5

                                SHA512

                                211a15eaaefdfd01568807066d7950b651b95cb0409cf5b66a044661095a9a08dde8ea170b7f7d2961c58cb40fc14fa1b6fa08f958eba633fcd9c7ac08bc11ba

                              • C:\Users\Admin\AppData\Local\Temp\is-6P617.tmp\is-2IMFI.tmp

                                Filesize

                                642KB

                                MD5

                                6580f6f26daf83c5e4d3e3b28e2f70f6

                                SHA1

                                5bc35126a341e038b96923db25c3f5424a631c5e

                                SHA256

                                e241bd09fc67344895f45de4fb9f147d618a8a5bcec360c83882675e75ebd672

                                SHA512

                                8f042bbbaec8f0a7cb31cfa44ed0e3d72100e3f3473f442e06ffc7f90322da4cb54979ba51365033cba927b801225d339e64b3b31c3b57483b76bd006908dd36

                              • C:\Users\Admin\AppData\Local\Temp\is-D3KB1.tmp\_iscrypt.dll

                                Filesize

                                2KB

                                MD5

                                a69559718ab506675e907fe49deb71e9

                                SHA1

                                bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                SHA256

                                2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                SHA512

                                e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnk

                                Filesize

                                1KB

                                MD5

                                267a00fe7a22fa4bf2543e7225da0a4f

                                SHA1

                                05b9ec01b72a1a10a22948b0310c4fd82ef833e1

                                SHA256

                                1f7ddfa2d90b871cc85930212a5bc270e5b589d8bfc3c660a628fbd7141491bb

                                SHA512

                                81e3e5c9daa1d364ccbdf69c2d182f384596eab6d45ff0022cbc4a2c53d8ad251f61f1d350dff5c5af9edddb78fbaa2d28c14173f452a10defd02d180834803f

                              • C:\Users\Admin\Documents\piratemamm\Fs3cAZRoLgoGZ1_H3rSzXASO.exe

                                Filesize

                                480KB

                                MD5

                                46ed2f5409a89bb45f8d7b90bd4b3ee8

                                SHA1

                                639ceddb42c3fe622d0f5aed2a2c65f69a82cd15

                                SHA256

                                471da4679c8d3819c355fdcd7c834a0318699494972a78c5c48f791a960949c8

                                SHA512

                                34d4e53510fd0aa57aa65dfd55176ef993827d558d8e6eb83d1a529768a77bed85fbb853218e628de42839230293cbecdb3f7318c1cad8f34c7b3d44b9f9b759

                              • C:\Users\Admin\Documents\piratemamm\Fs3cAZRoLgoGZ1_H3rSzXASO.exe

                                Filesize

                                480KB

                                MD5

                                96daf295843ca1cf1408b8f5a912c136

                                SHA1

                                b00c166fea9bca5ea77e0f1864f4284bacf37ce2

                                SHA256

                                40b704b032f93c27acddc971ec757a9eeb8019adc9ab400f14719b298ae9419a

                                SHA512

                                5bd3f90e9576b36a3b15bfb19b77c2184302b3c7b4d6568e861ed6f1e9808e4666af9c422d4867c1f522b8ed8508d82802d245d5b141172faab18a072f3fd820

                              • C:\Users\Admin\Documents\piratemamm\Rm8DG5gpCJbTxcIX4uRDB_yw.exe

                                Filesize

                                4.7MB

                                MD5

                                727dcaeb4f0c1b079f38de04d46b8b61

                                SHA1

                                9a1d3a2fba990c3556550d51891fe27db166831c

                                SHA256

                                b73a7ba55921766688d6556cbdb0a86906d658510f007a4c7792d95145912356

                                SHA512

                                24e3751b6376f4237affb010b35bd56f75822c9c202edc66412a53194184779fdc795f084823ee4b091f1584ff15a654d5b4d0f37f1b7b40701bd06cd3b64176

                              • C:\Users\Admin\Documents\piratemamm\Rm8DG5gpCJbTxcIX4uRDB_yw.exe

                                Filesize

                                4.7MB

                                MD5

                                b366925f2782d865196e48969928a02d

                                SHA1

                                076cbb4249c1425388c6429f3da17cb499142493

                                SHA256

                                e5d5729184e407491fab88b4fe8de5307af67b567887babffb5ec4ee2eab4834

                                SHA512

                                2f70441adc95dda09b254582755c653ef81a85f8cb0e872e270921bc57802dcad680badd52a32447eb900931b789ce6a9ea4c091d517135df4b2854327efdd62

                              • C:\Users\Admin\Documents\piratemamm\StlF6kWMqAD21wM1jXgvv4Ar.exe

                                Filesize

                                3.7MB

                                MD5

                                2ab891d9c6b24c5462e32a0bab3d1fec

                                SHA1

                                4dbb387d2fce2b47ff3699468590466505ba7554

                                SHA256

                                6ffd157eb781504eadd72996c2cdbd4881034ffb7f7d2bc4b96d4daa61fb4d86

                                SHA512

                                0317a30e9e70d0ac8416f14a91119504fc40e9a72ee34d358741ebf820367abb3b18e2c64987f6d86d3c4a8952621aebeca83fa027d66edb456c749e56d42d89

                              • C:\Users\Admin\Documents\piratemamm\XODKyrRtoiWNcSS45ZSSRAf1.exe

                                Filesize

                                1003KB

                                MD5

                                e21c96e36fe32401a35f1ce5d682261d

                                SHA1

                                929161085902d893513e96911f419e2788c5dc91

                                SHA256

                                e2aae19b046e47cdda7bbb00d3c4fbb801b10b470b1cd5da539bba41509dce23

                                SHA512

                                6478d9adba4469146af893085a3fad179f9f17954012953c5811b6fb77e9f3b0084203f341a4457bf5e72c4d6eeb94f8164cbbbb59426af6ea9931279633b909

                              • C:\Users\Admin\Documents\piratemamm\XODKyrRtoiWNcSS45ZSSRAf1.exe

                                Filesize

                                1003KB

                                MD5

                                5d63ad0f9c259fdc26185773bb1fef9b

                                SHA1

                                1ef790359804b3f27daedfb2fb9dd885927547c6

                                SHA256

                                8bf4b78f93ee95bb1deaf613a4bf3963dce18023bce71d9d6bcf87098120c656

                                SHA512

                                bf0ac948b4262dadac52c32af70b780c0187401ac3f1019aa23014147300a8affe654da4258000e23bfa8e32124ce2ea6d8460f64eae4447c2af85caa557efb8

                              • C:\Users\Admin\Documents\piratemamm\eLkBIGH8iGA_TNVMoQM3QOcm.exe

                                Filesize

                                6.7MB

                                MD5

                                39c9e80e32b15c9010648e422e412ea1

                                SHA1

                                7053c8f8e505cbb18b4fa4cbc2e732b4f01f5362

                                SHA256

                                cef8b12b6541259d5fc2001e648b8fe33d58a001745a2bbe4cc9068bb961de2e

                                SHA512

                                430fb5def8e95c34f5b2a01ced0d07f9d10c3709795158e670a19b48e18701f8d9a5e5ea5a75d07661670f0ea7ec0ec5401fc0d502c005c5e1f2121b7e200499

                              • C:\Users\Admin\Documents\piratemamm\k1L2XEOChJ4DrFgc9oZolQGi.exe

                                Filesize

                                287KB

                                MD5

                                f04052fb093c0ffe4484abbdac0d1cf1

                                SHA1

                                58dbf4a9ddd955e03032efc4c9cb97e13f67aa7c

                                SHA256

                                dae56bc934663460f6cece9445ff4c10183f33054c67be434b5af40245ddce59

                                SHA512

                                b8a5c5f0cd5e023df8f2af5c31a893acd218da1971e90e3daa76933b3c27f0f4e8af4a5848d33da75bf6bcec8de97aa86c099bc2e91dac71cf54265c8203f420

                              • C:\Users\Admin\Documents\piratemamm\qkfCzLq17mRJf_eWZddEpY62.exe

                                Filesize

                                10.1MB

                                MD5

                                3b24971c5fef776db7df10a769f0857a

                                SHA1

                                ab314ddf208ef3e8d06f2f5e96f0f481075de0f4

                                SHA256

                                0d990bedac4696a67ad46dbc686750086f72f4795ed8a6121782ba3b0dc736b5

                                SHA512

                                f70dccd6fd95516eac21b0cc30c70fb5f17c3c8f1f3b28fe3bdaec6053c2de53daf68caf422dea8861e4ab84f3dd7be36965c6998c1380dbf2a05a2a74b36b28

                              • C:\Users\Admin\Documents\piratemamm\se8dOl6JODxBSiHqh68Wp12X.exe

                                Filesize

                                4.7MB

                                MD5

                                de4d8ed12fe5cbc1d2618b847363c63f

                                SHA1

                                af28e145c87af3bd3b19fd6639f4f776555ed899

                                SHA256

                                9a4c61384c5a8ac8e36805be2ba8f4088bfda909b5066f6c4b5e1880010c5389

                                SHA512

                                b9f03dfb1c6d07b532180513ee025d4985ca5046de8aeb8e9ba45d187533ed892e004f0e3cce1259fc6b6ebca28876bb024a9b95a7692c0caa6720c99f3cfc72

                              • C:\Users\Admin\Documents\piratemamm\se8dOl6JODxBSiHqh68Wp12X.exe

                                Filesize

                                4.7MB

                                MD5

                                af89bf8d68d054656a8c4646e8e7c555

                                SHA1

                                e92e5b260125eef08138b44192e3d5116744f3dc

                                SHA256

                                8c3b7045c3538dc8167aeaee0b72e57437e7898ca71bed00e9999b65ed56bfed

                                SHA512

                                da835fb9f15274d04b5c10b0b4149dca1374db925b1dfb43a60a36b73c3ac352ad93d36d5d8fad40b1e9a3574e785e924eab496800e648264ca43030fdd8ad53

                              • C:\Windows\System32\GroupPolicy\gpt.ini

                                Filesize

                                127B

                                MD5

                                8ef9853d1881c5fe4d681bfb31282a01

                                SHA1

                                a05609065520e4b4e553784c566430ad9736f19f

                                SHA256

                                9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                SHA512

                                5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                              • memory/1996-209-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-179-0x0000000005F80000-0x00000000060EC000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/1996-193-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-191-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-197-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-199-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-205-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-186-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-201-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-187-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-175-0x0000000005DB0000-0x0000000005F76000-memory.dmp

                                Filesize

                                1.8MB

                              • memory/1996-195-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-211-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-203-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-207-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-189-0x0000000005BF0000-0x0000000005C05000-memory.dmp

                                Filesize

                                84KB

                              • memory/1996-155-0x0000000000F50000-0x000000000140C000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2044-587-0x0000000000400000-0x000000000071A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2044-377-0x0000000000400000-0x000000000071A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2264-150-0x0000000000AB0000-0x0000000000F70000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/2264-170-0x00000000059E0000-0x0000000005BAA000-memory.dmp

                                Filesize

                                1.8MB

                              • memory/2264-178-0x0000000005750000-0x000000000576C000-memory.dmp

                                Filesize

                                112KB

                              • memory/2264-176-0x0000000005BB0000-0x0000000005D20000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/2264-152-0x0000000005940000-0x00000000059DC000-memory.dmp

                                Filesize

                                624KB

                              • memory/2668-67-0x000002833C060000-0x000002833C061000-memory.dmp

                                Filesize

                                4KB

                              • memory/2668-65-0x000002833C060000-0x000002833C061000-memory.dmp

                                Filesize

                                4KB

                              • memory/2668-63-0x000002833C060000-0x000002833C061000-memory.dmp

                                Filesize

                                4KB

                              • memory/2668-62-0x000002833C060000-0x000002833C061000-memory.dmp

                                Filesize

                                4KB

                              • memory/2668-66-0x000002833C060000-0x000002833C061000-memory.dmp

                                Filesize

                                4KB

                              • memory/2668-64-0x000002833C060000-0x000002833C061000-memory.dmp

                                Filesize

                                4KB

                              • memory/2668-68-0x000002833C060000-0x000002833C061000-memory.dmp

                                Filesize

                                4KB

                              • memory/2668-56-0x000002833C060000-0x000002833C061000-memory.dmp

                                Filesize

                                4KB

                              • memory/2668-57-0x000002833C060000-0x000002833C061000-memory.dmp

                                Filesize

                                4KB

                              • memory/2668-58-0x000002833C060000-0x000002833C061000-memory.dmp

                                Filesize

                                4KB

                              • memory/2876-422-0x0000000007950000-0x00000000079A0000-memory.dmp

                                Filesize

                                320KB

                              • memory/2876-365-0x0000000006770000-0x0000000006D88000-memory.dmp

                                Filesize

                                6.1MB

                              • memory/2876-366-0x0000000005A10000-0x0000000005B1A000-memory.dmp

                                Filesize

                                1.0MB

                              • memory/2876-374-0x0000000005910000-0x000000000595C000-memory.dmp

                                Filesize

                                304KB

                              • memory/2876-341-0x0000000000400000-0x0000000000450000-memory.dmp

                                Filesize

                                320KB

                              • memory/2876-367-0x0000000005870000-0x0000000005882000-memory.dmp

                                Filesize

                                72KB

                              • memory/2876-371-0x00000000058D0000-0x000000000590C000-memory.dmp

                                Filesize

                                240KB

                              • memory/3308-140-0x0000000000400000-0x0000000000413000-memory.dmp

                                Filesize

                                76KB

                              • memory/3624-592-0x0000000005F50000-0x00000000060BC000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/3624-591-0x0000000005D80000-0x0000000005F48000-memory.dmp

                                Filesize

                                1.8MB

                              • memory/3624-590-0x0000000000D00000-0x00000000011BA000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/4088-373-0x0000000000400000-0x000000000071A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/4088-364-0x0000000000400000-0x000000000071A000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/4128-671-0x0000000006020000-0x00000000061AA000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/4128-670-0x0000000005E40000-0x0000000006024000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/4128-669-0x0000000000F60000-0x0000000001442000-memory.dmp

                                Filesize

                                4.9MB

                              • memory/4736-568-0x0000000000300000-0x0000000000C8F000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/4736-171-0x0000000000300000-0x0000000000C8F000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/4736-149-0x0000000000300000-0x0000000000C8F000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/4736-172-0x0000000000300000-0x0000000000C8F000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/4736-168-0x0000000000300000-0x0000000000C8F000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/4736-166-0x0000000000300000-0x0000000000C8F000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/4736-167-0x0000000000300000-0x0000000000C8F000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/4736-164-0x0000000000300000-0x0000000000C8F000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/4908-2-0x00007FF6D02E6000-0x00007FF6D0440000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/4908-18-0x000001EB3A020000-0x000001EB3A0C9000-memory.dmp

                                Filesize

                                676KB

                              • memory/4908-7-0x00007FF6D0180000-0x00007FF6D0700000-memory.dmp

                                Filesize

                                5.5MB

                              • memory/4908-316-0x00007FF6D02E6000-0x00007FF6D0440000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/4908-5-0x00007FFF6FDF0000-0x00007FFF6FDF2000-memory.dmp

                                Filesize

                                8KB

                              • memory/4908-0-0x00007FFF72370000-0x00007FFF72372000-memory.dmp

                                Filesize

                                8KB

                              • memory/4908-3-0x00007FFF70F20000-0x00007FFF70F22000-memory.dmp

                                Filesize

                                8KB

                              • memory/4908-20-0x00007FF6D02E6000-0x00007FF6D0440000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/4908-4-0x00007FFF70F30000-0x00007FFF70F32000-memory.dmp

                                Filesize

                                8KB

                              • memory/4908-1-0x00007FFF72380000-0x00007FFF72382000-memory.dmp

                                Filesize

                                8KB

                              • memory/4908-6-0x00007FFF6FE00000-0x00007FFF6FE02000-memory.dmp

                                Filesize

                                8KB

                              • memory/4928-326-0x0000000005790000-0x0000000005822000-memory.dmp

                                Filesize

                                584KB

                              • memory/4928-385-0x000000000A410000-0x000000000A93C000-memory.dmp

                                Filesize

                                5.2MB

                              • memory/4928-384-0x00000000099C0000-0x0000000009B82000-memory.dmp

                                Filesize

                                1.8MB

                              • memory/4928-382-0x0000000009290000-0x00000000092AE000-memory.dmp

                                Filesize

                                120KB

                              • memory/4928-380-0x0000000009570000-0x00000000095E6000-memory.dmp

                                Filesize

                                472KB

                              • memory/4928-379-0x00000000092B0000-0x0000000009316000-memory.dmp

                                Filesize

                                408KB

                              • memory/4928-169-0x0000000000400000-0x000000000045E000-memory.dmp

                                Filesize

                                376KB

                              • memory/4928-340-0x00000000056C0000-0x00000000056CA000-memory.dmp

                                Filesize

                                40KB

                              • memory/4928-324-0x0000000005C00000-0x00000000061A4000-memory.dmp

                                Filesize

                                5.6MB