Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-09-2024 01:56

General

  • Target

    8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe

  • Size

    1.1MB

  • MD5

    f1424e5b9810a4a9c33506aa784fca89

  • SHA1

    4ad6287fe149832551afbcb1113db50cd133777b

  • SHA256

    8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed

  • SHA512

    e03432137a7c12c03d34302fe4e1774a3a08935d39f665e4086fd8637f4ea961a645e2a8bb3cd85dd24c54861e4f01b0500a70641e2fa3a4a09e2e89a3b77380

  • SSDEEP

    12288:JYYjzzONcuuIYsYNeaCbU6sKySaVQ4pBgncu7EKHCBbsCU/hpgmxCBbsCUXEGnF9:eg9uurUngnBU97EniCUppoiCUXfF9

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

185.252.232.158:7812

64.23.232.116:7812

Mutex

vsvf

Attributes
  • delay

    1

  • install

    true

  • install_file

    Windows Security Health Service.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7074211690:AAFHdtGIEk1j3FpHjh6_p8Xjh9rfZDo4uSc/sendMessage?chat_id=6291749148

https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain
aes.plain

Extracted

Family

xworm

Version

5.0

C2

146.190.29.250:7812

165.227.91.90:7812

167.99.94.206:7812

Mutex

4chIqEbR5Rq6U6EI

Attributes
  • Install_directory

    %AppData%

  • install_file

    Windows Defender Service Host.exe

  • telegram

    https://api.telegram.org/bot7074211690:AAFHdtGIEk1j3FpHjh6_p8Xjh9rfZDo4uSc/sendMessage?chat_id=6291749148

aes.plain

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Office04

C2

146.190.29.250:7812

Mutex

VNM_MUTEX_h1gQxrpyccCFZq7JPS

Attributes
  • encryption_key

    V5fWyT4tQqXFouaUUxe2

  • install_name

    Windows Security.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Update

  • subdirectory

    SubDir34

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 4 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Async RAT payload 3 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 14 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe
    "C:\Users\Admin\AppData\Local\Temp\8a3da2a07e82bf22f3cd239de861b2b8c50c9fe9ee2ba12a33564e1b5cc93fed.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Users\Admin\AppData\Roaming\crack.exe
      "C:\Users\Admin\AppData\Roaming\crack.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6DFC.tmp.cmd""
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3572
        • C:\Windows\SysWOW64\timeout.exe
          timeout 4
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:4576
    • C:\Users\Admin\AppData\Roaming\Cracked.exe
      "C:\Users\Admin\AppData\Roaming\Cracked.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4832
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3632
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "Windows Security Health Service" /tr '"C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"'
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1196
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6A43.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4312
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:2304
        • C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe
          "C:\Users\Admin\AppData\Roaming\Windows Security Health Service.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3004
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:940
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        PID:2152
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3508
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:1828
        • C:\Windows\SysWOW64\findstr.exe
          findstr All
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1356
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4532
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1552
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show networks mode=bssid
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2844
    • C:\Users\Admin\AppData\Roaming\update.exe
      "C:\Users\Admin\AppData\Roaming\update.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:212
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:448
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:808
        • C:\Windows\SysWOW64\findstr.exe
          findstr All
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2384
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
        3⤵
        • System Location Discovery: System Language Discovery
        PID:884
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:936
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show networks mode=bssid
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:3396
    • C:\Users\Admin\AppData\Roaming\Window Security.exe
      "C:\Users\Admin\AppData\Roaming\Window Security.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Checks computer location settings
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Window Security.exe" /rl HIGHEST /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4488
      • C:\Users\Admin\AppData\Roaming\SubDir34\Windows Security.exe
        "C:\Users\Admin\AppData\Roaming\SubDir34\Windows Security.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3240
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir34\Windows Security.exe" /rl HIGHEST /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2240
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3396
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3364
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4868
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8EMMncIdEZHV.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3156
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1916
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1480
        • C:\Users\Admin\AppData\Roaming\Window Security.exe
          "C:\Users\Admin\AppData\Roaming\Window Security.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4856
    • C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe
      "C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender Service Host" /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4772
  • C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe
    "C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3040
  • C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe
    "C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\244afb72866c8b52ebeea553725abc3a\Admin@KZYBFHMK_en-US\System\Process.txt

    Filesize

    4KB

    MD5

    3703dafe83ae78057f885bc7d275a7dd

    SHA1

    f99d12945546f53cd9bbcb37c5cb7588b05bea6d

    SHA256

    abb092b713575c8d8dca8cc159425b9901302aa331b4a1877edc71dc80464881

    SHA512

    dd20da8a15f442aadcc6cce6a2c8cdd93caef857d4428efd635dcc4018908270d61eda692bdb7137be5a4542af4fa575ca3a0c09f60a4d146bfa0baf2ca81f87

  • C:\Users\Admin\AppData\Local\48fc5197e2f4f4ede7a9e52c81d7baf7\msgid.dat

    Filesize

    1B

    MD5

    cfcd208495d565ef66e7dff9f98764da

    SHA1

    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

    SHA256

    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

    SHA512

    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Defender Service Host.exe.log

    Filesize

    654B

    MD5

    2ff39f6c7249774be85fd60a8f9a245e

    SHA1

    684ff36b31aedc1e587c8496c02722c6698c1c4e

    SHA256

    e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

    SHA512

    1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Window Security.exe.log

    Filesize

    1KB

    MD5

    10eab9c2684febb5327b6976f2047587

    SHA1

    a12ed54146a7f5c4c580416aecb899549712449e

    SHA256

    f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

    SHA512

    7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

  • C:\Users\Admin\AppData\Local\Temp\8EMMncIdEZHV.bat

    Filesize

    209B

    MD5

    c9d232718c48375a2c49d6f7064cf0b6

    SHA1

    b9bd50968372e3198a1c7d452378a4a3cf5b6fab

    SHA256

    9c479d2db2dae74fbb8c164c9263d1d3851bed91445d4022237cd5f47082b95c

    SHA512

    2f681ed3b1cdeb93edaf02e009e38be5bacb502a8aba70dcd7c8e41fddf89eaba3614a59183da3be15cb4cf885817370991367a03f018ffe66a27c4f7b9418ee

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ovyoc1tp.bgk.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\places.raw

    Filesize

    5.0MB

    MD5

    81412f7f844b75a6c65ed71eac0b9e61

    SHA1

    39b14eb48e13daaf94023482666fc9e13118ba72

    SHA256

    e37ca7753860c60248b70828432c8e018a3788479808fdfdbc4d3b369b381019

    SHA512

    63f2f6af6974091fb8de9dae945b392bb5f68abe66f7d9e3906089bb31f8e7ae2be03fcce44288514678b2b79eb309667b4607e9132183d1bb9a631ad65a983a

  • C:\Users\Admin\AppData\Local\Temp\tmp6A43.tmp.bat

    Filesize

    175B

    MD5

    fa0fe982a2a0a34b1750f7038f4ec163

    SHA1

    0396733e53449c883aa69aed731fd0eeb0c90064

    SHA256

    9eae411ed0bc4856cd9f0522f52f00257a19cf77425c8da0f15011988e707ea2

    SHA512

    64c0b7a478c70a03e450c86188156315c2d21b5df118ec0090fbfe4f72585d3f012f0902cbc87b62f4d25241fa3829760f90b2c15dd631fb34ec08bb7059c706

  • C:\Users\Admin\AppData\Local\Temp\tmp6DFC.tmp.cmd

    Filesize

    151B

    MD5

    5afb73cfdc4b74b10e8891d9a6810152

    SHA1

    663469a61215b25ab7f298799cb7b16e463a6808

    SHA256

    7d5fcc3e59ff75380228ceb57737bc92f80f504379e330ec697d5a0b4e5e4e2a

    SHA512

    f7aed2339dff6fc439809691b3b9372a48db84acb9e526e686739c637ffe5bd6ea176c01be991d2676b13aacad2fa48a75a40b198e8e8567741f011700908659

  • C:\Users\Admin\AppData\Local\Temp\tmp806B.tmp.dat

    Filesize

    114KB

    MD5

    242b4242b3c1119f1fb55afbbdd24105

    SHA1

    e1d9c1ed860b67b926fe18206038cd10f77b9c55

    SHA256

    2d0e57c642cc32f10e77a73015075c2d03276dd58689944b01139b2bde8a62a1

    SHA512

    7d1e08dc0cf5e241bcfe3be058a7879b530646726c018bc51cc4821a7a41121bcda6fbfdeeca563e3b6b5e7035bdd717781169c3fdbd2c74933390aa9450c684

  • C:\Users\Admin\AppData\Local\Temp\tmp806D.tmp.dat

    Filesize

    160KB

    MD5

    f310cf1ff562ae14449e0167a3e1fe46

    SHA1

    85c58afa9049467031c6c2b17f5c12ca73bb2788

    SHA256

    e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

    SHA512

    1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

  • C:\Users\Admin\AppData\Local\Temp\tmp8070.tmp.dat

    Filesize

    116KB

    MD5

    f70aa3fa04f0536280f872ad17973c3d

    SHA1

    50a7b889329a92de1b272d0ecf5fce87395d3123

    SHA256

    8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

    SHA512

    30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

  • C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\Admin@KZYBFHMK_en-US\Browsers\Firefox\Bookmarks.txt

    Filesize

    105B

    MD5

    2e9d094dda5cdc3ce6519f75943a4ff4

    SHA1

    5d989b4ac8b699781681fe75ed9ef98191a5096c

    SHA256

    c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

    SHA512

    d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

  • C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\Admin@KZYBFHMK_en-US\System\Process.txt

    Filesize

    4KB

    MD5

    2be0849ffa6c34f5178edad59e3ca323

    SHA1

    5b446ffdf327e93c963a185fdf067c49cb42c104

    SHA256

    6e415c1326d948fb7374cbf69e71fa1c77953e068b1152a53a2110771055f142

    SHA512

    ded2e173d0e326cac3d7cf31b694a8ba7a45b2d8cdbebcc3440faf27647ef7ab795d19c2bcb183004f5c7b9561e7d5eb549a87f6557b6a45352a828b1743455e

  • C:\Users\Admin\AppData\Local\cd715dd0cb9123424d92f63e0c63e92a\msgid.dat

    Filesize

    4B

    MD5

    99ba5c4097c6b8fef5ed774a1a6714b8

    SHA1

    f1febaefe09fccf9243580f7522c1543012df210

    SHA256

    a7c24c0bcfeeaa0ca9751a639c0606083df9faba7faa9ecfef9ba2342f4e5a0f

    SHA512

    36d35281900b81e5f171e3fd7fc2cf7af38def70de5a8f28a1b3d310a0f33411f8111c3ffdfad3e482494f68fb12aecf7d3b3205df52fc7df38cb989694ba094

  • C:\Users\Admin\AppData\Roaming\Cracked.exe

    Filesize

    74KB

    MD5

    0dfa83a82f6418c73406d78296de61be

    SHA1

    dd7eceef8a434c43e0751e180bf714e08771d336

    SHA256

    8d27369ffa8b29d561fa9daf485be14d2fc00287bb1c69d4c84d514891c8db5e

    SHA512

    9a4b026250b18c29ab7dd48203f321c2ef2f12695bd2dcb52ebbc15001c8ddf019d5a7e04da056c50c1881ce269d1810259bf6d04b61f471e8751b7192fc73d4

  • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf

    Filesize

    8B

    MD5

    cf759e4c5f14fe3eec41b87ed756cea8

    SHA1

    c27c796bb3c2fac929359563676f4ba1ffada1f5

    SHA256

    c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

    SHA512

    c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

  • C:\Users\Admin\AppData\Roaming\Window Security.exe

    Filesize

    534KB

    MD5

    81b2c5c64951b603480d40d321540ff2

    SHA1

    314199ad92baeb203f5555ff3814e9b7a4f226f8

    SHA256

    b893220d33f9b8a0f98702bb577e4459792253ae651bdc18a93145ccd008af54

    SHA512

    3a57655bf7aa18a34364659553aad26a3d5b8946b957441f5fedebab5936b6bb2c71c6337837ead486a001b6a9227437cc5c4ec4a5de627f0e2db10dc6afdea6

  • C:\Users\Admin\AppData\Roaming\Windows Defender Service Host.exe

    Filesize

    43KB

    MD5

    5322a12cb24e83bfa9746fbde06d07e7

    SHA1

    5263a4f26bda073e9f82dd4fa612eb494dd771c7

    SHA256

    4957d607c2984f94a258dba088fa1ab85e508bfaabe9279bf8b6bf6f4b97a9bb

    SHA512

    67bfaef1ddf4ad44218c82c5634e7f726304845fab1d5361353fdacd8d8d767fec32c871fa304f4199dde3f6224be76c67560a64c1d72bbe20e134c50d1bf058

  • C:\Users\Admin\AppData\Roaming\crack.exe

    Filesize

    8KB

    MD5

    9215015740c937980b6b53cee5087769

    SHA1

    a0bfe95486944f1548620d4de472c3758e95d36a

    SHA256

    a5390a297f14ef8f5be308009ec436d2a58598188dbb92d7299795a10ba1c541

    SHA512

    5b9bbf1836466d803d3e160a38e10c8397aa3966c120ab6435a52b7d0a09eb664ef2172bf0e7e2de1cc3eae261167c9355fa7ac3b1b7e4504a7e07b82c4b90e2

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    170KB

    MD5

    96014694a042d8344b910bc47d79337b

    SHA1

    9d19ab2f110ae58f30965a5a3d608cbf51986edb

    SHA256

    4950eb74909bd6e739e38e57d8c6465c76ef108d65cac9f130d3f5c6d2fe943f

    SHA512

    fe308c42b3ad2c3d73a834399aa12ea23f336103389181dface80a81da8be1ffd9a950cac802dc8a806ad318eb90a6bb6021d1acd9206a07749f83f2bb6cd03d

  • C:\Users\Admin\AppData\Roaming\update.exe

    Filesize

    225KB

    MD5

    b8df7316cc35a0fb6fe3a326b4283010

    SHA1

    d49c11f5a95f72e37d6194df41178f2b7faa01ee

    SHA256

    f243df692ee7552286d52b23e4993e07a27877aa86c63b84903a8e6cbd0d19f3

    SHA512

    3ef92be29123695820970a003fd0561a57f87c8c6adae86781729027ce40ede4b63da30d0b0cc75376bd9ae90accaf674fc7ff799a8b73ab4bb45b2ca65ff120

  • memory/940-73-0x00000000007B0000-0x00000000007E0000-memory.dmp

    Filesize

    192KB

  • memory/940-465-0x00000000061D0000-0x00000000061E2000-memory.dmp

    Filesize

    72KB

  • memory/1428-452-0x0000000005B10000-0x0000000005B1A000-memory.dmp

    Filesize

    40KB

  • memory/1428-72-0x0000000000820000-0x000000000085E000-memory.dmp

    Filesize

    248KB

  • memory/1904-74-0x0000000000300000-0x0000000000312000-memory.dmp

    Filesize

    72KB

  • memory/3240-119-0x00000000061B0000-0x00000000061BA000-memory.dmp

    Filesize

    40KB

  • memory/3396-140-0x0000000007540000-0x000000000755A000-memory.dmp

    Filesize

    104KB

  • memory/3396-139-0x0000000007440000-0x0000000007454000-memory.dmp

    Filesize

    80KB

  • memory/3396-112-0x0000000005EF0000-0x0000000005F3C000-memory.dmp

    Filesize

    304KB

  • memory/3396-102-0x0000000005930000-0x0000000005C84000-memory.dmp

    Filesize

    3.3MB

  • memory/3396-96-0x0000000004FB0000-0x0000000005016000-memory.dmp

    Filesize

    408KB

  • memory/3396-120-0x00000000070A0000-0x00000000070D2000-memory.dmp

    Filesize

    200KB

  • memory/3396-121-0x00000000704F0000-0x000000007053C000-memory.dmp

    Filesize

    304KB

  • memory/3396-131-0x0000000006480000-0x000000000649E000-memory.dmp

    Filesize

    120KB

  • memory/3396-132-0x00000000070E0000-0x0000000007183000-memory.dmp

    Filesize

    652KB

  • memory/3396-133-0x0000000007840000-0x0000000007EBA000-memory.dmp

    Filesize

    6.5MB

  • memory/3396-134-0x0000000007200000-0x000000000721A000-memory.dmp

    Filesize

    104KB

  • memory/3396-135-0x0000000007270000-0x000000000727A000-memory.dmp

    Filesize

    40KB

  • memory/3396-136-0x0000000007480000-0x0000000007516000-memory.dmp

    Filesize

    600KB

  • memory/3396-137-0x0000000007400000-0x0000000007411000-memory.dmp

    Filesize

    68KB

  • memory/3396-138-0x0000000007430000-0x000000000743E000-memory.dmp

    Filesize

    56KB

  • memory/3396-110-0x0000000005EC0000-0x0000000005EDE000-memory.dmp

    Filesize

    120KB

  • memory/3396-93-0x0000000004910000-0x0000000004946000-memory.dmp

    Filesize

    216KB

  • memory/3396-141-0x0000000007520000-0x0000000007528000-memory.dmp

    Filesize

    32KB

  • memory/3396-95-0x0000000004F10000-0x0000000004F32000-memory.dmp

    Filesize

    136KB

  • memory/3396-94-0x0000000005120000-0x0000000005748000-memory.dmp

    Filesize

    6.2MB

  • memory/4120-75-0x00000000008A0000-0x00000000008A8000-memory.dmp

    Filesize

    32KB

  • memory/4220-0-0x00007FFD7E403000-0x00007FFD7E405000-memory.dmp

    Filesize

    8KB

  • memory/4220-1-0x0000000000BF0000-0x0000000000D10000-memory.dmp

    Filesize

    1.1MB

  • memory/4832-85-0x00007FFD7E400000-0x00007FFD7EEC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4832-68-0x00007FFD7E400000-0x00007FFD7EEC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4832-64-0x0000000000DB0000-0x0000000000DC8000-memory.dmp

    Filesize

    96KB

  • memory/5040-87-0x0000000006730000-0x000000000676C000-memory.dmp

    Filesize

    240KB

  • memory/5040-80-0x00000000061F0000-0x0000000006202000-memory.dmp

    Filesize

    72KB

  • memory/5040-79-0x00000000055D0000-0x0000000005636000-memory.dmp

    Filesize

    408KB

  • memory/5040-78-0x0000000005530000-0x00000000055C2000-memory.dmp

    Filesize

    584KB

  • memory/5040-77-0x0000000005980000-0x0000000005F24000-memory.dmp

    Filesize

    5.6MB

  • memory/5040-76-0x0000000000BA0000-0x0000000000C2C000-memory.dmp

    Filesize

    560KB