Analysis

  • max time kernel
    73s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 16:17

General

  • Target

    https://drive.google.com/file/d/1DSHSwW7U5pd0-wkBos_dwjXdoURl2bms/view

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1DSHSwW7U5pd0-wkBos_dwjXdoURl2bms/view
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80f3646f8,0x7ff80f364708,0x7ff80f364718
      2⤵
        PID:2296
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1880 /prefetch:2
        2⤵
          PID:3460
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1988 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3656
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:8
          2⤵
            PID:4572
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
            2⤵
              PID:2692
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
              2⤵
                PID:2284
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:1
                2⤵
                  PID:1572
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:1
                  2⤵
                    PID:3760
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:8
                    2⤵
                      PID:3248
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2168
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4748 /prefetch:8
                      2⤵
                        PID:2868
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:1
                        2⤵
                          PID:384
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6240 /prefetch:8
                          2⤵
                            PID:3884
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:1
                            2⤵
                              PID:5268
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:1
                              2⤵
                                PID:5276
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:1
                                2⤵
                                  PID:5428
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:1
                                  2⤵
                                    PID:5436
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1868,9026608003324727018,3163918173502617675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5888
                                  • C:\Users\Admin\Downloads\FiveNightsatFreddys.exe
                                    "C:\Users\Admin\Downloads\FiveNightsatFreddys.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    PID:6004
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:1352
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3312
                                    • C:\Windows\System32\GameBarPresenceWriter.exe
                                      "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
                                      1⤵
                                      • Network Service Discovery
                                      PID:4052
                                    • C:\Windows\system32\OpenWith.exe
                                      C:\Windows\system32\OpenWith.exe -Embedding
                                      1⤵
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2288
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                                      1⤵
                                      • Drops desktop.ini file(s)
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      PID:916
                                    • C:\Windows\system32\AUDIODG.EXE
                                      C:\Windows\system32\AUDIODG.EXE 0x464 0x4fc
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5308

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      ab8ce148cb7d44f709fb1c460d03e1b0

                                      SHA1

                                      44d15744015155f3e74580c93317e12d2cc0f859

                                      SHA256

                                      014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff

                                      SHA512

                                      f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      38f59a47b777f2fc52088e96ffb2baaf

                                      SHA1

                                      267224482588b41a96d813f6d9e9d924867062db

                                      SHA256

                                      13569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b

                                      SHA512

                                      4657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      384B

                                      MD5

                                      e0b2cf8ec6340671d63e70696ac80349

                                      SHA1

                                      4dee8076a7e2ff133d07de070e234958937ed09a

                                      SHA256

                                      97f4aabb5ac86f85056a75464d270c735698cf1d46fe4205a3b3ccf7d1bb5097

                                      SHA512

                                      95e7fc754e785747aa5a94e47a5be24b225103e903b2b8bbbe31bfc62fba2745b3884582dc7bc3c63788d1f0cbc7bc29f22610e539c248e37e0ff9f4e63c931f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      3KB

                                      MD5

                                      ee75553a783218f978b21dc11ea914a7

                                      SHA1

                                      b4dca7e8aedd52766be4fa7363099ab6eb704c8a

                                      SHA256

                                      8f7b30f982095c9c5916a689a1147ab494592e99a726903b03704f132ca423c4

                                      SHA512

                                      8658c92888a0770a8083252fce023cffb9f1f52f4b992900868b018ebafbeea70172db2edeb7722e86a73e4f6cf82b3b99b48295aabf979d509d720894df4963

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      c69d2b96c0533a05442cff3aaab4326e

                                      SHA1

                                      068a6b4ea367143ce6889c66cae6ccfd51124fa4

                                      SHA256

                                      3ac15f42a3acf08949642e6049e580b469cc1703342a8f5ea9d116a31ce3d6c5

                                      SHA512

                                      14474577dd98b958887caf36167656aff990a2af1f1f52c9a19b6a01a694204c3828c32fc53b85c856994caf8d9692b204e492fdcc51b1ed47bbd4c769058c7b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      19522340c5ad07c42cb880d2f133c2c2

                                      SHA1

                                      ef6b41dcd9487981ae38f0e5a884ea751e26f659

                                      SHA256

                                      ae49d8f6e77b9d838ef4cdb2f1223fd6eda7f0ea9e716d6636e4cb86972b8e6a

                                      SHA512

                                      0c6a94bf67d520d26ea68b1bf49819306b39570fa1a972cb7a430a6f83cb8db65985fc0877ebc70faaab4079753ecfa5ac071ed2f65b920d4108b913ca75e339

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      d2f3e1e581ab6587061cca2f03b02147

                                      SHA1

                                      defe9c96fc73e90df74faa1dedbc819a86a210f8

                                      SHA256

                                      09b981aeab38d399d5f5ffa30bba0a9bc3ea6226329f168747a915b237304f23

                                      SHA512

                                      b3bbd5194e9be2fb31133e2f19684b1d1167be3336642636a31c7b7f260cb730f5a54a736d7ee09276616035f468180daf51d56302180c5033637df7976c0740

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      962950e247b8e6c6f30fe77ec08eb45c

                                      SHA1

                                      a7387d6fa2aedc0866c099444f793ce08a408ce0

                                      SHA256

                                      dad50c2fcaf5d8a52ecb3ac1d11478eaf0c8712a62221a7b219bf5aec71393ed

                                      SHA512

                                      64dacfd54b6004a48f6ca15ff28d847c1eb07c758b8eb138961701f026c5a66bb2dee6a01fa28419700699591f56689e2559fb96341f8b03c76674021af311d1

                                    • C:\Users\Admin\AppData\Local\Temp\mrt2E4E.tmp\Perspective.mfx

                                      Filesize

                                      15KB

                                      MD5

                                      9f064bdcb066daa428db0ed9e33e785d

                                      SHA1

                                      3c0df73cf247ce49d1010fe0e2f722424fe43f4f

                                      SHA256

                                      090925a4cd961f22b1ecd2fba4ce04ab063e26507a1dc09b1d6a40c4860a8777

                                      SHA512

                                      4a510ce13c379e8cb5ccb9f9c69e28e9440f48156c8c4c1fef6987495cace7c028d45530ac961f47786e8f503f90c54310cb1ccf43d7fd584506461c1bd616d5

                                    • C:\Users\Admin\AppData\Local\Temp\mrt2E4E.tmp\cctrans.dll

                                      Filesize

                                      64KB

                                      MD5

                                      a20165b7e7dfee46a59e48c175523af0

                                      SHA1

                                      6ed627806753d11e1a121689369668294d15be74

                                      SHA256

                                      cba1c0fa69bc6b106408d06878390a5699cd2b25adfed1a2610ee01ae2524cbe

                                      SHA512

                                      a9295b814fe77aa4ba4dec5cbed790858852f775799fe9da01bf07d67fa294d4ca1c5a68c9255c3fb716d0dbeb8b5a5ea38b8ec72263f40957beafe7bf323cd4

                                    • C:\Users\Admin\AppData\Local\Temp\mrt2E4E.tmp\kcclock.mfx

                                      Filesize

                                      36KB

                                      MD5

                                      35fa0df588606e5a382e7c155b28d0ff

                                      SHA1

                                      0552d9a6124b11d3ccea7ff8170b3a84c2afd0a7

                                      SHA256

                                      d320a4aeb6940a6a8589a99e5e16abb086e96c4c3376fdf4f066c0e125302247

                                      SHA512

                                      0421292d49fcf3bc87091f52fdc6def36cf7ace90123ee16289e6893c57d8ff23b72c8e9ad2261b9267c7c13f9de9d8c38246d6d68d3bad97c8967470d81ef64

                                    • C:\Users\Admin\AppData\Local\Temp\mrt2E4E.tmp\kcini.mfx

                                      Filesize

                                      28KB

                                      MD5

                                      5522465eba7c81f1fb67d6ad1a5df233

                                      SHA1

                                      0ec415bfaa9db6984cf922d5503d9fde67d0b3e2

                                      SHA256

                                      82c4f5af3c25a8daf60185833d3d61f2e8e2851ad640b59af54060eab6bc859e

                                      SHA512

                                      30d0ed91bf072e7b7367a708eb6a7d92cc0f326249ffdd44a0d94c3b8feb37b38387141c88add61a578393a186e9fb379d42ab0018aa14e917705e4344233f6a

                                    • C:\Users\Admin\AppData\Local\Temp\mrt2E4E.tmp\mmf2d3d9.dll

                                      Filesize

                                      1.1MB

                                      MD5

                                      22284d6bb382967ff72363f828050e13

                                      SHA1

                                      5c98e25d24aacafffded9353c9526be0128c6dbd

                                      SHA256

                                      9eaa342059785bd584df956574c637e6d0e6016a099221a56e0397f8c86cd93f

                                      SHA512

                                      2e5a5bf115b1d2a07d0647b6f4925ab84301ca6354e3f3beb8d44f51900ff21b06b97b23128160fd94dfd33116d03094ca47c49143ae98473eaaed441f9705b2

                                    • C:\Users\Admin\AppData\Local\Temp\mrt2E4E.tmp\mmfs2.dll

                                      Filesize

                                      459KB

                                      MD5

                                      4cf7bb74d8104280b7e986f4df21109d

                                      SHA1

                                      edc21a43136afddbf4786593e84b934d40591b74

                                      SHA256

                                      c0d56cefb509e5600ac6b430adcaf53b81881d3fff4e62b7ede158d66d826622

                                      SHA512

                                      2bbac48354657659795697e67508d777ee595348e1fb3d4b6c65d8618c346b3be0052b1e2e2fe669dcca19c3c00d59d1833acc21d88a97efbde2694935e3c292

                                    • C:\Users\Admin\AppData\Local\Temp\mrt2E4E.tmp\waveflt.sft

                                      Filesize

                                      8KB

                                      MD5

                                      f76739536860a0bdb4a7e3bbb0c06d08

                                      SHA1

                                      b21581aa36eda87db8845caf58c668749e26b29f

                                      SHA256

                                      41136b09b033a20b9acc430620ea095ff76afbdc7aebe7f26f7d2b4315afddef

                                      SHA512

                                      6e65f23a4c1e3b0068b190f9aaaedcfa0466b0185cd6bbafa5f6f6940c8bc332e7c8c611d1b3b63bb2c5fcda48bbe2a678d81a3819940ecc0c701d6fec4194c7

                                    • C:\Users\Admin\AppData\Roaming\MMFApplications\freddy

                                      Filesize

                                      19B

                                      MD5

                                      2847008c8627f8b2672b8100f96473e4

                                      SHA1

                                      10be339a01586dc00a6fb47f99615cf10689e13a

                                      SHA256

                                      05f0f5766a3626c415f8633a2f07bc17c44757cc670fb242a10e4c3179ad6c01

                                      SHA512

                                      4db346250bffbffbde4d70909596ac7e074fc6f9a4469a1ff54e46d87c1d8b2c843c30a531f86f9e0935977d6909ee41c761132f7d26875a3cbf14f88c0cd850

                                    • C:\Users\Admin\Videos\Captures\desktop.ini

                                      Filesize

                                      190B

                                      MD5

                                      b0d27eaec71f1cd73b015f5ceeb15f9d

                                      SHA1

                                      62264f8b5c2f5034a1e4143df6e8c787165fbc2f

                                      SHA256

                                      86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

                                      SHA512

                                      7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

                                    • memory/6004-183-0x00000000086A0000-0x00000000086B0000-memory.dmp

                                      Filesize

                                      64KB