Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2024 19:01

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

redline

Botnet

Miles

C2

194.49.94.43:3251

Attributes
  • auth_value

    e9df05a4c476aa612a10a6f3fc79043d

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

137.184.144.245:4782

Mutex

6cfe4a65-c41d-4b02-9ae9-e727a748ae84

Attributes
  • encryption_key

    B702BA239316FCF317B584A351F2EC1696EBE772

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    java updater

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Downloads MZ/PE file
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 34 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Drops file in System32 directory 13 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Connections Discovery 1 TTPs 2 IoCs

    Attempt to get a listing of network connections.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\smss.exe
    \SystemRoot\System32\smss.exe
    1⤵
      PID:256
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
        "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Users\Admin\AppData\Local\Temp\Files\script2.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\script2.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:936
          • C:\Users\Admin\AppData\Local\Temp\Files\script2.exe
            "C:\Users\Admin\AppData\Local\Temp\Files\script2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2224
        • C:\Users\Admin\AppData\Local\Temp\Files\Miles.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\Miles.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2680
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 516
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:3056
        • C:\Users\Admin\AppData\Local\Temp\Files\plswork.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\plswork.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1664
          • C:\Windows\system32\schtasks.exe
            "schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\plswork.exe" /rl HIGHEST /f
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2280
          • C:\Windows\system32\SubDir\Client.exe
            "C:\Windows\system32\SubDir\Client.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1164
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2492
        • C:\Users\Admin\AppData\Local\Temp\Files\update.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\update.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:676
          • C:\Users\Admin\AppData\Local\Temp\dgfbchgzvb.exe
            "C:\Users\Admin\AppData\Local\Temp\dgfbchgzvb.exe" "C:\Users\Admin\AppData\Local\Temp\xrtjrobrcf.exe" "C:\Users\Admin\AppData\Local\Temp\Files\update.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:1920
            • C:\Users\Admin\AppData\Local\Temp\Files\update.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\update.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1064
          • C:\Users\Admin\AppData\Local\Temp\stqqpzraba.exe
            C:\Users\Admin\AppData\Local\Temp\stqqpzraba.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:548
            • C:\Windows\System32\cmd.exe
              /c sc config msdtc obj= LocalSystem
              5⤵
                PID:1068
                • C:\Windows\system32\sc.exe
                  sc config msdtc obj= LocalSystem
                  6⤵
                  • Launches sc.exe
                  PID:1728
              • C:\Windows\system32\cmd.exe
                cmd /c "C:\Users\Admin\AppData\Local\Temp\WDItO7U9.bat"
                5⤵
                  PID:1836
                • C:\Windows\System32\bindsvc.exe
                  "C:\Windows\System32\bindsvc.exe"
                  5⤵
                  • Executes dropped EXE
                  PID:2244
            • C:\Users\Admin\AppData\Local\Temp\Files\data_recovery.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\data_recovery.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4208
            • C:\Users\Admin\AppData\Local\Temp\Files\backdoor.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\backdoor.exe"
              3⤵
              • Executes dropped EXE
              PID:872
          • C:\Windows\System32\wscript.exe
            C:\Windows\System32\wscript.exe C:\Users\Admin\AppData\Roaming\Microsoft\Word\winword.vbs C:\Users\Admin\AppData\Roaming\Microsoft\Word
            2⤵
              PID:1712
            • C:\Windows\System32\wscript.exe
              C:\Windows\System32\wscript.exe C:\Users\Admin\AppData\Roaming\Microsoft\Word\winword.vbs C:\Users\Admin\AppData\Roaming\Microsoft\Word
              2⤵
                PID:2112
            • C:\Windows\system32\SearchIndexer.exe
              C:\Windows\system32\SearchIndexer.exe /Embedding
              1⤵
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2352
              • C:\Windows\system32\SearchUserHost.exe
                C:\Windows\system32\SearchUserHost.exe
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2056
                • C:\Windows\system32\cmd.exe
                  /c systeminfo
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2044
                  • C:\Windows\system32\systeminfo.exe
                    systeminfo
                    4⤵
                    • Gathers system information
                    PID:2796
                • C:\Windows\system32\cmd.exe
                  /c "tasklist /v"
                  3⤵
                    PID:2568
                    • C:\Windows\system32\tasklist.exe
                      tasklist /v
                      4⤵
                      • Enumerates processes with tasklist
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2076
                  • C:\Windows\system32\cmd.exe
                    /c "netstat -ano"
                    3⤵
                    • System Network Connections Discovery
                    PID:576
                    • C:\Windows\system32\NETSTAT.EXE
                      netstat -ano
                      4⤵
                      • System Network Connections Discovery
                      • Gathers network information
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1968
                  • C:\Windows\system32\cmd.exe
                    /c "ipconfig /all"
                    3⤵
                      PID:2668
                      • C:\Windows\system32\ipconfig.exe
                        ipconfig /all
                        4⤵
                        • Gathers network information
                        PID:2684
                    • C:\Windows\system32\cmd.exe
                      /c "route print"
                      3⤵
                        PID:2100
                        • C:\Windows\system32\ROUTE.EXE
                          route print
                          4⤵
                            PID:2948
                        • C:\Windows\system32\cmd.exe
                          /c "arp -a"
                          3⤵
                          • Network Service Discovery
                          PID:2612
                          • C:\Windows\system32\ARP.EXE
                            arp -a
                            4⤵
                            • Network Service Discovery
                            PID:1368
                        • C:\Windows\system32\cmd.exe
                          /c "tasklist /m msfte.dll"
                          3⤵
                            PID:2792
                            • C:\Windows\system32\tasklist.exe
                              tasklist /m msfte.dll
                              4⤵
                              • Enumerates processes with tasklist
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2408
                          • C:\Windows\system32\cmd.exe
                            /c "net share"
                            3⤵
                              PID:2192
                              • C:\Windows\system32\net.exe
                                net share
                                4⤵
                                  PID:3036
                                  • C:\Windows\system32\net1.exe
                                    C:\Windows\system32\net1 share
                                    5⤵
                                      PID:2704
                                • C:\Windows\system32\cmd.exe
                                  /c "ping server"
                                  3⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  PID:932
                                  • C:\Windows\system32\PING.EXE
                                    ping server
                                    4⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:776
                                • C:\Windows\system32\cmd.exe
                                  /c "sc query hfile.sys"
                                  3⤵
                                    PID:2728
                                    • C:\Windows\system32\sc.exe
                                      sc query hfile.sys
                                      4⤵
                                      • Launches sc.exe
                                      PID:3064
                                • C:\Windows\system32\SearchProtocolHost.exe
                                  "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                                  2⤵
                                  • Loads dropped DLL
                                  • Drops file in System32 directory
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2936
                                • C:\Windows\system32\SearchFilterHost.exe
                                  "C:\Windows\system32\SearchFilterHost.exe" 0 544 548 556 65536 552
                                  2⤵
                                  • Modifies data under HKEY_USERS
                                  PID:2844

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                                Filesize

                                1024KB

                                MD5

                                a966de0604a7629db060cb5c0f8810c4

                                SHA1

                                10c6832e2b1f3d1c4b04e61d76daaf79dd2422ce

                                SHA256

                                1a39ff3da1df5c90c9b2f9a96318f4db749eff0bfb53d49612e49da4f2678059

                                SHA512

                                c7d6ef34acf66b6c54f8b1db25e269cd780f4d40200203efde4488db62f40cf860f4f4dfb7c9a1b8015ee107768bd8ef35754b006757119e3281db7b8591b316

                              • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSStmp.log

                                Filesize

                                1024KB

                                MD5

                                8234c981980f2f91abc9a47233b7d5ec

                                SHA1

                                b42ce89001ac7917ab066b7352c357cfb919bdf3

                                SHA256

                                81958dde7eae199f9f2f0cff69561a9ba2bd7b08514acf811665663ea03c7f04

                                SHA512

                                7e94d14c451d41f63d4ca19714f6bddedf2458930ac31fea4fb7384f424fba84424f48c76e9edc2db78c0d76d688d71ff419145a5b48b86b8ad6c812e3bcd993

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                342B

                                MD5

                                9651fbfca1f533d28a6332344cf85670

                                SHA1

                                2ad5c69ef03a109d7d9064bc93fcad6346a617eb

                                SHA256

                                c38f0300e6a10d7eb9aceaa9ed46cdd7691b31cf0bf2a00792624835c7bbd496

                                SHA512

                                f818957d197ad44175c62488d1d4faf178e299ed6b3ba7c857097668f10674409461225e9dadb7ccee0b7e0e545dfc234a4bda189e31572b96ce39bc61163068

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                342B

                                MD5

                                a310499607779de443dcaefd9dfb410a

                                SHA1

                                f3d1a781b3ee47f117e980c2926767ddb99c996a

                                SHA256

                                5ac5a23f894f638557fcfd9de7251855a50f03a831e6c3a743420fb86548531f

                                SHA512

                                6fa6e50461ab220ec71988710e4aaeb912fe9d73fe8280b0f22e9b4363e7ad29bf722f3f4aaee173da49699eddddc90cfb1de7d8011f9092b96a1b26703fcf03

                              • C:\Users\Admin\AppData\Local\Temp\CabD78C.tmp

                                Filesize

                                70KB

                                MD5

                                49aebf8cbd62d92ac215b2923fb1b9f5

                                SHA1

                                1723be06719828dda65ad804298d0431f6aff976

                                SHA256

                                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                SHA512

                                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                              • C:\Users\Admin\AppData\Local\Temp\Files\backdoor.exe

                                Filesize

                                68KB

                                MD5

                                698f5896ec35c84909344dc08b7cae67

                                SHA1

                                4c3eb447125f74f2eef63e14a5d97a823fa8d4e9

                                SHA256

                                9cc2e2d5feeb360b2ea9a650809468f08e13c0e997ebadf5baa69ae3c27a958e

                                SHA512

                                2230abef3f2ac7fff21f2af8a1df79a0ab3f7b1153ce696745ff5cef7f677bfe562dc820eb36be8e4819210ffa565d52e3b940f0cad5427d30a3aa05a4bcde2b

                              • C:\Users\Admin\AppData\Local\Temp\JOINDI~1.ZIP

                                Filesize

                                13KB

                                MD5

                                a99bf4536e2442bf21242d6742da4178

                                SHA1

                                5ce0a39762b37518a99b1d127a8b013c8e05b3ab

                                SHA256

                                5c2476fc4e975c4f68d78373b2f93f381150eaca389bde895119161c9f86e77b

                                SHA512

                                20c1351ac8ae8866f44574804d41890384f530e124e6ec22f81cbaa59f006c4d30277d144df5504176226958694d12b603515ea7b0910ea704616724fff9d938

                              • C:\Users\Admin\AppData\Local\Temp\TarD7AE.tmp

                                Filesize

                                181KB

                                MD5

                                4ea6026cf93ec6338144661bf1202cd1

                                SHA1

                                a1dec9044f750ad887935a01430bf49322fbdcb7

                                SHA256

                                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                SHA512

                                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                              • C:\Users\Admin\AppData\Local\Temp\WDItO7U9.bat

                                Filesize

                                196B

                                MD5

                                992a20093112df3f3e6010c64455af64

                                SHA1

                                7073facca99a30dc192731d0d42211ce52dda948

                                SHA256

                                9be9647b951c3ba858c7f11d4e3d2b5cbe38f94b4708f8d84346118106e0baff

                                SHA512

                                d706799e7fe5839fcf0cd285ed2d5ef120357ca4131636da12c810c3a98d01923e9dd710e04d3aca6b05d01639dfa9db30e798e09d1ed1d727f2fac5c0e4b4cc

                              • C:\Users\Admin\AppData\Local\Temp\_MEI9362\api-ms-win-core-file-l2-1-0.dll

                                Filesize

                                18KB

                                MD5

                                bfffa7117fd9b1622c66d949bac3f1d7

                                SHA1

                                402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

                                SHA256

                                1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

                                SHA512

                                b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

                              • C:\Users\Admin\AppData\Local\Temp\_MEI9362\api-ms-win-core-localization-l1-2-0.dll

                                Filesize

                                21KB

                                MD5

                                724223109e49cb01d61d63a8be926b8f

                                SHA1

                                072a4d01e01dbbab7281d9bd3add76f9a3c8b23b

                                SHA256

                                4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210

                                SHA512

                                19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

                              • C:\Users\Admin\AppData\Local\Temp\_MEI9362\python39.dll

                                Filesize

                                4.3MB

                                MD5

                                11c051f93c922d6b6b4829772f27a5be

                                SHA1

                                42fbdf3403a4bc3d46d348ca37a9f835e073d440

                                SHA256

                                0eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c

                                SHA512

                                1cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6

                              • C:\Users\Admin\AppData\Local\Temp\dgfbchgzvb.exe

                                Filesize

                                51KB

                                MD5

                                e48b89715bf5e4c55eb5a1fed67865d9

                                SHA1

                                89a287da39e14b02cdc284eb287549462346d724

                                SHA256

                                c25d90168fc2026d8ed2a69c066bd5a7e11004c3899928a7db24cb7636fc4d9e

                                SHA512

                                4bd77d2fa5da646009ebeeedb5610048c58598ee7e5aeb5660b0c01042f0f34a88f89181e13e86c06cae9984155d0299128a2aee1c2c16f18e284db4745d850c

                              • C:\Users\Admin\AppData\Local\Temp\xrtjrobrcf.exe

                                Filesize

                                7.1MB

                                MD5

                                b83f61aa51a36f48610bfcda20dd82fd

                                SHA1

                                a069a376489bc55649ba1ef8f0d8799d75288002

                                SHA256

                                9bfe94178387ca65b1a5a65701a5b4a2edb109248bf3030cb3f75c6512e21f18

                                SHA512

                                8dbe667f5c71fa055f48bcf395487ac94c4b276bc6af081969b7a977e79e0b975c0a294ea23746259ddcb8af58dd29bb61b93ae47d7918da2fad03aac7913227

                              • C:\Users\Admin\AppData\Roaming\Microsoft\UserSetting\MediaCache\ramdisk.sdb

                                Filesize

                                870B

                                MD5

                                7add4a4c93101b30ece6b12152a6c240

                                SHA1

                                c1beb4bce2b682eec40396e499bd5ca8d1f35295

                                SHA256

                                98d6e4f849e06896ad1e11a0a9adeeefa1d20f4f8d652847447d9b2eab5682a8

                                SHA512

                                c9755c8285049385b6747e7701a00069d842481222760771c29851007d2298bb7c8f6551aca191977b895cf0f5b61142bad80dea73ab565628f28c748e6fb106

                              • C:\Users\Admin\AppData\Roaming\Microsoft\UserSetting\MediaCache\ramdisk.sdb

                                Filesize

                                4KB

                                MD5

                                0aa41d1b32068c315280073ea8f83093

                                SHA1

                                451410e0f63b78f4d3f1ed26fd4ab8407ed97f08

                                SHA256

                                703d95ef925d0a7860947c8394cd14d88f8037e1a374a824f73b83c9c2aa3d8f

                                SHA512

                                c79c4d9a5579fe21b77a07b610399c456eabd399f7a03f467ba79ce115fda4d5e694ef7ea3247ed64d744bc9d01fc839b1491816e484fecd247cabccb1d53504

                              • C:\Users\Admin\AppData\Roaming\Microsoft\UserSetting\trnmg.sdb

                                Filesize

                                1KB

                                MD5

                                6084cf6d673cf675b6298e6b3b16433a

                                SHA1

                                d27add32e3f5ccc9e478dc210af997097430cef6

                                SHA256

                                27165dd7dfa651b2b8af7c5499aedfd37a6d62611bb0746f7e049c3029b2d187

                                SHA512

                                d5ad3fa3a42fb944d1bc1c34d1857a15f8cb17ca76a9e5086157ead54d149b371cca8e955dae41f7682e0d0fb9a173e261910759a2d09ca00a58beea39fbfe24

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Word\EnterSwitch.docx

                                Filesize

                                17KB

                                MD5

                                d249613b3ab8d8050efe8e4c6b1d7e28

                                SHA1

                                7124c831b78fc9cc5184cf1ada471cd64a271342

                                SHA256

                                098438ec94329da311f3b883b766c45e25d0bbff4a19e2e405c94985091e4f40

                                SHA512

                                ec0e6eabbaf76ef2f9690ea033c627528bdae820c1be2149c1c0d34a10d31e6f1ab6ee71c8c0b1c1d80a8a3c2e877092bde45616cf6c8b86c8ae31b90918c2a5

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Word\EnterSwitch.txt

                                Filesize

                                6KB

                                MD5

                                3333958d7ebfc3507ddb812aac34e2e9

                                SHA1

                                aebd3421d17e70111a5fd27f96fb650ea886b334

                                SHA256

                                37d1e8d61b4bc11002e42375c18691d3b054423daeebe5f5c456c171faf672dc

                                SHA512

                                a2effadbd9dfe255d45161991f6afa8cc7c8f23458c4af3815ab9472466b029bf1f9cd0c8e458ef5787b36bfdc566cb02ce3538b0ebcbcf60d3e747b6377229d

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Word\JoinDisable.txt

                                Filesize

                                1KB

                                MD5

                                f728a50436133c34dcf86c5a17fc5520

                                SHA1

                                604f6edc4bfe85c8fd4a4bfb621920afbe2b185b

                                SHA256

                                da487688fda862e49c7aaeb8da8e1e28ff7343d9849fa690dba3c9aff848cdbe

                                SHA512

                                21b30bd7a8922833c683c110d230e92f1692b7dd71896471fecb9d49dd262854bd085695c7bc0ed3985efb00130857c59748af12a115ba149c046000015a0b1b

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Word\winword.vbs

                                Filesize

                                1KB

                                MD5

                                3439318cedcf37c1bf5fe6d49ddbb2cb

                                SHA1

                                e075965bb3b38abdd80668fb6101a0d10b30f080

                                SHA256

                                6484a02c2db6c9afb5659ede4047cad10b7102c2bbc4c94bf8482f88d8fd83a8

                                SHA512

                                3dffcf24b052a7fffd50ab6c76d081b1c47ba64c20f21650e4bdcf19106518e8b342691711230ba9eea5489994b8ccec8ad11f54b1509b1cd518616254176b61

                              • C:\Windows\System32\SearchUserHost.exe

                                Filesize

                                244KB

                                MD5

                                42ec9065d9bf266ade924b066c783a56

                                SHA1

                                a8dcf7d63a8bb5abef8787775957a5bb6c0f3f77

                                SHA256

                                4ac002e90a52cb0998da78f2995294ee77b89fb2be709b0e3c8e1627212bccdc

                                SHA512

                                e49af43aef3f02397098821b81e034ee1f07f8c2f49a9a1768d1522bbc009103a2c88f436f488333f57c7d56b34acbee84588040f56382cc75eaddbb9db19980

                              • \Users\Admin\AppData\Local\Temp\Files\Miles.exe

                                Filesize

                                168KB

                                MD5

                                1a736481ee80955422945de5dd8589dd

                                SHA1

                                dca7760022f8d223e44995f69bd0523a2ca0691e

                                SHA256

                                6e60f56a54f6a1c48e727cd8e08c119e37f8b24470a1d27da5b352060006e62b

                                SHA512

                                5b92ae8359780eb712a6191ea8c2bd420afc51cac5dcf4128a26e29f42d32c7a70023bafb12d24ae23b20828e60e0924bbdb05555b50e4db313146f9971b1990

                              • \Users\Admin\AppData\Local\Temp\Files\plswork.exe

                                Filesize

                                502KB

                                MD5

                                71685fb1a3701f1e27e48ba3e3ce9530

                                SHA1

                                f460a9ecc7e35b4691532bc6c647dbe3973a51ca

                                SHA256

                                6600b4938a679ecd93d6149fb3f8fe74c8b347106de55a4853a76ae7a204950e

                                SHA512

                                3a7505c3faacf6f3e113570545767757d2db5aa342023a4eea27e49e4d632a0064a957c6b07f950e727dd71b8262b768626521cf1d1fbb195fd36d7db7bf5c5a

                              • \Users\Admin\AppData\Local\Temp\Files\script2.exe

                                Filesize

                                9.8MB

                                MD5

                                a302d6dc5b77cb66fc8f4f91164c9c02

                                SHA1

                                052449b1f5843c10755e36675c2cf74aece15629

                                SHA256

                                5221e8121172d9926be049824080b257148fd952494065aa51aa8f376e2506dd

                                SHA512

                                d5183369f645a9aa547a486901a025b9230622a5b75596ffe47ea42a5e20ccb080e3cf067666454c9c4ff7034b796e9e3cf89f6e7375f001d3499db004786740

                              • \Users\Admin\AppData\Local\Temp\Files\update.exe

                                Filesize

                                7.8MB

                                MD5

                                2f7548098416cbe47d675b1d61b6c334

                                SHA1

                                f5a20d7e5b04aaf27fac94c27ebae6bf30d03b07

                                SHA256

                                c6b56d104ad74e587a58acc64b68b603d1786d07c3054d82ca29d6820f215f16

                                SHA512

                                9098091b972788da8527762a9794509a9413928ff0411c8f67e3e168efb1028ac13d25e5aa61f75ec5513581b6322de8a7217aa5094d8ae9d5aaf387309aa8a8

                              • \Users\Admin\AppData\Local\Temp\_MEI9362\api-ms-win-core-file-l1-2-0.dll

                                Filesize

                                21KB

                                MD5

                                1c58526d681efe507deb8f1935c75487

                                SHA1

                                0e6d328faf3563f2aae029bc5f2272fb7a742672

                                SHA256

                                ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2

                                SHA512

                                8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

                              • \Users\Admin\AppData\Local\Temp\_MEI9362\api-ms-win-core-processthreads-l1-1-1.dll

                                Filesize

                                21KB

                                MD5

                                517eb9e2cb671ae49f99173d7f7ce43f

                                SHA1

                                4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab

                                SHA256

                                57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54

                                SHA512

                                492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

                              • \Users\Admin\AppData\Local\Temp\_MEI9362\api-ms-win-core-timezone-l1-1-0.dll

                                Filesize

                                21KB

                                MD5

                                d12403ee11359259ba2b0706e5e5111c

                                SHA1

                                03cc7827a30fd1dee38665c0cc993b4b533ac138

                                SHA256

                                f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781

                                SHA512

                                9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

                              • \Users\Admin\AppData\Local\Temp\_MEI9362\ucrtbase.dll

                                Filesize

                                992KB

                                MD5

                                0e0bac3d1dcc1833eae4e3e4cf83c4ef

                                SHA1

                                4189f4459c54e69c6d3155a82524bda7549a75a6

                                SHA256

                                8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

                                SHA512

                                a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

                              • \Users\Admin\AppData\Local\Temp\stqqpzraba.exe

                                Filesize

                                580KB

                                MD5

                                2c2029588ad8b86759c17b7ae885ee03

                                SHA1

                                91653b5344d4c210201218e2f215dd5228d76799

                                SHA256

                                3ab288c47914e33cc61985e46502158400faa9d7187b55c19039b8795504a290

                                SHA512

                                88531fe6b0f2d66ada368a431f912868f74f9ed8ade9dc88887807b761490fe2cc317e1b6b40e7070411924c80971f237dca68ad2faafa7b4b1ecd2ec90c860f

                              • \Windows\System32\bindsvc.exe

                                Filesize

                                291KB

                                MD5

                                7c5b397fb54d5aa06bd2a6fb99c62fee

                                SHA1

                                a9e0bf7bbabf6ab9e294156985537ae972ebd743

                                SHA256

                                d032bdc64c9451bbb653b346c5bd6ac9f83a91edeb0155497f098c8d6182ddee

                                SHA512

                                daa4702eff625b5dd1edca358c653338cff4eeca4e43d12dfd39bbc52acf8dfde3b963d190cf4426e405d9db8bcc9817cd50868055aa0d4a9efe4d1042beaf0c

                              • \Windows\System32\msfte.dll

                                Filesize

                                217KB

                                MD5

                                d7ddfd90c55ad42200b2a7e51110ad87

                                SHA1

                                0c9429f0b51a73423de4cb0ecf10fd3b3bacd84d

                                SHA256

                                4fdc7aacb3981434e797106944f27a507201d11cdf194b3fab79747ce98f2446

                                SHA512

                                8ba6cd56ce6aeae9481154e93b75d8712e854a19c60f6279abf721c2550a09d9f22cb410a5cc3062d59f17cde35e728d250129abe60f29321a16df7d2fb9c179

                              • memory/548-750-0x0000000000AC0000-0x0000000000C3A000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/548-480-0x0000000000AC0000-0x0000000000C3A000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/676-478-0x0000000003650000-0x00000000037CA000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/676-779-0x0000000003650000-0x00000000037CA000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/1064-773-0x00000000000D0000-0x00000000007E6000-memory.dmp

                                Filesize

                                7.1MB

                              • memory/1064-893-0x0000000000A70000-0x0000000000A7A000-memory.dmp

                                Filesize

                                40KB

                              • memory/1064-882-0x0000000000A70000-0x0000000000A7A000-memory.dmp

                                Filesize

                                40KB

                              • memory/1064-777-0x0000000000A70000-0x0000000000A7A000-memory.dmp

                                Filesize

                                40KB

                              • memory/1064-778-0x0000000000A70000-0x0000000000A7A000-memory.dmp

                                Filesize

                                40KB

                              • memory/1164-450-0x0000000000910000-0x0000000000994000-memory.dmp

                                Filesize

                                528KB

                              • memory/1284-496-0x0000000002540000-0x0000000002541000-memory.dmp

                                Filesize

                                4KB

                              • memory/1664-445-0x0000000000230000-0x00000000002B4000-memory.dmp

                                Filesize

                                528KB

                              • memory/1680-0-0x0000000074DEE000-0x0000000074DEF000-memory.dmp

                                Filesize

                                4KB

                              • memory/1680-1-0x0000000001200000-0x0000000001208000-memory.dmp

                                Filesize

                                32KB

                              • memory/1680-2-0x0000000074DE0000-0x00000000754CE000-memory.dmp

                                Filesize

                                6.9MB

                              • memory/1680-114-0x0000000074DEE000-0x0000000074DEF000-memory.dmp

                                Filesize

                                4KB

                              • memory/1680-216-0x0000000074DE0000-0x00000000754CE000-memory.dmp

                                Filesize

                                6.9MB

                              • memory/2352-726-0x0000000003330000-0x0000000003338000-memory.dmp

                                Filesize

                                32KB

                              • memory/2352-849-0x0000000005740000-0x0000000005748000-memory.dmp

                                Filesize

                                32KB

                              • memory/2352-547-0x0000000001070000-0x0000000001071000-memory.dmp

                                Filesize

                                4KB

                              • memory/2352-516-0x0000000001EF0000-0x0000000001F00000-memory.dmp

                                Filesize

                                64KB

                              • memory/2352-805-0x0000000003F10000-0x0000000003F18000-memory.dmp

                                Filesize

                                32KB

                              • memory/2352-831-0x0000000005720000-0x0000000005728000-memory.dmp

                                Filesize

                                32KB

                              • memory/2352-832-0x0000000005710000-0x0000000005711000-memory.dmp

                                Filesize

                                4KB

                              • memory/2352-500-0x0000000001DF0000-0x0000000001E00000-memory.dmp

                                Filesize

                                64KB

                              • memory/2352-846-0x0000000005740000-0x0000000005741000-memory.dmp

                                Filesize

                                4KB

                              • memory/2352-553-0x0000000001070000-0x0000000001078000-memory.dmp

                                Filesize

                                32KB

                              • memory/2352-564-0x0000000001420000-0x0000000001428000-memory.dmp

                                Filesize

                                32KB

                              • memory/2352-555-0x0000000001020000-0x0000000001021000-memory.dmp

                                Filesize

                                4KB

                              • memory/2352-938-0x0000000004AE0000-0x0000000004AE8000-memory.dmp

                                Filesize

                                32KB

                              • memory/2352-939-0x0000000004AD0000-0x0000000004AD1000-memory.dmp

                                Filesize

                                4KB

                              • memory/2352-546-0x0000000001410000-0x0000000001418000-memory.dmp

                                Filesize

                                32KB

                              • memory/2352-966-0x0000000004AF0000-0x0000000004AF8000-memory.dmp

                                Filesize

                                32KB

                              • memory/2352-1244-0x0000000003780000-0x0000000003781000-memory.dmp

                                Filesize

                                4KB

                              • memory/2680-379-0x0000000001260000-0x000000000128E000-memory.dmp

                                Filesize

                                184KB