Resubmissions

04-12-2024 19:31

241204-x8wmhaxmcv 10

04-12-2024 11:47

241204-nybd5szkdq 10

04-12-2024 11:40

241204-nsybqazjek 10

04-12-2024 11:35

241204-np1bxatqgz 10

03-12-2024 19:23

241203-x381msvpgj 10

03-12-2024 16:27

241203-tyez8atjdv 10

Analysis

  • max time kernel
    299s
  • max time network
    279s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-12-2024 11:40

General

  • Target

    infected dot net installer.exe

  • Size

    1.7MB

  • MD5

    6eb2b081d12ad12c2ce50da34438651d

  • SHA1

    2092c0733ec3a3c514568b6009ee53b9d2ad8dc4

  • SHA256

    1371b24900cbd474a6bc2804f0e79dbd7b0429368be6190f276db912d73eb104

  • SHA512

    881d14d87a7f254292f962181eee79137f612d13994ff4da0eb3d86b0217bcbac39e04778c66d1e4c3df8a5b934cbb6130b43c0d4f3915d5e8471e9314d82c1b

  • SSDEEP

    49152:znsHyjtk2MYC5GDbQ2cRQh9GexmCxBxVV56CmWQax:znsmtk2aj2cROGom6mGvx

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 32 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\infected dot net installer.exe
    "C:\Users\Admin\AppData\Local\Temp\infected dot net installer.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\._cache_infected dot net installer.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_infected dot net installer.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\67ce152a105fcba7e8ad6b921c297451\Setup.exe
        C:\67ce152a105fcba7e8ad6b921c297451\\Setup.exe /x86 /x64 /web
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:4732
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\19d183101b248e9a8b50\Setup.exe
          C:\19d183101b248e9a8b50\\Setup.exe InjUpdate /x86 /x64 /web
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:3840
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\67ce152a105fcba7e8ad6b921c297451\1025\LocalizedData.xml

    Filesize

    49KB

    MD5

    d84db0827e0f455f607ef501108557d0

    SHA1

    d275924654f617ddaf01b032cf0bf26374fc6cd5

    SHA256

    a8d9fd3c7ebb7fee5adb3cafe6190131cebfcbeff7f0046a428c243f78eac559

    SHA512

    1b08115a4ea03217ce7a4d365899bd311a60490b7271db209d1e5979a612d95c853be33d895570e0fb0414ab16eb8fd822fe4e3396019a9edd0d0c7ff9e57232

  • C:\67ce152a105fcba7e8ad6b921c297451\1028\LocalizedData.xml

    Filesize

    41KB

    MD5

    ff41100cc12e45a327d670652f0d6b87

    SHA1

    cb53d671cb66d28b6eb7247a1a0c70a114d07e6b

    SHA256

    ef3de7ab3d80a4d2865b9e191d2311112b4870103d383ae21882f251bbde7f0a

    SHA512

    f8a2f8db5957a43aa82bd7d193b2ff2a151bba6a9d0ad2d39e120909a0f8939123b389ebb4244a417f9e4d8e46629c49ac193c320231cb614253612af45281a8

  • C:\67ce152a105fcba7e8ad6b921c297451\1029\LocalizedData.xml

    Filesize

    53KB

    MD5

    51130f3479df72fe12b05a7aba1891d3

    SHA1

    fbaf9c0269d532a3ce00d725cd40772bc0ad8f09

    SHA256

    8845d0f0fadfdf51b540d389bbb0a8a9655cf65055e55dcd54fa655576dd70a1

    SHA512

    b641e22b81babbde85a6f324851d35f47bd769fc0cff74911010ae620cf682f9c7bc4d946d2f80a46a9851f3cc912625991c8a3876f1d958ea4d49d8791d1815

  • C:\67ce152a105fcba7e8ad6b921c297451\1030\LocalizedData.xml

    Filesize

    52KB

    MD5

    53aa67d27c43a35c6f61552ee9865f55

    SHA1

    504035de2fe6432d54bc69f0d126516f363e1905

    SHA256

    5d08b297b867179d8d2ec861dbf7e1dfdb283573430a55644e134ee39083157a

    SHA512

    7a284076f6f204e5be41eab3c3abb1983fbbc21669130cc7e6961a7b858f30caf83fbcb2ef44cfe712341ab664347df29d58b650f004608b015e61e4f5d4f47b

  • C:\67ce152a105fcba7e8ad6b921c297451\1031\LocalizedData.xml

    Filesize

    55KB

    MD5

    f8e3a846d4aca062413094f1d953075e

    SHA1

    09f2aa5b5ef693051862965c7c1063d31623f433

    SHA256

    5a929328125673d922e7f969769b003f5cb6942daa92818a384d50ac755174c2

    SHA512

    95fead89ac87c700615deef0b5c75aa818172cb387fb5e7178d0a96adb4a60abe86c3793f1174ad27b3a12fe29a371682a032d83d2c63f50a223e37a9d5fc7c6

  • C:\67ce152a105fcba7e8ad6b921c297451\1032\LocalizedData.xml

    Filesize

    56KB

    MD5

    8ecac4ca4cc3405929b06872e3f78e99

    SHA1

    805250d3aa16183dc2801558172633f718a839c4

    SHA256

    b9e9740a1f29eeaf213e1e0e01f189b6be1d8d44a2ab6df746eebe9cb772f588

    SHA512

    6f681c35a38a822f4747d6d2bcacefc49a07c9ca28a6b8eed38b8d760327419b5b469698bed37366c2480a4f118d4d36c6ae0f3c645f185e39a90ff26e749062

  • C:\67ce152a105fcba7e8ad6b921c297451\1033\LocalizedData.xml

    Filesize

    51KB

    MD5

    24fde6338ea1a937945c3feb0b7b2281

    SHA1

    6b8b437cd3692207e891e205c246f64e3d81fdd5

    SHA256

    63d37577f760339ed4e40dc699308b25217ce678ce0be50c5f9ce540bb08e0a7

    SHA512

    9a51c7057de4f2ec607bb9820999c676c01c9baf49524011bb5669225d80154119757e8eb92d1952832a6cb20ea0e7da192b4b9ddf813fa4c2780200b3d7ba67

  • C:\67ce152a105fcba7e8ad6b921c297451\1033\SetupResources.dll

    Filesize

    27KB

    MD5

    541d0525f83b665b9237bfe3e3483031

    SHA1

    ddc3b3dbf0524c38328b1dcbb7207e265b7d67cc

    SHA256

    6612a68898b89bcc6f1b74c11d4ec33a4b230ab567aed78d31e0120509ef2990

    SHA512

    bf6f131b0d26c6785991e1b4c460668e82e01fe949dbe94bd0ed4fb2be0cc38d50dc266f03ef491f33f447b7d724e045a486410e265561b77c3205964cab55ff

  • C:\67ce152a105fcba7e8ad6b921c297451\1035\LocalizedData.xml

    Filesize

    52KB

    MD5

    de5ccb392face873eae6abc827d2d3a7

    SHA1

    50eab784e31d1462a6e760f39751e7e238ba46a2

    SHA256

    6638228cb95fc08eebc9026a2978d5c68852255571941a3828d9948251ca087d

    SHA512

    b615a69b49404d97ce0459412fbd53415dfbc1792ed95c1f1bd30f963790f3f219e028f559706e8b197ce0223a2c2d9f2e1cac7e3b50372ebef0d050100c6d10

  • C:\67ce152a105fcba7e8ad6b921c297451\1036\LocalizedData.xml

    Filesize

    55KB

    MD5

    75bf2db655ca2442ae41495e158149c9

    SHA1

    514a48371362dfa2033ba99ecab80727f7e4b0ee

    SHA256

    1938c4ffedfbb7fea0636238abb7f8a8db53db62537437ff1ec0e12dca2abfab

    SHA512

    1b697d0621f47bb66d45ae85183a02ec78dd2b6458ef2b0897d5bbbd2892e15eaf90384bc351800b5d00cb0c3682db234fac2a75214d8ade4748fc100b1c85b2

  • C:\67ce152a105fcba7e8ad6b921c297451\1037\LocalizedData.xml

    Filesize

    48KB

    MD5

    94f3480d829cee3470d2ba1046f2f613

    SHA1

    9a8ffc781afb5f087b39abe82c11e20d3e08b4f3

    SHA256

    eceb759e0f06e5d4f30bc8a982f099c6c268cff4a1459222da794d639c74f97f

    SHA512

    436d52da9c6c853616cf088c83b55032e491d6d76eeca0bf0cb40b7a84383a1fcffcb8ac0793cdea6af04d02acf5c1654d6b9461506ee704d95a9469581e8eaf

  • C:\67ce152a105fcba7e8ad6b921c297451\1038\LocalizedData.xml

    Filesize

    54KB

    MD5

    818e35b3eb2e23785decef4e58d74433

    SHA1

    41b43d0b3f81a3a294aa941279a96f0764761547

    SHA256

    3d8b2c8079cf8117340a8fc363dceb9be102d6eb1a72881b0c43e1e4b934303e

    SHA512

    98ae09da1be0ebe609d0e11d868258ab322cdc631e3105296c8ce243d821b415f3c487cbb4cd366bb4bdb7f0f9447a25836e53320b424a9ff817cac728ff4ae2

  • C:\67ce152a105fcba7e8ad6b921c297451\1040\LocalizedData.xml

    Filesize

    53KB

    MD5

    5e805353cb010fc22f51c1f15b8bcaa1

    SHA1

    9360f229aee4fed6897d4f9f239072aa22d6da9e

    SHA256

    02b83ebd2689e22668a5ee55a213091fdc090dfee42c0be9386f530d48af8950

    SHA512

    275d7c7c952a352417fe896c5be07f5a4c50ff51569cb04ab615cda6a880a8e83f651c87f226a1eb79d8286f777488bfaac2636a1a2057cf5db83037b3e1214f

  • C:\67ce152a105fcba7e8ad6b921c297451\1041\LocalizedData.xml

    Filesize

    45KB

    MD5

    5ab13768b6c897eff96e35f91b834d25

    SHA1

    54f04c73a57a409e4c1fe317a825ee2ed4ddcd10

    SHA256

    87b5ce86b0134ea82215dcf04ffbf7f5c8a570f814f82b4c7ba6106195924c6b

    SHA512

    ee98f34723a1593ef12589ea9657f8d9a3c9dc8a3fb5eed6f8bb026c6656a3ca6fec8243745ed7fbf406019b6e2b42762c1ee74d26c0f70cc9da272291fe680f

  • C:\67ce152a105fcba7e8ad6b921c297451\1042\LocalizedData.xml

    Filesize

    44KB

    MD5

    ad25367f86144f29946df3b3866e7dbe

    SHA1

    cc8470dbe0bfe9394742d639d9caeec961a27928

    SHA256

    90d0885f929059358fe76e61b560b3d188abbe7c041babefc82038f6faebb7eb

    SHA512

    66a343d1405e377bf2d303b0ec896814a46248c05dfe61a2c3167ed1c915964f7f57b335bd7fae324461e65e5ee6bc2384eff28f71c4325eb3c4f89611659afb

  • C:\67ce152a105fcba7e8ad6b921c297451\1043\LocalizedData.xml

    Filesize

    53KB

    MD5

    898d2a1a5fac4d1a028aa11e0ed9f9b4

    SHA1

    343795fbc1bbf1b0982dc9e70501721433fba892

    SHA256

    73130da9b103f1812ca69cfffdf5750e74b0228cd40e0325a7f14e799aaf21a3

    SHA512

    fac3fd81d803c1029df6a3cd93060c950b0ba399fe074d438c4867d55468e7de9aa77bbd7b51fe866f6849684408c853d70956e94de39d4f61019825028a25e4

  • C:\67ce152a105fcba7e8ad6b921c297451\1044\LocalizedData.xml

    Filesize

    53KB

    MD5

    a459afdbe20f5d4c904d3e3700ee9191

    SHA1

    22570b1de34c11796390057537269145a2c63438

    SHA256

    0ac4bcf5cee39ad42070e34393303ffe3ef27e71c8d9522f3dc01e12f93dda03

    SHA512

    b01536c774121ba9fe25014bb802b45449ba46529af8ad59f3ff93e339e7443238b268716ac051d24ac9eba093e5d66fd5c5faa2ca17bf744ec31e50627159ce

  • C:\67ce152a105fcba7e8ad6b921c297451\1045\LocalizedData.xml

    Filesize

    53KB

    MD5

    95c6472f2c8329ec1c10f7df3a31c154

    SHA1

    624d46235912dc169913ba77caa7889219e2c394

    SHA256

    197722527d1ad65a10a29ecec04f029abc549eb5d05bc07a68107ad6dd4bd35b

    SHA512

    28149ab0c041dc35f717435f3c2218700090fc38723219c1cd40ec7f777c68d99dd08b6a42014ead8fb1e309637b6c33aa5dec0518dc1b72273c7a6fd7ef06c0

  • C:\67ce152a105fcba7e8ad6b921c297451\1046\LocalizedData.xml

    Filesize

    52KB

    MD5

    c13b50e2a7f6e7e9343500771cf2d247

    SHA1

    0b679d20dda94224a5ddd80863a2a32de1cc6f1e

    SHA256

    3f9bf4eee9ece4a0181ea344344230d73d711aba2fa9248834e3b7547a3062cf

    SHA512

    32daea597a34f60ca5b73648d66663e4723c0d588af4ce08f76240aabbecd3a35abfbfd5e22abd8eac8ca64a9f2b3edadb8d1c24bc31f53ce5cd902dba3fc5da

  • C:\67ce152a105fcba7e8ad6b921c297451\1049\LocalizedData.xml

    Filesize

    53KB

    MD5

    1c8ad8f7aacde7ac59bfd9730cfcae80

    SHA1

    815c79113429b37d34c7ddff46ceccfe58b4cddc

    SHA256

    4faa58922f623685f05386ce518c0243e3f310db5ac64c58e5b4e91a3e4477b7

    SHA512

    27d5871f862756945c66397d539c79bf6032ec0d6a06255ad6b57ad1df3c1e8c87dc55dcc3febfb4bd1ce4eb24f3268fab30b1df3fd1c035d66410337db73785

  • C:\67ce152a105fcba7e8ad6b921c297451\1053\LocalizedData.xml

    Filesize

    52KB

    MD5

    984229d90d2e75f49cd9de5df014e484

    SHA1

    fc32854972f189305a38c11a62ef457cd94026c6

    SHA256

    c884f515f337e977d4cf1a19ff693c753813ede2e52a9dbe8f6ef25184ccae8d

    SHA512

    23101cc1b6c17f10a8d53c59c4e9bf6d24d03d781fa1a36fcb89315f2257ea4a1bd652bdbc81845479a88f00f1db52b35a0bba311a9885c7503689f9c25e49c2

  • C:\67ce152a105fcba7e8ad6b921c297451\1055\LocalizedData.xml

    Filesize

    52KB

    MD5

    ddb64b6c4fc498c27d291edaaf65a536

    SHA1

    e312eef1e9a485c5c6fe4578bbe1dd0cadbb1e3e

    SHA256

    027180d93ceb875227a1d76a018b870cd1d09e143ffa1632b31c322b92dd6a35

    SHA512

    ddb55169000052fb27caeeb349939925c7df1535c5c697da7cc2be3224c2c8ebe64328d865d1dfdbad4c1e0588853c5309e31de747f71b7f3bc9b6a9eb4335c1

  • C:\67ce152a105fcba7e8ad6b921c297451\2052\LocalizedData.xml

    Filesize

    41KB

    MD5

    759eb338d738ca6c531b9d5b06591b3b

    SHA1

    c9ed5ada615ccacd887a0d07ee25dfe1d7fbc00c

    SHA256

    a4c3bc545fc028935ad6ec4bd8ce51a300fab8a0b128cca89a8c14923d437b16

    SHA512

    82e6b969dedfdda477f6fb7fcb50a0acad0b26b9b4cca9f1adab5323c6c144da6c0bff34e39e0ef7b39f37ab5808f0064eace99867f7cd258e91aeb5aa5baef2

  • C:\67ce152a105fcba7e8ad6b921c297451\2070\LocalizedData.xml

    Filesize

    54KB

    MD5

    6930ce4e8e28f54a0db5d919b6babd0e

    SHA1

    0278bf717168c061709e60ca754c8dc6e32b92d1

    SHA256

    4bbb7f8a9743a5a21711156dc978dc8683b3edcd9ca32e4c6a38dbe6f5001e04

    SHA512

    904dc390c6cad81e60159683fadc5e8556585b32f1f9482accfedf3ee6b14cd8240e2225e3ce8a0338da93162cef601c4e9798327a1bc390e62b4eb2fc59cd4c

  • C:\67ce152a105fcba7e8ad6b921c297451\3082\LocalizedData.xml

    Filesize

    53KB

    MD5

    e58efac53fe2a16be9b99d0aa33baa3d

    SHA1

    7f2fecb6c4ebe9374a04f374d43465d968b3e33f

    SHA256

    64baa04b7ebb5ee833f43493497e99a6f2584bdc763a7c24700693cb89b35a0c

    SHA512

    b9b2e07e845e6bb509d4471cbe3c848836938e507308293f7c083c54cef61911a06110a5616c216ec72c39ce887b2e7f5961688809a2dad787d131ef2780d22e

  • C:\67ce152a105fcba7e8ad6b921c297451\DHTMLHeader.html

    Filesize

    15KB

    MD5

    cd131d41791a543cc6f6ed1ea5bd257c

    SHA1

    f42a2708a0b42a13530d26515274d1fcdbfe8490

    SHA256

    e139af8858fe90127095ac1c4685bcd849437ef0df7c416033554703f5d864bb

    SHA512

    a6ee9af8f8c2c7acd58dd3c42b8d70c55202b382ffc5a93772af7bf7d7740c1162bb6d38a4307b1802294a18eb52032d410e128072af7d4f9d54f415be020c9a

  • C:\67ce152a105fcba7e8ad6b921c297451\ParameterInfo.xml

    Filesize

    731KB

    MD5

    4925613d29bc7350130c7076e4c92c1c

    SHA1

    2821351d3be08f982431ba789f034b9f028ca922

    SHA256

    9157a0afe34576dfea4ba64db5737867742b4e9346a1f2c149b98b6805d45e31

    SHA512

    3e69650e4101a14ef69f94fa54b02d8d305039165a0bffc519b3cf96f2dcbcf46845e4669d29ccc5ceb887b2f95fc4756265b19d5c17aa176d3d6dc53ed83f77

  • C:\67ce152a105fcba7e8ad6b921c297451\Setup.exe

    Filesize

    85KB

    MD5

    8b3ecf4d59a85dae0960d3175865a06d

    SHA1

    fc81227ec438adc3f23e03a229a263d26bcf9092

    SHA256

    2b088aefcc76d0baa0bff0843bf458db27bacc47a8e698c9948e53ffc471828b

    SHA512

    a58a056a3a5814a13153b4c594ed72796b4598f8e715771fc31e60c60a2e26250768b8f36b18675b91e7ecc777ef27c7554f7a0e92c2dfaba74531e669c38263

  • C:\67ce152a105fcba7e8ad6b921c297451\SetupEngine.dll

    Filesize

    868KB

    MD5

    43bc7b5dfd2e45751d6d2ca7274063e4

    SHA1

    a8955033d0e94d33114a1205fe7038c6ae2f54f1

    SHA256

    a11af883273ddbd24bfed4a240c43f41ce3d8c7962ec970da2d4c7e13b563d04

    SHA512

    3f3068e660fea932e91e4d141d8202466b72447107ff43f90dea9557fc188696617025531220bc113dc19fdd7adf313a47ac5f2a4ce94c65f9aeb2d7deda7f36

  • C:\67ce152a105fcba7e8ad6b921c297451\SetupUi.dll

    Filesize

    299KB

    MD5

    c6760e8b45ffa0cd56b843bc498b919d

    SHA1

    9faa762fcd06b2c216122c31a387d6d9cf5a6558

    SHA256

    26f324b3d8e7af4994459e118d20ef5b0abb332075432dd42c6597833486e269

    SHA512

    b83f7eab3ee1ef167f81c3ddfa6a578540fb0da2efd15b54650fcf5b35cdb6f54229e04887a6f66a78c4e20cdc21119db4e0f0ed3799eeea3d2e4a308ff3f54a

  • C:\67ce152a105fcba7e8ad6b921c297451\SetupUi.xsd

    Filesize

    29KB

    MD5

    2fadd9e618eff8175f2a6e8b95c0cacc

    SHA1

    9ab1710a217d15b192188b19467932d947b0a4f8

    SHA256

    222211e8f512edf97d78bc93e1f271c922d5e91fa899e092b4a096776a704093

    SHA512

    a3a934a8572ff9208d38cf381649bd83de227c44b735489fd2a9dc5a636ead9bb62459c9460ee53f61f0587a494877cd3a3c2611997be563f3137f8236ffc4ca

  • C:\67ce152a105fcba7e8ad6b921c297451\SplashScreen.bmp

    Filesize

    40KB

    MD5

    0966fcd5a4ab0ddf71f46c01eff3cdd5

    SHA1

    8f4554f079edad23bcd1096e6501a61cf1f8ec34

    SHA256

    31c13ecfc0eb27f34036fb65cc0e735cd444eec75376eea2642f926ac162dcb3

    SHA512

    a9e70a2fb5a9899acf086474d71d0e180e2234c40e68bcadb9bf4fe145774680cb55584b39fe53cc75de445c6bf5741fc9b15b18385cbbe20fc595fe0ff86fce

  • C:\67ce152a105fcba7e8ad6b921c297451\Strings.xml

    Filesize

    13KB

    MD5

    8a28b474f4849bee7354ba4c74087cea

    SHA1

    c17514dfc33dd14f57ff8660eb7b75af9b2b37b0

    SHA256

    2a7a44fb25476886617a1ec294a20a37552fd0824907f5284fade3e496ed609b

    SHA512

    a7927700d8050623bc5c761b215a97534c2c260fcab68469b7a61c85e2dff22ed9cf57e7cb5a6c8886422abe7ac89b5c71e569741db74daa2dcb4152f14c2369

  • C:\67ce152a105fcba7e8ad6b921c297451\UiInfo.xml

    Filesize

    37KB

    MD5

    d8f565bd1492ef4a7c4bc26a641cd1ea

    SHA1

    d4c9c49b47be132944288855dc61dbf8539ec876

    SHA256

    6a0e20df2075c9a58b870233509321372e283ccccc6afaa886e12ba377546e64

    SHA512

    ecf57cc6f3f8c4b677246a451ad71835438d587fadc12d95ef1605eb9287b120068938576da95c10edc6d1d033b5968333a5f8b25ce97ecd347a42716cd2a102

  • C:\67ce152a105fcba7e8ad6b921c297451\sqmapi.dll

    Filesize

    191KB

    MD5

    d475bbd6fef8db2dde0da7ccfd2c9042

    SHA1

    80887bdb64335762a3b1d78f7365c4ee9cfaeab5

    SHA256

    8e9d77a216d8dd2be2b304e60edf85ce825309e67262fcff1891aede63909599

    SHA512

    f760e02d4d336ac384a0125291b9deac88c24f457271be686b6d817f01ea046d286c73deddbf0476dcc2ade3b3f5329563abd8f2f1e40aee817fee1e3766d008

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.7MB

    MD5

    6eb2b081d12ad12c2ce50da34438651d

    SHA1

    2092c0733ec3a3c514568b6009ee53b9d2ad8dc4

    SHA256

    1371b24900cbd474a6bc2804f0e79dbd7b0429368be6190f276db912d73eb104

    SHA512

    881d14d87a7f254292f962181eee79137f612d13994ff4da0eb3d86b0217bcbac39e04778c66d1e4c3df8a5b934cbb6130b43c0d4f3915d5e8471e9314d82c1b

  • C:\Users\Admin\AppData\Local\Temp\._cache_infected dot net installer.exe

    Filesize

    982KB

    MD5

    9e8253f0a993e53b4809dbd74b335227

    SHA1

    f6ba6f03c65c3996a258f58324a917463b2d6ff4

    SHA256

    e434828818f81e6e1f5955e84caec08662bd154a80b24a71a2eda530d8b2f66a

    SHA512

    404d67d59fcd767e65d86395b38d1a531465cee5bb3c5cf3d1205975ff76d27d477fe8cc3842b8134f17b61292d8e2ffba71134fe50a36afd60b189b027f5af0

  • C:\Users\Admin\AppData\Local\Temp\HFIDBCA.tmp.html

    Filesize

    17KB

    MD5

    8b8dd3b24cab66d2142efee7834ec756

    SHA1

    04ec8871812f447c27c4412c83ef927e7cb3c8ca

    SHA256

    990c269ed50e4744afa9aa9c5869e8fcfc63b3876502706c8e6d5330dee878a2

    SHA512

    a6c05b98f694c1eeff91aad6381568f93bb76db82b3e2578c89c88e6f7bd7dbae22d04e51d7af2de40510e5348915e2b1f24431dd2c0af94b2f3d407c2a401d5

  • memory/2108-408-0x00007FFC27190000-0x00007FFC271A0000-memory.dmp

    Filesize

    64KB

  • memory/2108-405-0x00007FFC27190000-0x00007FFC271A0000-memory.dmp

    Filesize

    64KB

  • memory/2108-406-0x00007FFC27190000-0x00007FFC271A0000-memory.dmp

    Filesize

    64KB

  • memory/2108-409-0x00007FFC27190000-0x00007FFC271A0000-memory.dmp

    Filesize

    64KB

  • memory/2108-619-0x00007FFC24A60000-0x00007FFC24A70000-memory.dmp

    Filesize

    64KB

  • memory/2108-407-0x00007FFC27190000-0x00007FFC271A0000-memory.dmp

    Filesize

    64KB

  • memory/2108-627-0x00007FFC24A60000-0x00007FFC24A70000-memory.dmp

    Filesize

    64KB

  • memory/2380-330-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/2380-0-0x00000000008A0000-0x00000000008A1000-memory.dmp

    Filesize

    4KB

  • memory/4512-683-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/4512-784-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB