Analysis

  • max time kernel
    93s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 18:57

General

  • Target

    Cryos Woofer.exe

  • Size

    3.2MB

  • MD5

    2129b89ba0537555b185f6fb819c0693

  • SHA1

    008c94d1dc3bcf3ae3ce4c735fad94f810b844b8

  • SHA256

    b250a8cb9042a96d90850ef165b43cd50624878916ab0dd259a577032912e055

  • SHA512

    005b4155242b4711b07e34f1435a6e7268d5d3217a44f99df6137280647d2673a078ea0d8e1f8ba192a2209777cf2ad0dc960373cceda11be0b4ecf36fc2048b

  • SSDEEP

    98304:t2BvT8knglXKHw6ub2NQOtmnuu4Yv21O5PEsOPR:t2ZYPGPzQ0muu4Yv/PROPR

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 11 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3412
      • C:\Users\Admin\AppData\Local\Temp\Cryos Woofer.exe
        "C:\Users\Admin\AppData\Local\Temp\Cryos Woofer.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Google Google.cmd && Google.cmd
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2960
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4020
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3620
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1224
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2388
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 189964
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1540
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "AaronHandyGottenDisclosureImmuneHerbsEncounteredEngineering" Element
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4124
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Points + ..\Forward + ..\Tft + ..\Independence + ..\Rr + ..\Front + ..\Delayed + ..\Signs + ..\Diego + ..\Casa + ..\Kb + ..\Consortium + ..\Cradle + ..\Federation + ..\Apnic + ..\Alpha + ..\Involved + ..\Teenage + ..\Compromise + ..\Standard + ..\Charleston + ..\Niger + ..\Study + ..\Punch + ..\Push + ..\Point + ..\Fixes + ..\Propose + ..\Reliance + ..\Stupid + ..\Mg + ..\Management + ..\Greeting + ..\Leaders + ..\Lance + ..\Garage + ..\Chinese d
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3696
          • C:\Users\Admin\AppData\Local\Temp\189964\Net.com
            Net.com d
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3144
            • C:\Users\Admin\AppData\Local\Temp\189964\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\189964\RegAsm.exe
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1760
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2368
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:3028
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\RevokeTrace.docx" /o ""
        2⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1256
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\MeasureTest.jpeg" /ForceBootstrapPaint3D
        2⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1404
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
      1⤵
      • Drops file in System32 directory
      PID:2572
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1032

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\189964\Net.com

      Filesize

      872KB

      MD5

      6ee7ddebff0a2b78c7ac30f6e00d1d11

      SHA1

      f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2

      SHA256

      865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4

      SHA512

      57d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0

    • C:\Users\Admin\AppData\Local\Temp\189964\RegAsm.exe

      Filesize

      63KB

      MD5

      0d5df43af2916f47d00c1573797c1a13

      SHA1

      230ab5559e806574d26b4c20847c368ed55483b0

      SHA256

      c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

      SHA512

      f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

    • C:\Users\Admin\AppData\Local\Temp\189964\d

      Filesize

      2.7MB

      MD5

      6e93666841e830ab68e145c4826e8a7c

      SHA1

      ac2af84f6941066c27f1a66970d4eff25b0f115f

      SHA256

      7a0ded163606500781a0e7b98fe6468914515b7e4fda2cfae6d16af82d1a2bfa

      SHA512

      f6ddcdab8f82610e1de03d528c1f1dfce43c0ba5d6a4137a133520af5f0a63e0a9a69da72f96b49da24cadc1da81e36c94ac6f871f045bc466737c39da0286ae

    • C:\Users\Admin\AppData\Local\Temp\Alpha

      Filesize

      80KB

      MD5

      b4eba941594f5b81156da311ea9d6a76

      SHA1

      7405fc9766a11b0a076db21fdd498e28318d9ab7

      SHA256

      1e2f183e6f8ddb0f5517f0e32c9e96e97586dda1227f0c566394109189bad044

      SHA512

      2ffe3e377cb91b9b8fa3c37764ad35df0e5557bffa8d60e931056328d65c262a9fb8346c6568ffbd97862875a91d94368cfa97a6269ec7d41c6d78fedb5949f8

    • C:\Users\Admin\AppData\Local\Temp\Apnic

      Filesize

      88KB

      MD5

      7dca32736c199efa61904d2afb465efc

      SHA1

      661527757e83bf3a37c91c7909918c3fc2375b32

      SHA256

      d63e70b5cbe9aea2053e89e97d4984fbb0d110113b20a327b70e6c317346a46d

      SHA512

      de68987cf9436828832fb5f17d846fde4d202f91e212451f4ffc005d089d5e96da1a15dfbc250c6fcff87d33dba692eb9f1bcc773dfd9b72cb79784004ec8887

    • C:\Users\Admin\AppData\Local\Temp\Casa

      Filesize

      94KB

      MD5

      85c42237902c103d6aa1bb99857d13d5

      SHA1

      de98c441a45dfbd83f6716977572a3c37dd8c614

      SHA256

      6bcbf606674f937e1e665bb06579b75458990c2de0b86be5864e6365488e26e1

      SHA512

      46b3660d3842c10fa55e312c08f60233ce0ece1afb1ab5713b70b60ade970b59cfb931cc99acda111ef95fd35a795c1f5fa276a9ccc76185ed1a5176d333c441

    • C:\Users\Admin\AppData\Local\Temp\Charleston

      Filesize

      80KB

      MD5

      a2f6fe834ea97119a59aeb477b06a471

      SHA1

      66cc3f0555d662fc4beadb82e54a6267485e9a24

      SHA256

      85a040edf84778ad9e4cc023646016f37769bde58b1331056f6789c2a385ef99

      SHA512

      942424376d8634787e97d096888d773c3c70fc32e0b0c712d739395575927a5b63958246fa6323d7cf4b66b3ca5ba0827d491676343e9f896e1f0bd7e85339df

    • C:\Users\Admin\AppData\Local\Temp\Chinese

      Filesize

      13KB

      MD5

      c8a5fee6c2c81cfce539907d577f12fc

      SHA1

      9bb8e764338bfb98e30f99a245814978a177912a

      SHA256

      f098fc84032acee2315f3de9f8d247ca44ac8e51e9d21d6451edebd92ce09236

      SHA512

      0b3d2d10a99ed915357ab5ba07f8f635503ef97599dbccd2ae0d744acc9ba4e4a707a1f5b639474aa92854385cd712c094625b14befdd2004f074ccad166cf64

    • C:\Users\Admin\AppData\Local\Temp\Compromise

      Filesize

      78KB

      MD5

      fcc8ab8327b384d290beae6dc87b3da4

      SHA1

      584957308d2b64df009d72e02e60c32c3fa92c43

      SHA256

      dc79cf933df0aafe3ebfd0297431ca9e2113f5419dfb594821e1d7aef113bab9

      SHA512

      f26e538970feb6b345dfec532a766678efc6123745aa5e6301f45b338eed28a09855dbf145b79b2653e5723930729e1bdc955f39890020ad6131f0116f77a6b4

    • C:\Users\Admin\AppData\Local\Temp\Consortium

      Filesize

      89KB

      MD5

      b223090919d9c2c58b4c2e86870d7951

      SHA1

      1afaa9f00f88d949fefa9e17d147236eb1269d11

      SHA256

      5f516c943079695a5fc7f90a729d6120ae8c5cf46278711bc9cac4366cb0f046

      SHA512

      e97c4d185140e4324d1350aa894a45942ba95ad2dc40b3d3120f04cd781d153fd1bc158871a2a8bb2047fbc6565ee79e00543dd7f8192dd17ce8c999d4ae7c20

    • C:\Users\Admin\AppData\Local\Temp\Cradle

      Filesize

      62KB

      MD5

      f416e5192492868fa51e412ac5503c07

      SHA1

      eda6c63aafb5f2cc6406eb737cf70107898dcd73

      SHA256

      f9481f6619a0112aad607efa8564958aadca58afeb2b49d8d6f9f990cd62be60

      SHA512

      560b9cef881b4b547e0edd1c895879b519933b2b8361ba0df62543df8e18f02af5f29fc62f08de69295c1d7053e430fd88a23ec7b9568104b2fce3f89091836c

    • C:\Users\Admin\AppData\Local\Temp\Delayed

      Filesize

      69KB

      MD5

      f1d0af671c88b4881e4c4902aacb043c

      SHA1

      daf3d8184b6fd438f4ce36b7fdc97912e220a5ce

      SHA256

      8490e244e0ccd867308f8ef0ade69e00ee86eab2b2344d9db7c3e7c7acdb4106

      SHA512

      514ffeedc11d2be7901cbe08f28e434e1e447eb969c308dbb0f7e5a06a9bc3fcbf47b2a30ad0b5e783c736fb07b4f1b35d48acec5dde8253e7d12bfe14f0546d

    • C:\Users\Admin\AppData\Local\Temp\Diego

      Filesize

      93KB

      MD5

      d3d7c45b2be4daa2f99a79e3a3a5f746

      SHA1

      33514d005e4e3e27cde81756fe453446b2d93dbd

      SHA256

      aea635487dc9bdeb7bc788d014861316fb78c4f9fb643b45a48318a5b4739401

      SHA512

      c379058391a0dd770f23fbbcfc99c597c262d1abd8a8b673cea07bd7a823dd68a3a7d983d66e60fcdf58d9de76dca9fd504c879a6cc67389486bc4d27ad0a28a

    • C:\Users\Admin\AppData\Local\Temp\Element

      Filesize

      498KB

      MD5

      527d883b8494620b08af8fccafe091f7

      SHA1

      a92bb133594994b71a7370cde62661e757a136cc

      SHA256

      8ea0869e7dffbfc4df5f14e9aa0bbaa27d8f072ae3559810e6c58e77a68321ca

      SHA512

      944e29661ae91773f53174993503d2d99f3a74d3157d41d9d7980256bb90e4a103aec589e58adab7d6cfaabff84fab19be2a81e280ecdb7a555d7f042a345516

    • C:\Users\Admin\AppData\Local\Temp\Federation

      Filesize

      98KB

      MD5

      bb5f3dd82db5e0ab48aa7dbbaccd5b56

      SHA1

      d347664fe9f1fc1fe39d4413173726117ac196f9

      SHA256

      406b1c705ce3a29d450589f8d710b065ddc549f9cef2045f4d1b8e999d1b98e2

      SHA512

      e0b06950a062d095293f8776ab5968da28be3375d33649ee1d6d1e9da99e54673ac52e75359160686fef428f82a3dd72cb6a4e3bc212cff4e54205114263fb2e

    • C:\Users\Admin\AppData\Local\Temp\Fixes

      Filesize

      93KB

      MD5

      376a9ac3599934adfdf5cf843dfe777f

      SHA1

      fbb1ae1938a37def7dfebf433422285ff5db486f

      SHA256

      7da89c0cee8a09b7fffa2b7ea8e57c8a00b5da1aae71544414eb712dafecff34

      SHA512

      a1eaa4cd4baf0d10cd2077e655504d917fb80cc0d9c59a42f206c218333e059f1bb859f74f7f620ef11e4574328ca4e2e64e26e7760a9d835b708d8a08f9a125

    • C:\Users\Admin\AppData\Local\Temp\Forward

      Filesize

      96KB

      MD5

      50962cbac4004d3568789b25c4e9d395

      SHA1

      6f5e1f181d831ef3161e8e59fa945def00c6e981

      SHA256

      e0bd26dde199a56f6c3f2c95a067c321f6dfd9eb6c19b61486a3273feb6bff59

      SHA512

      a6028d6c0dcdb2a01cef5b1394972fd035e5d3ac2f27b058912fe21bd79db8b97c7f970c0adf7697da3b459626fcc5e8eb636ffd1d5d94406a4676b1269cc193

    • C:\Users\Admin\AppData\Local\Temp\Front

      Filesize

      55KB

      MD5

      2e572d22feff047877fa95cd07bfd3ba

      SHA1

      8fead7b65c9aa108011b89a1827c74fb159ba0a7

      SHA256

      e42bfd83426c7aed0d993d4dba951c606858ca6233310bcc5b15acdb0bb25732

      SHA512

      3cedb2738aad701d5a4271c93815b538089e0031bbfcb498a564855363a4019aa29159d6650055d718cc80afc678d792566f3d8e01d89432f7a537d2c846f3a8

    • C:\Users\Admin\AppData\Local\Temp\Garage

      Filesize

      85KB

      MD5

      10ae8f7dff7c6bcc9fdb99f89da6b53c

      SHA1

      042e9e285c9c64bcb22fe6d26997a78c679374f3

      SHA256

      45fbe6cd9f81a9e7ee28e522f4ba31d17f6e961a3b1d2487dbaca7faa09f70fd

      SHA512

      59788d7904c32df03bab54a812877a18085ff352e2937b5888b7d9b112d95e591836c74c7fbd1151e3952cb2d21d886c96b0aa9400e6bebf3b488dc9822734b6

    • C:\Users\Admin\AppData\Local\Temp\Google.cmd

      Filesize

      25KB

      MD5

      8f3d65af0df39f5d94912e329417af02

      SHA1

      ab317ac4eb3e5261822a3b8ed0de3272d662a619

      SHA256

      7a255ad6478e9c5051efc3064cd558d4fb26a99f462888f65b841349ec80a996

      SHA512

      5c61949f8a668dc85426d5980695d31b02c18e78fa55dc3f6107f9349bdcdecffce7c9863e7985937ab14298380fbd3b41db59684a1027444c470a58b78e4330

    • C:\Users\Admin\AppData\Local\Temp\Greeting

      Filesize

      51KB

      MD5

      2592d2e8154b23e8be8406892290eb32

      SHA1

      2f3c8e87d4a3e2e03adc564cbd7a278dc0fa288e

      SHA256

      015ef50b24331adde19feb8060a0d521e81d6f8661d4b8ed5b8b226b322d45c4

      SHA512

      1a29ec1b9b9075eb4df3d2c7f8044c64816f6069f4bf9c1e10e8460c0fd4df835a3a618bfcd101c9fa0efe96a11242b43b01e0869cac6b0a58ee9c85aafb68e2

    • C:\Users\Admin\AppData\Local\Temp\Independence

      Filesize

      99KB

      MD5

      e94e4ad0e4842209bda5cb076b627c2a

      SHA1

      3dd3d427be03b1834224c68851ad7883ed234b11

      SHA256

      bb1cba3c6aade9b7fbcdd7a40e5e684cf1c502dcca50a4a09bdbb83d67a2f267

      SHA512

      415445ad5bc1226525fffff249874f39d24230587cc1b39f4497d33e095121894de38a395f7f2728004d05df546039d6a0e37ec0171ff8a3b265084f0edef721

    • C:\Users\Admin\AppData\Local\Temp\Involved

      Filesize

      51KB

      MD5

      ebffa6ddd261877e6b22d9d05e96b996

      SHA1

      7ff2482ff89761fea5e0fc120e4c87dece65df23

      SHA256

      c8a5138a384e3d79ef18676168a4b851f6666eae34523c0311cabe88d8e7b2cb

      SHA512

      c979760a08065093c1e65fcd214fe25c23c82b0bcc7feb4016dcbe9cdc56973a2ec2274496477010dfbab148061dba8e676109ab8114078ba9dea70e2731f273

    • C:\Users\Admin\AppData\Local\Temp\Kb

      Filesize

      65KB

      MD5

      821933d9ee87283fdf0d01b9cf7d13fc

      SHA1

      40d24273e9606735eca43e8b45b4bcd014fd5117

      SHA256

      34bc79bc9fb8e84119b49aabda6b1821384192197ec29e159d7688836b4b4f9d

      SHA512

      f95c929feaab12232c91b9d26b738526228d0aeb21642c27e64ab931744a56b7abe415dabc45f19819f63b88055834dc02a33992dc947a18d68147d10cd02367

    • C:\Users\Admin\AppData\Local\Temp\Lance

      Filesize

      84KB

      MD5

      b6de1c8ffe1dcaf10dde47cf0095ac10

      SHA1

      c6942694ce63d49cf3c1a406b25ccf3faf9ceadb

      SHA256

      86bf32c70c6a63baca89d269aa8c9d2929184e9fbf974d0a4e3ca95111ef82ce

      SHA512

      61fa5a560898893fbfb4e37b01bc85a4311eefd83423cd24ed6fc72f2247c326d8cf11feef5db245f78597c1f56648428976cf0c17784be195d76c11378ef951

    • C:\Users\Admin\AppData\Local\Temp\Leaders

      Filesize

      68KB

      MD5

      354ab12f12062725f7b756ddd3e6e361

      SHA1

      e010f6deeab1ba73523a76e26eb756d28e5b2d6b

      SHA256

      1b6bd15aa3c8f18be6a3a668e9fc2b54ac61b78b3bc6de4887b7c7a9b888cb6b

      SHA512

      d282bec4a44cf6cc5e1cbd3c9991ad91417027115202a3c17ddd38cac3d176752e87f1139f7de39aa729e3209e7d84caacf838d3b06f614ae2de1ee199e7d6dc

    • C:\Users\Admin\AppData\Local\Temp\Management

      Filesize

      59KB

      MD5

      c730fbb406cb86802f207b6df6f71f0a

      SHA1

      7d240715a25f5093e29b73c3421adff8f603b3e9

      SHA256

      8461501dbddb532603e460abc4805e9987814312ee29da135d1c1c84ffda2ce9

      SHA512

      a9c3fc94f079059d269a2f84d2de146da341d7c81399119283b6e118e37f22d75c83d8045143c9414615af62f6ae7857c4e93604e746bd4c84257bb2649dfde7

    • C:\Users\Admin\AppData\Local\Temp\Mg

      Filesize

      78KB

      MD5

      d506321827e47cf2a75a43fd999fe125

      SHA1

      0bc6cdf62c97732724e4769d1471ddce3e5e8a7a

      SHA256

      18f39917456fa311d24db5e95b0d618d801958f2915c22da6e607d7a82b51e28

      SHA512

      6f7f81d4dd831fc39a81ed4046d81bfa5664fed6178ecdcb83c26c896b21d237cfdc402b5968f7d67aaa5cf50f7464dbb394fdf1aeaebe62c4b5f36a1418223e

    • C:\Users\Admin\AppData\Local\Temp\Niger

      Filesize

      66KB

      MD5

      8dfbdec83eace783c7f4cbaf31c7c56d

      SHA1

      772bcc24c73727c576d76ab8936f4ae49bd878c4

      SHA256

      166c46e4715fe8a25a2847bd561eb4d2124cbe9dc886239e852dafe69c57fa2c

      SHA512

      3045adc558a29f5b031fa55a6d9e27387238b9750d8fdc93ed07e40271511c3f180bc39b5ffd138fd0d4c4fb5dd9927b06ddbac6894bc9ff23e75a4f5f726d72

    • C:\Users\Admin\AppData\Local\Temp\People

      Filesize

      77KB

      MD5

      f76659d51000412a9bed559b12f7329f

      SHA1

      85565795b8182cc7217ee3829f7cb237501d723c

      SHA256

      057f7a29b3b2dc732e41e659c54264a016da1e39803be5c6d9bfd8af69436764

      SHA512

      fe968e3ac196f740531270cb8dba120ac99017cb8fda4ec3e42f3f5198092ff9ad10d7667419ef2e3b0de785eaac0a85797df27b82aff6d151cd78728e2ffe5f

    • C:\Users\Admin\AppData\Local\Temp\Phil

      Filesize

      297KB

      MD5

      e9d72cb8ba3c64d135e42f126c3a6298

      SHA1

      a828accf4f64abd6fdead658851ddde2ce4ac17f

      SHA256

      19c2dc17824336a6f2286c44a4cabba32211f20564613afa63033108d231c437

      SHA512

      d0fdc24a157300db5781f11255fa3334439379ce82840b06266204e1fb952e2a0f45ef5b240679eecb0ebba29e1ca8ceaab39e448c2e92b0e134b748784b8ad9

    • C:\Users\Admin\AppData\Local\Temp\Point

      Filesize

      65KB

      MD5

      ab37359203590d8e17bf7f54256629bf

      SHA1

      b02e1efe2f28be804fd795455b60ae99cb0bb9a2

      SHA256

      1ecd524700ad97b570dfdafdd17729c03fdd51ef90fcea063e1c1baa4586a902

      SHA512

      53105e2c2b42af3435e25f8a0f6795c55b6d17afada3760904c68d489c74c68d61a72b4017752a0c0f1c3ba523eea6e666ee4db5d91a424fc9e942a23e14f3f8

    • C:\Users\Admin\AppData\Local\Temp\Points

      Filesize

      58KB

      MD5

      59b519e239a0e26c568cb8389f11e41f

      SHA1

      68f0c72a98afb1aa656776ff0e133283788d1ff0

      SHA256

      314ff990abcc57430cbbc6377bbc27cda929ccb28c5b840ee36593aeb966a301

      SHA512

      009a51c7c29742444e50d153d2cf85c5d78d32e0c689d40514df6c5551762636a2b0d9995a066bf3ed786a26b8a0ce5d124ab5d417ad03bc554793ef5c388d7e

    • C:\Users\Admin\AppData\Local\Temp\Propose

      Filesize

      51KB

      MD5

      bd2b755d02b90f64b8ec6b6c8ff72b7f

      SHA1

      907083d93db0b0626258f32c4794c161e1b7e1c6

      SHA256

      d2d3aac9d0df443691e40c3d956ce32057ba8d4ca135b5360a255dec93372917

      SHA512

      e807843b44c30169d98ce57ade717c028fc6d3443f3a8b30170739756482cc94b41cee6ad7ae15d26c7af02853559df0822403a2b2cc678670933d13575eb2a7

    • C:\Users\Admin\AppData\Local\Temp\Punch

      Filesize

      90KB

      MD5

      15dda7f1bb12602771dc5cc6d9381260

      SHA1

      d4c2f508e8ea4eb5d479ed404caa726fe83dfe6b

      SHA256

      f9c7b9d90cb57d8ddb7f198cb0ba60b47a89befe2aac6333a916bb9d26f43f7e

      SHA512

      1f7f4e23b2fa2800d7c3196c4c775c8c94677baa87de251d310857a2848022b144a49350d742085f9497816e268873b2c22904a3f125c1f32352944224c9faf6

    • C:\Users\Admin\AppData\Local\Temp\Push

      Filesize

      70KB

      MD5

      6af4c91a6e6ce163cf54107cc6c4c6e2

      SHA1

      ad86cdd754261087045d9c4e003177b58a93f345

      SHA256

      0ece0a173c8c3502cac2072474f080815a3531570daf2f2525a2c9538abe7d78

      SHA512

      65b2ec105a4247318d2d7e1b215f34ae932fad072559239a27e8f7634e7a3d199ce3149c261cab32191ec9a02264f6fba3bcc8352cddda1af4e6a28f53783798

    • C:\Users\Admin\AppData\Local\Temp\Reliance

      Filesize

      89KB

      MD5

      ded1634f6a84748f79caeb0ed261fe12

      SHA1

      5013f69fc38a03aa6bbb9757ffec57e4a81b8e73

      SHA256

      d7a1bef2ab1bb7fdbdc0dce0ed706ba98d1fd822ba49e9f3c37e991d7eaeadcc

      SHA512

      647f7a26234899e44c79627090eadf73ae81cd7434ef919a66e7c25aa55e3818b8e1a704714ce1f399aba6ec72b15802765010b6673f2275aad1e78d4c20be4a

    • C:\Users\Admin\AppData\Local\Temp\Rr

      Filesize

      69KB

      MD5

      02b9dd0a82ca3fbda810a012adb8868f

      SHA1

      8afe09a236e82a5c99e34a54166a716aa0f5f733

      SHA256

      a1c6291d0f38aac1dea638385332ed496e018ece30bbde1fc8eae4a9328f7a7e

      SHA512

      be96afcfe1495c69adce54d5626b6375fe8ff46518f9055f57ff310029276971f0aae97856790f4b015ffa3fa5543d7be1f16c2320313282940cfeaf3431427b

    • C:\Users\Admin\AppData\Local\Temp\Signs

      Filesize

      57KB

      MD5

      6dd34779bbaebcc095d9cffe9c722822

      SHA1

      8f84d12c39c4ff788b229a7eb2515716e4776b2c

      SHA256

      213be4b27e88ea671e6fead5cf7ead00f31b06f1de32d21f41d3bc91655a0ddb

      SHA512

      112031ed18ae4d3143f93962ac57c22f031f3c347cb7f0c44e4f5236fab420222dfdb651082f0ef4f7e74b9d993e869fd1548067a8c9abe2d14656cf90172e84

    • C:\Users\Admin\AppData\Local\Temp\Standard

      Filesize

      90KB

      MD5

      5a717168c627844df8f5062ef1b6c4c0

      SHA1

      3de6accc70ddc4606a094c5912219f58b20737f5

      SHA256

      47c3c12ea39fa0193d2c832874288c377aae179d6961fe52453d97948cedb1d8

      SHA512

      c90f11d4af65d42d7e99a992d46323147d99844fba36f816f61e03c04bb036fe876d76ea8746926ab9ac68337f95dddf898e169e71224c04845273d1ef1df374

    • C:\Users\Admin\AppData\Local\Temp\Study

      Filesize

      71KB

      MD5

      a307ca00504ac8e484bd54c5df7b1a9d

      SHA1

      bc82cd32b90b0b3414b27e877464264104b421e0

      SHA256

      f762f8567d9a92e561215fa8ad46eacb716dc318e7b26153d8647743bf7e93e4

      SHA512

      3259592fd68315984c53392353a08e621d5ea7cf690093f772f9024c028c1e5841542c5aecdd1ef0977e32aa33e35ac956b361fff474295b5c95697d59ae84b7

    • C:\Users\Admin\AppData\Local\Temp\Stupid

      Filesize

      73KB

      MD5

      0059044f674bb23e8c52537007fe143a

      SHA1

      428995bb099339b426f91dbd44a005bca1abf149

      SHA256

      5dc82e508d976087392b16962468efb2105f0056c648b1cb69054f12deb8f2ee

      SHA512

      854d5376f309297b07d03b6ba43881c50780bf3d672f18ebb3c6b0a7334c58f56a95835d0c9623a18fb51575dede6d5568ced226cb6830ffe3e30db78aa21818

    • C:\Users\Admin\AppData\Local\Temp\Teenage

      Filesize

      74KB

      MD5

      61330c5107ac2d9baf46de3eb2623257

      SHA1

      1811897892e3106fe3f1cc7ff070fc5727cd6978

      SHA256

      a6a9eed5b8f38107808e3a9e0b089910bb3ae2ab874e146696cd8cc292db37e0

      SHA512

      7cff32b5c9e6aeeb4b179a4f2be99df11f4973017d269c4702f56301677b7d309144b27d36ba488fd4265f030fe5289bbdb759e1443c0b0b092d6aaa50465626

    • C:\Users\Admin\AppData\Local\Temp\Tft

      Filesize

      80KB

      MD5

      a3be2eb071af6b6bc479a97891ddb3ed

      SHA1

      a7e11cdac58bb929ec18558ad7937af733d4909b

      SHA256

      b4aef2ad69081b3a4e433aa72113482e0f3d3b228179fb2ba444a258ab4707f5

      SHA512

      644d817b1d765f8fbf403a15328be9e4fcaeca9d6ec49f81791ad1e56fc4e586cd0efdc21c277a104f05c09ce1e7ecd2367a7b12cd1637efcdf90c3915c8ad4b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      339B

      MD5

      6e1b8f78ff1bdfdc204174095d447eca

      SHA1

      d967f04a8320a589f79b6825b2d4ea805ab0b352

      SHA256

      b77b41691675047e976550143e8fc3191f117194eb5412d4615397dc5b160748

      SHA512

      70740f7bb1414e13e6dfac98f78fc190a281463e7d390c2241912304515f8c19cb8fb1dca7489a8a05f590f33263928dd0384c23f29e6955ce942777347c4a88

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

      Filesize

      16B

      MD5

      d29962abc88624befc0135579ae485ec

      SHA1

      e40a6458296ec6a2427bcb280572d023a9862b31

      SHA256

      a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

      SHA512

      4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/1256-619-0x00007FFE607C0000-0x00007FFE607D0000-memory.dmp

      Filesize

      64KB

    • memory/1256-615-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

      Filesize

      64KB

    • memory/1256-620-0x00007FFE607C0000-0x00007FFE607D0000-memory.dmp

      Filesize

      64KB

    • memory/1256-616-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

      Filesize

      64KB

    • memory/1256-618-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

      Filesize

      64KB

    • memory/1256-617-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

      Filesize

      64KB

    • memory/1256-686-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

      Filesize

      64KB

    • memory/1256-688-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

      Filesize

      64KB

    • memory/1256-689-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

      Filesize

      64KB

    • memory/1256-687-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

      Filesize

      64KB

    • memory/1256-614-0x00007FFE62CB0000-0x00007FFE62CC0000-memory.dmp

      Filesize

      64KB

    • memory/1760-713-0x0000000000620000-0x0000000000924000-memory.dmp

      Filesize

      3.0MB

    • memory/1760-716-0x00000000055E0000-0x0000000005B84000-memory.dmp

      Filesize

      5.6MB

    • memory/1760-724-0x0000000006830000-0x0000000006B84000-memory.dmp

      Filesize

      3.3MB

    • memory/1760-723-0x0000000006800000-0x0000000006822000-memory.dmp

      Filesize

      136KB

    • memory/1760-722-0x0000000005F30000-0x0000000005F96000-memory.dmp

      Filesize

      408KB

    • memory/1760-721-0x0000000006370000-0x000000000640C000-memory.dmp

      Filesize

      624KB

    • memory/1760-718-0x0000000005320000-0x000000000532A000-memory.dmp

      Filesize

      40KB

    • memory/1760-717-0x00000000053C0000-0x0000000005452000-memory.dmp

      Filesize

      584KB

    • memory/2572-709-0x0000025EAC740000-0x0000025EAC741000-memory.dmp

      Filesize

      4KB

    • memory/2572-696-0x0000025EA4520000-0x0000025EA4530000-memory.dmp

      Filesize

      64KB

    • memory/2572-692-0x0000025EA39A0000-0x0000025EA39B0000-memory.dmp

      Filesize

      64KB

    • memory/2572-710-0x0000025EAC750000-0x0000025EAC751000-memory.dmp

      Filesize

      4KB

    • memory/2572-711-0x0000025EAC750000-0x0000025EAC751000-memory.dmp

      Filesize

      4KB

    • memory/2572-703-0x0000025EAC630000-0x0000025EAC631000-memory.dmp

      Filesize

      4KB

    • memory/2572-708-0x0000025EAC740000-0x0000025EAC741000-memory.dmp

      Filesize

      4KB

    • memory/2572-707-0x0000025EAC6B0000-0x0000025EAC6B1000-memory.dmp

      Filesize

      4KB

    • memory/2572-705-0x0000025EAC6B0000-0x0000025EAC6B1000-memory.dmp

      Filesize

      4KB