Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 02:58

General

  • Target

    773e13fffd0842e717ce55e2a678da37123c55186f9c92460c671261b1654ffd.exe

  • Size

    72.2MB

  • MD5

    33c2adebfe2c3acedfb34ffff8151b7d

  • SHA1

    8e93f7ecafa92017a7d528423574ab5cfeec754a

  • SHA256

    773e13fffd0842e717ce55e2a678da37123c55186f9c92460c671261b1654ffd

  • SHA512

    6f545b4da55412ec78de6d1c3bddbcc6bb857b7d13b15fe4bb832259dbe1842d44a02b46395233c23ca57abd34239226a60c9f7ee26fcf82ba383a836f8d61ad

  • SSDEEP

    1572864:yIWs/6+mI5n17YTIytz8ATFiQiFGaaoE13gIFxXtzM/zMfCOA6Z:ssJmIBiTvR8UFiQYGvoq35FVEeCOr

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

167.71.56.116:22269

Mutex

3470ac31-30aa-4cf6-ab0a-1ed0dd64656f

Attributes
  • encryption_key

    33E08519CDBEF59C54E93052681A76D1969C659E

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 33 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Checks system information in the registry 2 TTPs 12 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 9 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\773e13fffd0842e717ce55e2a678da37123c55186f9c92460c671261b1654ffd.exe
    "C:\Users\Admin\AppData\Local\Temp\773e13fffd0842e717ce55e2a678da37123c55186f9c92460c671261b1654ffd.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2616
    • C:\Users\Admin\AppData\Local\Temp\TeamViewer_Setup_x64.exe
      "C:\Users\Admin\AppData\Local\Temp\TeamViewer_Setup_x64.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Users\Admin\AppData\Local\Temp\nsjD3D4.tmp\nstD4AF\TeamViewer_.exe
        "C:\Users\Admin\AppData\Local\Temp\nsjD3D4.tmp\nstD4AF\TeamViewer_.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Windows\SysWOW64\schtasks.exe
          C:\Windows\system32\schtasks /Create /TN TVInstallRestore /TR "\"C:\Program Files\TeamViewer\RollbackTemp\TeamViewer_.exe\" /RESTORE" /RU SYSTEM /SC ONLOGON /F
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1492
        • C:\Program Files\TeamViewer\TeamViewer_Service.exe
          "C:\Program Files\TeamViewer\TeamViewer_Service.exe" -install
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:1584
        • C:\Program Files\TeamViewer\TeamViewer.exe
          "C:\Program Files\TeamViewer\TeamViewer.exe" api --install
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2448
          • C:\Program Files\TeamViewer\crashpad_handler.exe
            "C:\Program Files\TeamViewer\crashpad_handler.exe" --no-rate-limit --database=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports --metrics-dir=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports --url=https://errorreporting.teamviewer.com:443/api/3/minidump/?sentry_client=sentry.native/0.4.17&sentry_key=ab2b65e79a501de39a5e47e7bc23e13b --attachment=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports\1ba065d7-d08b-4c2f-534d-a131e66301b2.run\__sentry-event --attachment=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports\1ba065d7-d08b-4c2f-534d-a131e66301b2.run\__sentry-breadcrumb1 --attachment=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports\1ba065d7-d08b-4c2f-534d-a131e66301b2.run\__sentry-breadcrumb2 --initial-client-data=0x1cc,0x1d0,0x1d4,0x1a0,0x1d8,0x14447d8d8,0x14447d8f0,0x14447d908
            5⤵
            • Executes dropped EXE
            PID:2552
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\TeamViewer\outlook\TeamViewerMeetingAddinShim.dll"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:1668
        • C:\Windows\SysWOW64\schtasks.exe
          C:\Windows\system32\schtasks /Delete /TN TVInstallRestore /F
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1852
        • C:\Program Files\TeamViewer\utils\MicrosoftEdgeWebview2Setup.exe
          "C:\Program Files\TeamViewer\utils\MicrosoftEdgeWebview2Setup.exe" /install
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Program Files (x86)\Microsoft\Temp\EU6D82.tmp\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\Temp\EU6D82.tmp\MicrosoftEdgeUpdate.exe" /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
            5⤵
            • Event Triggered Execution: Image File Execution Options Injection
            • Executes dropped EXE
            • Checks system information in the registry
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2548
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              PID:2460
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              PID:2596
              • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe
                "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe"
                7⤵
                • Executes dropped EXE
                • Modifies registry class
                PID:2832
              • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe
                "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe"
                7⤵
                • Executes dropped EXE
                • Modifies registry class
                PID:2804
              • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe
                "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.173.45\MicrosoftEdgeUpdateComRegisterShell64.exe"
                7⤵
                • Executes dropped EXE
                • Modifies registry class
                PID:2844
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzMuNDUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzMuNDUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjgwNkIzRjMtMUFFRS00Q0IzLUIzMEItM0Q0NzVCMUMwQ0FCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins5QzFDMjMxMS03Q0U1LTRDQzQtOERCMC1CQjE4Q0NEMEYyRkR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iMiIgZGlza190eXBlPSIwIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSI2LjEuNzYwMS4wIiBzcD0iU2VydmljZSBQYWNrIDEiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxIiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSIiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMS4zLjE3My40NSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMjg1OTc4NDAwMCIgaW5zdGFsbF90aW1lX21zPSI3MDIiLz48L2FwcD48L3JlcXVlc3Q-
              6⤵
              • Executes dropped EXE
              • Checks system information in the registry
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              PID:316
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{6806B3F3-1AEE-4CB3-B30B-3D475B1C0CAB}"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2404
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
    1⤵
    • Executes dropped EXE
    • Checks system information in the registry
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1640
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzMuNDUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzMuNDUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjgwNkIzRjMtMUFFRS00Q0IzLUIzMEItM0Q0NzVCMUMwQ0FCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntGQzQwQUU1NS1DNkU1LTRBRTgtOUNCRS05QzBENzkyNjYzQzF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iMiIgZGlza190eXBlPSIwIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSI2LjEuNzYwMS4wIiBzcD0iU2VydmljZSBQYWNrIDEiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxIiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSIiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTA2LjAuNTI0OS4xMTkiIG5leHR2ZXJzaW9uPSIxMDYuMC41MjQ5LjExOSIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjMiIHN5c3RlbV91cHRpbWVfdGlja3M9IjI4NjI3NDgwMDAiLz48L2FwcD48L3JlcXVlc3Q-
      2⤵
      • Executes dropped EXE
      • Checks system information in the registry
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Modifies data under HKEY_USERS
      PID:920
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0BB12989-F8AD-4AB8-AD8C-1C2293E6215E}\MicrosoftEdge_X64_109.0.1518.140.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0BB12989-F8AD-4AB8-AD8C-1C2293E6215E}\MicrosoftEdge_X64_109.0.1518.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:1200
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0BB12989-F8AD-4AB8-AD8C-1C2293E6215E}\EDGEMITMP_3EB3E.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0BB12989-F8AD-4AB8-AD8C-1C2293E6215E}\EDGEMITMP_3EB3E.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0BB12989-F8AD-4AB8-AD8C-1C2293E6215E}\MicrosoftEdge_X64_109.0.1518.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:2976
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzMuNDUiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzMuNDUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjgwNkIzRjMtMUFFRS00Q0IzLUIzMEItM0Q0NzVCMUMwQ0FCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InsxRDhBNEFDNi0zNUVFLTQ4MzQtQTg1NC1BMkYxOUU2MjZDNUR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iMiIgZGlza190eXBlPSIwIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSI2LjEuNzYwMS4wIiBzcD0iU2VydmljZSBQYWNrIDEiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxIiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-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-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-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-PC9hcHA-PC9yZXF1ZXN0Pg
      2⤵
      • Executes dropped EXE
      • Checks system information in the registry
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Modifies data under HKEY_USERS
      PID:1300
  • C:\Program Files\TeamViewer\TeamViewer_Service.exe
    "C:\Program Files\TeamViewer\TeamViewer_Service.exe"
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2812
    • C:\Program Files\TeamViewer\TeamViewer.exe
      "C:\Program Files\TeamViewer\TeamViewer.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies system certificate store
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1432
      • C:\Program Files\TeamViewer\crashpad_handler.exe
        "C:\Program Files\TeamViewer\crashpad_handler.exe" --no-rate-limit --database=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports --metrics-dir=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports --url=https://errorreporting.teamviewer.com:443/api/3/minidump/?sentry_client=sentry.native/0.4.17&sentry_key=ab2b65e79a501de39a5e47e7bc23e13b --attachment=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports\e2b573e6-e616-4a4a-f220-00913c9c3988.run\__sentry-event --attachment=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports\e2b573e6-e616-4a4a-f220-00913c9c3988.run\__sentry-breadcrumb1 --attachment=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports\e2b573e6-e616-4a4a-f220-00913c9c3988.run\__sentry-breadcrumb2 --initial-client-data=0x1c8,0x1cc,0x1d0,0x19c,0x1d4,0x14475d8d8,0x14475d8f0,0x14475d908
        3⤵
        • Executes dropped EXE
        PID:2276
      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe
        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=TeamViewer.exe --webview-exe-version=15.59.5.0 --user-data-dir="\\?\C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection,msWebOOUI,msPdfOOUI,ElasticOverscroll --lang=en --mojo-named-platform-channel-pipe=1432.1468.17440011222869380935
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Checks system information in the registry
        • Enumerates system info in registry
        • Suspicious use of FindShellTrayWindow
        PID:1696
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=\\?\C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=\\?\C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=109.0.5414.165 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=109.0.1518.140 --initial-client-data=0xc4,0xc8,0xcc,0x98,0xec,0x7feec1cffa8,0x7feec1cffb8,0x7feec1cffc8
          4⤵
          • Executes dropped EXE
          PID:1864
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="\\?\C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView" --webview-exe-name=TeamViewer.exe --webview-exe-version=15.59.5.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1200 --field-trial-handle=1216,i,192743922426666927,9890615294569449040,131072 --disable-features=ElasticOverscroll,msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:2
          4⤵
          • Executes dropped EXE
          PID:2684
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="\\?\C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView" --webview-exe-name=TeamViewer.exe --webview-exe-version=15.59.5.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=1444 --field-trial-handle=1216,i,192743922426666927,9890615294569449040,131072 --disable-features=ElasticOverscroll,msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:3
          4⤵
          • Executes dropped EXE
          PID:2056
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="\\?\C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView" --webview-exe-name=TeamViewer.exe --webview-exe-version=15.59.5.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=1540 --field-trial-handle=1216,i,192743922426666927,9890615294569449040,131072 --disable-features=ElasticOverscroll,msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:2152
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="\\?\C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView" --webview-exe-name=TeamViewer.exe --webview-exe-version=15.59.5.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=2092 --field-trial-handle=1216,i,192743922426666927,9890615294569449040,131072 --disable-features=ElasticOverscroll,msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          PID:2248
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="\\?\C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView" --webview-exe-name=TeamViewer.exe --webview-exe-version=15.59.5.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1444 --field-trial-handle=1216,i,192743922426666927,9890615294569449040,131072 --disable-features=ElasticOverscroll,msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:2
          4⤵
          • Executes dropped EXE
          PID:2428
      • C:\Program Files\TeamViewer\crashpad_handler.exe
        "C:\Program Files\TeamViewer\crashpad_handler.exe" --no-rate-limit --database=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports --metrics-dir=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports --url=https://errorreporting.teamviewer.com:443/api/3/minidump/?sentry_client=sentry.native/0.4.17&sentry_key=ab2b65e79a501de39a5e47e7bc23e13b --attachment=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports\4259d072-db94-4717-13f5-a1714f84fa36.run\__sentry-event --attachment=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports\4259d072-db94-4717-13f5-a1714f84fa36.run\__sentry-breadcrumb1 --attachment=C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports\4259d072-db94-4717-13f5-a1714f84fa36.run\__sentry-breadcrumb2 --initial-client-data=0x688,0x68c,0x690,0x684,0x694,0x14475d8d8,0x14475d8f0,0x14475d908
        3⤵
        • Executes dropped EXE
        PID:1920
    • C:\Program Files\TeamViewer\tv_w32.exe
      "C:\Program Files\TeamViewer\tv_w32.exe" --action hooks --log C:\Program Files\TeamViewer\TeamViewer15_Logfile.log
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:1992
    • C:\Program Files\TeamViewer\tv_x64.exe
      "C:\Program Files\TeamViewer\tv_x64.exe" --action hooks --log C:\Program Files\TeamViewer\TeamViewer15_Logfile.log
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies data under HKEY_USERS
      PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe

    Filesize

    201KB

    MD5

    ae0bd70d0d7e467457b9e39b29f78410

    SHA1

    b4a549508cbc9f975a191434d4d20ad3c28d5028

    SHA256

    4d9f16b00bda1db65b68cb486f7ae1bf5b32aedf7fd335e4a8ef2fa087870986

    SHA512

    cbe2b5ffe647f5318edd9825ea6536d6d14dab66920def0323fb5b4dc03a4f8b6781b9209e5a557ab4d270b3f2b170797e6bd807195c93869367c0a245a3168e

  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\109.0.1518.140\Installer\msedge_7z.data

    Filesize

    3KB

    MD5

    bd70ed26e6e6f3193043ac09c58c6a1c

    SHA1

    d733a65e17f2851d5116598dd80533efc1656468

    SHA256

    7a474217d20b9a6fe3c3a46c0d6d5b2d2040fa790663f6da9202ee7cb07bb448

    SHA512

    3e2ecade6d687b0736d5eafd7527b24095b9c51f0c8ba99398b23da2d8843c49fc8c1fa37190d385b504d8224c8c517d78d44ae32e10e45d54b19477a6970756

  • C:\Program Files (x86)\Microsoft\EdgeWebView\Temp\source2976_789761219\109.0.1518.140\Installer\setup.exe

    Filesize

    3.8MB

    MD5

    3a92a61a6e01c80ecc7d9499abb901b7

    SHA1

    d89d05802d937f9c71ced14282b8a19623fca7c8

    SHA256

    b70b2ed82c7afde8003983992b74f8182f55080b43da3d96dd29e8c0c7e8b47e

    SHA512

    3867efbd984ddd1eec084c70a42104cbc0057c3bed222af8963051779b612b46bf4cea3311452f6564513d7558d49a1e66a9473ad53f1b2fb4c43a9d7d0fb47d

  • C:\Program Files\TeamViewer\utils\MicrosoftEdgeWebview2Setup.exe

    Filesize

    1.5MB

    MD5

    b32d72daeee036e2b8f1c57e4a40e87a

    SHA1

    564caa330d077a3d26691338b3e38ee4879a929d

    SHA256

    65f6efdf6df4095971a95f4bf387590ae63109388344632a22458265ab7dd289

    SHA512

    b5d62ce1462d786c01d38e13d030ad6236ce63321819cf860cc6169f50f6309e627bc7709b305422851779e37dbae9fb358008aad8d6c124cd33cdec730288d5

  • C:\Program Files\TeamViewer\x64\teamviewervpn.sys

    Filesize

    34KB

    MD5

    f5520dbb47c60ee83024b38720abda24

    SHA1

    bc355c14a2b22712b91ff43cd4e046489a91cae5

    SHA256

    b8e555d92440bf93e3b55a66e27cef936477ef7528f870d3b78bd3b294a05cc0

    SHA512

    3c5bb212467d932f5eaa17a2346ef8f401a49760c9c6c89c6318a1313fcbabb1d43b1054692c01738ea6a3648cc57e06845b81becb3069f478d5b1a7cbcb0e66

  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

    Filesize

    14KB

    MD5

    ebf526c16df030d56f9f7105b2ab63a1

    SHA1

    f4074cbd6b0a36e969044b5ce25005a703729797

    SHA256

    6ac9d60fd636419a834ab83aee0db010b1585a7a0ab0b542067a6df5c7b3e95e

    SHA512

    ccb8a9066c141228ce18c299eb70438dde8b406209d5390addec1b93545a735515b1ac8915d96deca35e53e506d0533b1d3b8368e41161a5e3f91bbbc12789b9

  • C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView\Crashpad\settings.dat

    Filesize

    280B

    MD5

    7d00af759b2a7774a8023b48c4dd0d3d

    SHA1

    aa93803432cc884607099ac71fe7828108095bce

    SHA256

    bf1c090de2df2303774f6bc14080425b3bdacbe95f9b51d106f1132acd221cc2

    SHA512

    0cabb077fc54ec0f597d421ce5784839ce91ea2a16b9e7e6e660a8089113edb53ad8cd96ab7ae3d49d701497a2b982e0bfac11d0ab885ecb7527afc06d16916c

  • C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView\Default\DawnCache\data_0

    Filesize

    8KB

    MD5

    cf89d16bb9107c631daabf0c0ee58efb

    SHA1

    3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

    SHA256

    d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

    SHA512

    8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

  • C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView\Default\GPUCache\data_1

    Filesize

    264KB

    MD5

    f50f89a0a91564d0b8a211f8921aa7de

    SHA1

    112403a17dd69d5b9018b8cede023cb3b54eab7d

    SHA256

    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

    SHA512

    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

  • C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView\Default\GPUCache\data_2

    Filesize

    8KB

    MD5

    0962291d6d367570bee5454721c17e11

    SHA1

    59d10a893ef321a706a9255176761366115bedcb

    SHA256

    ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

    SHA512

    f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

  • C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView\Default\Local Storage\leveldb\CURRENT~RFf788fb2.TMP

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView\Default\Session Storage\000002.dbtmp

    Filesize

    16B

    MD5

    206702161f94c5cd39fadd03f4014d98

    SHA1

    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

    SHA256

    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

    SHA512

    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

  • C:\Users\Admin\AppData\Local\TeamViewer\EdgeBrowserControl\Persistent\MainWindow_75AD616BF1F04DA9878FF44DD080A108\20241112T163121-6f9a5a2f6~en\EBWebView\ShaderCache\data_3

    Filesize

    8KB

    MD5

    41876349cb12d6db992f1309f22df3f0

    SHA1

    5cf26b3420fc0302cd0a71e8d029739b8765be27

    SHA256

    e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

    SHA512

    e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

  • C:\Users\Admin\AppData\Local\TeamViewer\Logs\ErrorReports\settings.dat

    Filesize

    40B

    MD5

    add7f09c7a3224fef1edef479f76d000

    SHA1

    094cd695bcbcac3c0b5039fa31f390bfad4b292e

    SHA256

    34653adaca444ea281378cd6ea0f07ff6432c3d44def61eea0702a71c338d903

    SHA512

    4214b4ecdbe950a5dcc4fd827ed47f7652f46b48c0df8c32fa60f0b98c3f571ba98870306c3302cb31dc51f1430820e7b7966e27f7efbb00cbe969b3949ef97a

  • C:\Users\Admin\AppData\Local\Temp\Cab5C07.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5C39.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsjD3D4.tmp\TvGetVersion.dll

    Filesize

    686KB

    MD5

    878c644c12c3d96438c2909fbb7375cd

    SHA1

    4fb206e213bd088e28a1c10ab815d1bfd1b522f1

    SHA256

    75cf60d72a2cb6a748db6f69e2bfa065422df7bb6636d3c214f5435341574a66

    SHA512

    df0d1903901ffaf7ca1ee22cc5b8bac37cb554f78ed07a8ccaf84a2cd6fb7f9ac5599caad83d92079e170190701a9391468331ec8aa562bfdf32376703e05bd8

  • C:\Users\Admin\AppData\Local\Temp\nsjD3D4.tmp\nstD4AF\TV15Install.log

    Filesize

    4KB

    MD5

    00f94a6ea245a9674329fb24b5239f8b

    SHA1

    ac3ad7ebaf2436c6cfd0a574f8a0051ce0a06c2a

    SHA256

    6b2d08e04bb603190221c72f62e14f55841ae0267e9b67b858298cc39e14e84d

    SHA512

    8421d678fc6181342e0f573c0378f796d26ca17d42e82fc923141005250b4f86509fb84c726a409935cd675f43d124daac86a9e83e790ca10d8297421b4ee0df

  • C:\Users\Admin\AppData\Local\Temp\nsjD3D4.tmp\nstD4AF\install.ini

    Filesize

    78B

    MD5

    a3c26dd25fc88922e9297e2a9d04ac53

    SHA1

    807b0ca16c4080b6ce7ae8b09e7dcce7e52d5c19

    SHA256

    1c5231379c3025a42d51f956f649c445ebc550f9ad9b9f5cc4ae5e627ef456b3

    SHA512

    1d36ee7b43d82b72000520c0b0c37585576363fcd506aeab362c544000b0bf9702a357e118b2ae3499d8f8c9a7529f56169cc14e5281a5246ae9efd342c4fa59

  • C:\Users\Admin\AppData\Local\Temp\nsjD3D4.tmp\nstD4AF\tvinfo.ini

    Filesize

    50B

    MD5

    a48b05e8e36f7f4e9096ade8950b87e4

    SHA1

    c743c68fb5798389435927338d1c8ed1c59496a2

    SHA256

    72935bcb05a31b405a0e4a13eb0babd1640bbe03fad52ff85ffa91390d0e8eee

    SHA512

    7943a5c44c136347f199a1a3e1aa8af3f4ee9d5024d4588e3faa95f57dcd51292e606a057d567d45c8bc9d62ebfcfebd199654d1f1214b205124418c592f47f7

  • C:\Users\Admin\AppData\Local\Temp\nsjDD95.tmp\TvGetVersion.dll

    Filesize

    696KB

    MD5

    41c3a6594060581d3bf1a16ed4ae6a72

    SHA1

    62bdf8c2a3fa5f70e8b25e83c946debf80c8fd47

    SHA256

    e35396c7d7e32a8fe771895ed9ea16bd85c8544410bf4dc70a42ccd2884cfd83

    SHA512

    3fee7ea74b4173b2815d631c8e69f5a21f2a170a46ce60424f9b9fb03cf7a35eab6933210497f851816a1a85eb3fdb682781ccb5e2607b7ade6dbc7a098368bd

  • C:\Users\Admin\AppData\Local\Temp\nsjDD95.tmp\advanced_unicode.ini

    Filesize

    1KB

    MD5

    f68824a4130ebaf6bc7ab0f62256d7d7

    SHA1

    40af19a0d92b3c9e1a8b1eaab7d12c69e5df436a

    SHA256

    cd8149a2e89373075ee6db800b7f2496bacbfe21b23e4a06a3453632503b3965

    SHA512

    6a173aaa183be0e5a516cad484802dae1fc53a414f870f93ea846a9ef9f9df35153766ef632eb5e8ced8f94c2ed09a9decdf3465d46b0dcc44a6918d88e242cb

  • C:\Users\Admin\AppData\Local\Temp\nsjDD95.tmp\start_unicode.ini

    Filesize

    2KB

    MD5

    934bd8a35ad5defa22fe382fd33a8912

    SHA1

    a56e04f09a4639bf9533d1fad94cc5cd0dd556aa

    SHA256

    548eabf95dc677c2c88d4abafda97b62a98a2a4a4edd184f07ea73546e0d584c

    SHA512

    d285a761d48d8fc787111c38bcc439a8ef41730f0f5a2994c99482a79e6d62e73692ff56e4f79e269e360ab32c41fe4ff8f4c840a64f8f9f669d1424166808dd

  • C:\Users\Admin\AppData\Local\Temp\nsjDD95.tmp\start_unicode.ini

    Filesize

    2KB

    MD5

    00071d37c13eca877ea80da755975382

    SHA1

    cd25fcdc48ea4b0b6c2c3bfff68ba63b1904e6a3

    SHA256

    a4a1eb9c8c4c461d1fe709dd767a95a767528e5235943b2109215f15cdf2f41f

    SHA512

    769904a552b1c917668a9d7bc0722360d63a8d77ea870ead385036d3508ce28905f480e20886a53ac9b197b61a2afd46473c9714ec86051b6a92d66012eda702

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    89b58657f52d28fb6fb93fb2610a4e53

    SHA1

    1efcdd0489d9dd0c99752feb08c3a610e5b26efd

    SHA256

    aa27d703140fd98b2e2393edf4da5d2a109403e8cd4bf8cfae5ca04bcbd82307

    SHA512

    961cde075989b2a6168ae64d5ecb20b401e6e96f9f622b31fa228ef691b69f82cede1695206da1700c436307ddee1c7020ca22ae8b416e3b4df6ed7e95d31e3a

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c60e4496db109d2f9e623b85333a0af

    SHA1

    a4c3f5fae59fe9426b07bf9fc49f3873b7b7bdb1

    SHA256

    a770d3121d91966dc564ce0bbf2a57cbd8e403822c7eccbe5d417f27cd7641dd

    SHA512

    1d7fb91de8a5651572b2ed3043c1e3c57dc8b710cf1194ea1b6bce62c8aa29a0818a1a6fc09d0eb191c19bb7558f94f48893046df2d7b43d1eae3f7414c7fae5

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7a8535002fd5315796cdce970a4fd22

    SHA1

    ccc5d691f0909c643a0a9168db229d000e0cb54c

    SHA256

    df58e40ae1712dbf1c47b674b92a4e19dd14e5f72327e71908f6d0d04074691a

    SHA512

    bb58ea51553354c6a41d44f0866fb6c08c1b8ef41ba88cf821c469fe3bb29f30be2600fc6cc7631bdaebe67e57c19c019624baf3f6f5a61471262de612441308

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c15e88ce66bc398b5bcd4ddb2b330a0f

    SHA1

    c652de86220ced91840f3e5a3571d10642f9dc2c

    SHA256

    62951fea34ee71e11f05fae9a88f360c9f11e0cc2ca57237602bebff1f50b30c

    SHA512

    c898a28ee0edfcc815d3dd36c09089ad618602f600a7ee091e691c35226e4e1991934b65ed5841054a05b1af9b24d19718948ef43e97682d8239759b7753a5f4

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    abb1db1c00618484814a7b463981954e

    SHA1

    1e0e57cd08216f6932e519e0f711222327484408

    SHA256

    c99297dfae48e399cb9991eed6dce1192bd643fc59cadda42d79fb3cd31159dc

    SHA512

    78b609e2f922692084ba68ff420aadd646eb9a8e6cbe3e54c09ebb40e97ace062845dee6476d65ba2f32ca9bb6a1dcee655e1c8582abc411eda4c122418ab35c

  • \Users\Admin\AppData\Local\Temp\Client-built.exe

    Filesize

    3.1MB

    MD5

    181719b653c83d0463d89a625a7f5c3e

    SHA1

    1173005be27979dc74779e60dc790299e4f2b0a4

    SHA256

    03a4b081b4966130cbe615ff249954e7e9a0d62a79faf8e56ac3830929748e43

    SHA512

    d05e6fc586a8731903df4cffe3bdcb92f99e2cdbe15e40706e87ecc038e4e9b1ef1fc9a39f8adeda4341e3507f2f8f81ae50d590ff9f4233cd7694b26fb3fa04

  • \Users\Admin\AppData\Local\Temp\nsjDD95.tmp\InstallOptions.dll

    Filesize

    27KB

    MD5

    e87068563fc18e67a78230067cc240e5

    SHA1

    37cd2cb5581fc575b8c46383d877926bda85883b

    SHA256

    822f75b69dd87332b5995528771923ec74dc5329c65094bf4e372eb8ef42bb8e

    SHA512

    dab6b330d73abadb63f6eb02a5bc87ce9b9d1bc64fcb9289581cfc2e04be0254893945b3bdb762b382bb491388e34bc018f098a489908dfbc9feca2a9ba13d5d

  • \Users\Admin\AppData\Local\Temp\nsjDD95.tmp\System.dll

    Filesize

    23KB

    MD5

    938c37b523d7fc08166e7a5810dd0f8e

    SHA1

    47b9663e5873669211655e0010e322f71b5a94be

    SHA256

    a91aa7c0ead677fc01b1c864e43e0cace110afb072b76ad47f4b3d1563f4dc20

    SHA512

    77afe83fb4e80a775dae0a54a2f0ff9710c135f9f1cf77396bc08a7fe46b016a8c079b4fa612e764eea5d258703f860688e38b443e33b1f980e04831739517c1

  • \Users\Admin\AppData\Local\Temp\nsjDD95.tmp\UAC.dll

    Filesize

    29KB

    MD5

    488819f838abfcad73a2220c151292ee

    SHA1

    4a0cbd69300694f6dc393436e56a49e27546d0fe

    SHA256

    b5bb8d301173c4dd2969b1203d2c7d9400ba3f7f2e34ee102905bd2724162430

    SHA512

    b00d6cf712fe4cefce41479f6e6f4aa5ea006694d10f2837204de5bde1c5a4bef1368f2b0eb4b66d57a66e8ce6dc335fa91e9c8017e8e125c27eb1f5df4de9a0

  • \Users\Admin\AppData\Local\Temp\nsjDD95.tmp\UserInfo.dll

    Filesize

    15KB

    MD5

    77ff6a927940a0e4b8dc07bdde6ab5db

    SHA1

    8d0035242289504d050d237f7e3e548c1ddff077

    SHA256

    e1cb80a23786b02cb2c6a2f9e391b63cbf3ad911e42bbdc14cc6879c84b7404e

    SHA512

    6a3050dc8e3f4eaaa85a43cdf1ac4f69745c07efe48268103ee7d8927ec574b6866740f95e6b3aff154ba74cd05024223a3ea4957cb773dd065cfd797f8a07e3

  • \Users\Admin\AppData\Local\Temp\nsjDD95.tmp\linker.dll

    Filesize

    56KB

    MD5

    b05a97bb3f532b7cf57b8eedf198d7af

    SHA1

    83c13a90f4a3c1c62e132f5f3bc70c97c2ecfc80

    SHA256

    7817f79bcdf54ef8617f15b5c0b9b92053549d5a51fa280722ee7179311b69a1

    SHA512

    40706c5fc72198148962d24046722fc5e488c0cc4b3374a9f4b652175919e97a8712e882940db8c26479619a26ec4e2d41744627a9ca52ec7cb1ce4f91d7ee8c

  • \Users\Admin\AppData\Local\Temp\nsjDD95.tmp\nsArray.dll

    Filesize

    18KB

    MD5

    9761d708ea7c49662a21f6690d439e06

    SHA1

    b2e757e7eee5c788f16d666fb6cf9d41caccb04b

    SHA256

    8b8be21fa7bca491c93683c9f84bb49370ca7e1e864bd0658ff9e1d2809b67e4

    SHA512

    25990a993373009ccbd9e89cae3fc601928121775d0d5fe326c55a305ce8de51f35a2cb160e9dfbf3be82a53ddf7b9864116e7f5d3325afd7403cd3b7740c652

  • \Users\Admin\AppData\Local\Temp\nsjDD95.tmp\nsExec.dll

    Filesize

    18KB

    MD5

    9ea6ec7934495cc757639b5095362ca7

    SHA1

    ef2c14142b70689483576cc09083db4a2a363e02

    SHA256

    4d8c8353641bbb26bf9ea2ab2dbf126be6ef164b1ce80e3ef5030b873be166cd

    SHA512

    414b08f75bd7febb56784d8534cee028f6420776f07ce5797f66a78748c34b52f443aa35f72c8d7c81dd5366b34998b56d99a9d0d2b4b2b6bfc9775e4ff66531

  • \Users\Admin\AppData\Local\Temp\nsjDD95.tmp\nsis7z.dll

    Filesize

    187KB

    MD5

    7fe20cee9277556f4ef137e61d29d9f5

    SHA1

    d53c37dbf548914ed20c8ebb21186a95beef1ee3

    SHA256

    5d71aaeefbc81732017e9040c8087e6686a16dd54e6d9bcd5ba7a47af68cc925

    SHA512

    a90250214c6c5048b098e031fca5a8097854a8667330551d7694740e3bc83f7d77791d314e3ac75617ef1834b75c41e3e3d3c74da9794a207894c13fb2d4bef7

  • memory/316-3966-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/316-3425-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/920-3428-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/920-3969-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/1400-1559-0x00000000008C0000-0x00000000008CE000-memory.dmp

    Filesize

    56KB

  • memory/1400-1659-0x0000000074820000-0x000000007482A000-memory.dmp

    Filesize

    40KB

  • memory/1400-3049-0x0000000074820000-0x000000007482A000-memory.dmp

    Filesize

    40KB

  • memory/1400-1759-0x0000000007D10000-0x0000000007D42000-memory.dmp

    Filesize

    200KB

  • memory/1400-1861-0x0000000074820000-0x000000007482A000-memory.dmp

    Filesize

    40KB

  • memory/1432-5317-0x00000000069C0000-0x0000000006FA8000-memory.dmp

    Filesize

    5.9MB

  • memory/1432-4550-0x0000000003280000-0x0000000003868000-memory.dmp

    Filesize

    5.9MB

  • memory/1432-4560-0x0000000003280000-0x0000000003868000-memory.dmp

    Filesize

    5.9MB

  • memory/1432-5318-0x00000000069C0000-0x0000000006FA8000-memory.dmp

    Filesize

    5.9MB

  • memory/1432-5096-0x00000000029F0000-0x00000000029FA000-memory.dmp

    Filesize

    40KB

  • memory/1432-4724-0x00000000069C0000-0x0000000006FA8000-memory.dmp

    Filesize

    5.9MB

  • memory/1432-4723-0x00000000069C0000-0x0000000006FA8000-memory.dmp

    Filesize

    5.9MB

  • memory/1640-4032-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/1640-3427-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/1640-4038-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/1640-4043-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/1640-4105-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/2404-3426-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/2404-4042-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/2404-4037-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/2448-2316-0x0000000003230000-0x0000000003818000-memory.dmp

    Filesize

    5.9MB

  • memory/2448-2317-0x0000000003230000-0x0000000003818000-memory.dmp

    Filesize

    5.9MB

  • memory/2548-3424-0x0000000074470000-0x0000000074681000-memory.dmp

    Filesize

    2.1MB

  • memory/2548-3423-0x0000000000ED0000-0x0000000000F05000-memory.dmp

    Filesize

    212KB

  • memory/2616-1333-0x0000000000CF0000-0x0000000001014000-memory.dmp

    Filesize

    3.1MB

  • memory/2960-22-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-0-0x0000000074281000-0x0000000074282000-memory.dmp

    Filesize

    4KB

  • memory/2960-19-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-30-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-23-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-14-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-10-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-147-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-12-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-15-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-18-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-1324-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB

  • memory/2960-7-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-6-0x0000000016D60000-0x000000001B589000-memory.dmp

    Filesize

    72.2MB

  • memory/2960-5-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB

  • memory/2960-4-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB

  • memory/2960-3-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB

  • memory/2960-2-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB

  • memory/2960-1-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB

  • memory/2960-1326-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB

  • memory/2960-1327-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB

  • memory/2960-1341-0x0000000074280000-0x000000007482B000-memory.dmp

    Filesize

    5.7MB