Analysis

  • max time kernel
    32s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 15:25

General

  • Target

    NL Brute 1.2.exe

  • Size

    10.1MB

  • MD5

    50b072669d250694e04f3e2d27153ece

  • SHA1

    616d07f52763be900b56eafdf54e996e1183da4a

  • SHA256

    3837bbb589f027fe75534ac85223641d8cb3f162420e8843aa94ade7045fa35a

  • SHA512

    f556f495692011df4170c2e2a21378d9fbb4bb6769d87116f31afca3f9200a9eb22f24e275d087098ffed5a5b0108d04b52296892fd9b6c15399ac5e53b28682

  • SSDEEP

    196608:RL1f+fCWf+fCufu0p8Y4DFbBJ5dIa82Vou2j09a3XAydVdODHMD16UAsdfPL9:RxWJWhn8YwFV/dIa8wp2j09qXAyYDHMD

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 21 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 35 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 16 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 33 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Modifies registry class 21 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NL Brute 1.2.exe
    "C:\Users\Admin\AppData\Local\Temp\NL Brute 1.2.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Local\Temp\._cache_NL Brute 1.2.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_NL Brute 1.2.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Local\Temp\3582-490\._cache_NL Brute 1.2.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\._cache_NL Brute 1.2.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1360
        • C:\Users\Admin\AppData\Local\Temp\._cache_._cache_NL Brute 1.2.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_._cache_NL Brute 1.2.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:4916
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4952
          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:5100
            • C:\Windows\svchost.com
              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate
              6⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3784
              • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
                C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2296
                • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE
                  "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE" InjUpdate
                  8⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2924
                  • C:\Windows\svchost.com
                    "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE" InjUpdate
                    9⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:3528
                    • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
                      C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE InjUpdate
                      10⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:952
                      • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE
                        "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE" InjUpdate
                        11⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of SetWindowsHookEx
                        PID:5076
                • C:\ProgramData\Synaptics\Synaptics.exe
                  "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4660
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:232
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3512
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:928
          • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
            C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4888
            • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE
              "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE" InjUpdate
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3212
              • C:\Windows\svchost.com
                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE" InjUpdate
                7⤵
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2640
                • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
                  C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE InjUpdate
                  8⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:5096
                  • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE
                    "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE" InjUpdate
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:5048
                  • C:\ProgramData\Synaptics\Synaptics.exe
                    "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    PID:1540
                    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                      "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
                      10⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      PID:1956
                      • C:\Windows\svchost.com
                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate
                        11⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:4216
                        • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
                          C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate
                          12⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Adds Run key to start application
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          PID:716
                          • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE
                            "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE" InjUpdate
                            13⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            PID:1320
                            • C:\Windows\svchost.com
                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE" InjUpdate
                              14⤵
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:1736
                              • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
                                C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE InjUpdate
                                15⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Adds Run key to start application
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                PID:4764
                                • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE
                                  "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE" InjUpdate
                                  16⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:4004
                                • C:\ProgramData\Synaptics\Synaptics.exe
                                  "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                  16⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  PID:3388
                                  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                                    "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
                                    17⤵
                                      PID:2640
                                      • C:\Windows\svchost.com
                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate
                                        18⤵
                                          PID:4344
                                          • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
                                            C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate
                                            19⤵
                                              PID:2780
                                              • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE
                                                "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE" InjUpdate
                                                20⤵
                                                  PID:3948
                                                  • C:\Windows\svchost.com
                                                    "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE" InjUpdate
                                                    21⤵
                                                      PID:2640
                                                      • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
                                                        C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE InjUpdate
                                                        22⤵
                                                          PID:3496
                                                          • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE
                                                            "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE" InjUpdate
                                                            23⤵
                                                              PID:2392
                                                            • C:\ProgramData\Synaptics\Synaptics.exe
                                                              "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                                              23⤵
                                                                PID:4836
                                                        • C:\ProgramData\Synaptics\Synaptics.exe
                                                          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                                          20⤵
                                                            PID:1468
                                            • C:\ProgramData\Synaptics\Synaptics.exe
                                              "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                              13⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              PID:4268
                                              • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                                                "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
                                                14⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Modifies registry class
                                                PID:3896
                                                • C:\Windows\svchost.com
                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate
                                                  15⤵
                                                  • Executes dropped EXE
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2492
                                                  • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
                                                    C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate
                                                    16⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2864
                                                    • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE
                                                      "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE" InjUpdate
                                                      17⤵
                                                        PID:2972
                                                        • C:\Windows\svchost.com
                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE" InjUpdate
                                                          18⤵
                                                            PID:2192
                                                            • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
                                                              C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE InjUpdate
                                                              19⤵
                                                                PID:3152
                                                                • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE
                                                                  "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE" InjUpdate
                                                                  20⤵
                                                                    PID:4056
                                                                  • C:\ProgramData\Synaptics\Synaptics.exe
                                                                    "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                                                    20⤵
                                                                      PID:4488
                                                                    • C:\ProgramData\Synaptics\Synaptics.exe
                                                                      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                                                      20⤵
                                                                        PID:3528
                                                                • C:\ProgramData\Synaptics\Synaptics.exe
                                                                  "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                                                  17⤵
                                                                    PID:3248
                                                                    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
                                                                      18⤵
                                                                        PID:4364
                                                                        • C:\Windows\svchost.com
                                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate
                                                                          19⤵
                                                                            PID:624
                                                                            • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
                                                                              C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate
                                                                              20⤵
                                                                                PID:2668
                                                                                • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE
                                                                                  "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE" InjUpdate
                                                                                  21⤵
                                                                                    PID:4364
                                                                                    • C:\Windows\svchost.com
                                                                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE" InjUpdate
                                                                                      22⤵
                                                                                        PID:2280
                                                                                        • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
                                                                                          C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE InjUpdate
                                                                                          23⤵
                                                                                            PID:2864
                                                                                            • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE
                                                                                              "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE" InjUpdate
                                                                                              24⤵
                                                                                                PID:4644
                                                                                        • C:\ProgramData\Synaptics\Synaptics.exe
                                                                                          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                                                                          21⤵
                                                                                            PID:2408
                                                                                            • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
                                                                                              22⤵
                                                                                                PID:4576
                                                                                                • C:\Windows\svchost.com
                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate
                                                                                                  23⤵
                                                                                                    PID:1932
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
                                                                                                      C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate
                                                                                                      24⤵
                                                                                                        PID:1036
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE" InjUpdate
                                                                                                          25⤵
                                                                                                            PID:3496
                                                                                                            • C:\Windows\svchost.com
                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE" InjUpdate
                                                                                                              26⤵
                                                                                                                PID:2964
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE InjUpdate
                                                                                                                  27⤵
                                                                                                                    PID:5108
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE" InjUpdate
                                                                                                                      28⤵
                                                                                                                        PID:1716
                                                                          • C:\ProgramData\Synaptics\Synaptics.exe
                                                                            "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                                                            6⤵
                                                                            • Executes dropped EXE
                                                                            PID:5084
                                                                          • C:\ProgramData\Synaptics\Synaptics.exe
                                                                            "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                                                            6⤵
                                                                            • Executes dropped EXE
                                                                            PID:3480
                                                                • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                  "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                                                  1⤵
                                                                  • Checks processor information in registry
                                                                  • Enumerates system info in registry
                                                                  • Suspicious behavior: AddClipboardFormatListener
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2604
                                                                • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                  "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                                                  1⤵
                                                                  • Checks processor information in registry
                                                                  • Enumerates system info in registry
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:3996
                                                                • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                  "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                                                  1⤵
                                                                  • Checks processor information in registry
                                                                  • Enumerates system info in registry
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:4324
                                                                • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                  "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                                                  1⤵
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:3480
                                                                • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                  "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                                                  1⤵
                                                                    PID:4736

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE

                                                                    Filesize

                                                                    328KB

                                                                    MD5

                                                                    114445130d5e083c42830d9adbf5d748

                                                                    SHA1

                                                                    48a62ec52b835918cc19a2df9c624a7a0d6b85e1

                                                                    SHA256

                                                                    a5f47d59b8d08fc85ee411ec2e1015fedda08fd4a6cae2bf7b3bb1a7db2ccb5e

                                                                    SHA512

                                                                    45eb73fd4e12ed70c386c733b2bc04296fb1a16be04b4cd45260c70d0e4b6cf3a87dc223ce2319d94b79c513ba19d0816bae428c466076c1de906429aaa78748

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

                                                                    Filesize

                                                                    86KB

                                                                    MD5

                                                                    ef63e5ccbea2788d900f1c70a6159c68

                                                                    SHA1

                                                                    4ac2e144f9dd97a0cd061b76be89f7850887c166

                                                                    SHA256

                                                                    a46d1ffbe9114015050b2a778859c26248f8bab22d5d1a302b59373bc20c6b45

                                                                    SHA512

                                                                    913371abb54e0adc94aa08372a20f07ced9f9fdc170f9e468cd39c7387c7e30c1ae238148ccf355d5c8b88b7fd63f914bb108c6cafca9a791d02d8b36468bfac

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE

                                                                    Filesize

                                                                    5.7MB

                                                                    MD5

                                                                    3e4c1ecf89d19b8484e386008bb37a25

                                                                    SHA1

                                                                    a9a92b63645928e8a92dc395713d3c5b921026b7

                                                                    SHA256

                                                                    1ebe469c94c2c2a5acbc3927cef19dbe2f583ba3651a55623633891c4c05cc22

                                                                    SHA512

                                                                    473d03abbb61609749a176a0724e427599a4f4707d72a74ed457b2198098f59fdf64b5394798db82f4064dfe964083d70af6a50a5fa2ab2674c77a99792e4e52

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe

                                                                    Filesize

                                                                    175KB

                                                                    MD5

                                                                    3da833f022988fbc093129595cc8591c

                                                                    SHA1

                                                                    fdde5a7fb7a60169d2967ff88c6aba8273f12e36

                                                                    SHA256

                                                                    1ad4c736829dbcb0fcc620fd897fe0941b9c01e14ccba5d18085b3ca0416ab66

                                                                    SHA512

                                                                    1299d63337c958e8072d6aaa057904cbbaa51c2eec4457269ead6b72c4eb2a10882e4a5dc7afcdcab5a6910d2105c2e5ee706850074e0425ae7f87d9ea1e5537

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe

                                                                    Filesize

                                                                    9.4MB

                                                                    MD5

                                                                    124147ede15f97b47224628152110ce2

                                                                    SHA1

                                                                    4530fee9b1199777693073414b82420a7c88a042

                                                                    SHA256

                                                                    3e815d583236b9cecd912fcc949a301d1e51b609cbb53a2285d08feea305edcd

                                                                    SHA512

                                                                    f4c2825380d1bb9ca889d5c5684f13aa0cacb0d6511f6409ca0972a7191195a0175e00c995407848bf09ea03cff05c7395952bf2ffd2af2015b8939f75a8e627

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

                                                                    Filesize

                                                                    2.4MB

                                                                    MD5

                                                                    d9e8a1fa55faebd36ed2342fedefbedd

                                                                    SHA1

                                                                    c25cc7f0035488de9c5df0121a09b5100e1c28e9

                                                                    SHA256

                                                                    bd7696911d75a9a35dfd125b24cb95003f1e9598592df47fa23a2568986a4a9a

                                                                    SHA512

                                                                    134644c68bd04536e9ea0a5da6e334d36b1ce8012a061fa6dabd31f85c16a1ac9eee8c40fee3d55f25c4d4edf0672de8ce204e344c800361cbcff092c09d7a33

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE

                                                                    Filesize

                                                                    183KB

                                                                    MD5

                                                                    4ab023aa6def7b300dec4fc7ef55dbe7

                                                                    SHA1

                                                                    aa30491eb799fa5bdf79691f8fe5e087467463f1

                                                                    SHA256

                                                                    8ca27077312716f79f39309156c905719a908e8ded4bf88c2ba6fa821e574673

                                                                    SHA512

                                                                    000e33cc2399efa9dc56c06a42f91eb64b94f30b78cf260469f45f3b876f518d2d2b62e33d8f697660ae560d595e5bd5b7a5f847c316d5f97adeb3d8f9248ab5

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe

                                                                    Filesize

                                                                    131KB

                                                                    MD5

                                                                    514972e16cdda8b53012ad8a14a26e60

                                                                    SHA1

                                                                    aa082c2fbe0b3dd5c47952f9a285636412203559

                                                                    SHA256

                                                                    49091e1e41980b39d8de055fe6c6a1dc69398f17817960d64743e7efb740efc4

                                                                    SHA512

                                                                    98bbd6f06e3ff3e94aee3620f20f89e254dde157bc8129a64cf78fefe5cf9b13c7902128c2acbd54b3def527e09a039bd1f66ba64efb85f3f0404d894cabbee4

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE

                                                                    Filesize

                                                                    254KB

                                                                    MD5

                                                                    c4a918069757a263adb9fbc9f5c9e00d

                                                                    SHA1

                                                                    66d749fc566763b6170080a40f54f4cda4644af4

                                                                    SHA256

                                                                    129a2bfe25ceabb871b65b645ef98f6799d7d273fc5ddfd33c1cb78f5b76fa3b

                                                                    SHA512

                                                                    4ecf32fa2c8f53ff7a08555ec5d37739dc1358352621d038669f608edf18b0dcc6dca168a2b602359c9ee098052e546e5c02603f83aad44a114192138de7b7b9

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE

                                                                    Filesize

                                                                    386KB

                                                                    MD5

                                                                    2e989da204d9c4c3e375a32edf4d16e7

                                                                    SHA1

                                                                    e8a0bf8b4ae4f26e2af5c1748de6055ba4308129

                                                                    SHA256

                                                                    cae320401aa01a3cef836c191c2edbd7a96bfcce9efad1a21880626a64cc4dec

                                                                    SHA512

                                                                    3ebf71578bef909d9411c131d0ccd38ead68cba01a8e0f845d08faa012ca2136476fe09a2859ed846641f80b7a2d9b78d49c709065a52c6b9ee149edf84c8c4f

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE

                                                                    Filesize

                                                                    92KB

                                                                    MD5

                                                                    3e8712e3f8ce04d61b1c23d9494e1154

                                                                    SHA1

                                                                    7e28cd92992cdee55a02b5ece4b7c2fc4dd0c5e4

                                                                    SHA256

                                                                    7a8ee09f8a75b3e812f99a0b611c6720626c62c6985306a408694389a996c8e9

                                                                    SHA512

                                                                    d07d924f338bd36ca51c8e11931f7ff069e65942725a8e1f1ff6b81076a987ab7d787452a5fb08314edf1489e081f4164db1ad299a6d78401e630796f4487dc8

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE

                                                                    Filesize

                                                                    147KB

                                                                    MD5

                                                                    dc6f9d4b474492fd2c6bb0d6219b9877

                                                                    SHA1

                                                                    85f5550b7e51ecbf361aaba35b26d62ed4a3f907

                                                                    SHA256

                                                                    686bec325444e43232fb20e96365bb1f1eb7c47a4e4ce246fc900d3a9784d436

                                                                    SHA512

                                                                    1e9c2dfeada91e69ee91cd398145e4044bd5788a628b89441c8c6ff4067ba0a399124197fd31dad26ccb76a4d866ad99918ba8e1549983be967d31b933ad9780

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe

                                                                    Filesize

                                                                    125KB

                                                                    MD5

                                                                    66a77a65eea771304e524dd844c9846a

                                                                    SHA1

                                                                    f7e3b403439b5f63927e8681a64f62caafe9a360

                                                                    SHA256

                                                                    9a7391267ab83b45a47d9fcf1e0f76002ed6640ed6a574ba51373410b94812f6

                                                                    SHA512

                                                                    3643ad1036075305d76dfd753b1ed29ae611b4b9f397b2520f95b1487e85155a111adc83578db8ca5d0fd1e9fe146d018e22f572c187ef468eab8d11d48fc7f4

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE

                                                                    Filesize

                                                                    142KB

                                                                    MD5

                                                                    3ccfc6967bcfea597926999974eb0cf9

                                                                    SHA1

                                                                    6736e7886e848d41de098cd00b8279c9bc94d501

                                                                    SHA256

                                                                    a89d3e2109a8e35e263da363d3551258ea320a99bfb84a4b13ad563008eda8d9

                                                                    SHA512

                                                                    f550af4e053d89eff45c0fb00bb32e8d212645a155727d3536a3f12bb0b5550bed25516516334245b912fa4fc2e4e7c267e80da4f06d22ea128f20eb56ab4351

                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE

                                                                    Filesize

                                                                    278KB

                                                                    MD5

                                                                    823cb3e3a3de255bdb0d1f362f6f48ab

                                                                    SHA1

                                                                    9027969c2f7b427527b23cb7ab1a0abc1898b262

                                                                    SHA256

                                                                    b8c5b99365f5ac318973b151fe3fe2a4ad12546371df69e1b7d749f7a4ce356f

                                                                    SHA512

                                                                    0652b60e07aa5a469b9cf1013a1ed98d0352996c59b9a66f612be2bc0081d8ec8a65a44a3977d2e188cd8ee3311edb251b818cf300d152ed5f633679a6cf834c

                                                                  • C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE

                                                                    Filesize

                                                                    454KB

                                                                    MD5

                                                                    961c73fd70b543a6a3c816649e5f8fce

                                                                    SHA1

                                                                    8dbdc7daeb83110638d192f65f6d014169e0a79b

                                                                    SHA256

                                                                    f94ddaf929fb16d952b79c02e78439a10dd2faa78f7f66b7d52de2675e513103

                                                                    SHA512

                                                                    e5d97ee63b02abc65add41f6721514515b34fd79f7db23ae04cf608c2f7e0504e00b07694047b982d14d60cccf6f833b50268c693e3baf1b697d3370c0bba0b6

                                                                  • C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE

                                                                    Filesize

                                                                    121KB

                                                                    MD5

                                                                    6b27dd3f7c6898e7d1bcff73d6e29858

                                                                    SHA1

                                                                    55102c244643d43aeaf625145c6475e78dfbe9de

                                                                    SHA256

                                                                    53e47df12f0ce2005f4a2a773d194c9431b325b64c205dfa4cfba45c973b65f3

                                                                    SHA512

                                                                    52b7a596b07935f15f008c2de38c5dfd85df18b49e5083e363b90fb321d4f1bf588627dcbe94fa6434c460243b254c5ca1dbcf2c956e49baa92e13e104500f2f

                                                                  • C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\java.exe

                                                                    Filesize

                                                                    366KB

                                                                    MD5

                                                                    75dbb8ccc95969068e221b7292f50888

                                                                    SHA1

                                                                    c87ee029a84d2c021ce5d816b32a9d7d55c914d4

                                                                    SHA256

                                                                    6b2fdb20eab37b1faec1a92358d05ca2ee050fd824add15b0f1de7ee47999185

                                                                    SHA512

                                                                    66e8a79990a38a4a7b7d6366383eb23cbc9bf522c1354193d04d7442a7d72356e9d7f1b84459724c800dda79fac438f35756aa1e8465b1dc8d870792cca1c831

                                                                  • C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe

                                                                    Filesize

                                                                    505KB

                                                                    MD5

                                                                    7aac73055860fcd079d9407cab08276d

                                                                    SHA1

                                                                    482b9f337d60270c95950353f9ca8929d8926b1d

                                                                    SHA256

                                                                    97508a81b805937e1ca57711a51d2e8d715a2748e2f9d27d39dfecc28f3fb9e5

                                                                    SHA512

                                                                    f183a10eb13c083c7cd8e785a7978eee4998c33d1eb104a0ab0e54146e10651f68612249e668baa08919a5840f6f929b5452c93f71a232b30aab9e2857109fb5

                                                                  • C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE

                                                                    Filesize

                                                                    146KB

                                                                    MD5

                                                                    6ecccb4bab82a4971897aa0bcb2f14be

                                                                    SHA1

                                                                    1c680d6f8ca6a0436b5935906a2d9c4699a7a412

                                                                    SHA256

                                                                    c661a1408b32f837e02965675400807e111dc5d43a00588011e4365dd3c24be1

                                                                    SHA512

                                                                    d68cae4b3c7664751bca1f73cb6b6aa0f0745bb10a76e250b9ffae82bbf2a398f17277ebe5cfd22338af9b4d4c0e0c8241eeb640bdcc0a73774612a6785ac081

                                                                  • C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE

                                                                    Filesize

                                                                    221KB

                                                                    MD5

                                                                    a12297c17e3747647d5c29d67edd4d9a

                                                                    SHA1

                                                                    6a6ed9d50d8385b2fb1da6c700934bf213e1ec2d

                                                                    SHA256

                                                                    288f7e376d1ba967276a05a1b00fddff236315ee0df24e543cf8b604768ae7f2

                                                                    SHA512

                                                                    e1004b5307f26af7c22ec051539ed633105ac6673301d31a57cb530ab76551b51aa59741397d1b9fe860bed8c93c2a21d8e828edd1612750bcec1bd068898239

                                                                  • C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE

                                                                    Filesize

                                                                    198KB

                                                                    MD5

                                                                    2424d589d7997df1356c160a9a82088c

                                                                    SHA1

                                                                    ca9b479043636434f32c74c2299210ef9f933b98

                                                                    SHA256

                                                                    9d6982a566148cf69cb6aec417baddca680e647931315736a6c19f2ba91c4d60

                                                                    SHA512

                                                                    4dd0a69c1dfb0e88fc6b24c97e14dd0ad1ac0226dd372d09123b6a2ec3c107fc94a810764d16e111d1cf7e81a23b70b84d36cbfbf1e32986d00de3cd9e315c2b

                                                                  • C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE

                                                                    Filesize

                                                                    258KB

                                                                    MD5

                                                                    78f77aff4993684fdbcad13c74d5f364

                                                                    SHA1

                                                                    0b02ed9112021b3c65778fdce0642e81dfb5b628

                                                                    SHA256

                                                                    9f707deff2f5b5a8c611c5926362c4ffc82f5744a4699f3fb1ee3ef6bb9b2cfb

                                                                    SHA512

                                                                    568c1abf5f6d13fe37cb55a5f5992dea38e30fc80812a977c0ae25ed30f67321db8f4c0da2ae4ae558e58dc430885fa13c1f7f1d6b2d6bb51ed031f042defafb

                                                                  • C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE

                                                                    Filesize

                                                                    335KB

                                                                    MD5

                                                                    48628eeb152032e8dc9af97aaaeba7cf

                                                                    SHA1

                                                                    e826f32c423627ef625a6618e7250f7dbc4d2501

                                                                    SHA256

                                                                    f271af83d96b1d536e1a1788ec0baa0c3c583ddfe61faceccaeec1470c5676ca

                                                                    SHA512

                                                                    18a2a247177d04d5b1b56d126d72e29b02c8378e8aa4c89bdbaefe14bcd577d7aa054b05a5db37d142a37cf869f3bc03fe9a5bba4886a52d6c2ede5052dfcc7d

                                                                  • C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE

                                                                    Filesize

                                                                    433KB

                                                                    MD5

                                                                    b6283a7eb554d995d9a7c72dcfca14b5

                                                                    SHA1

                                                                    67d64907800c611bbcefd31d2494da12962f5022

                                                                    SHA256

                                                                    099da4830adbab785d86ca4680c041458acfe798ed8b301b2bb6bd47891ed881

                                                                    SHA512

                                                                    a6d96a13b8672d0f1d50ac22ba95b715527050ce91bb67dc261732e0a114ef2902e3380577546ff34860f65723a143153cea47ae31e12bb27dd3f4f5ee2245f3

                                                                  • C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE

                                                                    Filesize

                                                                    201KB

                                                                    MD5

                                                                    74a044a62415d995102a0d58424bc49e

                                                                    SHA1

                                                                    10aeaa3fa60f5550bab9321048675c433a27e12a

                                                                    SHA256

                                                                    bf70a32a354a2c7ec912701f3350b8706bd9f422ea091de93088abe8e2b58efa

                                                                    SHA512

                                                                    0aa5780b75b506dadcdd3902b4defb847c1f7e6deca78596c70e95cf2e179489f8748e0580aacd07875aa75fba08af13e7c6463925424ead18720a2934ac210b

                                                                  • C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE

                                                                    Filesize

                                                                    250KB

                                                                    MD5

                                                                    cd4af683704c71887125716ca891e18c

                                                                    SHA1

                                                                    64d02bac29cfeeed31978438d572230f316d61df

                                                                    SHA256

                                                                    1e6a087180f0e5a8e738718de2d4d99c1a4b6d89bd2a84ad19ab45f7dd9225c5

                                                                    SHA512

                                                                    dda5661f1e95e1a6dc0ce62a5b476aa335ddde431d47fb6cabffe36947376f6c583f83560dc43da4bc4432052a95ed61f0553ade59308582510c25a5f828921a

                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE

                                                                    Filesize

                                                                    509KB

                                                                    MD5

                                                                    fdad5d6d8cf37e8c446dcd6c56c718c3

                                                                    SHA1

                                                                    412883fd3bb56f2b850d2c29ee666d9b75636faf

                                                                    SHA256

                                                                    2ed31146dc94132acafc7e759086f18c83560693a813b1d842a30908f50faf7c

                                                                    SHA512

                                                                    9866ddd370e7ab75aea143c5ede3ee96700ed662aab7fb3e989f9beedb2800b488f985a8069a61025cc8201bbc42e23d744717988587c2a8a66f2e91ea7cbbbc

                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE

                                                                    Filesize

                                                                    138KB

                                                                    MD5

                                                                    b84ae39dd0420080bd9e6b9557eea65b

                                                                    SHA1

                                                                    5326a058a3bcc4eb0530028e17d391e356210603

                                                                    SHA256

                                                                    92439a773781fc1b4e45de7fad393bb9ccd05af99dc1a1bb2246a4befb1f5924

                                                                    SHA512

                                                                    860ae09c5806622420147af1073cecc065786968737547276641af710b4caccd16b787bdf7212dd1d8ab16e257dd5c5cd20790bf000d75d82410cbd5bf7af388

                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE

                                                                    Filesize

                                                                    1.6MB

                                                                    MD5

                                                                    ae390fa093b459a84c27b6c266888a7e

                                                                    SHA1

                                                                    ad88709a7f286fc7d65559e9aee3812be6baf4b2

                                                                    SHA256

                                                                    738b7b5da8ca4798043672d2a32913e0f64268c7861eecc9fcc4c7f9d440d8cd

                                                                    SHA512

                                                                    096b5190efefe4c5272637e0721dcd339883f551c5e0cce568ed0bd63b31fb9acef6b09d310966482dbc7a944cc7a5878b0ad6bd68c30d1871254865a1660851

                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    24eeb998cb16869438b95642d49ac3dd

                                                                    SHA1

                                                                    b45aa87f45250aa3482c29b24fa4aa3d57ae4c71

                                                                    SHA256

                                                                    a2cfd55902b1750070e9154a90e29a10b9e6fa0c03bc82d8f198678e9bc46cd0

                                                                    SHA512

                                                                    2ac6de5c3e52b31355300ff4e846ed0627d8d4af02c4c07c0886694a09237ef2ee76e004883fae76a959bef0b60bd4138a9c88ad22139c6b859786c8e37bb358

                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe

                                                                    Filesize

                                                                    3.6MB

                                                                    MD5

                                                                    69e1e0de795a8bf8c4884cb98203b1f4

                                                                    SHA1

                                                                    a17f2ba68776596e2d1593781289c7007a805675

                                                                    SHA256

                                                                    2b6d153b9df86033b7a83eb4f521fd4f7aeec35dc54ef8d1ffe80f5bbd030dbb

                                                                    SHA512

                                                                    353b664271d0f49f94b60c7fbaf5ab6d5b8df7690383517a90ba675f750d9b28628bbd5ed92a6782879607f4c21214b15ea95fd6a5a8d6f9540a1b75ddb9e665

                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    a31628879099ba1efd1b63e81771f6c7

                                                                    SHA1

                                                                    42d9de49d0465c907be8ee1ef1ccf3926b8825fe

                                                                    SHA256

                                                                    031b0b0de72eba9350a1234eba7489bc04f94823501fc6a200266fa94b8c51dc

                                                                    SHA512

                                                                    0e86020f61fd08578507c3cd37385ffa2ffd964407a689b4c3d532fe4dc826eea58391f938840d18ecfa6bae79c6ece31b8f63b50366c2fa4d6ecf5194475759

                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE

                                                                    Filesize

                                                                    2.8MB

                                                                    MD5

                                                                    032ee4d65b62d87cf809438556d30429

                                                                    SHA1

                                                                    34458fcefe3c67f19c3d2c94389fc99e54e74801

                                                                    SHA256

                                                                    0099c710e406e0423bb0b11eb4c113508c67f84a0972a2d14c038687cac1753b

                                                                    SHA512

                                                                    6b912d51e93f1e4756ecc5321ec08a6eb5e15413a9d9cf568bd14ce2a5199d064f6dd5c7d9d5155296d1a4ab5852c81a8fc138565fb788e7402c09b61281a5cd

                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    ecda5b4161dbf34af2cd3bd4b4ca92a6

                                                                    SHA1

                                                                    a76347d21e3bfc8d9a528097318e4b037d7b1351

                                                                    SHA256

                                                                    98e7a35dd61a5eeea32ca5ff0f195b7e5931429e2e4b12d1e75ca09ddab3278f

                                                                    SHA512

                                                                    3cd3d64e7670ab824d36a792faa5d16a61f080d52345e07b0ef8396b2a1481876a3b30fc702bf0018a1b02c7788c3c7f1b016590c5b31485a90e3a375f11dade

                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe

                                                                    Filesize

                                                                    3.2MB

                                                                    MD5

                                                                    6b7a2ce420e8dd7484ca4fa4460894ae

                                                                    SHA1

                                                                    df07e4a085fc29168ae9ec4781b88002077f7594

                                                                    SHA256

                                                                    dec51011b3bd2d82c42d13f043fac935b52adeaa17427ce4e21e34fcbd2231e4

                                                                    SHA512

                                                                    7d2cd278ee45ec0e14145f2be26b8cdbe3312b300aa216532c41e839ba61c12ae379025568c85634f0ec3bc95cc481bb17f99ab30c711986651569f0f1f81beb

                                                                  • C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE

                                                                    Filesize

                                                                    274KB

                                                                    MD5

                                                                    7fbf415b935535d546d5f9203964ed7e

                                                                    SHA1

                                                                    ce6a5d5117940e7435f4a0ff412741f40a5cbafb

                                                                    SHA256

                                                                    ea24198d33ecd695b9892068d4d155435318e41531d7ca5379b45b344a086a28

                                                                    SHA512

                                                                    5e613b6f43f16f298ae67ff1928354e7f40adfc574bec5996dbdef99c8c053f1c32c677f18093c7ff78ec2f883e6d377af8515c76380823264633dd8c78cd2ec

                                                                  • C:\PROGRA~2\MOZILL~1\UNINST~1.EXE

                                                                    Filesize

                                                                    141KB

                                                                    MD5

                                                                    144294f89c5a1ad929b9056ec0760f0f

                                                                    SHA1

                                                                    91175b430042997c8fb899596afc53bea4bb38c8

                                                                    SHA256

                                                                    9d1eeb4a9b9ef3d686891ac34e9b4a2379f24fc02ea2e9fc00071d03a86d42ab

                                                                    SHA512

                                                                    77c2fd3dc1bc710e652e4e4ca7cd73076a3988cf395d977b5a46a395cedd943560f3a5ad2251365c63cd2d3e681e7cf9fc3510d8d778732d7c692831c2fc9898

                                                                  • C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe

                                                                    Filesize

                                                                    494KB

                                                                    MD5

                                                                    2b10fad55bb461c01d3f922c3fbf7d2e

                                                                    SHA1

                                                                    e899a087bc0a8b36c79d24505dc72813a25b0eb9

                                                                    SHA256

                                                                    8f1d9b2c820fb05556bc9ddabafc7e5cf51c5c01075bab11d68ae965ca21f68f

                                                                    SHA512

                                                                    2a47bf1f477dcf0070e9157cc0b816fd1563075a19286df7bb4d3fc368552d72a95505a35bba961b69b3561d1d858857c14762b7c046c6cf382d08e037f2ec61

                                                                  • C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE

                                                                    Filesize

                                                                    485KB

                                                                    MD5

                                                                    048da0aced67fe14cbc1801a057b8cef

                                                                    SHA1

                                                                    9ddac6ad86b54d0b7e1d22fbc1ff75ccfa9c17ea

                                                                    SHA256

                                                                    2f37cac4a1dbf7944d43f1154ce293311c3f9d44317276a06b49cd41123d9d96

                                                                    SHA512

                                                                    1d2b23dc25ea03002a3ccbcdf08a7ebf47ee2158bf9211b71830a92dfa4bef584529c1804148ebe2cb662e579cc97e9f702a6a42071f2600a129c642a6b92c16

                                                                  • C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE

                                                                    Filesize

                                                                    495KB

                                                                    MD5

                                                                    96c338591ac8ea4483337c8371cfbab9

                                                                    SHA1

                                                                    21bed3f86db1c33912390db397678631c876f431

                                                                    SHA256

                                                                    7237de120dcf61936d33394b8e211d4af88a7e4c6ee53cf053a54b8b60c23a1e

                                                                    SHA512

                                                                    44e44c466ca812a1ce21f5ba8e3e57434ae7ff1549b0315d3887cd467da40e1604ec9a69f07d7e3c834aa1d96c8206628ce173ae8a8a59a9d713b516f58e9455

                                                                  • C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE

                                                                    Filesize

                                                                    650KB

                                                                    MD5

                                                                    fc3c02a4d4d5861fabd35e1fee6c471a

                                                                    SHA1

                                                                    1596a8ee947e5fdff7f1f03b694bfb71e9b1ddd1

                                                                    SHA256

                                                                    741ab407aa8af5f0f09d42a3c4eca0cf39a40af9a261d3f0d653b13f7e5ad36f

                                                                    SHA512

                                                                    d6dae86cdf99696c7af7b397d8a81d09671f96801472063567dc4f6780d35307e2f149af6762616ece84039c34099c26fa6e1460da5ffe8acbc56da5b28afc97

                                                                  • C:\ProgramData\Synaptics\RCXE04E.tmp

                                                                    Filesize

                                                                    753KB

                                                                    MD5

                                                                    50891fdf662153bd82aadddeb9c11f4f

                                                                    SHA1

                                                                    3e6dbe704e58ed48b0a92bc04b83cd77510a5e89

                                                                    SHA256

                                                                    876f13848ccc16b4771440887df15c89e43c4811b6f34b977c0da8e6fea8cc26

                                                                    SHA512

                                                                    8dd3689711326005e9673608b35db760f02d3d30cfc37b3d749d7d8f5eaf81e2fcd3484fb5aedd4dcb4b86e89e3bc1da2694148b3886a05c2ef055e48120ccde

                                                                  • C:\ProgramData\Synaptics\Synaptics.exe

                                                                    Filesize

                                                                    10.1MB

                                                                    MD5

                                                                    50b072669d250694e04f3e2d27153ece

                                                                    SHA1

                                                                    616d07f52763be900b56eafdf54e996e1183da4a

                                                                    SHA256

                                                                    3837bbb589f027fe75534ac85223641d8cb3f162420e8843aa94ade7045fa35a

                                                                    SHA512

                                                                    f556f495692011df4170c2e2a21378d9fbb4bb6769d87116f31afca3f9200a9eb22f24e275d087098ffed5a5b0108d04b52296892fd9b6c15399ac5e53b28682

                                                                  • C:\Users\Admin\AppData\Local\Temp\._cache_._cache_NL Brute 1.2.exe

                                                                    Filesize

                                                                    8.6MB

                                                                    MD5

                                                                    29a056a84cf2cbaace260906b558c9bf

                                                                    SHA1

                                                                    5a5199d4cb1e8fa63f738baf443e002c546d031c

                                                                    SHA256

                                                                    cf68e068a071f44ea5b40b6f514cc4f9cfd16279652f85c3221cdfc5e0184e15

                                                                    SHA512

                                                                    8eecaa3efb4744dbd85ae413213803e5d09bb82d590ad3df4ca477120f72c04c611ced971a8e6b462e67e23186137e975006ca89c893d67bd39d2bd030f14901

                                                                  • C:\Users\Admin\AppData\Local\Temp\._cache_NL Brute 1.2.exe

                                                                    Filesize

                                                                    9.3MB

                                                                    MD5

                                                                    ad581ec2abb20785ac61234ec270509b

                                                                    SHA1

                                                                    4c46f335468f76e5eecd444f55074834725f8fc1

                                                                    SHA256

                                                                    ec1ef94580cfeef624d395ca70bb824d4d1522f5e003d4fa1126230ced3795cd

                                                                    SHA512

                                                                    b9ad5ebdfd5f9069a8e9be9d12cf5fa6ab0ad21d1c428114414a9253e3768f6029352a6b4cb4b1de48f092827e4d8cae4bbd5cfaa90cfd9d0c721f238ce29ad1

                                                                  • C:\Users\Admin\AppData\Local\Temp\3582-490\._cache_._cache_NL Brute 1.2.exe

                                                                    Filesize

                                                                    8.5MB

                                                                    MD5

                                                                    e6bf3f31987645cbbfe74e2fbcb87331

                                                                    SHA1

                                                                    f38f57cb3bcc28047f200d9fdd1fca400a9eafb1

                                                                    SHA256

                                                                    69e61da1dda3a4c7cfd589000ecf831c2739b4ffe578bdfb1456b59b3b1ec233

                                                                    SHA512

                                                                    7fadd83caa14497837d0d900cf40e706ef6e33815b861a602e0e83b3b1aa3c753ece3b084968919c7adc453bc368de8fe1e531e30e6ea6d1e9465b5628bc8605

                                                                  • C:\Users\Admin\AppData\Local\Temp\3582-490\._cache_NL Brute 1.2.exe

                                                                    Filesize

                                                                    9.3MB

                                                                    MD5

                                                                    a30763c11386537891860bb31ae2332c

                                                                    SHA1

                                                                    812c4e600b097ec74d6fcba24889994b458c452f

                                                                    SHA256

                                                                    af5aadcf55a696d1725b4d91d0a49afd9ba122ccc003618506eff255b7a2dcbc

                                                                    SHA512

                                                                    9fc786154505280591d915897b769be022af3f1beea3473f6f1be2e385382348305dd09b7bf0bf281f7b511dc4eedb9c14fdc3c343d9355a0a344e4bac70cc90

                                                                  • C:\Windows\directx.sys

                                                                    Filesize

                                                                    57B

                                                                    MD5

                                                                    6b3bfceb3942a9508a2148acbee89007

                                                                    SHA1

                                                                    3622ac7466cc40f50515eb6fcdc15d1f34ad3be3

                                                                    SHA256

                                                                    e0a7bae2a9ac263cff5d725922e40272d8854278d901233a93a5267859c00a3c

                                                                    SHA512

                                                                    fa222bfcade636824af32124b45450c92b1abec7a33e6e647a9248eef5371c127d22ccb7cc5a096b4d5d52e2457f3841293a1b34304e8e5523549856ac02f224

                                                                  • C:\Windows\directx.sys

                                                                    Filesize

                                                                    57B

                                                                    MD5

                                                                    56abc40d1e45c091d8afddb90a4ce6b4

                                                                    SHA1

                                                                    08db549484467b32b79958700300cabefc659848

                                                                    SHA256

                                                                    a43fa861957415e3b0f25e2b54d931961cd309ff1d5354a9362852895b90b3e1

                                                                    SHA512

                                                                    51625c015a7c8fcf6fb51d3396aa08d2068772e3fcacaf32c409e82071af4ba1eb2ee94f36c06a98c32ba59d23bbaa6b540f7bd418a9472303cc225151daa698

                                                                  • C:\Windows\svchost.com

                                                                    Filesize

                                                                    40KB

                                                                    MD5

                                                                    f2d9d8bfa7e66046f928920c14a99994

                                                                    SHA1

                                                                    aa3f3f7a16b54b65b55c27f862ad1f9169c102d1

                                                                    SHA256

                                                                    b6dabbe8027291860a9251351464485a38e600087ffb08f5a030ac82ddfc9010

                                                                    SHA512

                                                                    081d8b0f4491e10c23ae1edb8853e23c68be1642d2762f2e3632967f77d152c67ff008ddff1e53608bdc2c8b629abf561b6fca8b0089cedcf1c9a8be21905e21

                                                                  • memory/232-383-0x0000000000400000-0x0000000000E1A000-memory.dmp

                                                                    Filesize

                                                                    10.1MB

                                                                  • memory/232-340-0x0000000000400000-0x0000000000E1A000-memory.dmp

                                                                    Filesize

                                                                    10.1MB

                                                                  • memory/716-742-0x0000000000400000-0x0000000000D53000-memory.dmp

                                                                    Filesize

                                                                    9.3MB

                                                                  • memory/928-344-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/952-562-0x0000000000400000-0x0000000000C8D000-memory.dmp

                                                                    Filesize

                                                                    8.6MB

                                                                  • memory/952-548-0x0000000004550000-0x0000000005DF0000-memory.dmp

                                                                    Filesize

                                                                    24.6MB

                                                                  • memory/952-490-0x0000000004550000-0x0000000005DF0000-memory.dmp

                                                                    Filesize

                                                                    24.6MB

                                                                  • memory/1320-743-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/1360-191-0x0000000000400000-0x0000000000D53000-memory.dmp

                                                                    Filesize

                                                                    9.3MB

                                                                  • memory/1540-662-0x0000000000400000-0x0000000000C8D000-memory.dmp

                                                                    Filesize

                                                                    8.6MB

                                                                  • memory/1736-744-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/1956-656-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/2000-561-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/2000-776-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/2000-339-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/2296-547-0x0000000000400000-0x0000000000D53000-memory.dmp

                                                                    Filesize

                                                                    9.3MB

                                                                  • memory/2492-777-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/2604-237-0x00007FF9832B0000-0x00007FF9832C0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/2604-238-0x00007FF9832B0000-0x00007FF9832C0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/2604-246-0x00007FF9832B0000-0x00007FF9832C0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/2604-278-0x00007FF980CC0000-0x00007FF980CD0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/2604-316-0x00007FF980CC0000-0x00007FF980CD0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/2604-239-0x00007FF9832B0000-0x00007FF9832C0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/2604-236-0x00007FF9832B0000-0x00007FF9832C0000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/2640-483-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/2924-464-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/3212-457-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/3480-486-0x0000000000400000-0x0000000000D53000-memory.dmp

                                                                    Filesize

                                                                    9.3MB

                                                                  • memory/3512-235-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/3528-484-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/3784-381-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/3896-775-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/4216-657-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/4660-557-0x0000000000400000-0x00000000004C2000-memory.dmp

                                                                    Filesize

                                                                    776KB

                                                                  • memory/4672-115-0x0000000000400000-0x0000000000E1A000-memory.dmp

                                                                    Filesize

                                                                    10.1MB

                                                                  • memory/4672-0-0x0000000002A70000-0x0000000002A71000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/4764-751-0x0000000000400000-0x0000000000C8D000-memory.dmp

                                                                    Filesize

                                                                    8.6MB

                                                                  • memory/4888-485-0x0000000000400000-0x0000000000D53000-memory.dmp

                                                                    Filesize

                                                                    9.3MB

                                                                  • memory/4888-395-0x0000000000400000-0x0000000000D53000-memory.dmp

                                                                    Filesize

                                                                    9.3MB

                                                                  • memory/4916-382-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/4916-572-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB

                                                                  • memory/4952-384-0x0000000000400000-0x0000000000E1A000-memory.dmp

                                                                    Filesize

                                                                    10.1MB

                                                                  • memory/5048-560-0x0000000000400000-0x0000000001C9F400-memory.dmp

                                                                    Filesize

                                                                    24.6MB

                                                                  • memory/5048-659-0x0000000000400000-0x0000000001C9F400-memory.dmp

                                                                    Filesize

                                                                    24.6MB

                                                                  • memory/5048-753-0x0000000000400000-0x0000000001C9F400-memory.dmp

                                                                    Filesize

                                                                    24.6MB

                                                                  • memory/5076-658-0x0000000000400000-0x0000000001C9F400-memory.dmp

                                                                    Filesize

                                                                    24.6MB

                                                                  • memory/5076-752-0x0000000000400000-0x0000000001C9F400-memory.dmp

                                                                    Filesize

                                                                    24.6MB

                                                                  • memory/5076-559-0x0000000000400000-0x0000000001C9F400-memory.dmp

                                                                    Filesize

                                                                    24.6MB

                                                                  • memory/5096-632-0x0000000000400000-0x0000000000C8D000-memory.dmp

                                                                    Filesize

                                                                    8.6MB

                                                                  • memory/5100-376-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                    Filesize

                                                                    108KB