Resubmissions

11/01/2025, 14:51

250111-r8efbstram 3

11/01/2025, 14:29

250111-rt2bjs1nct 10

Analysis

  • max time kernel
    22s
  • max time network
    26s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2025, 14:29

General

  • Target

    lol.exe

  • Size

    4.9MB

  • MD5

    1958ebce3ce234f5bc991d75bbeac04d

  • SHA1

    a3a65a551398e3c81ecb8f4729ea4f879e018ea4

  • SHA256

    8961760a99a872da1ba6555b2eafaa8e68dfce94136156fff0651ac61275acf5

  • SHA512

    c99210237ac3135c9f75eeafe4803b129d0f7749c3960a8d127e4c28f982c8ecf61672bcf358a5f76cc02bd5cc27ca9863ed9d24ca75242db9799aa84675ac9c

  • SSDEEP

    49152:DAodtaG9kS2U84B+FLan9k5TRM9zlfVjjotfsdS2Mc1xZ9mw53PvOL7CaI4LOOEl:h/B179A2Pbn2shvit4xAhQRxGck6lh

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

NMW

C2

nm111-20223.portmap.host:20223

Mutex

0cf74134-5c38-42d6-bb49-4c83c1e37344

Attributes
  • encryption_key

    F7F619EE7207F0CE79B19EAEA54D81315C5AE97B

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Exm Tweaks

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lol.exe
    "C:\Users\Admin\AppData\Local\Temp\lol.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2376
    • C:\windows\system32\cmstp.exe
      "C:\windows\system32\cmstp.exe" /au C:\windows\temp\835096430.inf
      2⤵
        PID:2788
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
        2⤵
          PID:2808
        • C:\Windows\System32\svchost.exe
          "C:\Windows\System32\svchost.exe"
          2⤵
            PID:2888
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2892
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
              3⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1564
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1564 CREDAT:275457 /prefetch:2
                4⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:1860
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1564 CREDAT:275468 /prefetch:2
                4⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2700
        • C:\Users\Admin\AppData\Local\Temp\lol.exe
          C:\Users\Admin\AppData\Local\Temp\lol.exe
          1⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:948
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2108
          • C:\windows\system32\cmstp.exe
            "C:\windows\system32\cmstp.exe" /au C:\windows\temp\1640105309.inf
            2⤵
              PID:1944
            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
              "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
              2⤵
                PID:1724
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                2⤵
                  PID:1876
                • C:\Windows\System32\notepad.exe
                  "C:\Windows\System32\notepad.exe"
                  2⤵
                    PID:1812
                  • C:\Windows\regedit.exe
                    "C:\Windows\regedit.exe"
                    2⤵
                    • Runs regedit.exe
                    PID:2656
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
                    2⤵
                      PID:1816
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"
                      2⤵
                        PID:1384
                      • C:\Windows\System32\calc.exe
                        "C:\Windows\System32\calc.exe"
                        2⤵
                          PID:1552
                        • C:\Program Files (x86)\Windows Mail\wab.exe
                          "C:\Program Files (x86)\Windows Mail\wab.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1592
                      • C:\Windows\system32\taskkill.exe
                        taskkill /IM cmstp.exe /F
                        1⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1556

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

                        Filesize

                        579B

                        MD5

                        f55da450a5fb287e1e0f0dcc965756ca

                        SHA1

                        7e04de896a3e666d00e687d33ffad93be83d349e

                        SHA256

                        31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

                        SHA512

                        19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

                        Filesize

                        252B

                        MD5

                        93bc5b2f054e136103f01688ebd1d5da

                        SHA1

                        1c9f70202ed63a9734115322a845fa0c106ce871

                        SHA256

                        9a5e28f0e751d1485666ab070b7907544fc20dd11987724cbe43901265536860

                        SHA512

                        270965f670ac6cdb8e7d7c7a26abcdc736fd17a413d6bd63969a82c8dbac9a1d71ce0206bac10805844a25c2c3b08277642de44f763bb1369daa0bd9654d8d4c

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        06f91399cc64f1b473a834b1ef28e04e

                        SHA1

                        ccb654620fab169704085269e8c81c309fb5644b

                        SHA256

                        61f517611f6ab3ddeeb1527d51b0da4222b7342779c5bfe119f26ed9ad44af6a

                        SHA512

                        f36238d7b88cd7ca3963005d14df1affac818c74a279bf43be05e7b2e91d032e861c7469da9f96a716b2903879179f0a042557d03daa2be13f6fd812806ed1bf

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        0633520f97c40b51cfa9d4e9a05621f7

                        SHA1

                        e5d2d07e0fece5d7d34460b0bea42123d54193d8

                        SHA256

                        e9633ef440a92f7d780e2965e1f9f0c4a51e7937cc2f3098d14d7b28ce15b676

                        SHA512

                        1deb402be9cd49d600d2474dd7a8971941d86b4d5b8fa071f3f34bd2cd04372ea34383ca8d9819774f1089f90702a8f48393e92dd52d6d38367379326daf790d

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        b7465991327afdda9e4eb3546b7c35f4

                        SHA1

                        5ef09c63c7504dfded1ba014b94369afaa563730

                        SHA256

                        586e2ac52f1ddd3abc07d9e77fe66e8d68c4101ddb5b53765f582278695dc751

                        SHA512

                        4b8c96ad96950b64befb3bd0a470ad30fdbee53efa3822998021c7562d5251e504c0ac9f7a41f99b3f5994dce9cec47539dae3e4ee81e66e9b423d419be30449

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        53d1d09fd23bee5a24fae0449c084bb0

                        SHA1

                        ef40703fd750d70ff7523918b7f93c5ea1800e74

                        SHA256

                        8c7980f56ef5d402dc19d2ce93cdb214d7c49a844f77962b4c4bfca75b62aed2

                        SHA512

                        3c0c5e5270edb1158f98b7ca2c896ecd0b8a177b12a1b3f16791c8335f8e47070a2febc566d828245b3f62125d55c5d6170057e4dbfe1fd0c256bf6759bb61bc

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        1dbe834f1cb5ffebbb2a7f06e7bb9967

                        SHA1

                        d6d8d5fa2b9251e2ebaebe918c279935e444e771

                        SHA256

                        ee2fa9b066f808f494c5c606c5cbc83135af88de3361cf963dc75a613a324696

                        SHA512

                        9f2e34f89893a6e64534937b4320245113c2bc7b94ce63a9f3f90e02a46cfb165b3eda99b38237e163e015d43b9f6651dfa37e3fcaa862095e98257db3e41b96

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        c9c12e3da731e9933744cdc36bda24f5

                        SHA1

                        bbd945be15ab4abfe3ff7e2867d5a17ccaa5edfe

                        SHA256

                        f01741c8d00e24d26e66074e7c02db186ee1d0a2a95165a0ed1ab7eea4eb8a9e

                        SHA512

                        3d1373e0b4f1f2e6603a3659d590e7649311806ed93ed2bf5d6c79da41ff79fdd04a62fd2a60b208db37e2fb74e7da7b0d6eb11f2a3ce0a992fde9a8c4d94763

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        981f7b558d1982f233bbf644fd186aec

                        SHA1

                        0cfda3be2f6c7b76a165f92e36a72688606d1e7f

                        SHA256

                        2c6598016dde2d981faab147971376be92bdc1e99eedb55b62215dbfe0f45a6f

                        SHA512

                        141f06890214cb35c35bedf4079de0d2ecff9867ff1342ffb870067c3c293bd11e59654a7ddfa3e97bd1541966c7f6dd1c3b70e91ee3a5f4d989e9e6b1d5498f

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        9c1fcded6c854c3988a3751b5de1460b

                        SHA1

                        10397381ad68fb154c73b32514f367b55d79d94e

                        SHA256

                        c624de4f2d01dd1bb2a38d3d9cbe5517e6c4b17ee878a8564dcba6748066680c

                        SHA512

                        8d65076ed7a8b553acc26124ad394e5031048e243303195c1791d99d97c656c06fa676c7fa3ae3700e2a94bffa9da47fa6eb9042f09e6f52d4bc1ad3a3aa3888

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        15663560ba3d87404ec8e6e6cc87d77e

                        SHA1

                        3f83f1fd9cdf0454d1377d001c643dd23c8c2f65

                        SHA256

                        836b9eaa8bf9666a37cdf1ff3327b4226575c4bef1df427d2649c1e9fbe07210

                        SHA512

                        f5fae9865728b958645825225ef5505d18c4bed3b7d506b5370ef1fd8d10ff6f5dd1987a79259dbfe4f29b350bcafb0a5a07cfebfdd79a694b1e7574d1eb376e

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        62276492260fcd0cc874d9d42a8c6a46

                        SHA1

                        e22468d30afb3b883c6bb253ec97620168ac7e95

                        SHA256

                        c5410f5d24a77a9d212d40c0374f6e21773e1bf653c03778b7e7beeb06ef225d

                        SHA512

                        7fe7fac45164ca0ae9c9dd74c305445e155aa431a32cc4ee9b8db78e689c2503a43fc1ee231344a4f1e8d35a1650926f60b2eb9642c57110a3eef9447bb96eab

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        dcd43921703b3284dce1c2ed93be3d08

                        SHA1

                        4a2d30332c02d87d0eb6d0780540fbc45728bb41

                        SHA256

                        24599f2131b9a8a04203b866c63c4ee9d272d553e9f0b461470c622b0ec2c289

                        SHA512

                        bf73f701ff3cc0ff395b32414650da3de209e18e50f8fca1b97dcec1f7bd7b0aefdf28e5e9ad29d6e0b1a00fb60b40e4ab1c271996c80b9dca4aba30561aec8d

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        d6a9b69754ae7eb40dcfed7f0ed4c8aa

                        SHA1

                        eb0516e7c2c5df370165414209e6845f6b62b854

                        SHA256

                        a847c5414c9dd803751eab599a971a212851fd31a44d198bdcdc87a90bdde201

                        SHA512

                        219b9435ebca37fc27bcf5c48cbbab3c326d01a4580702c40f32ad762e58568f37103e2ad9c19f0173cf48efe042fa402e8815472e2d58ffe8e9100a98fe9de5

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        77fb25e1402715bc60242533dcbd9966

                        SHA1

                        22c7cbd8a761748f0381bb096789fd48d3b4cee4

                        SHA256

                        8f0c65d5f26797a5e63b615b27b7e4d5727f7d758aeac5c0ecfbb1b557c9fc21

                        SHA512

                        a86480b6c3959d8c5d82c9907658d4a29dfe60b77fa2762a77c5de41c625f3f8065bc88f47a2d1cdbd71cfb3f08061ad2cf8ac06917cc0b15eae85ed6f81fb0d

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        e40a05cca16f23d84cf4b3dba416f352

                        SHA1

                        8d5eaad6a537e1446e2ab942301e40dc6c9f7262

                        SHA256

                        4e09d1733fad1baf54dd9ba1a5bcb004a1822781345d7e36a878a33ad644cf7b

                        SHA512

                        39d1c6e9d74d676a6700b245a1c70f1dd1829c69d70af4d76f51efd15348615ad8f256240e56b2d9702620657a4bf8436f3cb256527d1252fd77aa03c86def2d

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        f165576bac9131487a6696388b8bb6bc

                        SHA1

                        d236e1f8ea1cd2e73950fadbefe538ada662452a

                        SHA256

                        caf4b839bc1a733227d0645f125ffcce186e23e8b7ce93255bfc143abace4602

                        SHA512

                        9383afc3a810b7fa7094324a09a4451e2412d24cfc770c6b3d9d8bbe264c916fa239c0865e3a9d70466a1f536f24118d7f4987aeabce75d74eb21241b79432db

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        af296c9fa48aafa8f6e01c2b4de93863

                        SHA1

                        ec568d133769ee62074a9e849b5cd684d789e776

                        SHA256

                        8c32f59c48af52acd75b56c682e24499d76ff6b2fd045a1cf616de91324ed42b

                        SHA512

                        78236a893a5dbb7b51135d4572171f5befd98261bef9bee08996801c5a936a49858bc6b85800d502d364094b1b93d7501ce44b0aba7e3136a80ff8eaa39c501a

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        c06fbebe0218d60b8b4548427f4dfe03

                        SHA1

                        15ab5c24a02871a555a1e2fa537d03ab558f2516

                        SHA256

                        fbd888657d719ef6692adba70b64482bafd63d8e15750008172fc638b5e3bf78

                        SHA512

                        a333526c38436a14c7dc9cb11dc5627ab425b459b0a5e17097d35da7bb3d03d4e01f7f55aa3b97ddf565257711e978fe65c9e65c98328c12f5be3cd8770eb947

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        0101a0a1589d18aaa22a14cb23172642

                        SHA1

                        414640a78611955a556897e01ccf7baa73650ec1

                        SHA256

                        6d634bd53225f7c825b21940608005a7dd276bb22c4b8108e8d895250a104b04

                        SHA512

                        e304d76a453d8fd14ae0422a76f35bd434dbba97301911c948b02a6ede3102088a685db45ff66f7aca29b35564df4b0f9aede68570cf27383fe7784c623e16de

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        654b0ad2fbbaf617d33df02c2400503e

                        SHA1

                        49e88cf90c7990a5436b37992860bc320ad4a653

                        SHA256

                        ce93f1ce5910f015087c15ef7c438e714797550692e0298f6a99fa6d1e79949c

                        SHA512

                        ea8875ed68b6196cb2a928dae941e98c14d61d4b1a166046008a6d200a3ce0dd165253e869be186129c1d4df573caa5369644f2a5e275c98c8bd99bd0f1b92e3

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        0005e1f6fc759d004a2b988c76be86f1

                        SHA1

                        d6b17377e0a1317505cef0222b4b6c72302ca4a9

                        SHA256

                        748333068922d751349d4fea4ceb91b48c9678c45c13dcea8fce5d7551e2c348

                        SHA512

                        feb7f27e9f9a843fc70f1a51b648a07dc91964b83b18ee18898c1c5256dc3d8bbc1ed8569cd46f25ea93e98d8e484b42ed0bef468b0c458059aec0e7d9c2bd1e

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        5be8766893f028ce59d3bd55a5758e8b

                        SHA1

                        5d0eb7e88ae7d30a98936273109c69a9892d274b

                        SHA256

                        95213a6906e4271ff85ebc227ca57c962dab1c565e0b15a23551a36e28b1d8be

                        SHA512

                        34cfb7f3a39b6fee3ee4adeae6c4e78c0231fcd04fea686f5656e97675ed5f62532c512e32cf3cac2a8f717cb88d8f9dbf013f897d772d7a5eb6ecf6bb3940e1

                      • C:\Users\Admin\AppData\Local\Temp\CabF93F.tmp

                        Filesize

                        70KB

                        MD5

                        49aebf8cbd62d92ac215b2923fb1b9f5

                        SHA1

                        1723be06719828dda65ad804298d0431f6aff976

                        SHA256

                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                        SHA512

                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                      • C:\Users\Admin\AppData\Local\Temp\TarF9EE.tmp

                        Filesize

                        181KB

                        MD5

                        4ea6026cf93ec6338144661bf1202cd1

                        SHA1

                        a1dec9044f750ad887935a01430bf49322fbdcb7

                        SHA256

                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                        SHA512

                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W8Q3AL9MTPQQK83PVDY6.temp

                        Filesize

                        7KB

                        MD5

                        7d15a36c3f04130c36f57c0a3ba9e308

                        SHA1

                        bf1a2c3a9d5eb5040337a04fb3216c56251c5227

                        SHA256

                        ed88933d480bfc9382757d3db43d94c8da166bc342be5e81a4a1d27fc3a94645

                        SHA512

                        a3c78df8054cf6f8bfadd467b09b8d242ff2360ff9f53d52b5f6733618ec6c58f2cce863bf87b5bafdd8822e0bde47e9eec7b050987f50de27296ef36f38c3bb

                      • C:\Users\Admin\lol.exe

                        Filesize

                        4.9MB

                        MD5

                        1958ebce3ce234f5bc991d75bbeac04d

                        SHA1

                        a3a65a551398e3c81ecb8f4729ea4f879e018ea4

                        SHA256

                        8961760a99a872da1ba6555b2eafaa8e68dfce94136156fff0651ac61275acf5

                        SHA512

                        c99210237ac3135c9f75eeafe4803b129d0f7749c3960a8d127e4c28f982c8ecf61672bcf358a5f76cc02bd5cc27ca9863ed9d24ca75242db9799aa84675ac9c

                      • C:\windows\temp\835096430.inf

                        Filesize

                        512B

                        MD5

                        47bd066ba19bec1b8a7a947db20b343b

                        SHA1

                        0d2b3f71ece9bed2723e1799f3a3b5524b5ad421

                        SHA256

                        6e8338d3f69602ccbae478c887acb4f561eb450c48f100c53da74bc925b3e966

                        SHA512

                        e7e403fc5adeaddf5df00566ef60837de73d3a593e9c6aecc672c4251ad3d7c5bbfebe982f75e686b17733d9e8a5f2bd7734dc1391a3017bbb1d52f8109ccab9

                      • memory/1592-28-0x0000000000400000-0x000000000078E000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/1592-29-0x0000000000400000-0x000000000078E000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/2108-22-0x00000000027A0000-0x00000000027A8000-memory.dmp

                        Filesize

                        32KB

                      • memory/2108-21-0x000000001B710000-0x000000001B9F2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2376-4-0x000007FEF5E6E000-0x000007FEF5E6F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2376-6-0x000000001B750000-0x000000001BA32000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2376-9-0x000007FEF5BB0000-0x000007FEF654D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2376-8-0x000007FEF5BB0000-0x000007FEF654D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2376-12-0x000007FEF5BB0000-0x000007FEF654D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2376-14-0x000007FEF5BB0000-0x000007FEF654D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2376-7-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

                        Filesize

                        32KB

                      • memory/2376-5-0x000007FEF5BB0000-0x000007FEF654D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2892-15-0x0000000000400000-0x000000000078E000-memory.dmp

                        Filesize

                        3.6MB