Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    112s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2025, 22:01

General

  • Target

    3364346db0f071150f401d19894c30ce61b0de0ef3b3c0f473991f6e4e83fa3e.exe

  • Size

    520KB

  • MD5

    2168141fcf982917e05f4981a174947b

  • SHA1

    212a5c866bbafabbf56df672313a81b6a722337b

  • SHA256

    3364346db0f071150f401d19894c30ce61b0de0ef3b3c0f473991f6e4e83fa3e

  • SHA512

    6e7c1a8e13699214732b2079b3e13a3ce53d4818713fb0bccae6467d22287d78dfd80afe4c061e325523148228a806cec4ed5aa13c312843f835bbedb0ab7656

  • SSDEEP

    12288:zW6n3sX4yCFr2ZemYOpSPIsGWeKZl4q7sioXb:zW6ncoyqOp6IsTl/mXb

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 11 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Checks computer location settings 2 TTPs 29 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 30 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3364346db0f071150f401d19894c30ce61b0de0ef3b3c0f473991f6e4e83fa3e.exe
    "C:\Users\Admin\AppData\Local\Temp\3364346db0f071150f401d19894c30ce61b0de0ef3b3c0f473991f6e4e83fa3e.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4084
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempXIACQ.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "ITYUIVGFJWXAKQX" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\YRQAYMLNIGNJYMT\service.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4012
    • C:\Users\Admin\AppData\Local\Temp\YRQAYMLNIGNJYMT\service.exe
      "C:\Users\Admin\AppData\Local\Temp\YRQAYMLNIGNJYMT\service.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4060
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempGUCQP.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4100
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "BYMKJNAEAOUMCCE" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\HJVVWRQWSIVDMDX\service.exe" /f
          4⤵
          • Adds Run key to start application
          PID:968
      • C:\Users\Admin\AppData\Local\Temp\HJVVWRQWSIVDMDX\service.exe
        "C:\Users\Admin\AppData\Local\Temp\HJVVWRQWSIVDMDX\service.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1792
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempBRSPX.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3180
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "DIWVHPHYQMHXRCS" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\TSCONPKIPLAOVEQ\service.exe" /f
            5⤵
            • Adds Run key to start application
            PID:1464
        • C:\Users\Admin\AppData\Local\Temp\TSCONPKIPLAOVEQ\service.exe
          "C:\Users\Admin\AppData\Local\Temp\TSCONPKIPLAOVEQ\service.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3232
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempUQYPE.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:536
            • C:\Windows\SysWOW64\reg.exe
              REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "IMJJURPTOWKMELL" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\SLKSGFHCAHCXSGN\service.exe" /f
              6⤵
              • Adds Run key to start application
              PID:5116
          • C:\Users\Admin\AppData\Local\Temp\SLKSGFHCAHCXSGN\service.exe
            "C:\Users\Admin\AppData\Local\Temp\SLKSGFHCAHCXSGN\service.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4604
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempUVHIF.bat" "
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4824
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "QMLYFPYWGDNHIYR" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\QJIQEEFAFBWRELG\service.exe" /f
                7⤵
                • Adds Run key to start application
                PID:464
            • C:\Users\Admin\AppData\Local\Temp\QJIQEEFAFBWRELG\service.exe
              "C:\Users\Admin\AppData\Local\Temp\QJIQEEFAFBWRELG\service.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:612
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempFGEME.bat" "
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2948
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "KXENXUFBMFGWPSU" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\EMDVNJEXNOMUGMR\service.exe" /f
                  8⤵
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  PID:3724
              • C:\Users\Admin\AppData\Local\Temp\EMDVNJEXNOMUGMR\service.exe
                "C:\Users\Admin\AppData\Local\Temp\EMDVNJEXNOMUGMR\service.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2496
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempDGHQM.bat" "
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2568
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "XUTXKAOKIYWNMPK" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\RUJDCJSINFWNBMC\service.exe" /f
                    9⤵
                    • Adds Run key to start application
                    • System Location Discovery: System Language Discovery
                    PID:4584
                • C:\Users\Admin\AppData\Local\Temp\RUJDCJSINFWNBMC\service.exe
                  "C:\Users\Admin\AppData\Local\Temp\RUJDCJSINFWNBMC\service.exe"
                  8⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:3652
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempKWHGK.bat" "
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:4552
                    • C:\Windows\SysWOW64\reg.exe
                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "CAEHTUPNQFTBJAV" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DLDUMIDXNOLTGMR\service.exe" /f
                      10⤵
                      • Adds Run key to start application
                      • System Location Discovery: System Language Discovery
                      PID:3296
                  • C:\Users\Admin\AppData\Local\Temp\DLDUMIDXNOLTGMR\service.exe
                    "C:\Users\Admin\AppData\Local\Temp\DLDUMIDXNOLTGMR\service.exe"
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2036
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempMPQWC.bat" "
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:456
                      • C:\Windows\SysWOW64\reg.exe
                        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "GUBKXTRCWJCWYDT" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\TNFLSDERXPWLVLH\service.exe" /f
                        11⤵
                        • Adds Run key to start application
                        • System Location Discovery: System Language Discovery
                        PID:1468
                    • C:\Users\Admin\AppData\Local\Temp\TNFLSDERXPWLVLH\service.exe
                      "C:\Users\Admin\AppData\Local\Temp\TNFLSDERXPWLVLH\service.exe"
                      10⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:5076
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempUJXFN.bat" "
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:5104
                        • C:\Windows\SysWOW64\reg.exe
                          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "KQVGEIDLWBYTRAA" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\UOGMTFFSYQYMWMI\service.exe" /f
                          12⤵
                          • Adds Run key to start application
                          PID:4984
                      • C:\Users\Admin\AppData\Local\Temp\UOGMTFFSYQYMWMI\service.exe
                        "C:\Users\Admin\AppData\Local\Temp\UOGMTFFSYQYMWMI\service.exe"
                        11⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:4188
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempLPQVC.bat" "
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:3348
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "GTAJXTRBWIBVXCS" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\SMFLSDERWOWKVLH\service.exe" /f
                            13⤵
                            • Adds Run key to start application
                            PID:4252
                        • C:\Users\Admin\AppData\Local\Temp\SMFLSDERWOWKVLH\service.exe
                          "C:\Users\Admin\AppData\Local\Temp\SMFLSDERWOWKVLH\service.exe"
                          12⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:556
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempYXTTU.bat" "
                            13⤵
                            • System Location Discovery: System Language Discovery
                            PID:4060
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "PKILAOVFQVFSDBG" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\GQHESWIJGPBHMCO\service.exe" /f
                              14⤵
                              • Adds Run key to start application
                              • System Location Discovery: System Language Discovery
                              PID:4664
                          • C:\Users\Admin\AppData\Local\Temp\GQHESWIJGPBHMCO\service.exe
                            "C:\Users\Admin\AppData\Local\Temp\GQHESWIJGPBHMCO\service.exe"
                            13⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:652
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempADSXJ.bat" "
                              14⤵
                              • System Location Discovery: System Language Discovery
                              PID:2684
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "MDNTLCBEFTBPOAI" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IWSAVYXLPUBCIAF\service.exe" /f
                                15⤵
                                • Adds Run key to start application
                                • System Location Discovery: System Language Discovery
                                PID:1144
                            • C:\Users\Admin\AppData\Local\Temp\IWSAVYXLPUBCIAF\service.exe
                              "C:\Users\Admin\AppData\Local\Temp\IWSAVYXLPUBCIAF\service.exe"
                              14⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of SetWindowsHookEx
                              PID:4168
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempRNBMV.bat" "
                                15⤵
                                  PID:3316
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "YLCPLJXOAOQLEHI" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DLDVMJEXNOLUGMR\service.exe" /f
                                    16⤵
                                    • Adds Run key to start application
                                    PID:4196
                                • C:\Users\Admin\AppData\Local\Temp\DLDVMJEXNOLUGMR\service.exe
                                  "C:\Users\Admin\AppData\Local\Temp\DLDVMJEXNOLUGMR\service.exe"
                                  15⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3216
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempFFYOJ.bat" "
                                    16⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:464
                                    • C:\Windows\SysWOW64\reg.exe
                                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WUCDOVLJNIQEFYW" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MEUDLAAVBRMHBGV\service.exe" /f
                                      17⤵
                                      • Adds Run key to start application
                                      PID:1672
                                  • C:\Users\Admin\AppData\Local\Temp\MEUDLAAVBRMHBGV\service.exe
                                    "C:\Users\Admin\AppData\Local\Temp\MEUDLAAVBRMHBGV\service.exe"
                                    16⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2696
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempKSFLQ.bat" "
                                      17⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1008
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "RQCKCTLHCSMNWMN" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FBWPVNEOHGIYUVD\service.exe" /f
                                        18⤵
                                        • Adds Run key to start application
                                        PID:4252
                                    • C:\Users\Admin\AppData\Local\Temp\FBWPVNEOHGIYUVD\service.exe
                                      "C:\Users\Admin\AppData\Local\Temp\FBWPVNEOHGIYUVD\service.exe"
                                      17⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4480
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempOACFX.bat" "
                                        18⤵
                                          PID:4584
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SKGBRKLUYKLJRDK" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\HUQTWVXJNSAGDRR\service.exe" /f
                                            19⤵
                                            • Adds Run key to start application
                                            • System Location Discovery: System Language Discovery
                                            PID:4664
                                        • C:\Users\Admin\AppData\Local\Temp\HUQTWVXJNSAGDRR\service.exe
                                          "C:\Users\Admin\AppData\Local\Temp\HUQTWVXJNSAGDRR\service.exe"
                                          18⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1424
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempYXFGP.bat" "
                                            19⤵
                                              PID:4444
                                              • C:\Windows\SysWOW64\reg.exe
                                                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HWXUDEPVMKOJQFG" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\WYOIBGNXNSKSGRH\service.exe" /f
                                                20⤵
                                                • Adds Run key to start application
                                                • System Location Discovery: System Language Discovery
                                                PID:3880
                                            • C:\Users\Admin\AppData\Local\Temp\WYOIBGNXNSKSGRH\service.exe
                                              "C:\Users\Admin\AppData\Local\Temp\WYOIBGNXNSKSGRH\service.exe"
                                              19⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of SetWindowsHookEx
                                              PID:4144
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempIJSOC.bat" "
                                                20⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1224
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "AWVMCQMKYPBPRMF" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\TWLFELUKQHYPDOE\service.exe" /f
                                                  21⤵
                                                  • Adds Run key to start application
                                                  PID:2692
                                              • C:\Users\Admin\AppData\Local\Temp\TWLFELUKQHYPDOE\service.exe
                                                "C:\Users\Admin\AppData\Local\Temp\TWLFELUKQHYPDOE\service.exe"
                                                20⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1620
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempNLPKS.bat" "
                                                  21⤵
                                                    PID:4312
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "BDXTOCYJEIYWFRX" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DRNQTSUGKPCAOWO\service.exe" /f
                                                      22⤵
                                                      • Adds Run key to start application
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3616
                                                  • C:\Users\Admin\AppData\Local\Temp\DRNQTSUGKPCAOWO\service.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\DRNQTSUGKPCAOWO\service.exe"
                                                    21⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:3876
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempENEYC.bat" "
                                                      22⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4956
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "UGDHDKWAXSQATIW" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\GPGYPMHBBQROXJP\service.exe" /f
                                                        23⤵
                                                        • Adds Run key to start application
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3636
                                                    • C:\Users\Admin\AppData\Local\Temp\GPGYPMHBBQROXJP\service.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\GPGYPMHBBQROXJP\service.exe"
                                                      22⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:4080
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempKWSQU.bat" "
                                                        23⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:996
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "AFTTGIDBEYTHOJN" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\LOEWUDXMCIAQHGR\service.exe" /f
                                                          24⤵
                                                          • Adds Run key to start application
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1508
                                                      • C:\Users\Admin\AppData\Local\Temp\LOEWUDXMCIAQHGR\service.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\LOEWUDXMCIAQHGR\service.exe"
                                                        23⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1420
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempKLUQD.bat" "
                                                          24⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4584
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "CYXBOESOMRDQTOH" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\VYNHAGNWMRJRFQG\service.exe" /f
                                                            25⤵
                                                            • Adds Run key to start application
                                                            PID:3128
                                                        • C:\Users\Admin\AppData\Local\Temp\VYNHAGNWMRJRFQG\service.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\VYNHAGNWMRJRFQG\service.exe"
                                                          24⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:4808
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempHPHBK.bat" "
                                                            25⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4180
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "KGDUSIIKFCDMIWV" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\ESOQUSVGLQDAPXP\service.exe" /f
                                                              26⤵
                                                              • Adds Run key to start application
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4408
                                                          • C:\Users\Admin\AppData\Local\Temp\ESOQUSVGLQDAPXP\service.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\ESOQUSVGLQDAPXP\service.exe"
                                                            25⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2616
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempSYEFC.bat" "
                                                              26⤵
                                                                PID:3920
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WDMVTEAYLEYFVOR" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\VPHNUGGTARNXOJI\service.exe" /f
                                                                  27⤵
                                                                  • Adds Run key to start application
                                                                  PID:3340
                                                              • C:\Users\Admin\AppData\Local\Temp\VPHNUGGTARNXOJI\service.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\VPHNUGGTARNXOJI\service.exe"
                                                                26⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:456
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempCUYTQ.bat" "
                                                                  27⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4420
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "XLMHFIXLSBNSCOX" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DMWEAPTYFGDLEJX\service.exe" /f
                                                                    28⤵
                                                                    • Adds Run key to start application
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5044
                                                                • C:\Users\Admin\AppData\Local\Temp\DMWEAPTYFGDLEJX\service.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\DMWEAPTYFGDLEJX\service.exe"
                                                                  27⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2720
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempACQML.bat" "
                                                                    28⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4984
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "YUIVGFJWXAKQXXI" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\TWMGELUKQIYQEOE\service.exe" /f
                                                                      29⤵
                                                                      • Adds Run key to start application
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3612
                                                                  • C:\Users\Admin\AppData\Local\Temp\TWMGELUKQIYQEOE\service.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\TWMGELUKQIYQEOE\service.exe"
                                                                    28⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1580
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempPNSFJ.bat" "
                                                                      29⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2512
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HODEWVDEXNIRIGR" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\LHVTJUNLOEJXWIQ\service.exe" /f
                                                                        30⤵
                                                                        • Adds Run key to start application
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3220
                                                                    • C:\Users\Admin\AppData\Local\Temp\LHVTJUNLOEJXWIQ\service.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\LHVTJUNLOEJXWIQ\service.exe"
                                                                      29⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:4028
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempCUYTP.bat" "
                                                                        30⤵
                                                                          PID:4540
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "XKMHFHXLSBNRCOW" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DMWEAOTYFFDLEIX\service.exe" /f
                                                                            31⤵
                                                                            • Adds Run key to start application
                                                                            PID:4432
                                                                        • C:\Users\Admin\AppData\Local\Temp\DMWEAOTYFFDLEIX\service.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\DMWEAOTYFFDLEIX\service.exe"
                                                                          30⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetThreadContext
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:4000
                                                                          • C:\Users\Admin\AppData\Local\Temp\DMWEAOTYFFDLEIX\service.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\DMWEAOTYFFDLEIX\service.exe
                                                                            31⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:3816
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                                                                              32⤵
                                                                                PID:1192
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                                                                                  33⤵
                                                                                  • Modifies firewall policy service
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Modifies registry key
                                                                                  PID:3920
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\DMWEAOTYFFDLEIX\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DMWEAOTYFFDLEIX\service.exe:*:Enabled:Windows Messanger" /f
                                                                                32⤵
                                                                                  PID:2312
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\DMWEAOTYFFDLEIX\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DMWEAOTYFFDLEIX\service.exe:*:Enabled:Windows Messanger" /f
                                                                                    33⤵
                                                                                    • Modifies firewall policy service
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Modifies registry key
                                                                                    PID:1876
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                                                                                  32⤵
                                                                                    PID:2452
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                                                                                      33⤵
                                                                                      • Modifies firewall policy service
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Modifies registry key
                                                                                      PID:4908
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\service.exe:*:Enabled:Windows Messanger" /f
                                                                                    32⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:3724
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\service.exe:*:Enabled:Windows Messanger" /f
                                                                                      33⤵
                                                                                      • Modifies firewall policy service
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Modifies registry key
                                                                                      PID:1392

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\TempACQML.txt

                      Filesize

                      163B

                      MD5

                      d31a68da3485c625bac4ed229893269d

                      SHA1

                      4ae2e3e3e724e2c9bb564ef2a79ac8951d0f9645

                      SHA256

                      009657391d332655c29c95bb7af06c3190ba1d35a0870ba5b827b72167096574

                      SHA512

                      c99256691cb2bdea9dca38d1b168bc36e8bd3e309b5d44e0be236372816ba3c2028c3cc1cb5c51c9110520b0cd76f8ca8ec57055199035fc13f32d228205c83f

                    • C:\Users\Admin\AppData\Local\TempADSXJ.txt

                      Filesize

                      163B

                      MD5

                      e8505431637028ceb2779f8bf990d7bf

                      SHA1

                      1827ff8626158e982611b8f53380f02266bb027c

                      SHA256

                      cd0722ed86358f34386e1d5bb74c109db375a417387927fa795d342d4051136c

                      SHA512

                      4357587b94e2d23300bae114509a7964e68805f6b3fc8f026d3db19a93e6a46b772c9bc1a711b6cdcb52ee33758e78e95c5012c2c120339f7734508f5beb9cb0

                    • C:\Users\Admin\AppData\Local\TempBRSPX.txt

                      Filesize

                      163B

                      MD5

                      d3213841806caceea777ff87e0167695

                      SHA1

                      31bd92efa6ab0d27ad6cb690b425db8e167528b5

                      SHA256

                      e1ff61f68aaf669aedce7ec0f607bf6755ff98f3f7f0369a5dfe40b415281a2f

                      SHA512

                      f49b894249b54b486d1a90402e5415621eb0a7c8eeff2c4d3bdc43166cbc2ddad0bbd969ebd6d67ddd9a33f38bff7d2ea997ecaa907e3e4e31a98571071127bf

                    • C:\Users\Admin\AppData\Local\TempCUYTP.txt

                      Filesize

                      163B

                      MD5

                      08ea9b0793b821c5dd895aac5ca0e326

                      SHA1

                      b9eac1ef591128a43725fd1d4f525b797b2cc2df

                      SHA256

                      41c44fd2715d67ffa4cab875cf4dcd75ca4b38abb402c26fe7d89458a4581293

                      SHA512

                      b77ff1a7904295fe98ec0b5173f9f766da7fa24efee8a64f119e660b5739e8a50f8bb0b15da1385804dfa754d493c54d8487cf0a2efbe885ba961251cc813d64

                    • C:\Users\Admin\AppData\Local\TempCUYTQ.txt

                      Filesize

                      163B

                      MD5

                      46f19fd0c708b38dcea1eaf6a92f0c50

                      SHA1

                      c48b7c70aba151004bd4bfecd6888c3a7bf628e4

                      SHA256

                      3ccc4288690f3ace49bfcfd1faaa011fc300f00cddedbba9004d1750e08fa966

                      SHA512

                      fe08992afbf445b47ab9c052c12bb75f6916b2ee6b28fa6af4668cec15afa0d484539f78ed01fa70a45084128e9401c1b216dd024afab0d70be8548be2bc7653

                    • C:\Users\Admin\AppData\Local\TempDGHQM.txt

                      Filesize

                      163B

                      MD5

                      c1e9cc859b16b9aaf13c7abbc8695e56

                      SHA1

                      fb49c82be270cefd43f9154a833d9f1fd2b811dd

                      SHA256

                      fd1db65b4c055373a0a760d16e5e68b96b8d83802200465c0c07a43eb6050027

                      SHA512

                      dd2803c4bb852df4f419bfd558036ab6503de0b5883719540b71b7d134fd9eae0e1d3fd61add84ae9203c08af3f3483d18e23c122af0f408e5382b0b831d2114

                    • C:\Users\Admin\AppData\Local\TempENEYC.txt

                      Filesize

                      163B

                      MD5

                      450df8792ce97b3b149ee477a338f126

                      SHA1

                      5ed11369cc5067502ff2e23e0fba08508ac08e85

                      SHA256

                      5bcbd88e62ecbb95519094c7fe1966d29d68cdce5c2ad72fb3ff427b4b598624

                      SHA512

                      cb16108bc5c8dfc4e092b71b448505353b2a5bd103f436a88bb7d0705b61717a1a38eac618927d27e61f62af07facde2bafe77d616950c29477968debbf870b6

                    • C:\Users\Admin\AppData\Local\TempFFYOJ.txt

                      Filesize

                      163B

                      MD5

                      f3719e263529fa662715cdd85fec8596

                      SHA1

                      6148a2364029aa9781f6f2d6143ad2b060483be5

                      SHA256

                      ee5e309ba64eb2c3b5f807c6b026a982ffee23b8bc50a9e3184b80e04275c9fc

                      SHA512

                      749de53bc273ea7004970b838725bf7c612d34254ed1ab6d5af5bb83518865a34ab97cb0a47a9804b60ba8a18c0fcdddc19f8e679f940ea04a2c72b747dc609f

                    • C:\Users\Admin\AppData\Local\TempFGEME.txt

                      Filesize

                      163B

                      MD5

                      9ad31f63c61d7346f4c43878045ffec2

                      SHA1

                      3b1ec0a1d60a4088d6081308864f5e740159080e

                      SHA256

                      954d8e16ef3604f9bdd397b77cc9a44263164f591dc392d6490df2369fe79b2f

                      SHA512

                      4cfe6ca028a44e9d57ab0f192de5092c71dd06a5178c8887057d09f787c79d3c1f5a2065b75f71450d7eec70897ed47672b13bc5c771669764a2f640c71702f2

                    • C:\Users\Admin\AppData\Local\TempGUCQP.txt

                      Filesize

                      163B

                      MD5

                      da2da4db20b9c85b0ba6636edc06c00d

                      SHA1

                      92893883053fd258f00f4fbc5308e53fd3c785a7

                      SHA256

                      8fcac993078b5faabc185c771380087092f93e72411ce0cbeada60351e0d598a

                      SHA512

                      14d1c25f6c74bf4b05bbce3c69c7463933d7d0fe9dab4cd022842b5c9623864cf8dab2be444f620024670d89dff16c13fd1a3a908532333778c49e33549a9474

                    • C:\Users\Admin\AppData\Local\TempHPHBK.txt

                      Filesize

                      163B

                      MD5

                      8506c3afdc08f02c6faaf2a2db024105

                      SHA1

                      131df5fa44be3c51c24326e0a7c24e894b78a053

                      SHA256

                      0e56f8c609148994ddccfbef8ebc13b6453c83fcc1ed41638403b8c4d599ca37

                      SHA512

                      c13a347a4e2fd5936517a342a74f1019735c7bee46c2b74511a10d194a0bd452496ae3d536da233e957ddf9f2cb34e79ee425f2a4de2f13e6af1b70520b2ca5a

                    • C:\Users\Admin\AppData\Local\TempIJSOC.txt

                      Filesize

                      163B

                      MD5

                      053b51eae04a6363b9e65a4032cc7a28

                      SHA1

                      23feb7c605b2844dc2fd81c3913a9f29e4729373

                      SHA256

                      a06777194667f0a0f210c26b5c9389bac9fcfdd76883de805d92aa5a05315b2f

                      SHA512

                      698597e9c0155dc5dec76f91de9a536c7f213b7c7383c6981b1804a899f9117943b16dbda3b0ecf531853332beab8a083431fcc44b251204692e12472f716ab2

                    • C:\Users\Admin\AppData\Local\TempKLUQD.txt

                      Filesize

                      163B

                      MD5

                      6a401fac14448a283b090176a53a6b0a

                      SHA1

                      d154a2cb98ece0bbe8a6f2d73a905132a15235a3

                      SHA256

                      25b5dfefe526d611b4e691a065a0a720f6ff92ec69dfb886fa4120c3d224818f

                      SHA512

                      4c2308e6af81edcce42193761419bf3017336aa6858191b30bc2342128273deb45486b44874813e5182715b6b7e472874db8a4d3a9343ea3dce1c94c98434887

                    • C:\Users\Admin\AppData\Local\TempKSFLQ.txt

                      Filesize

                      163B

                      MD5

                      b26c8cc3ca5f915507cdbd939df6cd98

                      SHA1

                      41df0368c5141d0135229e8b792c94bc18980b4f

                      SHA256

                      f524ba0a509958fd34d65982d56b0c0da42676ed927bc88e19ac90a611b839a3

                      SHA512

                      57278b1b8023f38c0da26b937adf984b850efc224b9a1f73731a80a69e3235bebff9ed8c5d1b6a725ff89aa887f2b13bf5af20a3dd6eec7efff4b3ca9afee655

                    • C:\Users\Admin\AppData\Local\TempKWHGK.txt

                      Filesize

                      163B

                      MD5

                      7d91fbae34e3b22b8ecd08e9589faf4e

                      SHA1

                      c0a663f1ed8b2c31fa3e07ff9ea2beb36b14d2b0

                      SHA256

                      c415e6c0545dbab68eb36e8ed2726658f1b06c18c2210c28cd87a5ea6c461590

                      SHA512

                      3202b819a02005b4de6c990c4235904cddb05f3a20c3549ebdb7016ecd4bcdb4f9976ce24596c26154bac6f6e6133cdcffa4f468f67465507baf3e3eefefbae7

                    • C:\Users\Admin\AppData\Local\TempKWSQU.txt

                      Filesize

                      163B

                      MD5

                      de91ea33ca4a8e1a874454fdfec5e312

                      SHA1

                      3af287b5230dde3d44b6f32286fa8725d94ee00f

                      SHA256

                      c349090f80247ec2a98b77cd05d50bfac2a05c22c29b8e3eb0d7dc256fe29f81

                      SHA512

                      187f3de5ed575f9a96bffc908eaaffd25cc5731647a02290f005558baa43a744a85cc5ed142b45fb69403ace9f4b17a82ad6f2dcd568a0e27e38a8b397a85992

                    • C:\Users\Admin\AppData\Local\TempLPQVC.txt

                      Filesize

                      163B

                      MD5

                      2934c1cd715b076e4de9967cce3f9b17

                      SHA1

                      fdbb5daa0e7a39fda2dcffb164215a3b0e74f955

                      SHA256

                      bb12a4465fe3c466fba0b4ffcb70c46241616110351d90d4d750b28702148ac2

                      SHA512

                      8ac735c8e6bf99d95fff5cd07bbef130a42d1bc4b4ece99f1413548e629a45563f6e16f6fa07574eb5d6dde60d1dd7f0208bf423b11359ab30ad529ede57fe42

                    • C:\Users\Admin\AppData\Local\TempMPQWC.txt

                      Filesize

                      163B

                      MD5

                      3aa66717fe1890e4085403eb810d29b3

                      SHA1

                      d8f2d0ac14c84a58a54d09adbb68a3d72df92bed

                      SHA256

                      13699c0be9d2040018c11108589b2be7a2bf877aec3fecdd015e92f5d1054671

                      SHA512

                      6d44cd6fc744ee57c66f3905d463a3a6f4a9f21667d2c72fd50777aa56bb52d8632908558dc33c7d04ca56a052add1970b3caaaeb9d10fb08d3fa3edfad344b1

                    • C:\Users\Admin\AppData\Local\TempNLPKS.txt

                      Filesize

                      163B

                      MD5

                      7e488893ead94784cbfdb3cad2be1267

                      SHA1

                      e179fa18b240c727b240a45d068e0eefb474c166

                      SHA256

                      4a63114693dfd3e67f87986e7bb37d64c885329c0817c3334b10ae87c5143cac

                      SHA512

                      2ecb16b534c6209b89d2f1cab3c7957d914228ac4c2bf9d3057150835c8b02638a25fa5350cc2d0059af153bffbf0743af9f08e0ded6418660079f0e9162ffa7

                    • C:\Users\Admin\AppData\Local\TempOACFX.txt

                      Filesize

                      163B

                      MD5

                      5409b5fe067eff7e02a38c3ce47ade86

                      SHA1

                      206bd87521316ecad95022b5ffb09d19d19e28ee

                      SHA256

                      6bae98d721fdda2048e1b02261b9222fa249ce7f4c22f43ec4494af23b463414

                      SHA512

                      388916143217cf5e7542ea7ccaa2472f17ea3c237eab059831b7073e8cd6b827f1e88c0bc98603d94b553c532b334ebb0438f4b881b6abea8fa59770feefa4f3

                    • C:\Users\Admin\AppData\Local\TempPNSFJ.txt

                      Filesize

                      163B

                      MD5

                      c0edc66b457ed702751323675f9e41c0

                      SHA1

                      2afca3bd12c044a43da495258b677b4f6dde20be

                      SHA256

                      ca31a05bbf0e08aec98dcad00e194198a3deec6bf2eb31d9d0f8b59aa1051281

                      SHA512

                      fba94087087be02529828d95455c3915d7f16e79ae715e754397b19bc12bf11cf0dfe1958411e35c76ec8ed015de29a9080a08f59231285b4c069be09f528069

                    • C:\Users\Admin\AppData\Local\TempRNBMV.txt

                      Filesize

                      163B

                      MD5

                      0a66f3ef877543b735ac3975aac4f1d9

                      SHA1

                      1cb758fa73bc7310712b319ced995011c213a8fd

                      SHA256

                      d02abd7badf6a6feefd824e4d31afc5ca3ac90e520c25a33ac0e23bb2b099323

                      SHA512

                      941224ec57e97301c9406d3184babe326d4d1c4232127a7d4eaf26a173f17c68f08a9e82059148394376e09b0efb155cf42130bbe865d7f65bbc57d5c4b00057

                    • C:\Users\Admin\AppData\Local\TempSYEFC.txt

                      Filesize

                      163B

                      MD5

                      28c24a343f70d490fc8f69dbc2484456

                      SHA1

                      f68463620b1fd8d538c92ae77aeb8551ddf321a4

                      SHA256

                      1f0da84ecad4d62c31518eca826c46fec9900f135c059c5e69f7573ba4fa1fae

                      SHA512

                      1781ea0c79a8510c2ed3af903c73455f3499f8ccf8a9ceff262ecb1f016d2035f8738419c4938cbdefffe5b59b9d0ac9d37b927fae4773a19537144eac321a5b

                    • C:\Users\Admin\AppData\Local\TempUJXFN.txt

                      Filesize

                      163B

                      MD5

                      5b7187ecd6398d75f46f2eca3fbcf074

                      SHA1

                      f92fc0f33830567906e6893c20a66e36ebe1d797

                      SHA256

                      d232b12818539833d1ba406d271601fbd78b61c0e50915595228586dc2a2e6a3

                      SHA512

                      a9daadc971328ccc826875a0b4bcf37a0f3aae40eaeede069fbf08e4ad3efb0083425610684499a70d721c01c1ddc0a7626e2cbaf9e0e1a7fedc63cc6c8afdb6

                    • C:\Users\Admin\AppData\Local\TempUQYPE.txt

                      Filesize

                      163B

                      MD5

                      5a4384ad153eee40e71481f1b84e2979

                      SHA1

                      c4f6eaf1a1a7e034ead8fb98d9f946ae66547733

                      SHA256

                      e24020f861db2b12a14f5de1030b174886ce889fe47e68fa46f555d2484ec935

                      SHA512

                      68a15ebf11eb0c7e315606916b9e3420d6bdeeb4cb0ec9b822fa629bd0ecbbba379c81b966ce5c686f7d47b51dc9d1752faf4ded1fb3c3b3ec11aba06258cf09

                    • C:\Users\Admin\AppData\Local\TempUVHIF.txt

                      Filesize

                      163B

                      MD5

                      c612bdf9e59b062a01bc9550b67d4322

                      SHA1

                      9b22839c78ba43f6d57e00a0aefba11edab91ceb

                      SHA256

                      084ee87bda829113625fd1087d234dd3e538187cc69780f6d0185659f67560b6

                      SHA512

                      aca3eb8da86bad82b12cf8a1ab06db5a82cfd4fc185fd329276268af7572b84de29d85648475ec17fe4ff66fd1c7172db78c1541c9e5cc339394927759851c9d

                    • C:\Users\Admin\AppData\Local\TempXIACQ.txt

                      Filesize

                      163B

                      MD5

                      471eb1050dfb01e7204011b0b79ad7fb

                      SHA1

                      bbd6a22dce8422c708f486cfcca371c4830b364f

                      SHA256

                      7747882bb31496edb9a0f7954c9d6595d73e59b32c41d87de343e02be6a9f78e

                      SHA512

                      4ccf51e24882e4d99fed33ceec4390a3d7810ce19ab9869db7719cf68e917d52a26ec2fe44e52698bb652826de79b8d5eced1cf01e21d012a642ba041e837593

                    • C:\Users\Admin\AppData\Local\TempYXFGP.txt

                      Filesize

                      163B

                      MD5

                      534a5a9a08499c8112430066acd3f32f

                      SHA1

                      5e4b2ea4b3c026d710cd862cedc58e9a4ad3235e

                      SHA256

                      d7b2951ffac14cb21060566ccb4d395744b83685aadd1bd205355e119b68661c

                      SHA512

                      a8c6612fce49e11b06dfdd30d712ab912505bf3fa6e270accca1f3b823ea87917afe04dfe7d843b202303d47bcb4a3b7e98a209ee83c99f4276e89e56725bfdd

                    • C:\Users\Admin\AppData\Local\TempYXTTU.txt

                      Filesize

                      163B

                      MD5

                      b02893b7e1264e03427657ad7e8d60cc

                      SHA1

                      67a83d11cabb1a5b009643c45f8dd03f84b36b69

                      SHA256

                      b23e099f605d205a37e7d6817808f1fe52c00187c831f87488f66936efab9ac0

                      SHA512

                      17ee8dedf20937b83758dc7dff8fcb0d03468d724923870c49be71c25e5382e9521fd35b744d0481ea3920e1af36f851f60b46ce3b15f39a51adfa963152b187

                    • C:\Users\Admin\AppData\Local\Temp\DLDUMIDXNOLTGMR\service.exe

                      Filesize

                      520KB

                      MD5

                      87df7ce0e57ccfe26c5fe4b5c5d6f979

                      SHA1

                      5904a120a4df02e8625cf8202421dc757eaa6eeb

                      SHA256

                      e50a5f809fd1ca0e5773f8c707e053406b53716a928d2f78c6c825645ea331a1

                      SHA512

                      ec59b8d3912fae70242bd5bda31730a81e082f28ff85bcf8d8269260dc233a9ca141714d847a8e2860cb09c48914c81606a933e05c9cf6c2da81778ac1438d5c

                    • C:\Users\Admin\AppData\Local\Temp\DLDVMJEXNOLUGMR\service.exe

                      Filesize

                      520KB

                      MD5

                      e9e33575cd86b258e0201ab2d3be44e4

                      SHA1

                      3bdab4cbf3d6263696a0470964891336da2024bd

                      SHA256

                      8be60075706d3a441d3b42377f54ff2dcb9ca83000ab4d8dd19add740a4e3d15

                      SHA512

                      e715101d45df71e954ad4360893bd499028ddb598b949134abc809ce60c06fb3c52708920672c496757fc678dfcc3b1e7f8a76713f63fc33ae29b5f3ba9b6ce5

                    • C:\Users\Admin\AppData\Local\Temp\DRNQTSUGKPCAOWO\service.exe

                      Filesize

                      520KB

                      MD5

                      9691e005a8dd54141f6ec4fb0575c1b1

                      SHA1

                      7c3e5aadc7a920de2225c2f433b665bb5cdce619

                      SHA256

                      a45d50eac7b75ed52efbecec930415d1dd2a6573519017d5bc3699ec77591a3c

                      SHA512

                      a007618b87068f62f6d89aacd9e544ed016254ca1e7578bce44705aa94314fa29f888a5c16356bf59ca7da44197f1c987bbcf7c0ec576201a1cc828465a338c5

                    • C:\Users\Admin\AppData\Local\Temp\EMDVNJEXNOMUGMR\service.exe

                      Filesize

                      520KB

                      MD5

                      86c0003fffa0d4e849c58797a9c9f4d7

                      SHA1

                      be94afaf505810a858b7e32ce9b55b9ae33685bc

                      SHA256

                      374fcfd0c51055a0ff8e2828f6aa51a6953157e7a697a034846c47a02f32ff62

                      SHA512

                      267af8189642299362c8cd5bb53e61a37e3431e8aed86d5a3ada89308b1e07ad1bcd9ae2cbe4e52bc1f2cd4f5bdff9c1cb7c38eb56b883152379f3d284949124

                    • C:\Users\Admin\AppData\Local\Temp\FBWPVNEOHGIYUVD\service.exe

                      Filesize

                      520KB

                      MD5

                      e0f9dd8d5154117681e0b2939cc6c3ff

                      SHA1

                      71764232e07d0dd55c44b4b8197daa80d3fda326

                      SHA256

                      172ee6d832c26b6b47bc2de0f6409e190b9a3570e7844930ca4f753a6912b06b

                      SHA512

                      7c99aea98b0e69f3b082c00dafd254ebae026ada7f7347206d1987be501d6fe2828df65538e695408c9da936dcf0009a4ef06945a99e32e3880b607c3da0d288

                    • C:\Users\Admin\AppData\Local\Temp\GPGYPMHBBQROXJP\service.exe

                      Filesize

                      520KB

                      MD5

                      9aad5cbb881327a1df7259beccb7f5dd

                      SHA1

                      c441a3c6f05331944956fb661357fdbbf6e9c743

                      SHA256

                      3ac6c49944591d88a80ef75c50d2b0105eace4f9f2d3426aec69dd8e56784f64

                      SHA512

                      17a2b832c3f2e0da8e03400a0bde1b14ad9f568cb6614b8dab1e48b04f8dba12569948058a06e750acb34323a0f547cf39e53d3e5e251ecea882a04e6c1c3493

                    • C:\Users\Admin\AppData\Local\Temp\GQHESWIJGPBHMCO\service.exe

                      Filesize

                      520KB

                      MD5

                      796f3e1a5516af61fd19718a18e89203

                      SHA1

                      7c9a0650a49a5d8d03fde8623ae0ed6dc4964339

                      SHA256

                      606356ec049f50c020ffa672fedaabbec13fff7a9eb932b5a805aef5af86fe17

                      SHA512

                      9d53600166c10729f798591525e59a126082f66b4c70aa645ec241536cf0b58e5e62927712669bbde9e61a6e979547c593fd50cfeacd0dafea9ceeed31890fe6

                    • C:\Users\Admin\AppData\Local\Temp\HJVVWRQWSIVDMDX\service.exe

                      Filesize

                      520KB

                      MD5

                      435b43d3d20243096dd1a7d4f369b0bc

                      SHA1

                      cfdcb9ab7eca91c0ebd725fccc70cdc92424aa40

                      SHA256

                      0bdb82f72927add44603343a8784ffdf8181dd892d849b3b092ff6a54462b2af

                      SHA512

                      b02b9c3e4dc8b6860424e3115d50fb06ebe53d5e0d7eb0d0bfe4da58be7bf6567204cbaa0edc290374b3a125aed57a329cb7e62f41b41c7f8db12e58be202c85

                    • C:\Users\Admin\AppData\Local\Temp\HUQTWVXJNSAGDRR\service.exe

                      Filesize

                      520KB

                      MD5

                      6b08bfad03b4d985ea0b2a76212fb4ec

                      SHA1

                      38d688d3b46f80342e9ae08297c0a7eef16f919c

                      SHA256

                      9e54c0116517a2553e5334e8beb086e9fc745488090c40c7f81622de14e68126

                      SHA512

                      8149eb0315ce90f9844894527074550c68c9683e10dd2e042f6c96f76839d64b4db31db26cc919c4a081eed89fe68573ef76a35103cddc25872b08afda408a2a

                    • C:\Users\Admin\AppData\Local\Temp\IWSAVYXLPUBCIAF\service.exe

                      Filesize

                      520KB

                      MD5

                      2217d85a853e5774d7a9af569454cb25

                      SHA1

                      3ca641de270a0cf35a4045f34f441a621d84195c

                      SHA256

                      82ffd6b80de8a0648d4104962e07d70ae134dc2454aca3c0d4c81c76e48c7a2f

                      SHA512

                      3877f43c76b874467b9c2853abcd84c94940b7e6588d35231998a0afde190c17ddd1a88726c70c3b9d0526073ae91e5461e5b19d07646c1b4aa19780353f75e5

                    • C:\Users\Admin\AppData\Local\Temp\MEUDLAAVBRMHBGV\service.exe

                      Filesize

                      520KB

                      MD5

                      4ffc0035013511f9b0ce1b03c2ad2d49

                      SHA1

                      2142dcf2ab1758af505f3eabc6dc0a34e6f38f2e

                      SHA256

                      4be2776aed720479f939bd8db2894b3fd2a8954d52ebd8ed2ec4ae8d7d0f7085

                      SHA512

                      93f267cfc96c93d69998101373729b2904887295bf71ead2c8b4bcbe59bc696bdcf5174248a5ef0fed1ed644b2a17d2a14d0e914bbcbc4cc06e882b949b6fbd7

                    • C:\Users\Admin\AppData\Local\Temp\QJIQEEFAFBWRELG\service.exe

                      Filesize

                      520KB

                      MD5

                      e9b600601a32ec1691bb6040fcae505b

                      SHA1

                      f3c584e7ca5aa3b4a5138fc1bba663ca1fad669a

                      SHA256

                      e7ac219dc75fe5ff0223a64469fe35cd848c56bb0302af7151555193821fb72f

                      SHA512

                      dcee72575dddf8bc7607a83eea4029f2d3debb49fbefd25e5b9bbfef346b952d658824e45d9c1e601adb81ec7fe8c33e1977149586c4f39952a4ac5f2db3c4f9

                    • C:\Users\Admin\AppData\Local\Temp\RUJDCJSINFWNBMC\service.exe

                      Filesize

                      520KB

                      MD5

                      4e0ce3f9c984f34f64970e1ddad574b2

                      SHA1

                      5f1c4d4b9cfd3c97ac84a14c7835de6b2f3d4770

                      SHA256

                      1037e3681f816830de0506db70463b7c8ab6b5281d7a06fc8df39a28114c5a18

                      SHA512

                      a1b5b8c5fe5e220cb6fe72afeb00d034e634f86305debf710cd86ed334e4e3a05026b7f4d367cd3850b9f289e99f31eab7ac05628782243ddbfc539ad78f4a51

                    • C:\Users\Admin\AppData\Local\Temp\SLKSGFHCAHCXSGN\service.exe

                      Filesize

                      520KB

                      MD5

                      8c181c308fa6eae229678f770f855f1a

                      SHA1

                      7f33131c9416a401947bf45b843b3e18dc914487

                      SHA256

                      69f1f91363792e98166e762c7be6ed00c20e8c96956e8f1a6efafcb978fe1f3c

                      SHA512

                      bd55d9316ce36e8d7c7318075844531d32e793c1e29a266700f471256012cce495a2ff329319c04da30623c2a60677d09aa6761fb63aa4d509dac46ae8e4b081

                    • C:\Users\Admin\AppData\Local\Temp\SMFLSDERWOWKVLH\service.exe

                      Filesize

                      520KB

                      MD5

                      2db7d74dc776ab997cbd297bae34e46f

                      SHA1

                      570751cf0afcc0c818e11fced0c7c9a25b6f71f7

                      SHA256

                      ed8513034ec171cd6a328c1b6af67c9fabe8ec95d76625ac78955dcfba1a6e49

                      SHA512

                      9aa0ed1d9b86bc98219ba3b0c99efa1f8941a83805246638be6cf1455e0b632af13a3ac8a7f282dd25d1e3bf400d2625c00b624bd0ae0280b956f67c3780a8dd

                    • C:\Users\Admin\AppData\Local\Temp\TNFLSDERXPWLVLH\service.exe

                      Filesize

                      520KB

                      MD5

                      a8def4b05200185b59a93d42e165f858

                      SHA1

                      ca9cae57932c97c724afb65808f2c8bd7adca387

                      SHA256

                      46b1481a76f5d376158ab01aaf681847a38aac37b3030e02e046f5af3dddef46

                      SHA512

                      93c70f6a12e21f69a819475a0d465a1e44c2d079d55df785756aac7e52bf69cfb873b3c4a1bb32d7de4a13c4fc1dc5ab5fb81c03a65285a69474c1b5341eb2a5

                    • C:\Users\Admin\AppData\Local\Temp\TSCONPKIPLAOVEQ\service.exe

                      Filesize

                      520KB

                      MD5

                      30ef6d6768187c02e21a7ad2d42f8d76

                      SHA1

                      5b3ad781b4ea483b6e206ff180aa4e2030cc6746

                      SHA256

                      018902ee3697b7b17e90f792477130e2f7d74f4d4cd121c224287dd1a78ea84e

                      SHA512

                      3b0475893da8848087301daf8b3269e3a8cb1fd08ec0fb7dfe4560842252c25f098c19e6ac88f6cf70d2ed7903d6a4979b9a55513186a1999197ec3060655c2a

                    • C:\Users\Admin\AppData\Local\Temp\TWLFELUKQHYPDOE\service.exe

                      Filesize

                      520KB

                      MD5

                      72e34f84232ad3759734de2131cc87ed

                      SHA1

                      8f109f2396e23a8095d242f252dbbabd255b65df

                      SHA256

                      99c2f08a59f8026ea527e55cb599e0b6effec5bbebc5eca636e2b76a4472816e

                      SHA512

                      95b1fd82b9225df38b9512e58dadda0ff04fa3239c1542e784ad7a6e5544a4e27605283a3011bdc32960bc6ce4773d1d16df2bf5b62cdc986787994e78f51b2e

                    • C:\Users\Admin\AppData\Local\Temp\UOGMTFFSYQYMWMI\service.exe

                      Filesize

                      520KB

                      MD5

                      7a9081bcdb985be55b73862715ef5772

                      SHA1

                      aabb6363e9f40537e84b2dce934bdc2764da3ce1

                      SHA256

                      f539c48e3f79dc8f44e175d2d02c21afd689d4799b6ebdd0eadc9c7d9c9b3ccf

                      SHA512

                      ccc8e5a9cf7fba2dc7c49d715b76a55f7a7e816cd9b04a7ad223a162cf3d345597c859af8f5279b136ee82ee703451ec216a8209de19dc96b71af633addc583f

                    • C:\Users\Admin\AppData\Local\Temp\WYOIBGNXNSKSGRH\service.exe

                      Filesize

                      520KB

                      MD5

                      7470ff458389b6bac4842a5066a538ef

                      SHA1

                      8349c47748dbdc6a17ec8e2438adc9bb9a7834b2

                      SHA256

                      f65603f09a1461ed00f4585a791419edc7058317493cca961f41c1bbc672a70d

                      SHA512

                      c29a564f5df42e79c731686b4b7a7f5b7cef04dbeb3471d139c576eb6443cbb7461bbb9419b3de4de66ae630763f16eea0e6eda917b3bb62efb30b3c366fcd78

                    • C:\Users\Admin\AppData\Local\Temp\YRQAYMLNIGNJYMT\service.txt

                      Filesize

                      520KB

                      MD5

                      522709b336b58a34e63c7427529611b4

                      SHA1

                      39a007de63f061b825f266cb59c25f994779f632

                      SHA256

                      939c1c6fa74bc3b2de4c16de50a9494c4de0e45ef137cea975cc5cc599c3c96f

                      SHA512

                      ae4f73933d5133d5505ee8a2e3cf5b272424206b396fa1ffdffcac40bb43fcc513d662b36a3a86493434f25e68a8d2ee215f576150c891fba277cd639effb752

                    • memory/3816-762-0x0000000000400000-0x0000000000471000-memory.dmp

                      Filesize

                      452KB

                    • memory/3816-763-0x0000000000400000-0x0000000000471000-memory.dmp

                      Filesize

                      452KB

                    • memory/3816-768-0x0000000000400000-0x0000000000471000-memory.dmp

                      Filesize

                      452KB

                    • memory/3816-769-0x0000000000400000-0x0000000000471000-memory.dmp

                      Filesize

                      452KB

                    • memory/3816-771-0x0000000000400000-0x0000000000471000-memory.dmp

                      Filesize

                      452KB

                    • memory/3816-772-0x0000000000400000-0x0000000000471000-memory.dmp

                      Filesize

                      452KB

                    • memory/3816-773-0x0000000000400000-0x0000000000471000-memory.dmp

                      Filesize

                      452KB

                    • memory/3816-775-0x0000000000400000-0x0000000000471000-memory.dmp

                      Filesize

                      452KB

                    • memory/3816-776-0x0000000000400000-0x0000000000471000-memory.dmp

                      Filesize

                      452KB

                    • memory/3816-777-0x0000000000400000-0x0000000000471000-memory.dmp

                      Filesize

                      452KB

                    • memory/3816-778-0x0000000000400000-0x0000000000471000-memory.dmp

                      Filesize

                      452KB