Resubmissions

09/03/2025, 01:58

250309-cdv29swybs 10

08/03/2025, 06:55

250308-hp35xatjt9 10

08/03/2025, 04:53

250308-fh1ebssky5 10

Analysis

  • max time kernel
    150s
  • max time network
    163s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/03/2025, 06:55

General

  • Target

    My-Skidded-malwares-main/AnaRAT.exe

  • Size

    6.0MB

  • MD5

    b300d99faf11ac3c6d3609c34f39ad5b

  • SHA1

    039310584b1e8fb43a08a865f3ab1b64610c8013

  • SHA256

    b8af724789e01cb47a661d40a22a5ec93a2f1499d0ace4cd5e1d7d9fffa89246

  • SHA512

    2158ca82f753258c4abee3bf425f91bd26a79fcf7c53cbb98fd5980a53d678613258367a5f10117547f3d900456d78a0e4a7c85b0f1806948e8e5b767ccb26d0

  • SSDEEP

    49152:xqU/dfDJH/bKaPMNNteROzxRwF0UCLhCkpMn8HmWIos0/Noyos5rQLiMCPSsAm6o:x1dfDy

Malware Config

Extracted

Family

remcos

Botnet

AUGUST CRYPTER TOOLZ GRACE STUB

C2

teamfavour222.ddns.net :6767

odogwuvisual123.duckdns.org:6767

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    -YFLE4M

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

asyncrat

Version

0.5.8

Botnet

2 MONEY

C2

twart.myfirewall.org:14143

Mutex

udn3BZ1Fqt3jtiZx

Attributes
  • delay

    30

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Extracted

Family

njrat

Version

Hallaj PRO Rat [Fixed]

Botnet

FFF

C2

tibiaserver.ddns.net:2323

Mutex

64805e9b9efcd75e104b05fad0cb2a4c

Attributes
  • reg_key

    64805e9b9efcd75e104b05fad0cb2a4c

  • splitter

    boolLove

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Extracted

Family

remcos

Botnet

GOLAZO

C2

agosto14.con-ip.com:7772

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-KKPQTN

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect PurpleFox Rootkit 3 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Njrat family
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Purplefox family
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Stormkitty family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 27 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies registry class 27 IoCs
  • Runs ping.exe 1 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 17 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\AnaRAT.exe
    "C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\AnaRAT.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3392
    • C:\Users\Admin\AppData\Local\0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe
      "C:\Users\Admin\AppData\Local\0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1640
    • C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe
      "C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe
        "C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3852
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"' & exit
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4192
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"'
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4372
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp76B2.tmp.bat""
          4⤵
          • System Location Discovery: System Language Discovery
          PID:444
          • C:\Windows\SysWOW64\timeout.exe
            timeout 3
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:4776
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:3716
            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:4916
    • C:\Users\Admin\AppData\Local\62264.exe
      "C:\Users\Admin\AppData\Local\62264.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRIPT~1.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRIPT~1.EXE
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2332
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4648
        • C:\Users\Admin\AppData\Roaming\svchost.exe
          "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2772
    • C:\Users\Admin\AppData\Local\73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe
      "C:\Users\Admin\AppData\Local\73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
        "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:1748
        • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
          C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1700
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:3548
    • C:\Users\Admin\AppData\Local\1231234.exe
      "C:\Users\Admin\AppData\Local\1231234.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4304
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp28FF.tmp.bat""
        3⤵
          PID:2092
          • C:\Windows\system32\timeout.exe
            timeout 3
            4⤵
            • Loads dropped DLL
            • Delays execution with timeout.exe
            PID:2388
          • C:\Users\Admin\AppData\Roaming\DriverrHub\$77Microsoft To Do.exe
            "C:\Users\Admin\AppData\Roaming\DriverrHub\$77Microsoft To Do.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:4676
      • C:\Users\Admin\AppData\Local\150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe
        "C:\Users\Admin\AppData\Local\150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4776
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Client.exe'
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4552
        • C:\Users\Admin\AppData\Local\Temp\Client.exe
          "C:\Users\Admin\AppData\Local\Temp\Client.exe"
          3⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          PID:784
          • C:\Windows\SYSTEM32\CMD.exe
            "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe" & exit
            4⤵
              PID:1572
              • C:\Windows\system32\schtasks.exe
                SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe"
                5⤵
                • Scheduled Task/Job: Scheduled Task
                PID:3312
          • C:\Users\Admin\AppData\Local\Temp\Launcher.exe
            "C:\Users\Admin\AppData\Local\Temp\Launcher.exe"
            3⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:4736
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\zzzz.exe'
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:248
          • C:\Users\Admin\AppData\Local\Temp\zzzz.exe
            "C:\Users\Admin\AppData\Local\Temp\zzzz.exe"
            3⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Drops desktop.ini file(s)
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:4932
        • C:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe
          "C:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:664
        • C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe
          "C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:752
          • C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe
            "C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4604
        • C:\Users\Admin\AppData\Local\a6a1abaf12a28ea8f6553356c3bdcf57.exe
          "C:\Users\Admin\AppData\Local\a6a1abaf12a28ea8f6553356c3bdcf57.exe"
          2⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3488
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Offline Web Pages\conhost.exe'
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:4420
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\sysmon.exe'
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:1524
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Links\RuntimeBroker.exe'
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:3964
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\RuntimeBroker.exe'
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:1868
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\it-IT\StartMenuExperienceHost.exe'
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:2964
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2rLTM5r244.bat"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2324
            • C:\Windows\system32\chcp.com
              chcp 65001
              4⤵
                PID:3860
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                4⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:4968
              • C:\Program Files (x86)\Windows Mail\sysmon.exe
                "C:\Program Files (x86)\Windows Mail\sysmon.exe"
                4⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                PID:1020
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iDn8Em9rir.bat"
                  5⤵
                    PID:2084
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      6⤵
                        PID:4496
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        6⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:2208
                      • C:\Program Files (x86)\Windows Mail\sysmon.exe
                        "C:\Program Files (x86)\Windows Mail\sysmon.exe"
                        6⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2524
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\raUEgr1vJI.bat"
                          7⤵
                            PID:3080
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              8⤵
                                PID:1948
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                8⤵
                                  PID:1372
                                • C:\Program Files (x86)\Windows Mail\sysmon.exe
                                  "C:\Program Files (x86)\Windows Mail\sysmon.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1984
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iDn8Em9rir.bat"
                                    9⤵
                                      PID:5056
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        10⤵
                                          PID:4540
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 10 localhost
                                          10⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:3444
                                        • C:\Program Files (x86)\Windows Mail\sysmon.exe
                                          "C:\Program Files (x86)\Windows Mail\sysmon.exe"
                                          10⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Modifies registry class
                                          PID:2100
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LZJId2lFRi.bat"
                                            11⤵
                                              PID:2316
                                              • C:\Windows\system32\chcp.com
                                                chcp 65001
                                                12⤵
                                                  PID:4052
                                                • C:\Windows\system32\PING.EXE
                                                  ping -n 10 localhost
                                                  12⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:3444
                                                • C:\Program Files (x86)\Windows Mail\sysmon.exe
                                                  "C:\Program Files (x86)\Windows Mail\sysmon.exe"
                                                  12⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:1904
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Windows\Offline Web Pages\conhost.exe'" /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:4644
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\conhost.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:444
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Windows\Offline Web Pages\conhost.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:2588
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Mail\sysmon.exe'" /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:2100
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\sysmon.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:2148
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Mail\sysmon.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:4988
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Links\RuntimeBroker.exe'" /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:1036
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default\Links\RuntimeBroker.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:3728
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Links\RuntimeBroker.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:4360
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files\Google\Chrome\Application\RuntimeBroker.exe'" /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:3688
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\RuntimeBroker.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:1028
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\Chrome\Application\RuntimeBroker.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:3444
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Media Player\it-IT\StartMenuExperienceHost.exe'" /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:2000
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\it-IT\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:5044
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Media Player\it-IT\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:3732
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:4808

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\remcos\logs.dat

                              Filesize

                              122B

                              MD5

                              881016d254c6268368a09476214c40ac

                              SHA1

                              5025a4ae9006415fd878404a801a8576fed4cec2

                              SHA256

                              b83d50edf921bfee28644522beca0e6dbdb209297481432a19e30581f729eb47

                              SHA512

                              3b02ce9f7a77a4b48ecf39db69473f70e77979ce452de18b642660fc4e1e293a6d69b2fb608ea8927e96c58e8d6a8d94909998a3996648ca6d68a2abd8bcffa7

                            • C:\Users\Admin\AppData\Local\0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe

                              Filesize

                              446KB

                              MD5

                              385585748cd6feff767a913bd76c2457

                              SHA1

                              1bedac2bc0da78c4dbaaf3914816d84f5c08f005

                              SHA256

                              0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5

                              SHA512

                              80619ee207d6c5a352d811405c40bcb9043fb2b2759ad40575e03e9e7b89f4ad55f6bc01dfe62a64b42dcd9b3b5bfef10503ce72f4efa0d2e39546f92047a880

                            • C:\Users\Admin\AppData\Local\1231234.exe

                              Filesize

                              37KB

                              MD5

                              8f00376c7ee9fb1653dc2ae09afa5589

                              SHA1

                              0005d278c062b496628e9c2a27043e87fc05689e

                              SHA256

                              6d2223ee967236cbc2c35809fce753553cfdb0aac7ba34e7087e19d61eecaa18

                              SHA512

                              2512a5b67867c7c1cfbc19f7adc7ad56c3a2bf821f0c74341d0e69ee89dc20bbdc9118714d67ada6a846edced58afc6d01b0fe7560f2166e02c9044f85bc00f9

                            • C:\Users\Admin\AppData\Local\150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe

                              Filesize

                              227KB

                              MD5

                              1a83a244d9e90a4865aac14bc0e27052

                              SHA1

                              d2b65e7aed7657c9915f90f03d46902087479753

                              SHA256

                              150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712

                              SHA512

                              f4b9d26d8a0841f9425abf038f85563ddee65e2404bc508fd23c8023bb565fd7f0ceaeaadde49c4951d3bbbb93f6b64b3cf610464855a2bf2d418477dd4fe03f

                            • C:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe

                              Filesize

                              233KB

                              MD5

                              4ef3177a2e94ce3d15ae9490a73a2212

                              SHA1

                              a34f47568ce7fcea97a002eebeae385efa98790c

                              SHA256

                              87353d18dfdebf4d0747bbf21d58adaed2b04060d61cba3fa052d522640520f0

                              SHA512

                              635ce5c0d1b9f7dd5d7b4c00f216af06dc7d818132ba87a57d3d54f6b30ee01f64430d2aa265f60027cc58dc2e738d5b674ee36ffdca34ff540ce44b7da7c502

                            • C:\Users\Admin\AppData\Local\62264.exe

                              Filesize

                              198KB

                              MD5

                              f30e9ff8706f3ec72c82a74ee6328db9

                              SHA1

                              b526d52d22600b28892f898a717eb25779ef3044

                              SHA256

                              d22bf8ad4fc9b769ea2944bbdee78277ab29bac7199407baf7c3b489568a9489

                              SHA512

                              a21220d5f1818c9c5aa55cf8560365888046a090b8892a9d87919b48ac921bd2fdfd6016ace77fa8205fde067c7d45cb01032a47f4325fcac560361d66cc58f6

                            • C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe

                              Filesize

                              1.6MB

                              MD5

                              e2100d88aca7c0a44ba9bb988ccd3916

                              SHA1

                              ddaf17adbc769556037bb4fbf4bce7065bf57ef3

                              SHA256

                              75f846b15fa1b548a0143f35584b25875a03c03a783e9310c8573f3b76957688

                              SHA512

                              5b7fb077ea9d7d1310db3eb26b6624e3d12fe9f3d55d0a37d57c28197dab7e05449c6611d5b9a02f054d8ad790e12050228c8d7b913bb55e3f2b0da694c67ec5

                            • C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe

                              Filesize

                              608KB

                              MD5

                              690c1b65a6267d6d0b201ba46089aabc

                              SHA1

                              9eb6859bae82bcf8b9df7cf4fc061cd9155fdc39

                              SHA256

                              244f3a2fad1afa232909355901f33cca18ea95444c5d142c7aa308170db5294f

                              SHA512

                              cc540851386a3b98227822b2c952a57caf15db4563f9c246b8be5bca0989aaff70e64191d010738db86598d76dd8ad4e59a50965224db9f623edb64f2f8b3e2a

                            • C:\Users\Admin\AppData\Local\73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe

                              Filesize

                              110KB

                              MD5

                              0dcc21bdebe05957ca2922be486abe22

                              SHA1

                              8bcbd8a839a58e0050c17221e6a1cc775f07586b

                              SHA256

                              73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3

                              SHA512

                              0752ba22340fd3383132243580cb28a147e67b42bb920af8c0fde491d550556fdfa296e70d94f2ce9798faddd0dad4664e2c2edda8f6604b9ba9e63e8f875e0f

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                              Filesize

                              2KB

                              MD5

                              627073ee3ca9676911bee35548eff2b8

                              SHA1

                              4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                              SHA256

                              85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                              SHA512

                              3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\690c1b65a6267d6d0b201ba46089aabc.exe.log

                              Filesize

                              1KB

                              MD5

                              bc39854661a6b32a76bb89194cb4f97d

                              SHA1

                              aaa2fe4865ad144fc246a5109df804068c0e6aae

                              SHA256

                              8c743434094ed0f13f342c8c34d31d35067abc2c143668aea6fbf2f9793d4104

                              SHA512

                              44f9c3f41c39ac1f187b129bc91d8ef35a69b14643f5a520267cee84d9f7d837d0dc5361433ea519c33bc1237123e59c83009a4f0a2fbc1658c89c5d61600101

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log

                              Filesize

                              1KB

                              MD5

                              7e1ed0055c3eaa0bbc4a29ec1ef15a6a

                              SHA1

                              765b954c1adbb6a6ecc4fe912fdaa6d0fba0ae7d

                              SHA256

                              4c17576f64dea465c45a50573ee41771f7be9962ab2d07f961af4df5589bdcce

                              SHA512

                              de7c784c37d18c43820908add88f08ab4864c0ef3f9d158cc2c9d1bab120613cb093dd4bfc5d7ed0c289414956cfe0b213c386f8e6b5753847dec915566297c8

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              944B

                              MD5

                              aa4f31835d07347297d35862c9045f4a

                              SHA1

                              83e728008935d30f98e5480fba4fbccf10cefb05

                              SHA256

                              99c83bc5c531e49d4240700142f3425aba74e18ebcc23556be32238ffde9cce0

                              SHA512

                              ec3a4bee8335007b8753ae8ac42287f2b3bcbb258f7fc3fb15c9f8d3e611cb9bf6ae2d3034953286a34f753e9ec33f7495e064bab0e8c7fcedd75d6e5eb66629

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              944B

                              MD5

                              e02fc0b3bdb8f40184e3bd173e7ec2fe

                              SHA1

                              5798c44c7bb33eaa89cce50178180fc8b5411a17

                              SHA256

                              f80d602c298fb72e5c5f68ace593fa2785b97bacbc4277e5a187862b4b09272d

                              SHA512

                              6aab23f3512cc5238262b6188d0556006461a0f61e0a7a5ca0405c251d9a339226c27c46c4358e17e286b1e2b15fc094773ae5e685974570b4bbbfcb8b4daaac

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              944B

                              MD5

                              8ae23ac244d2498bebbef940ab1901c8

                              SHA1

                              4e327b29f95aaf976293263271ba4742558fab86

                              SHA256

                              8e88db3690d6941d1d99a34d8614fae26962fca46b12ce3bccd23ce8c2738f5a

                              SHA512

                              d9136a3e4aed92ec582edaf7f3997f271709e41532bad2b662cfa848701c2f0aa935af1606c8b4f81f371f4489f132d42f5a271cfc45a253c9560dc197cf5b28

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              944B

                              MD5

                              1804c6740eb5556056039a98ab1ec835

                              SHA1

                              01c386307cc450d8c639e3d38573e75a8ba607ef

                              SHA256

                              b1bac3764aeaf0bd5fd88966ce55b3299160a9b5acb3aa4727af7d0b94036253

                              SHA512

                              19f6ca87f2899874418c07352de4a245049b080f6b472c43bd321b204265591c71519615da0d092b0d73990ad4425026e0e60da5f51052cabcf8b4c5f842f482

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              944B

                              MD5

                              8b285a1184b0e0badb8427f4da3fa919

                              SHA1

                              b6f66499ca6abf4845fbcb2993b0f8a15b105b1e

                              SHA256

                              64f8090e06fa6bf0a56f03295fb7eb06f1db53fac5b68409bab621228e403c33

                              SHA512

                              7be507b2f6a57bbd2d85ea9272e988f6feea21fb50ffdc548fccbc64417421b330ec1c8d30342fbcec2f28fd17135464e0701853aa8a5fe86f9a5aa89537c1c5

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              944B

                              MD5

                              c83bd0c63443de261daf55bc77936e51

                              SHA1

                              8e89d2aa16255f401916cbb08dc240493a75d279

                              SHA256

                              c0ab48a5749309200838e6cb204cf5ff57a4b99b9a74a4226cfef16b68f13cd5

                              SHA512

                              feda166c7db52a5b91e4f84b77414eceb91292c1837fc3cf8d894d282a9c3d023edbd776380ec803a0e7723202dbb84c4bef05ac8e27d9e77908f164d699294b

                            • C:\Users\Admin\AppData\Local\Temp\2rLTM5r244.bat

                              Filesize

                              174B

                              MD5

                              73403c011b41c02e3547d322714bdb68

                              SHA1

                              11f4d222a6387c73f051126efdd190a161ff1d1f

                              SHA256

                              e1b9877fa738f745b5db4f70c4835f181712803b9a3466f885b50b7d580f52bd

                              SHA512

                              52d093294517b9223995766668a30907fc3fd0cdd10a62e3e4199d93398bb6abd6978adde4829d4ddd16e132d95424053e9c39c0deeb580d09fcaef0b818059b

                            • C:\Users\Admin\AppData\Local\Temp\Client.exe

                              Filesize

                              100KB

                              MD5

                              21560cb75b809cf46626556cd5fbe3ab

                              SHA1

                              f2eec01d42a301c3caacd41cddb0ef2284dbb5a6

                              SHA256

                              d2525bab5cb322933c8978880975e0c189feece68ae3f1951bf46297c7f640fa

                              SHA512

                              21eac0037b16f968ee8743b52dc73efdd34d24c2502d090b399a552dc6cb75f7d3090c10d448c66b868b1c4a7c46a5068b084b88b487e40b1e755356cb7557db

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRIPT~1.EXE

                              Filesize

                              210KB

                              MD5

                              4ca15a71a92f90c56b53d9d03da17657

                              SHA1

                              3d610aee0423eea84ad9dc0df7865e1bed982327

                              SHA256

                              ab532f166e08886166c0ed6426bb6a8998de8273d37ccac5823528a1ba3d8ca1

                              SHA512

                              e0d9e11b9a0fb84bab21cbe4638ead80319a9b38ed810a59a612ab844331adec32f2499425b0d9269f2eb3714e497ad31c9bdfded1f829533cc77bf2dea6464f

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\script-error.xml

                              Filesize

                              19B

                              MD5

                              fdb26e74f4d6ca3a02af55b15fcca7f2

                              SHA1

                              7d990a1a4062fc3f0ae117dc72f47bcb3ef66425

                              SHA256

                              49704e6fd30fc98988f40be963296c81b95662d7f3af605c372cd0344ab78e1b

                              SHA512

                              36a82624ee8173bacffdf978e00f9c5ffe96bd6b27ba1230f2891a11bc301908ed6ea790c75669219c7445489806f00ba67eda2ea7346396ca3304e02c6fec7d

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\script-error.zip

                              Filesize

                              308B

                              MD5

                              b3609673caf3522ae50fe7b2f69b46f2

                              SHA1

                              c14f39aa78398030b84ab6b3d36014483b97a520

                              SHA256

                              c2423419d653bf31077eb40ad665590445b5baac4f82948822c8ed55fc009c4d

                              SHA512

                              be15ca57e7b80049c35a37f216fb1387b89d68440494c81e7e8b21644dbab8ab161119a37475ad873d144ceae105ec2c61097f0c115f078cde961bc38e6f28b5

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe

                              Filesize

                              152KB

                              MD5

                              4b6d4727ca3c277e5af47092ec9e3ef1

                              SHA1

                              8faea131181960c1f43ccee6a2b7bcdaa23fcd81

                              SHA256

                              5fb62cc6421cf636023381cc6fd5a06e3b326a58ea3d3ce9c879f1cc408519f4

                              SHA512

                              8a1814ec549a42771cbe83fe7612d7e269af27d092a5c0ae685e92772dc7effd2b14829090f0b12edfbabeb9804f80558f2b316efb4f48a6a3b500b1172c2bbc

                            • C:\Users\Admin\AppData\Local\Temp\Launcher.exe

                              Filesize

                              22KB

                              MD5

                              4c8f3a1e15f370ca8afe2992902a6e98

                              SHA1

                              dc6324d924ac31bea4ad7e4dd6720ecdad3877dd

                              SHA256

                              dcdc72549f7ad41cc860738adbeee5e44f02222415fd84ed5c92538ac9049b92

                              SHA512

                              b63c4e48f3024edcf1e1391b5df6ff65fc5111849eb093b429fa0f21c03339dbaeff835f18e250758498f3432874b85348530e47b2ada93f6f68615a5ccf66c0

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_io2j1lta.4jv.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\iDn8Em9rir.bat

                              Filesize

                              174B

                              MD5

                              d5dc875408c637c3b62a770e4343f3a4

                              SHA1

                              b723c0fed43daf4b53662bc7cd79733b5daf5f2c

                              SHA256

                              a2a72f110e7ae84c73a088538e1ed2c5ccec89037039fe4de47168b44605c487

                              SHA512

                              fa814460c0e9e93e6f4f66232fe6a6bbd698d16dea79ea791ae78d869ab3ddd452eec812e0d5a0345bb4031586ca9ee4d3e9bbfd478a380b967d9b9e35d1ed2e

                            • C:\Users\Admin\AppData\Local\Temp\tmp28FF.tmp.bat

                              Filesize

                              173B

                              MD5

                              114625cc6f591515ec2e6cfcc82afc5c

                              SHA1

                              4fed9a42739a35e1bf8e5dea9dd22c9c113f84c8

                              SHA256

                              aea813045fd04eccc9354e4913e7cacb5e7020a0a7cf122af632893f3f6595ef

                              SHA512

                              f70e3332b0ecce80e6dfc5151cfc5a0c97c0f95bccac858f10ac14cdfaa2db0a6003396e6c62587f08373b5e3c99d40238ea6edea56cfecba720a14ca019c676

                            • C:\Users\Admin\AppData\Local\Temp\tmp76B2.tmp.bat

                              Filesize

                              154B

                              MD5

                              039db3c8d4c468477bdf53b11db02d6b

                              SHA1

                              89071c34c37f5958a799eb484479331c884d9c77

                              SHA256

                              5ce0f8406c86ee39904bad482ed351b15baa3252c908d69f72fef76dc29746f0

                              SHA512

                              7548a45dcad82dec30de3de62a2add2003cdc83cf11877d59063612bf78d8b795a2b7e6e21090899ac9f99d8f28502168779aaee63648370709974be1aff9765

                            • C:\Users\Admin\AppData\Local\Temp\zzzz.exe

                              Filesize

                              320KB

                              MD5

                              de4824c195cf1b2bb498511ef461e49b

                              SHA1

                              f15ca6d0e02c785cce091dbd716cd43e3f5a80bd

                              SHA256

                              51813dfedbe02f03d08b4728187eadb4948d8be40c9d8fe6e4e1cb61fa7ae209

                              SHA512

                              b211a636f2799d90ce38348dbbc7dbc69ac5374129c7896a137f03a57fe78139a030c1edb90cfc4203799d77a8720df431da75986aa1d8b16274030ad1db770a

                            • C:\Users\Admin\AppData\Local\WFQQFFOZ\Browsers\Firefox\Bookmarks.txt

                              Filesize

                              105B

                              MD5

                              2e9d094dda5cdc3ce6519f75943a4ff4

                              SHA1

                              5d989b4ac8b699781681fe75ed9ef98191a5096c

                              SHA256

                              c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                              SHA512

                              d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                            • C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Desktop\CompareGroup.css

                              Filesize

                              739KB

                              MD5

                              a1bbf39bf580865f421379345f119767

                              SHA1

                              75b622267881303f4d692d27342e09e2ccbe2b09

                              SHA256

                              706f828cf43588247b192f43714823f8ea5dba1e0d81eb84ed2c3edd1fe090f2

                              SHA512

                              37a625a5120a06273ee6ec5382f7d0577ae951a993c2bfb852f5ab401c61597bb3335add6dd89f29877080f2fc9b154cf2462fea2cf7c4abbfb7bb2de5c228d5

                            • C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Desktop\MergeDisable.php

                              Filesize

                              609KB

                              MD5

                              f79055a2a43e912ced541b0e0a6e1303

                              SHA1

                              b13dd5b660a51b0894aa68a41ccb008c2384ed9b

                              SHA256

                              72f4a2d5c3e029f8f060a46af9f039131efc9f55714ff4094a27eaeacf3b226b

                              SHA512

                              aac675331ae98208313592393fff487788846d3b501fac9fb95a517b8cda7622c640355cef966f64e6434d4b8ab55934bcd27972f876ca87475fca9fe491ffd6

                            • C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Documents\ApproveBackup.docx

                              Filesize

                              1.5MB

                              MD5

                              7df703b64a7e1c921707bf6ec3f20618

                              SHA1

                              06f43c8a3183615992ba82be9c8a94fa9bcba556

                              SHA256

                              280ae9d55d0859ed44decaa91f4cfcff7ae05554183fd3896a43a4d0995af880

                              SHA512

                              c558afc2165328efa8d6db3334c9144a3662558e8f4a0ac4fe629620cecddf504709dc3a4b653ecae3765dd08bb4e007d9f255760aadbc49587ab0a400afd2c3

                            • C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Downloads\CheckpointInitialize.css

                              Filesize

                              570KB

                              MD5

                              d0be8f6708d22224eb457a6523bc367f

                              SHA1

                              87fdc762defc28f832885fee0dcfaceced437d19

                              SHA256

                              7710d4669379145d547328ffe6077a5edf3dff9f139e081f947ba61df480c52d

                              SHA512

                              3fd71a3463d22dc5af28a499e0a205c8f6303da36e77d8f2b0443bd9f3adc3f592e0694f0da8dc822b390153dd178d3484cfe2e206f8a5d2e12e4031c0d9e482

                            • C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Downloads\FormatTrace.rtf

                              Filesize

                              329KB

                              MD5

                              3dd86567d37bbcb8ae7bad20d7e6f79c

                              SHA1

                              476f113c104b43e79505c42e0e4cb778c3c6f186

                              SHA256

                              844063de57471613023d0af2360705ffa495985e640e2c7ec88a629d8c676894

                              SHA512

                              28d41b0ccd02c238a32ae8c3918ee567fb40defe884c9ec705aaf6466955324a5450cd858ed21d5f0096ac570dc65bb884bde0b02b9efa14f4d59efb1b09f146

                            • C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Downloads\LimitTrace.css

                              Filesize

                              181KB

                              MD5

                              d5ee5c0ad3289f0c4b84b499acd36705

                              SHA1

                              c10e1700ca665eabce036a5e19217727ca02afd0

                              SHA256

                              2c82d3d6a2082da7289209ac607d30ad53d8ebfce23cf967a411fcbbe45e3e90

                              SHA512

                              06e728c6e9b46ff6f565147a4bf79f9d7189d581b32086b80543251b4c0f2ca60fab22f3c7ac1df880675b34d78aa2b2ad3ea00a337461e8da481f34c9562c52

                            • C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Downloads\NewFormat.html

                              Filesize

                              351KB

                              MD5

                              6b693a3ae2d4e0a5350cb033832a44b6

                              SHA1

                              d7a0945adfe5acfa2f2d409a9c28d865fa3cf7ba

                              SHA256

                              42383da5050d38c8b8b24e09bb8836479209342d76786bf31d8a6818e3107550

                              SHA512

                              63a0e0d8b73174739a309d1a4906a1b3f0ec4c586b23253a9b289a567443027c2ea44f59596f5e39e73f2f9ec1de4d43c0cfd8c6cb12592eb2e0b6a8706c3241

                            • C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Pictures\SelectNew.jpeg

                              Filesize

                              522KB

                              MD5

                              4893901755475f0d5180da1c67ed1970

                              SHA1

                              b9b2bb48871d1c7c933719dfe69117aca58fde95

                              SHA256

                              c289e39aa1d52577467df4159474c6f1b73b6b3ebdfd9e47667e994a6c38d813

                              SHA512

                              ae5a96bba2472f22ff7a899b42b8240271366ad963a4098ac789c662b64d1e6bffc2050980ed42414385130ef68b77a7b307e3024de2c8d1b041acc52958b725

                            • C:\Users\Admin\AppData\Local\WFQQFFOZ\FileGrabber\Pictures\SetCompress.png

                              Filesize

                              452KB

                              MD5

                              edf35ff01062140fed83d7bd27fe3be7

                              SHA1

                              519ca3b630d9599644c561cf660a556e2cc1f65e

                              SHA256

                              14e1625d5e4d01e21615ca7e88ed4d56d83e498f8b3f16e626baa2e6ae9cc0f7

                              SHA512

                              8fcadb6edeae64216426c160622417d11e1bf66c006bf0215482b8a7e4376d99f876128b0de80ae630fd57f60552af03d2eef51fed7fce0424cee352a623feb4

                            • C:\Users\Admin\AppData\Local\WFQQFFOZ\Process.txt

                              Filesize

                              4KB

                              MD5

                              eb79485755880bd80d8c0ffed8370c92

                              SHA1

                              da8c559f0e86cbfdc49c41a8f5ff54d0904318c0

                              SHA256

                              02f1d66584ebd9d3de8bdde6af73a1aff8ddd2dceeb253769c1a96f002ecff56

                              SHA512

                              5b84fe051f96920be55c728f675fc4f859ed15797d9cbc46e8669ea06c398fddeb4becffb8990b8de9bf2cc13cd6975dfa7abb130fd9bba18a3710686473701a

                            • C:\Users\Admin\AppData\Local\a6a1abaf12a28ea8f6553356c3bdcf57.exe

                              Filesize

                              874KB

                              MD5

                              a6a1abaf12a28ea8f6553356c3bdcf57

                              SHA1

                              b7613fb9944bc3d8e11b5eb6f7ff706f04e8ad53

                              SHA256

                              f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76

                              SHA512

                              e525d119128c1ca1c05d379b9ebba9791b7b15390c8999773bff6517fde674178e17ee2c7c126b249c8c54b4dd1c07326ba24d52c8c192f067bc7e8545113a65

                            • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

                              Filesize

                              110KB

                              MD5

                              ba63814f60e82f42afdc9c9958db93ae

                              SHA1

                              f322b087d62362047a260df614fc9ae3ad506d0a

                              SHA256

                              78084f8e2204f2d970a5659555755e02168a1180ec97667c9afd8da4b97f179b

                              SHA512

                              59f56f59c2171189680369fe61f86d01158b4af9e8b56e25b9231e24d3b7c6f40445a72402d775e94111f54ab9d6ed7ff96c29ae2167d76e151bace8c82cbad3

                            • C:\Windows\xdwd.dll

                              Filesize

                              136KB

                              MD5

                              16e5a492c9c6ae34c59683be9c51fa31

                              SHA1

                              97031b41f5c56f371c28ae0d62a2df7d585adaba

                              SHA256

                              35c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66

                              SHA512

                              20fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6

                            • memory/664-1172-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-581-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-1427-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-1005-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-1682-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-375-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-1087-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-913-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-376-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-789-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-708-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-1597-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-107-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-1516-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-1261-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/664-1342-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/752-465-0x0000000000400000-0x000000000058F000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/752-462-0x0000000000400000-0x000000000058F000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/784-187-0x0000000000E30000-0x0000000000E50000-memory.dmp

                              Filesize

                              128KB

                            • memory/1640-121-0x0000000010000000-0x00000000101A5000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/1640-124-0x0000000010000000-0x00000000101A5000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/1640-123-0x0000000010000000-0x00000000101A5000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/1640-125-0x0000000010000000-0x00000000101A5000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/1700-438-0x0000000000400000-0x000000000040C000-memory.dmp

                              Filesize

                              48KB

                            • memory/2992-118-0x0000000006B30000-0x0000000006B4E000-memory.dmp

                              Filesize

                              120KB

                            • memory/2992-112-0x0000000004E20000-0x0000000004E2A000-memory.dmp

                              Filesize

                              40KB

                            • memory/2992-394-0x0000000005B10000-0x0000000005B26000-memory.dmp

                              Filesize

                              88KB

                            • memory/2992-81-0x0000000004D20000-0x0000000004DB2000-memory.dmp

                              Filesize

                              584KB

                            • memory/2992-26-0x0000000070C3E000-0x0000000070C3F000-memory.dmp

                              Filesize

                              4KB

                            • memory/2992-48-0x0000000000330000-0x00000000003CA000-memory.dmp

                              Filesize

                              616KB

                            • memory/2992-75-0x0000000005410000-0x00000000059B6000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/2992-397-0x0000000008FC0000-0x0000000009014000-memory.dmp

                              Filesize

                              336KB

                            • memory/2992-113-0x00000000059C0000-0x0000000005A5C000-memory.dmp

                              Filesize

                              624KB

                            • memory/2992-84-0x0000000004FC0000-0x0000000005317000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/3392-115-0x0000000074B90000-0x0000000075141000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/3392-2-0x0000000074B90000-0x0000000075141000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/3392-1-0x0000000074B90000-0x0000000075141000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/3392-0-0x0000000074B91000-0x0000000074B92000-memory.dmp

                              Filesize

                              4KB

                            • memory/3488-140-0x0000000002790000-0x000000000279E000-memory.dmp

                              Filesize

                              56KB

                            • memory/3488-119-0x000000001B400000-0x000000001B584000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/3488-142-0x00000000027A0000-0x00000000027AE000-memory.dmp

                              Filesize

                              56KB

                            • memory/3488-116-0x0000000000480000-0x000000000055C000-memory.dmp

                              Filesize

                              880KB

                            • memory/3488-117-0x0000000000D60000-0x0000000000D66000-memory.dmp

                              Filesize

                              24KB

                            • memory/3488-138-0x000000001C6C0000-0x000000001C6D8000-memory.dmp

                              Filesize

                              96KB

                            • memory/3488-149-0x0000000002820000-0x000000000282C000-memory.dmp

                              Filesize

                              48KB

                            • memory/3488-151-0x000000001C6E0000-0x000000001C6EE000-memory.dmp

                              Filesize

                              56KB

                            • memory/3488-135-0x00000000027B0000-0x00000000027CC000-memory.dmp

                              Filesize

                              112KB

                            • memory/3488-133-0x0000000000DA0000-0x0000000000DAE000-memory.dmp

                              Filesize

                              56KB

                            • memory/3488-120-0x0000000000D70000-0x0000000000D76000-memory.dmp

                              Filesize

                              24KB

                            • memory/3488-136-0x000000001C670000-0x000000001C6C0000-memory.dmp

                              Filesize

                              320KB

                            • memory/3488-157-0x000000001C6F0000-0x000000001C6FC000-memory.dmp

                              Filesize

                              48KB

                            • memory/3716-859-0x0000000005760000-0x0000000005AB7000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/3716-960-0x00000000061F0000-0x0000000006206000-memory.dmp

                              Filesize

                              88KB

                            • memory/3852-399-0x0000000000400000-0x0000000000412000-memory.dmp

                              Filesize

                              72KB

                            • memory/4304-66-0x00000000003C0000-0x00000000003CE000-memory.dmp

                              Filesize

                              56KB

                            • memory/4552-152-0x0000024248D00000-0x0000024248D22000-memory.dmp

                              Filesize

                              136KB

                            • memory/4604-464-0x0000000000590000-0x0000000000612000-memory.dmp

                              Filesize

                              520KB

                            • memory/4604-472-0x0000000000590000-0x0000000000612000-memory.dmp

                              Filesize

                              520KB

                            • memory/4604-469-0x0000000000590000-0x0000000000612000-memory.dmp

                              Filesize

                              520KB

                            • memory/4604-468-0x0000000000590000-0x0000000000612000-memory.dmp

                              Filesize

                              520KB

                            • memory/4648-412-0x0000000000260000-0x000000000028C000-memory.dmp

                              Filesize

                              176KB

                            • memory/4648-419-0x0000000005780000-0x000000000578C000-memory.dmp

                              Filesize

                              48KB

                            • memory/4776-109-0x0000000000380000-0x00000000003C0000-memory.dmp

                              Filesize

                              256KB

                            • memory/4932-262-0x00000000004B0000-0x0000000000506000-memory.dmp

                              Filesize

                              344KB

                            • memory/4932-300-0x00000000065A0000-0x0000000006606000-memory.dmp

                              Filesize

                              408KB