Analysis

  • max time kernel
    120s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 05:46

General

  • Target

    39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf_NeikiAnalytics.exe

  • Size

    858KB

  • MD5

    9385b14139f56fa7db4f0e6baa9204d0

  • SHA1

    4b18c25a5da353acd74024202cbe16c4abb8e461

  • SHA256

    39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf

  • SHA512

    48482ad519c9f2f9b872e02e7c99c28f9247cd1244c8a0b47873c69e2ea6029df0bbf7e285bce8c1c9c8b95b3d1486ff710e805b999623bd8770c542f4225380

  • SSDEEP

    24576:/EN973phvt8tmUdkw1xG8fFjGMaOnO+pwFL9N09PP9:/EN973PvEL2wHBODLcPV

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 7 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Users\Admin\AppData\Local\Temp\39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf_NeikiAnalytics.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf_NeikiAnalytics.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2300
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:537619 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2524
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:537644 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2984
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\SysWOW64\schtasks.exe" /create /tn TRACERT /tr "C:\Users\Admin\cdp\mighost.exe" /sc minute /mo 1 /F
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2752
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {5AEEB68D-6BB2-46BE-AF84-D22A9B9B024E} S-1-5-21-1340930862-1405011213-2821322012-1000:TICCAUTD\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:888
    • C:\Users\Admin\cdp\mighost.exe
      C:\Users\Admin\cdp\mighost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:860
      • C:\Users\Admin\cdp\mighost.exe
        "C:\Users\Admin\cdp\mighost.exe"
        3⤵
        • Executes dropped EXE
        PID:1196
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /create /tn TRACERT /tr "C:\Users\Admin\cdp\mighost.exe" /sc minute /mo 1 /F
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2428
    • C:\Users\Admin\cdp\mighost.exe
      C:\Users\Admin\cdp\mighost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Users\Admin\cdp\mighost.exe
        "C:\Users\Admin\cdp\mighost.exe"
        3⤵
        • Executes dropped EXE
        PID:2400
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /create /tn TRACERT /tr "C:\Users\Admin\cdp\mighost.exe" /sc minute /mo 1 /F
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1092

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C
    Filesize

    579B

    MD5

    f55da450a5fb287e1e0f0dcc965756ca

    SHA1

    7e04de896a3e666d00e687d33ffad93be83d349e

    SHA256

    31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

    SHA512

    19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C
    Filesize

    252B

    MD5

    4e57970a7c17ee4cc197396f7c2dbe43

    SHA1

    c6d29e37610b422a206bfecb5fe0347e988dbdd2

    SHA256

    efe2653d392ce148ba204f98af54470f83cc4925448d3cd714b92800bf330d66

    SHA512

    d98ebe7c77e1f798fca73bf99698e318241a74a85f44ff5bae3d850460c8cfc3ed443c0cf17b392c41482765c3ba9bf47b157745b8640c02e3467cc13645f1dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    af1385add582c0d8811ca2f0da59d262

    SHA1

    1f5607bddb33dba003f70a857a6b0449a9979d34

    SHA256

    beebd0027e59fb292ab93be276a352a4c4d1344ce664d7747dd29cbec1a55c9f

    SHA512

    b8b11db7f287d662d0296a76b01f683e69a096c4593bcf88fafb754c1ccb0dd5a3ccbcb9d92e40ca949b8c47da90686c67ac4001cda5b532de20f649733e1564

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    ef505e83b38f0478525c64850af938ba

    SHA1

    750f5f077e9dd22f7dc2400148cdcd6d268cf208

    SHA256

    fac30bfc03a5983010c1305c128bc7940452ba33a0c0155e47286f718524993f

    SHA512

    f8da5fd535f6ddd0024057b8039210ed5077ef47f73b86e72b96d447756ae55e6f02418cc10a83760e939bcdd5010953daa3e9435fc3c0d9564804cd28308045

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    7996f51b5e71308c03ea6309fce326eb

    SHA1

    7fb7580511ac8fd713c5c556df5d6bc20d5bd359

    SHA256

    d9cc984cde07edbf96cdbe91e0044425006b1f6d893dfbbfc08f8cb5db500254

    SHA512

    109f2673f8bb382bf17aea8e8ac9c1c32975e54c86a9f6adde11254e0442b14652b217f14a92834dfdb2ab1be3db2968861d3b83b0eb92789812fab84d679a53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    103e8bd4958230e984cfbf36b3d682ff

    SHA1

    8c999dc7ac449f35acc57907d018320ab8c273b8

    SHA256

    5a6581e7580bc494cb907ded2b8c8f4890bf2d6eb0dccb7aa10c63b60f0a922d

    SHA512

    52ec0e0ce2f20e4c4b1d4864d74f8873818c1168f9110cf1182de73b45f284a8fc809696e8c2c5819809b855337d7aa482dee7b1ba55802364b49eb57c011ee0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b298098fb65811785e0fbd3d722a6060

    SHA1

    7b97259e25179e02c4738f049e927910fc115ebb

    SHA256

    c2f343b4153e49e1c03dafe31d41c32ac7d108680a6060527450db2d4c4e6664

    SHA512

    a36bff8b0fb080b2ef9308df98fd09daecce93a6e7173380793e3d524c58eba3370e6aa3c332bb10a8a54e3862b2d6ec958fa15f0ee2446d29a92120b60e90b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    7f82292c619a800ad9d332e05888a2b5

    SHA1

    ef1eb2b0a2175992b7ac328c6e8abbaa3ead8e3e

    SHA256

    eedd0730a5d02dfd87e2e4ca14110c5c99f906b9b366a4ab34d167351ae7abb8

    SHA512

    75a0886994110cf9caee9df2f596a1982edcbd9b9f209170461b5ed816206cffcf63474a51b5c9e7afbed213ce13a38f349d7dc27653a5fd7413cd845584f5b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5724296acae31f409992de5ee1d10c31

    SHA1

    caeb58da39e5ab27674c46962377066b7883e661

    SHA256

    751bb3ff43cfdb0b62de6d40785ff03ad0ed77dff4d68127dc4974f66301cdef

    SHA512

    089874ab94351f8aaeb299bd30e29aa8b36d1fcc007a025dcb23ba9e13621defdaa2671c85fd0c647104603a42e49a7e9c7f270eac35edb4d4ad0c0a9e2f9f62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    6327aa5db435d419013a4ceccdafa2e9

    SHA1

    e7e4bac1c7d96b27da7bacb6d2bd55179bb5cb85

    SHA256

    762b206eeb0a37b7abab0d0982d6c53bbda24ed5ea2983064f8fe12746af9859

    SHA512

    9959ae2eb08d13974af87c5c2c583aca287c5999fb5257a3493f97a503df28fb0c64ef55b2136801de2370f31f8321100fcdb9a4bb9753cf97d83bfcab73eea2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    ac95e4a2f29b6ed150e96e5a1ffd69e1

    SHA1

    31c9ab32e710c632de669deaed677f2beb7032f2

    SHA256

    86665ea0e1bffae253f121804ff315e86b1eb4d58a80d6c62086f015220a2edb

    SHA512

    98f0caca7f9dcc5aaa9301cf43d58e153b56607c14162eaa2a999b6aba10af323cca72f95a6f632328a72ee72568cd5b5736c7f785c3c7f3a343052b7ba1194d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    6c5a8cb212ea9f5e35af823f1b2edd1b

    SHA1

    de3ef920d9da8eab0c212eb1c1729528c3d07d3b

    SHA256

    dfc146ba9175e8f3d4b0085608dbf032bd0abd6d57db2b3168593ed8be7b2106

    SHA512

    3648deb3e9f91e5d903daba2043e86e815008d5aa8ee4f4cadb40ba74a551bfd570b765158f831c1e535fe24a1256a980fd82e2220d9625eed99efb203ff9a18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    fedc6a8322a287b547273bcb7f616249

    SHA1

    5154e7b572c712f5179ba4f251cb345b60c1271a

    SHA256

    9670037900326023725c72c5bca65104d3bacdc6603e4b1514dfbb87920f6fe9

    SHA512

    f184dfe965e5a206d1900f7950fb90d3d647779fd3fa1f99080aa8a5bef881492cbdfc2bdad682ee2961d1eac1f56c14968d66d9a7f40d4f2ab2a48de792b7cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    abd8c5bf2eeed00a455f752b752b1244

    SHA1

    3cf11ebfd765f84bf737be02d27788cd9e592ce4

    SHA256

    da6b38e93f9427a518b76bb42b699f58b5e621f47c51b9eee61bcb5cc477ed61

    SHA512

    ea05ffc44af990270fc1a9847d387ea5add0cdec32206a3b1bfb013fbbcc7b2a3d8610a0e2701c8ec7782d9232328652fb6384b9cfe0b681f96eb17a26707fef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    140431b3caf4f2ee52d88a2034198b43

    SHA1

    a2f6845abd35e6c725f98a37bfaf7f1ebfe98374

    SHA256

    db9183daffec8869704ee86aeec9ed3e3043e21693a4847379cfa45962a691c0

    SHA512

    aa4189cec2c91c60b038ecec278481b7e95524a1ac0e349db88d759e4e21abb6079c2a32c40969987807a9cc670273449f660e1cef01cdd4abfd3550efd590de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    bb8b3f6f7ffd03d7c86ac6829dcb52b7

    SHA1

    a537e738f35a6c2b135a8c9eb5708f201308eff3

    SHA256

    8ff28532bbb34aa5e2f0532ad40a312a36b002f9d9443c21bbed77d10ca48448

    SHA512

    3a98d770d1b0a3deceaeaa5f636e27616e8936704eaced7f0d21c506ebb8d09244d1e7fa9f7ed89866185aac3bb2bc446565069822911b89212cb2e23b150caa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    71aaedbd4b072956cb2f57a2dec2c2d5

    SHA1

    80a139f64c48433c0608b1483a0b61dc30e8e6cb

    SHA256

    627f0d64f844240371620a4cad4a091cc9b8025e9d7f92e9000d9dae36761203

    SHA512

    f606a34cf3f33c5b6ad5ba9e776548838ed6b55ad7c6586b977a2de04d4808ffbbfb4440571b4c1bf79db91945ec128dc1df0b1f0b07c755694ca30dbc00649c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    c72152d31b83d93e71c4d40ae0e5d323

    SHA1

    66f935a278104e3ccb5f00bb1fc10f923fefbead

    SHA256

    8e447ad2d025df8a989a4e60322dd7dc2ba3f429bf3c3eb805831bf592ab439c

    SHA512

    2bc52a32235e68e20228124d34a4f0c61adae81e462d99260e1d419f246b3aeed162fcc983fbf75fcb12fd4fd647b4f5e2671d0437600a209bec3c03554abe5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e36ddee7a1a47a7c7409953adbf26134

    SHA1

    3e572e70674e61b5c9803d0ef33438957f6e7cfd

    SHA256

    0a091d15d19cae686133e4e6ec3c5f321ae12fa17adb411868b5ec6c93903793

    SHA512

    ae3929d8772920594f7c46c6c56b136b56b0a8ad191f0549fd45b23fe25a74603b932cd4617293da5d1e1d033989e77f2eb35f75b1207fdd507655bd5773656b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    904e0a460bd85d1f4c3c361deb873b75

    SHA1

    1b927f43107b14033911d434bf5bd2f0fde15a5e

    SHA256

    044dcde9f828ef0dc127a1d8249c5d1ac488686c9806657d66b57b0710481b36

    SHA512

    ca9932c7bcac4e6f2e5c49592c1966e8719aad9d5424534372ebbcc2733e3bcc96a01ab7820ff01f61c78a09a707ec976bf303f5b3d240099c6c5a46c8e22a68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    466409405c49705789d6a7254a5facde

    SHA1

    3e8fed5c2e3685879384c38455001ffaeb9e6693

    SHA256

    f0be31bbfec896c2e8ddfcc0eae8b0bf5d68b19185b132859f110c24fb7d6692

    SHA512

    9fc7631904e85e90faa5e8e2edbb3a02bfb934e24b797bff3bfab3fe01a99a5d5268cd80067ace7a2fbf72ace4216fcf81b6718a47e2412e7dde78cfbd3df626

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    29c48e534491e82b2fa5539110e9dcea

    SHA1

    b997f355f756d47050c4fef75a5925e05d318e04

    SHA256

    5fd20cae04d33d2bd012a2da91ce87253259d7601af6275a92a2b8c5230021c1

    SHA512

    53dbf04323e445af32a578d5607e35a29092d1b500c8068e5d02916fd39dbeade4838c619f5f9e8189681c4deea6ddbb806d16a8d472e3df8365b036e772806c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    bac900988a44452879ca2df8bec21048

    SHA1

    6c4e7ceac2d4c9323c8ffdf0d2b5fc94710eac60

    SHA256

    45ca250d3951dbd52dd170af2a1fb2210c6059c74554c609e183acf1a4c0d05a

    SHA512

    773091d6853493477df2b5536144dbc269424511b839143b1615147f1bf547fc4fb270dbf4ed95baa224bafaad4b51556a3e87605c16783180816f74d8ccadef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    7133458d6787b20a5ce30ee2a02202ba

    SHA1

    18bbd4eb8280817c9962fe7c9f502bdd34ad278f

    SHA256

    27ae87e67f351e15a31a3592d9c4252748faaac2ed82154566c807cd42bdbf5f

    SHA512

    19285f7949bfa91a6b1eff7e453a426dc5a7cf34e59a7125b6f7d4fe498b362cdb020ac1f2e43657dac5c218be6f0a0751ae703470864173294b4a0b1a915dab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    c1e4714e5482cf9fc8d33af6b770227d

    SHA1

    9324ece068db81f1625dd74bd3128497fc2f4335

    SHA256

    5dded0d2743171176ce112ad62a963907a909d345ccde554aea7106f2669ad75

    SHA512

    ae6fc90f582bc64abe6b62a5ba5ac0c33b521d1324db58d7118401b05339168addd9ff61beb305d8321ee28b6322ff36e3e06875d6bc364760ec065fcd860795

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    96fe9ceedde0dcbd17c32937976648fa

    SHA1

    4ba82b7aa41fd8125527c6fca733c274d49d2bf2

    SHA256

    8c6e22d023caf80b45d7be3e3f015bab402997809df19390639e4d673d2a4c0c

    SHA512

    cb7109ff2a25661c9678720d630e0656c13a915fb0d8596eb2b17bdeb7f7ec3203a7597a777612c82c4d4fdcb0076091ba6065e5349b7d70da83060b1985d4f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    66fdc338b7e63378050a7a29859e3892

    SHA1

    9c826f56f730c04661da7b1fd66312428178dda1

    SHA256

    5311d873709252b9eb4637dc93f7086462017a6eedcbd35f0c131347b29ab1d2

    SHA512

    f8d362784f1e413d83493897fb0788acb6efa8edf03a02d772be98bb2b07324551768e5a9255cdd41e20857872bbe97c5dedf6ea7a3f31776fb5c0a86a2ccda2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    03dd59497f8a75d2343d8a5160da6b77

    SHA1

    62d183b87223f30edd71fe9fe55a150bc7e8ed41

    SHA256

    9fbdbbe1859506c76468648eb884490cb1d9d26b0cbd52a7cac8185a14c14c5b

    SHA512

    831025347eefcf918590deaf4d9b3db4b40118180d717d24ec75603e6086a6396b184546240ae910997fe167ae2a95b1f1cbef47b2ca8cb7a2d04d1613ab5a5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    ddeb41365e858ad31c00445afd0ca3da

    SHA1

    8950dce53f456fa6052a33bafc410d55bfa3c279

    SHA256

    0bb45d181285f4d0ab225471e8f53eabfff21f0dfeceac15ecb04a0d11e33026

    SHA512

    464ebb11604d4ecf897afcda56c4499d651e2172a1b773d8e0dcbf572ff44718012e8fca4ad63d526d1113b3d506e51f35c4a39f12e801440a393812ac0698bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    fcdec60074caf2a9244391f22833ee36

    SHA1

    0a3830ee4c3d8ea80978c73cbf39096d9ff9d3dc

    SHA256

    ab1db733aaf6dc9d39b7afd069220aac00b422a09523710d308ff057dd41f5ea

    SHA512

    d6c7ef84cde939c4ffaecadd4d7911c74a6bb6510d0493e75e2c038b3930ca37744c85d19bd3d5f931382c0c4bc99d6cb13cb42cb26523887b5e5ab0262b9148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    8ee95934464d59a740b7dd79d80fae0c

    SHA1

    14a4df0e5f78431bc85522ecb5c79edfe987a532

    SHA256

    4f6b61777a726652d8c64224c28ade0e0557f139c7c1753b0d754857b764e999

    SHA512

    4d78fcb86c397ba1642d94404b10f8744dee1ce2aa76e53fbdef9494a90e3588049d10ce61ff942fa1cef3de8e639b665fa75e755849280a7774b54ff368bf59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    c62c4e36ae72162032bc64a1a9a1e689

    SHA1

    c76b96337df79977484c528660bf0d8301e632fc

    SHA256

    5f8df662ecd06f3897b4e8f510a9c587703092139118d1a242863d2e7db0d430

    SHA512

    a7990256437cfef2179aee8a2515d412938191d68efe4e2c2c5cda1de725a7a1780cf7281b6cbe39d3877f59c6397bf408a3bfcf65d87e2e07535bc34711609f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    2c497ff1449bfc4d88f901d23be3dbaa

    SHA1

    fe841eee4f4ed5ed6725670b463386b23268f3b2

    SHA256

    72bad07187dc2585e87dd9915aaf84fb9ec50d6a9659d5d813c1516a22cfd079

    SHA512

    e4107a3d369fd53c61f4c2ef54b73d7fc258872e637bdc8b50cf05b1a91aac1192775639e2f86eadab665b6cbe3de032dcc7034e3459852b5dcfafd715da9657

  • C:\Users\Admin\AppData\Local\Temp\Cab2D59.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2DF8.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\cdp\mighost.exe
    Filesize

    858KB

    MD5

    fb8f9641b75daf919edf60afec541919

    SHA1

    43cd0067604a53d9fbf0fcd4154b745ee3018532

    SHA256

    7056cfccd9a84409d8537825f3dc147b4a2b9b793cc204a0d151d17cff38686a

    SHA512

    b08f4635a523518d723ca247b0160325fdaaa95ce57c0cbe430a21be6170828dba298faa22b3f69c0426c72a8af7f4000c6546819ea3e664e89881033e0d29b2

  • memory/828-1925-0x0000000000EE0000-0x000000000107E000-memory.dmp
    Filesize

    1.6MB

  • memory/828-1921-0x0000000000EE0000-0x000000000107E000-memory.dmp
    Filesize

    1.6MB

  • memory/828-1629-0x0000000000EE0000-0x000000000107E000-memory.dmp
    Filesize

    1.6MB

  • memory/860-1196-0x0000000000110000-0x00000000002AE000-memory.dmp
    Filesize

    1.6MB

  • memory/860-1198-0x0000000000110000-0x00000000002AE000-memory.dmp
    Filesize

    1.6MB

  • memory/860-903-0x0000000000110000-0x00000000002AE000-memory.dmp
    Filesize

    1.6MB

  • memory/1196-910-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/1196-906-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/1876-765-0x00000000009B0000-0x0000000000B4E000-memory.dmp
    Filesize

    1.6MB

  • memory/1876-0-0x00000000009B0000-0x0000000000B4E000-memory.dmp
    Filesize

    1.6MB

  • memory/1876-1-0x0000000000170000-0x0000000000171000-memory.dmp
    Filesize

    4KB

  • memory/1876-468-0x00000000009B0000-0x0000000000B4E000-memory.dmp
    Filesize

    1.6MB

  • memory/1876-13-0x0000000002C10000-0x0000000002DAE000-memory.dmp
    Filesize

    1.6MB

  • memory/2136-11-0x0000000000080000-0x00000000000DE000-memory.dmp
    Filesize

    376KB

  • memory/2136-4-0x0000000000080000-0x00000000000DE000-memory.dmp
    Filesize

    376KB

  • memory/2136-8-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2136-12-0x0000000000080000-0x00000000000DE000-memory.dmp
    Filesize

    376KB

  • memory/2136-2-0x0000000000080000-0x00000000000DE000-memory.dmp
    Filesize

    376KB

  • memory/2400-1632-0x00000000000C0000-0x000000000011E000-memory.dmp
    Filesize

    376KB

  • memory/2400-1641-0x00000000000C0000-0x000000000011E000-memory.dmp
    Filesize

    376KB

  • memory/2400-1640-0x00000000000C0000-0x000000000011E000-memory.dmp
    Filesize

    376KB

  • memory/2400-1639-0x0000000000EE0000-0x000000000107E000-memory.dmp
    Filesize

    1.6MB

  • memory/2400-1636-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB