Analysis
-
max time kernel
90s -
max time network
75s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-04-2021 11:52
Static task
static1
Behavioral task
behavioral1
Sample
vict.exe
Resource
win7v20201028
General
-
Target
vict.exe
-
Size
1.5MB
-
MD5
1fe5a78b062c229be63d1d69770fb04f
-
SHA1
220b0f77946840c832f6913ae05a1bbe26c95e54
-
SHA256
fc79c071ab08ab2fe68ac0361e340d8e3fc047d823392e4d3df25823d22acf78
-
SHA512
23aedb7bdc329469f0e577eb44a0a0d8da59c6d5bc6c5f77a51378640ebe2772217e61f81ab060473e7a03e97554fdd9392254860c2b61d212cb2e99aa1eee1e
Malware Config
Extracted
icedid
2412332838
gaaga923.website
Signatures
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1704-73-0x00000000003A0000-0x00000000003A7000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exeflow pid process 20 1704 rundll32.exe 22 1704 rundll32.exe 24 1704 rundll32.exe 26 1704 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
vict.tmpvict.tmpwin1host.exeyt9KsEwUx.exeSuono.exe.comSuono.exe.comnslookup.exepid process 1468 vict.tmp 1800 vict.tmp 820 win1host.exe 616 yt9KsEwUx.exe 476 Suono.exe.com 1176 Suono.exe.com 1408 nslookup.exe -
Loads dropped DLL 23 IoCs
Processes:
vict.exevict.tmpvict.exevict.tmpwin1host.execmd.exeSuono.exe.comrundll32.exerundll32.exeWerFault.exepid process 1932 vict.exe 1468 vict.tmp 1180 vict.exe 1800 vict.tmp 1800 vict.tmp 820 win1host.exe 572 cmd.exe 1176 Suono.exe.com 1932 rundll32.exe 1932 rundll32.exe 1932 rundll32.exe 1932 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 984 WerFault.exe 984 WerFault.exe 984 WerFault.exe 984 WerFault.exe 984 WerFault.exe 984 WerFault.exe 984 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Suono.exe.comdescription pid process target process PID 1176 set thread context of 1408 1176 Suono.exe.com nslookup.exe -
Drops file in Program Files directory 3 IoCs
Processes:
vict.tmpdescription ioc process File created C:\Program Files (x86)\viewerise\is-RKTCQ.tmp vict.tmp File opened for modification C:\Program Files (x86)\viewerise\unins000.dat vict.tmp File created C:\Program Files (x86)\viewerise\unins000.dat vict.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 984 820 WerFault.exe win1host.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
rundll32.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 19000000010000001000000044ba5fd9039fc9b56fd8aadccd597ca6030000000100000014000000317a2ad07f2b335ef5a1c34e4b57e8b7d8f1fca61d00000001000000100000005959ddbc9c7632ba0a05f06316846fe6140000000100000014000000a848b4242fc6ea24a0d78e3cb93c5c78d79833e4090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000002e00000053007400610072006600690065006c006400200054006500630068006e006f006c006f006700690065007300000053000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c00f000000010000001400000007eeabaf80a9ef4ae1b2cb9b4b5fc70d0428e6a92000000001000000eb020000308202e730820250020101300d06092a864886f70d01010505003081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d301e170d3939303632363030313935345a170d3139303632363030313935345a3081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d30819f300d06092a864886f70d010101050003818d0030818902818100ce3a71cae5abc8599255d7abd8740ef9eed9f655475965470e0555dceb98363c5c535dd330cf38ecbd4189ed254209246b0a5eb37cdd522d4ce6d4d67d5a59a965d449132d244d1c506fb5c185543bfe71e4d35c42f980e0911a0a5b393667f33f557c1b3fb45f647334e3b412bf8764f8da12ff3727c1b343bbef7b6e2e69f70203010001300d06092a864886f70d0101050500038181003b7f506f6f509499496238381f4bf8a5c83ea78281f62bc7e8c5cee83a1082cb18008e4dbda8587fa17900b5bbe98daf41d90f34ee218119a0324928f4c48e56d55233fd50d57e996c03e4c94cfccb6cab66b34a218ce5b50c323e10b2cc6ca1dc9a984c025bf3ceb99ea5720e4ab73f3ce61668f8beed744cbc5bd5621f43dd rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
win1host.exerundll32.exeWerFault.exepid process 820 win1host.exe 820 win1host.exe 1704 rundll32.exe 1704 rundll32.exe 984 WerFault.exe 984 WerFault.exe 984 WerFault.exe 984 WerFault.exe 984 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Suono.exe.compid process 1176 Suono.exe.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 984 WerFault.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
vict.tmppid process 1800 vict.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
vict.exevict.tmpvict.exevict.tmpwin1host.exeyt9KsEwUx.execmd.execmd.exeSuono.exe.comSuono.exe.comdescription pid process target process PID 1932 wrote to memory of 1468 1932 vict.exe vict.tmp PID 1932 wrote to memory of 1468 1932 vict.exe vict.tmp PID 1932 wrote to memory of 1468 1932 vict.exe vict.tmp PID 1932 wrote to memory of 1468 1932 vict.exe vict.tmp PID 1932 wrote to memory of 1468 1932 vict.exe vict.tmp PID 1932 wrote to memory of 1468 1932 vict.exe vict.tmp PID 1932 wrote to memory of 1468 1932 vict.exe vict.tmp PID 1468 wrote to memory of 1180 1468 vict.tmp vict.exe PID 1468 wrote to memory of 1180 1468 vict.tmp vict.exe PID 1468 wrote to memory of 1180 1468 vict.tmp vict.exe PID 1468 wrote to memory of 1180 1468 vict.tmp vict.exe PID 1180 wrote to memory of 1800 1180 vict.exe vict.tmp PID 1180 wrote to memory of 1800 1180 vict.exe vict.tmp PID 1180 wrote to memory of 1800 1180 vict.exe vict.tmp PID 1180 wrote to memory of 1800 1180 vict.exe vict.tmp PID 1180 wrote to memory of 1800 1180 vict.exe vict.tmp PID 1180 wrote to memory of 1800 1180 vict.exe vict.tmp PID 1180 wrote to memory of 1800 1180 vict.exe vict.tmp PID 1800 wrote to memory of 820 1800 vict.tmp win1host.exe PID 1800 wrote to memory of 820 1800 vict.tmp win1host.exe PID 1800 wrote to memory of 820 1800 vict.tmp win1host.exe PID 1800 wrote to memory of 820 1800 vict.tmp win1host.exe PID 820 wrote to memory of 616 820 win1host.exe yt9KsEwUx.exe PID 820 wrote to memory of 616 820 win1host.exe yt9KsEwUx.exe PID 820 wrote to memory of 616 820 win1host.exe yt9KsEwUx.exe PID 820 wrote to memory of 616 820 win1host.exe yt9KsEwUx.exe PID 820 wrote to memory of 616 820 win1host.exe yt9KsEwUx.exe PID 820 wrote to memory of 616 820 win1host.exe yt9KsEwUx.exe PID 820 wrote to memory of 616 820 win1host.exe yt9KsEwUx.exe PID 616 wrote to memory of 1968 616 yt9KsEwUx.exe at.exe PID 616 wrote to memory of 1968 616 yt9KsEwUx.exe at.exe PID 616 wrote to memory of 1968 616 yt9KsEwUx.exe at.exe PID 616 wrote to memory of 1968 616 yt9KsEwUx.exe at.exe PID 616 wrote to memory of 1736 616 yt9KsEwUx.exe cmd.exe PID 616 wrote to memory of 1736 616 yt9KsEwUx.exe cmd.exe PID 616 wrote to memory of 1736 616 yt9KsEwUx.exe cmd.exe PID 616 wrote to memory of 1736 616 yt9KsEwUx.exe cmd.exe PID 1736 wrote to memory of 572 1736 cmd.exe cmd.exe PID 1736 wrote to memory of 572 1736 cmd.exe cmd.exe PID 1736 wrote to memory of 572 1736 cmd.exe cmd.exe PID 1736 wrote to memory of 572 1736 cmd.exe cmd.exe PID 572 wrote to memory of 1160 572 cmd.exe findstr.exe PID 572 wrote to memory of 1160 572 cmd.exe findstr.exe PID 572 wrote to memory of 1160 572 cmd.exe findstr.exe PID 572 wrote to memory of 1160 572 cmd.exe findstr.exe PID 572 wrote to memory of 476 572 cmd.exe Suono.exe.com PID 572 wrote to memory of 476 572 cmd.exe Suono.exe.com PID 572 wrote to memory of 476 572 cmd.exe Suono.exe.com PID 572 wrote to memory of 476 572 cmd.exe Suono.exe.com PID 572 wrote to memory of 1732 572 cmd.exe PING.EXE PID 572 wrote to memory of 1732 572 cmd.exe PING.EXE PID 572 wrote to memory of 1732 572 cmd.exe PING.EXE PID 572 wrote to memory of 1732 572 cmd.exe PING.EXE PID 476 wrote to memory of 1176 476 Suono.exe.com Suono.exe.com PID 476 wrote to memory of 1176 476 Suono.exe.com Suono.exe.com PID 476 wrote to memory of 1176 476 Suono.exe.com Suono.exe.com PID 476 wrote to memory of 1176 476 Suono.exe.com Suono.exe.com PID 1176 wrote to memory of 1572 1176 Suono.exe.com schtasks.exe PID 1176 wrote to memory of 1572 1176 Suono.exe.com schtasks.exe PID 1176 wrote to memory of 1572 1176 Suono.exe.com schtasks.exe PID 1176 wrote to memory of 1572 1176 Suono.exe.com schtasks.exe PID 1176 wrote to memory of 1408 1176 Suono.exe.com nslookup.exe PID 1176 wrote to memory of 1408 1176 Suono.exe.com nslookup.exe PID 1176 wrote to memory of 1408 1176 Suono.exe.com nslookup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vict.exe"C:\Users\Admin\AppData\Local\Temp\vict.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-5TUIQ.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-5TUIQ.tmp\vict.tmp" /SL5="$40156,870426,780800,C:\Users\Admin\AppData\Local\Temp\vict.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vict.exe"C:\Users\Admin\AppData\Local\Temp\vict.exe" /SILENT3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-PJ0S1.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-PJ0S1.tmp\vict.tmp" /SL5="$6012C,870426,780800,C:\Users\Admin\AppData\Local\Temp\vict.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exe" terteretrr5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\yt9KsEwUx.exe"C:\Users\Admin\AppData\Local\Temp\yt9KsEwUx.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Marito.gif7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe8⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^CaWSaeSvAdYkfzbpRfhIGeKeRfokmseCgqWsHlzIpUNnKXGDsJAgYjEmITwrUHXogvWfbyBGVFmLfksUIFTQRNDevvJNpd$" Amai.gif9⤵
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.comSuono.exe.com U9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.comC:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.com U10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "mLdghlcqNQ" /tr "C:\\Users\\Admin\\AppData\\Roaming\\ThUbGJfUzN\\mLdghlcqNQ.exe.com C:\\Users\\Admin\\AppData\\Roaming\\ThUbGJfUzN\\s" /sc onstart /F /RU SYSTEM11⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\nslookup.exeC:\Users\Admin\AppData\Roaming\wipetKbAeQHS\nslookup.exe11⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /c start C:\Windows\System32\rundll32.exe vcredist_64.dll,DllRegisterServer12⤵
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe vcredist_64.dll,DllRegisterServer13⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exeC:\Windows\System32\rundll32.exe vcredist_64.dll,DllRegisterServer14⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 309⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 5246⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
19499f66fb15280fcb77e38edaec307c
SHA16ae9316ae7b0e750c41da185f84276828f88a035
SHA2567273b567b2dcb5b212f47f01792f560dfad97249e1ccae9cdc7e5ffed688e5d4
SHA512d8f00a59413221ef5d425131f9cc40074f878e81744e859016427e074346bf857a32e63a0af3d73629c07331486a1b0fb06f1d2139e99410d3de150e439d45de
-
C:\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exeMD5
fe2f53642abb64acb8b7cbc47daf9472
SHA1d99bb0f9cf06e3e3da736797198b2e57eacebbfc
SHA2560fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b
SHA512e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe
-
C:\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exeMD5
fe2f53642abb64acb8b7cbc47daf9472
SHA1d99bb0f9cf06e3e3da736797198b2e57eacebbfc
SHA2560fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b
SHA512e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe
-
C:\Users\Admin\AppData\Local\Temp\is-5TUIQ.tmp\vict.tmpMD5
6359179068bf26bd5a55d22a3b81777c
SHA14250579b8d1a1b9b8219e42bd183d7f2643089a3
SHA256397dfb61352aa7e19257dd8b7e52e54771fba767ec4a6a2629acf15e73ab0c08
SHA5121c43843dad4099aa6a94f6b743d43f14b9ccb52a7934157e7f983d91c906333ddc8be9854dbb435f9eaf3ae0437ba828f9b4670db907798c3657b9c538817c2c
-
C:\Users\Admin\AppData\Local\Temp\is-PJ0S1.tmp\vict.tmpMD5
6359179068bf26bd5a55d22a3b81777c
SHA14250579b8d1a1b9b8219e42bd183d7f2643089a3
SHA256397dfb61352aa7e19257dd8b7e52e54771fba767ec4a6a2629acf15e73ab0c08
SHA5121c43843dad4099aa6a94f6b743d43f14b9ccb52a7934157e7f983d91c906333ddc8be9854dbb435f9eaf3ae0437ba828f9b4670db907798c3657b9c538817c2c
-
C:\Users\Admin\AppData\Local\Temp\is-PJ0S1.tmp\vict.tmpMD5
6359179068bf26bd5a55d22a3b81777c
SHA14250579b8d1a1b9b8219e42bd183d7f2643089a3
SHA256397dfb61352aa7e19257dd8b7e52e54771fba767ec4a6a2629acf15e73ab0c08
SHA5121c43843dad4099aa6a94f6b743d43f14b9ccb52a7934157e7f983d91c906333ddc8be9854dbb435f9eaf3ae0437ba828f9b4670db907798c3657b9c538817c2c
-
C:\Users\Admin\AppData\Local\Temp\yt9KsEwUx.exeMD5
d9fa049575abf28baf2d06080a2b9080
SHA1ac90936fcb5871bb79076730ecbcad66bd69b689
SHA256ee8294e87cfec9193c06ca8747ac86c6392aa09c5e61346e67d692a140d34909
SHA512138636f3f0896ce349cc0ae5d0455b7acd938b47eb801d69ee5bbff6e4bb2fb521310983466faeb7f4db19c38c451c8179a1dd1b3bbffd52aaac58bc47dcd7be
-
C:\Users\Admin\AppData\Local\Temp\yt9KsEwUx.exeMD5
d9fa049575abf28baf2d06080a2b9080
SHA1ac90936fcb5871bb79076730ecbcad66bd69b689
SHA256ee8294e87cfec9193c06ca8747ac86c6392aa09c5e61346e67d692a140d34909
SHA512138636f3f0896ce349cc0ae5d0455b7acd938b47eb801d69ee5bbff6e4bb2fb521310983466faeb7f4db19c38c451c8179a1dd1b3bbffd52aaac58bc47dcd7be
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Amai.gifMD5
606c84cbe58e8413a23de79a135f8b14
SHA178277d63523550feb5a38ed81d0a7e067acc9474
SHA25656873d5e811646396347047bec9196f250a7a5a0c3e7f30f43eb854684376a0e
SHA5128b6a42cbdf3675c195034584b08deeda66145f7b3ed52858180ea5061d54a1e2def70da218eeec54f96b3e27b3412495b969c211793f91e2cf80847bcb440a12
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Marito.gifMD5
1a73e1b2de876a1ee2941907f8ad4134
SHA10d2483d0a100bffd14403ec8f59a353d56e89a19
SHA2569b664434809427823f190a3b18d42acd11d25ba364075725b1549faf784da9e9
SHA512994253badd8e17452a46644e706f89016c0c591f6ef213ceac23462fff7d35e217bf789e2e9a164057b961cf938839f5d4bff39a8c9b9c7bf6e914e8e214d8f3
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.comMD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.comMD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.comMD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\UMD5
23927dc0f409ed998394c4c64fca455a
SHA111b1fde2dd60b95f8ba4dc853832631699e4b1de
SHA256f496cf57a0c2d53249066eee0dac2ffc6b82c0c0af64b781baee2ffc64f8cc92
SHA512987935777679b72707b839d3b13dfd46296268ab23399b492ca65bffcd14d9b32ca19eca93198e065779d7890a683c9015f8e42e5b36df5eee1f53b101399cde
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Vieni.gifMD5
ae210c5a9986782e7d09c01c21b809a1
SHA12547c12132150c30147a04fb479f17f66fe47376
SHA256ac9de7cfab8fde65e48e7b5e1bd660cbdfc2b0825899392acc6dbda376b2109b
SHA51232130fdb198cbdeaa85da9a37e61ef93efa1f2e10fe87f92ac690710dbee8b66be17bbff98a847cff196cc30495b6a80bd53372212134312179855c679915850
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\Voi.gifMD5
23927dc0f409ed998394c4c64fca455a
SHA111b1fde2dd60b95f8ba4dc853832631699e4b1de
SHA256f496cf57a0c2d53249066eee0dac2ffc6b82c0c0af64b781baee2ffc64f8cc92
SHA512987935777679b72707b839d3b13dfd46296268ab23399b492ca65bffcd14d9b32ca19eca93198e065779d7890a683c9015f8e42e5b36df5eee1f53b101399cde
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\nslookup.exeMD5
5e3830ee3282a53920e00784fec44cfd
SHA13e43d4ac8ea7efdf5921ad123f4eabd5648778ab
SHA2564a35c36f3f41f977fe1f0174d43c8cb9bd25a823b5f2a1970e501d839e1f8276
SHA512ad87e4db060630f5a85d4ba25e53ca81da163c7888c2b4beddba8433dbbccd3979679e5385e40a931830e3c34c0d1b8715146b5d300d7edbb554cb7cae43f775
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\nslookup.exeMD5
5e3830ee3282a53920e00784fec44cfd
SHA13e43d4ac8ea7efdf5921ad123f4eabd5648778ab
SHA2564a35c36f3f41f977fe1f0174d43c8cb9bd25a823b5f2a1970e501d839e1f8276
SHA512ad87e4db060630f5a85d4ba25e53ca81da163c7888c2b4beddba8433dbbccd3979679e5385e40a931830e3c34c0d1b8715146b5d300d7edbb554cb7cae43f775
-
C:\Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dllMD5
2c4784e618e065b072371bb2e24ef11d
SHA193dcb9355ec4846a1107cb608abeb5b24aa5c72a
SHA256784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172
SHA512065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b
-
\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\idp.dllMD5
55c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exeMD5
fe2f53642abb64acb8b7cbc47daf9472
SHA1d99bb0f9cf06e3e3da736797198b2e57eacebbfc
SHA2560fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b
SHA512e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe
-
\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exeMD5
fe2f53642abb64acb8b7cbc47daf9472
SHA1d99bb0f9cf06e3e3da736797198b2e57eacebbfc
SHA2560fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b
SHA512e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe
-
\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exeMD5
fe2f53642abb64acb8b7cbc47daf9472
SHA1d99bb0f9cf06e3e3da736797198b2e57eacebbfc
SHA2560fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b
SHA512e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe
-
\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exeMD5
fe2f53642abb64acb8b7cbc47daf9472
SHA1d99bb0f9cf06e3e3da736797198b2e57eacebbfc
SHA2560fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b
SHA512e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe
-
\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exeMD5
fe2f53642abb64acb8b7cbc47daf9472
SHA1d99bb0f9cf06e3e3da736797198b2e57eacebbfc
SHA2560fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b
SHA512e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe
-
\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exeMD5
fe2f53642abb64acb8b7cbc47daf9472
SHA1d99bb0f9cf06e3e3da736797198b2e57eacebbfc
SHA2560fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b
SHA512e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe
-
\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exeMD5
fe2f53642abb64acb8b7cbc47daf9472
SHA1d99bb0f9cf06e3e3da736797198b2e57eacebbfc
SHA2560fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b
SHA512e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe
-
\Users\Admin\AppData\Local\Temp\is-17JGE.tmp\win1host.exeMD5
fe2f53642abb64acb8b7cbc47daf9472
SHA1d99bb0f9cf06e3e3da736797198b2e57eacebbfc
SHA2560fb9b4d12542494d40c4902f3163803102d2c034a92c7252b89ce955c427f03b
SHA512e1a4631afd164e226542f99e8e77428b616b05c6f3dd43c5938ba5d933d63a214c311a24ce4d4bcd644c879c820ae9f18948b27e4524b3f01c96cb1414e9cbfe
-
\Users\Admin\AppData\Local\Temp\is-5TUIQ.tmp\vict.tmpMD5
6359179068bf26bd5a55d22a3b81777c
SHA14250579b8d1a1b9b8219e42bd183d7f2643089a3
SHA256397dfb61352aa7e19257dd8b7e52e54771fba767ec4a6a2629acf15e73ab0c08
SHA5121c43843dad4099aa6a94f6b743d43f14b9ccb52a7934157e7f983d91c906333ddc8be9854dbb435f9eaf3ae0437ba828f9b4670db907798c3657b9c538817c2c
-
\Users\Admin\AppData\Local\Temp\is-PJ0S1.tmp\vict.tmpMD5
6359179068bf26bd5a55d22a3b81777c
SHA14250579b8d1a1b9b8219e42bd183d7f2643089a3
SHA256397dfb61352aa7e19257dd8b7e52e54771fba767ec4a6a2629acf15e73ab0c08
SHA5121c43843dad4099aa6a94f6b743d43f14b9ccb52a7934157e7f983d91c906333ddc8be9854dbb435f9eaf3ae0437ba828f9b4670db907798c3657b9c538817c2c
-
\Users\Admin\AppData\Local\Temp\is-PP7NN.tmp\idp.dllMD5
55c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
\Users\Admin\AppData\Local\Temp\yt9KsEwUx.exeMD5
d9fa049575abf28baf2d06080a2b9080
SHA1ac90936fcb5871bb79076730ecbcad66bd69b689
SHA256ee8294e87cfec9193c06ca8747ac86c6392aa09c5e61346e67d692a140d34909
SHA512138636f3f0896ce349cc0ae5d0455b7acd938b47eb801d69ee5bbff6e4bb2fb521310983466faeb7f4db19c38c451c8179a1dd1b3bbffd52aaac58bc47dcd7be
-
\Users\Admin\AppData\Roaming\wipetKbAeQHS\Suono.exe.comMD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
\Users\Admin\AppData\Roaming\wipetKbAeQHS\nslookup.exeMD5
5e3830ee3282a53920e00784fec44cfd
SHA13e43d4ac8ea7efdf5921ad123f4eabd5648778ab
SHA2564a35c36f3f41f977fe1f0174d43c8cb9bd25a823b5f2a1970e501d839e1f8276
SHA512ad87e4db060630f5a85d4ba25e53ca81da163c7888c2b4beddba8433dbbccd3979679e5385e40a931830e3c34c0d1b8715146b5d300d7edbb554cb7cae43f775
-
\Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dllMD5
2c4784e618e065b072371bb2e24ef11d
SHA193dcb9355ec4846a1107cb608abeb5b24aa5c72a
SHA256784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172
SHA512065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b
-
\Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dllMD5
2c4784e618e065b072371bb2e24ef11d
SHA193dcb9355ec4846a1107cb608abeb5b24aa5c72a
SHA256784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172
SHA512065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b
-
\Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dllMD5
2c4784e618e065b072371bb2e24ef11d
SHA193dcb9355ec4846a1107cb608abeb5b24aa5c72a
SHA256784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172
SHA512065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b
-
\Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dllMD5
2c4784e618e065b072371bb2e24ef11d
SHA193dcb9355ec4846a1107cb608abeb5b24aa5c72a
SHA256784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172
SHA512065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b
-
\Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dllMD5
2c4784e618e065b072371bb2e24ef11d
SHA193dcb9355ec4846a1107cb608abeb5b24aa5c72a
SHA256784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172
SHA512065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b
-
\Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dllMD5
2c4784e618e065b072371bb2e24ef11d
SHA193dcb9355ec4846a1107cb608abeb5b24aa5c72a
SHA256784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172
SHA512065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b
-
\Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dllMD5
2c4784e618e065b072371bb2e24ef11d
SHA193dcb9355ec4846a1107cb608abeb5b24aa5c72a
SHA256784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172
SHA512065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b
-
\Users\Admin\AppData\Roaming\wipetKbAeQHS\vcredist_64.dllMD5
2c4784e618e065b072371bb2e24ef11d
SHA193dcb9355ec4846a1107cb608abeb5b24aa5c72a
SHA256784ee92895e1e33403d4abdcc2cfd4a0ec50f20b3844c3d1d2aac11136efb172
SHA512065ba98ece735f4383e5ee111a55a8854419312019548e27999a714867e0962e58c5936afaeb39e201590597e0ac3337415dd9ce88d375c5fbd4c0e7a30f3f7b
-
memory/476-40-0x0000000000000000-mapping.dmp
-
memory/572-35-0x0000000000000000-mapping.dmp
-
memory/616-27-0x0000000000000000-mapping.dmp
-
memory/776-19-0x000007FEF6E90000-0x000007FEF710A000-memory.dmpFilesize
2.5MB
-
memory/820-22-0x0000000000000000-mapping.dmp
-
memory/984-74-0x0000000000000000-mapping.dmp
-
memory/984-75-0x0000000001FE0000-0x0000000001FF1000-memory.dmpFilesize
68KB
-
memory/984-83-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/1160-36-0x0000000000000000-mapping.dmp
-
memory/1176-56-0x00000000002E0000-0x00000000002E2000-memory.dmpFilesize
8KB
-
memory/1176-45-0x0000000000000000-mapping.dmp
-
memory/1176-55-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/1180-10-0x0000000000000000-mapping.dmp
-
memory/1408-57-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1408-52-0x000000000040128D-mapping.dmp
-
memory/1468-4-0x0000000000000000-mapping.dmp
-
memory/1468-9-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/1572-50-0x0000000000000000-mapping.dmp
-
memory/1704-67-0x0000000000000000-mapping.dmp
-
memory/1704-73-0x00000000003A0000-0x00000000003A7000-memory.dmpFilesize
28KB
-
memory/1732-44-0x0000000000000000-mapping.dmp
-
memory/1736-33-0x0000000000000000-mapping.dmp
-
memory/1800-18-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/1800-13-0x0000000000000000-mapping.dmp
-
memory/1896-59-0x0000000000000000-mapping.dmp
-
memory/1932-2-0x00000000750C1000-0x00000000750C3000-memory.dmpFilesize
8KB
-
memory/1932-8-0x0000000000401000-0x00000000004B7000-memory.dmpFilesize
728KB
-
memory/1932-60-0x0000000000000000-mapping.dmp
-
memory/1968-31-0x0000000000000000-mapping.dmp