Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    09-05-2021 02:01

General

  • Target

    8B1C960881FC789460B5B274ABD43BADDB1C92E1A942D.exe

  • Size

    760KB

  • MD5

    0aca4701d765de0b7e4ebc73e5770e2f

  • SHA1

    392f69d691e1dd17395448d17d354842f05c5b49

  • SHA256

    8b1c960881fc789460b5b274abd43baddb1c92e1a942d3a1080a4adb1f545e50

  • SHA512

    04903dcc4a4b4aad7ee08fb3bc7f74bda248651837af416bf243090328d73e10e37f9ca01840fb79c7a0b40bc7830e2e21a9892587be3964da974ab1d996ed73

Malware Config

Extracted

Family

raccoon

Botnet

67a1a4d96e0af06ab629d8d5c048c516a37dbc35

Attributes
  • url4cnc

    https://tttttt.me/brikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

oski

C2

malcacnba.ac.ug

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Contains code to disable Windows Defender 4 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Async RAT payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 26 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8B1C960881FC789460B5B274ABD43BADDB1C92E1A942D.exe
    "C:\Users\Admin\AppData\Local\Temp\8B1C960881FC789460B5B274ABD43BADDB1C92E1A942D.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\8B1C960881FC789460B5B274ABD43BADDB1C92E1A942D.exe
      "C:\Users\Admin\AppData\Local\Temp\8B1C960881FC789460B5B274ABD43BADDB1C92E1A942D.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Users\Admin\AppData\Local\Temp\gdfagfdds.exe
        "C:\Users\Admin\AppData\Local\Temp\gdfagfdds.exe" 0
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Users\Admin\AppData\Local\Temp\VDFgrdbvcdsf.exe
          "C:\Users\Admin\AppData\Local\Temp\VDFgrdbvcdsf.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2868
          • C:\Users\Admin\AppData\Local\Temp\VDFgrdbvcdsf.exe
            "C:\Users\Admin\AppData\Local\Temp\VDFgrdbvcdsf.exe"
            5⤵
            • Executes dropped EXE
            PID:2420
        • C:\Users\Admin\AppData\Local\Temp\FDfgbtgwssdf.exe
          "C:\Users\Admin\AppData\Local\Temp\FDfgbtgwssdf.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3340
          • C:\Users\Admin\AppData\Local\Temp\FDfgbtgwssdf.exe
            "C:\Users\Admin\AppData\Local\Temp\FDfgbtgwssdf.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:3204
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c taskkill /pid 3204 & erase C:\Users\Admin\AppData\Local\Temp\FDfgbtgwssdf.exe & RD /S /Q C:\\ProgramData\\248493849217343\\* & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1692
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /pid 3204
                7⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3244
        • C:\Users\Admin\AppData\Local\Temp\gdfagfdds.exe
          "C:\Users\Admin\AppData\Local\Temp\gdfagfdds.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops desktop.ini file(s)
          • Suspicious use of WriteProcessMemory
          PID:1816
          • C:\Users\Admin\AppData\Local\Temp\wrgt0Sv1Lx.exe
            "C:\Users\Admin\AppData\Local\Temp\wrgt0Sv1Lx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:4028
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cfgjShmvTZXcKv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp53AF.tmp"
              6⤵
              • Creates scheduled task(s)
              PID:2380
            • C:\Users\Admin\AppData\Local\Temp\wrgt0Sv1Lx.exe
              "{path}"
              6⤵
              • Executes dropped EXE
              PID:2964
          • C:\Users\Admin\AppData\Local\Temp\Wg1uGeT22X.exe
            "C:\Users\Admin\AppData\Local\Temp\Wg1uGeT22X.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            PID:4000
            • C:\Users\Admin\AppData\Local\Temp\Wg1uGeT22X.exe
              C:\Users\Admin\AppData\Local\Temp\Wg1uGeT22X.exe
              6⤵
              • Executes dropped EXE
              PID:1592
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Public\stt.bat" "
              6⤵
                PID:480
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /K C:\Users\Public\PXOR.bat
                  7⤵
                    PID:1736
                    • C:\Windows \System32\Netplwiz.exe
                      "C:\Windows \System32\Netplwiz.exe"
                      8⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:4120
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c C:\Users\Public\Cdex.bat
                        9⤵
                          PID:4188
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell -WindowStyle Hidden -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                            10⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4564
                • C:\Users\Admin\AppData\Local\Temp\3GI64mApg6.exe
                  "C:\Users\Admin\AppData\Local\Temp\3GI64mApg6.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:3940
                  • C:\Users\Admin\AppData\Local\Temp\3GI64mApg6.exe
                    "{path}"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:2012
                    • \??\c:\windows\SysWOW64\cmstp.exe
                      "c:\windows\system32\cmstp.exe" /au C:\Windows\temp\21grmlat.inf
                      7⤵
                        PID:584
                  • C:\Users\Admin\AppData\Local\Temp\wbJtI0Skv5.exe
                    "C:\Users\Admin\AppData\Local\Temp\wbJtI0Skv5.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3088
                    • C:\Users\Admin\AppData\Local\Temp\wbJtI0Skv5.exe
                      "{path}"
                      6⤵
                      • Executes dropped EXE
                      PID:1296
                    • C:\Users\Admin\AppData\Local\Temp\wbJtI0Skv5.exe
                      "{path}"
                      6⤵
                      • Executes dropped EXE
                      PID:3960
                    • C:\Users\Admin\AppData\Local\Temp\wbJtI0Skv5.exe
                      "{path}"
                      6⤵
                      • Executes dropped EXE
                      • Windows security modification
                      PID:3736
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\gdfagfdds.exe"
                    5⤵
                      PID:3792
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /T 10 /NOBREAK
                        6⤵
                        • Delays execution with timeout.exe
                        PID:2480
                • C:\Users\Admin\AppData\Local\Temp\fdsgfdds.exe
                  "C:\Users\Admin\AppData\Local\Temp\fdsgfdds.exe" 0
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2412
                • C:\Users\Admin\AppData\Local\Temp\jghfdsfadsfdds.exe
                  "C:\Users\Admin\AppData\Local\Temp\jghfdsfadsfdds.exe" 0
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4080
                  • C:\Users\Admin\AppData\Local\Temp\azflkjgfkldsad.exe
                    "C:\Users\Admin\AppData\Local\Temp\azflkjgfkldsad.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3904
                    • C:\Users\Admin\AppData\Local\Temp\ozflkjgfkldsad.exe
                      "C:\Users\Admin\AppData\Local\Temp\ozflkjgfkldsad.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:3380
                      • C:\Users\Admin\AppData\Local\Temp\ozflkjgfkldsad.exe
                        "{path}"
                        6⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Checks processor information in registry
                        PID:5604
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c taskkill /pid 5604 & erase C:\Users\Admin\AppData\Local\Temp\ozflkjgfkldsad.exe & RD /S /Q C:\\ProgramData\\239847652578764\\* & exit
                          7⤵
                            PID:5664
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /pid 5604
                              8⤵
                              • Kills process with taskkill
                              PID:5708
                      • C:\Users\Admin\AppData\Local\Temp\azflkjgfkldsad.exe
                        "{path}"
                        5⤵
                        • Executes dropped EXE
                        PID:4084
                    • C:\Users\Admin\AppData\Local\Temp\jghfdsfadsfdds.exe
                      "{path}"
                      4⤵
                      • Executes dropped EXE
                      PID:2192
                  • C:\Users\Admin\AppData\Local\Temp\dfsiuysfdds.exe
                    "C:\Users\Admin\AppData\Local\Temp\dfsiuysfdds.exe" 0
                    3⤵
                    • Executes dropped EXE
                    PID:2940
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 1228
                      4⤵
                      • Program crash
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1520
              • C:\Windows\SysWOW64\DllHost.exe
                C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                1⤵
                  PID:4080
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c start C:\Windows\temp\20zi1afn.exe
                    2⤵
                      PID:3852
                      • C:\Windows\temp\20zi1afn.exe
                        C:\Windows\temp\20zi1afn.exe
                        3⤵
                        • Executes dropped EXE
                        PID:2732
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" Get-MpPreference -verbose
                          4⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1016
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
                          4⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1824
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
                          4⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1428
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
                          4⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4228
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
                          4⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4320
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
                          4⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4536
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
                          4⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4648
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
                          4⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4708
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
                          4⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4788
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
                          4⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4888
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
                          4⤵
                            PID:1692
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
                            4⤵
                              PID:4060
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
                              4⤵
                                PID:5272
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /IM cmstp.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3176
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" Get-MpPreference -verbose
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:192

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Execution

                        Scheduled Task

                        1
                        T1053

                        Persistence

                        Modify Existing Service

                        1
                        T1031

                        Registry Run Keys / Startup Folder

                        1
                        T1060

                        Scheduled Task

                        1
                        T1053

                        Privilege Escalation

                        Scheduled Task

                        1
                        T1053

                        Defense Evasion

                        Modify Registry

                        3
                        T1112

                        Disabling Security Tools

                        2
                        T1089

                        Credential Access

                        Credentials in Files

                        3
                        T1081

                        Discovery

                        Query Registry

                        2
                        T1012

                        System Information Discovery

                        2
                        T1082

                        Collection

                        Data from Local System

                        3
                        T1005

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                          MD5

                          ad5cd538ca58cb28ede39c108acb5785

                          SHA1

                          1ae910026f3dbe90ed025e9e96ead2b5399be877

                          SHA256

                          c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                          SHA512

                          c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3GI64mApg6.exe.log
                          MD5

                          0c2899d7c6746f42d5bbe088c777f94c

                          SHA1

                          622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1

                          SHA256

                          5b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458

                          SHA512

                          ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wbJtI0Skv5.exe.log
                          MD5

                          0c2899d7c6746f42d5bbe088c777f94c

                          SHA1

                          622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1

                          SHA256

                          5b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458

                          SHA512

                          ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wrgt0Sv1Lx.exe.log
                          MD5

                          0c2899d7c6746f42d5bbe088c777f94c

                          SHA1

                          622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1

                          SHA256

                          5b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458

                          SHA512

                          ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          2b6b8710c5f62fed0fa366702a2a6f38

                          SHA1

                          972fbe11146535c5d6b83c53a1a120089b0d9d6f

                          SHA256

                          9373d0cea9700a81489c241a5cd6a68b7b402d31490645cc6dbd49a2f42f7937

                          SHA512

                          965780376d1a6d3939c19f62e76a0739e7eb5c3fecafd71b8fe047f29c41f0fe0bac8cf2b178a71f9e440a1568e69ad6f8def1945697dc9a635c29a84c0be5f9

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          9bc3238842370c9bc51a009674b72d01

                          SHA1

                          1444ca30a2d7bc31e1267cd1ef7e4788707c6048

                          SHA256

                          96a19145e578beb279a3ef49f6009b1d493e53f407b11513ee36c28c953a62f8

                          SHA512

                          76f92c3a5f99e2aee68f9ce8281b22bf7381251cfb8201f9a44761a4befeb3690412eca83330fbfc9d9e8eec10aa71657403030a87e0620ddd66355b847d91e6

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          e01d3ada71de9e3b21768f76aedde6f2

                          SHA1

                          1b496c2bcf10669dab712feeb1ec781a3e722324

                          SHA256

                          bc9ababbe1a964f2ffb12b53673bec3985b7852333b2cf03cbee1c514e4fd801

                          SHA512

                          450f33adf4fff32fdaa72b80a313a4a1fa94697d3703397d6444c0248ded3ca8b10ede99b9b10358a24e4b238c3d24c3423a7b0bc4f89716e2a7e4c4ee278766

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          fa7402c254c239a3bfc7fa881f4f471a

                          SHA1

                          16eff07bad5c0444f6e583d6b3ef399483f43046

                          SHA256

                          44edbf8e1d5d68d639af89b6b7a3f3fcc4a124356a9f489ab10f76f9aa6a651f

                          SHA512

                          8fc41afc6fc9f24996d1fcdc2f215d84ac43221d5bb231a3f326261b6c6f11371dc8ff6f8e24bf4a48e82f1294558a7b367bc5e843e2aacde0784d5bd84a33a6

                        • C:\Users\Admin\AppData\Local\Temp\3GI64mApg6.exe
                          MD5

                          5af92f78e6b00eff95b14018a5dda8fc

                          SHA1

                          5c02ecdd931eff5c66856cd13286cdb8f3172a23

                          SHA256

                          6cbfb1c60567bc22a202ba90c7a6cd377a133ae17b34dc5bef7d4e4808a66b8b

                          SHA512

                          d3f6632c7e9f2f7d57ac79c7b0c34ec243a927c3c98c542f9bd66e540981d1b7aafdcc01ac68ccfee820be5f8ef00b59c110afd25a622d205c51290eeb072d1b

                        • C:\Users\Admin\AppData\Local\Temp\3GI64mApg6.exe
                          MD5

                          5af92f78e6b00eff95b14018a5dda8fc

                          SHA1

                          5c02ecdd931eff5c66856cd13286cdb8f3172a23

                          SHA256

                          6cbfb1c60567bc22a202ba90c7a6cd377a133ae17b34dc5bef7d4e4808a66b8b

                          SHA512

                          d3f6632c7e9f2f7d57ac79c7b0c34ec243a927c3c98c542f9bd66e540981d1b7aafdcc01ac68ccfee820be5f8ef00b59c110afd25a622d205c51290eeb072d1b

                        • C:\Users\Admin\AppData\Local\Temp\3GI64mApg6.exe
                          MD5

                          5af92f78e6b00eff95b14018a5dda8fc

                          SHA1

                          5c02ecdd931eff5c66856cd13286cdb8f3172a23

                          SHA256

                          6cbfb1c60567bc22a202ba90c7a6cd377a133ae17b34dc5bef7d4e4808a66b8b

                          SHA512

                          d3f6632c7e9f2f7d57ac79c7b0c34ec243a927c3c98c542f9bd66e540981d1b7aafdcc01ac68ccfee820be5f8ef00b59c110afd25a622d205c51290eeb072d1b

                        • C:\Users\Admin\AppData\Local\Temp\FDfgbtgwssdf.exe
                          MD5

                          cef7c1b1844c7fd3c3692bc8bad713f4

                          SHA1

                          162d51f28d7231f88b4e686bf2dc2e6c17b13867

                          SHA256

                          42230602b4fff2f505dc7f6c37732717e61edcb86184944e36e258aad9c6e8d2

                          SHA512

                          9300803a802f3e8b7e85a2646db4e0f46e8ff276014b390c3565a5ee61b89dcf5c90d54337c2bfdb432e61779a03228ab9984d38c48f0279cfe62e4cfee22e2b

                        • C:\Users\Admin\AppData\Local\Temp\FDfgbtgwssdf.exe
                          MD5

                          cef7c1b1844c7fd3c3692bc8bad713f4

                          SHA1

                          162d51f28d7231f88b4e686bf2dc2e6c17b13867

                          SHA256

                          42230602b4fff2f505dc7f6c37732717e61edcb86184944e36e258aad9c6e8d2

                          SHA512

                          9300803a802f3e8b7e85a2646db4e0f46e8ff276014b390c3565a5ee61b89dcf5c90d54337c2bfdb432e61779a03228ab9984d38c48f0279cfe62e4cfee22e2b

                        • C:\Users\Admin\AppData\Local\Temp\FDfgbtgwssdf.exe
                          MD5

                          cef7c1b1844c7fd3c3692bc8bad713f4

                          SHA1

                          162d51f28d7231f88b4e686bf2dc2e6c17b13867

                          SHA256

                          42230602b4fff2f505dc7f6c37732717e61edcb86184944e36e258aad9c6e8d2

                          SHA512

                          9300803a802f3e8b7e85a2646db4e0f46e8ff276014b390c3565a5ee61b89dcf5c90d54337c2bfdb432e61779a03228ab9984d38c48f0279cfe62e4cfee22e2b

                        • C:\Users\Admin\AppData\Local\Temp\VDFgrdbvcdsf.exe
                          MD5

                          c8ec2be7bf8005fa2aa5a96f9cce5a18

                          SHA1

                          7c27aecadaf236a4b3c028113242700a9abac579

                          SHA256

                          73dfe6bf48ce6fb61c6e1421d676c37fd785bc4e6a1c7627735e0ba7a3775ca8

                          SHA512

                          ffb6a83e4fa167db7f319384d0e5ef51a4e0bfebe3900020f1decf8d9171a69888472a1c9cf7037872a3d5350f96d1d80b2e028717d9a14f7117916d41642b5e

                        • C:\Users\Admin\AppData\Local\Temp\VDFgrdbvcdsf.exe
                          MD5

                          c8ec2be7bf8005fa2aa5a96f9cce5a18

                          SHA1

                          7c27aecadaf236a4b3c028113242700a9abac579

                          SHA256

                          73dfe6bf48ce6fb61c6e1421d676c37fd785bc4e6a1c7627735e0ba7a3775ca8

                          SHA512

                          ffb6a83e4fa167db7f319384d0e5ef51a4e0bfebe3900020f1decf8d9171a69888472a1c9cf7037872a3d5350f96d1d80b2e028717d9a14f7117916d41642b5e

                        • C:\Users\Admin\AppData\Local\Temp\VDFgrdbvcdsf.exe
                          MD5

                          c8ec2be7bf8005fa2aa5a96f9cce5a18

                          SHA1

                          7c27aecadaf236a4b3c028113242700a9abac579

                          SHA256

                          73dfe6bf48ce6fb61c6e1421d676c37fd785bc4e6a1c7627735e0ba7a3775ca8

                          SHA512

                          ffb6a83e4fa167db7f319384d0e5ef51a4e0bfebe3900020f1decf8d9171a69888472a1c9cf7037872a3d5350f96d1d80b2e028717d9a14f7117916d41642b5e

                        • C:\Users\Admin\AppData\Local\Temp\Wg1uGeT22X.exe
                          MD5

                          e1d12a9c20844533f411f44a11c8ebd7

                          SHA1

                          6486bee5805be89084fc6286a43af065a93af310

                          SHA256

                          3418e1333e9001927ecc9000abf19f6dfd97a2a48399c9769182a132df8b39dc

                          SHA512

                          3048f1495b213d58c9732d8253798d5d029906da0f6eeffb5dee50cadfe659b18043dee227fb4b524af5427621d8b2e93c09b1812b10cb1f4b963343d79abb69

                        • C:\Users\Admin\AppData\Local\Temp\Wg1uGeT22X.exe
                          MD5

                          e1d12a9c20844533f411f44a11c8ebd7

                          SHA1

                          6486bee5805be89084fc6286a43af065a93af310

                          SHA256

                          3418e1333e9001927ecc9000abf19f6dfd97a2a48399c9769182a132df8b39dc

                          SHA512

                          3048f1495b213d58c9732d8253798d5d029906da0f6eeffb5dee50cadfe659b18043dee227fb4b524af5427621d8b2e93c09b1812b10cb1f4b963343d79abb69

                        • C:\Users\Admin\AppData\Local\Temp\Wg1uGeT22X.exe
                          MD5

                          e1d12a9c20844533f411f44a11c8ebd7

                          SHA1

                          6486bee5805be89084fc6286a43af065a93af310

                          SHA256

                          3418e1333e9001927ecc9000abf19f6dfd97a2a48399c9769182a132df8b39dc

                          SHA512

                          3048f1495b213d58c9732d8253798d5d029906da0f6eeffb5dee50cadfe659b18043dee227fb4b524af5427621d8b2e93c09b1812b10cb1f4b963343d79abb69

                        • C:\Users\Admin\AppData\Local\Temp\azflkjgfkldsad.exe
                          MD5

                          eb6c0ff23c01dd3528789c8142890547

                          SHA1

                          7cfed1e8bed52f4f376e5702dc303b6235b8a19d

                          SHA256

                          fe69416ea50c8316791d7de7da893f9189c3d5f34cb9c64026206d19325ef5c5

                          SHA512

                          0e3bf1fbbe15a26d6648a1eca4f2d66544a9d4293956aaaac8d258141d74ce11d4849b610285342219d315836dbe9e71aec9a1896020bb5def645ccdf994d94b

                        • C:\Users\Admin\AppData\Local\Temp\azflkjgfkldsad.exe
                          MD5

                          eb6c0ff23c01dd3528789c8142890547

                          SHA1

                          7cfed1e8bed52f4f376e5702dc303b6235b8a19d

                          SHA256

                          fe69416ea50c8316791d7de7da893f9189c3d5f34cb9c64026206d19325ef5c5

                          SHA512

                          0e3bf1fbbe15a26d6648a1eca4f2d66544a9d4293956aaaac8d258141d74ce11d4849b610285342219d315836dbe9e71aec9a1896020bb5def645ccdf994d94b

                        • C:\Users\Admin\AppData\Local\Temp\azflkjgfkldsad.exe
                          MD5

                          eb6c0ff23c01dd3528789c8142890547

                          SHA1

                          7cfed1e8bed52f4f376e5702dc303b6235b8a19d

                          SHA256

                          fe69416ea50c8316791d7de7da893f9189c3d5f34cb9c64026206d19325ef5c5

                          SHA512

                          0e3bf1fbbe15a26d6648a1eca4f2d66544a9d4293956aaaac8d258141d74ce11d4849b610285342219d315836dbe9e71aec9a1896020bb5def645ccdf994d94b

                        • C:\Users\Admin\AppData\Local\Temp\dfsiuysfdds.exe
                          MD5

                          0ef5824f270cd5f0677a4b4dfccfcf7a

                          SHA1

                          7a08ec428f1cee638735440b932e7d9a202d3bcb

                          SHA256

                          9528962252a217d88d24e372be0b977639c7d00f6777687adec8054eb8480784

                          SHA512

                          ea9cbfa85ca522f822bcff152afa6a6a1f8c2ae8e91459f105d6f5e4eb53848c696fb2ec756241738fba5d9195972b9c7fecb3073708319af2c27cced0eb709b

                        • C:\Users\Admin\AppData\Local\Temp\dfsiuysfdds.exe
                          MD5

                          0ef5824f270cd5f0677a4b4dfccfcf7a

                          SHA1

                          7a08ec428f1cee638735440b932e7d9a202d3bcb

                          SHA256

                          9528962252a217d88d24e372be0b977639c7d00f6777687adec8054eb8480784

                          SHA512

                          ea9cbfa85ca522f822bcff152afa6a6a1f8c2ae8e91459f105d6f5e4eb53848c696fb2ec756241738fba5d9195972b9c7fecb3073708319af2c27cced0eb709b

                        • C:\Users\Admin\AppData\Local\Temp\fdsgfdds.exe
                          MD5

                          85f8144cf55f7e208b04daf30a0e753c

                          SHA1

                          79b31f9e33db670b0fe23a427d2a7964cd42c570

                          SHA256

                          a9b0a14beac57ba149a978c8f0996a4f4e70e003b80c67e631947c9dc3590154

                          SHA512

                          5972cccacf15624bbd9985e8a44c4037cfaacfc7ad4c3c3d65cf5904ff656698475302520ce10e2bc97c0364e7bc8f3a0e1763584637f65650ab184eb9fb5f28

                        • C:\Users\Admin\AppData\Local\Temp\fdsgfdds.exe
                          MD5

                          85f8144cf55f7e208b04daf30a0e753c

                          SHA1

                          79b31f9e33db670b0fe23a427d2a7964cd42c570

                          SHA256

                          a9b0a14beac57ba149a978c8f0996a4f4e70e003b80c67e631947c9dc3590154

                          SHA512

                          5972cccacf15624bbd9985e8a44c4037cfaacfc7ad4c3c3d65cf5904ff656698475302520ce10e2bc97c0364e7bc8f3a0e1763584637f65650ab184eb9fb5f28

                        • C:\Users\Admin\AppData\Local\Temp\gdfagfdds.exe
                          MD5

                          85f8144cf55f7e208b04daf30a0e753c

                          SHA1

                          79b31f9e33db670b0fe23a427d2a7964cd42c570

                          SHA256

                          a9b0a14beac57ba149a978c8f0996a4f4e70e003b80c67e631947c9dc3590154

                          SHA512

                          5972cccacf15624bbd9985e8a44c4037cfaacfc7ad4c3c3d65cf5904ff656698475302520ce10e2bc97c0364e7bc8f3a0e1763584637f65650ab184eb9fb5f28

                        • C:\Users\Admin\AppData\Local\Temp\gdfagfdds.exe
                          MD5

                          85f8144cf55f7e208b04daf30a0e753c

                          SHA1

                          79b31f9e33db670b0fe23a427d2a7964cd42c570

                          SHA256

                          a9b0a14beac57ba149a978c8f0996a4f4e70e003b80c67e631947c9dc3590154

                          SHA512

                          5972cccacf15624bbd9985e8a44c4037cfaacfc7ad4c3c3d65cf5904ff656698475302520ce10e2bc97c0364e7bc8f3a0e1763584637f65650ab184eb9fb5f28

                        • C:\Users\Admin\AppData\Local\Temp\gdfagfdds.exe
                          MD5

                          85f8144cf55f7e208b04daf30a0e753c

                          SHA1

                          79b31f9e33db670b0fe23a427d2a7964cd42c570

                          SHA256

                          a9b0a14beac57ba149a978c8f0996a4f4e70e003b80c67e631947c9dc3590154

                          SHA512

                          5972cccacf15624bbd9985e8a44c4037cfaacfc7ad4c3c3d65cf5904ff656698475302520ce10e2bc97c0364e7bc8f3a0e1763584637f65650ab184eb9fb5f28

                        • C:\Users\Admin\AppData\Local\Temp\jghfdsfadsfdds.exe
                          MD5

                          0ef5824f270cd5f0677a4b4dfccfcf7a

                          SHA1

                          7a08ec428f1cee638735440b932e7d9a202d3bcb

                          SHA256

                          9528962252a217d88d24e372be0b977639c7d00f6777687adec8054eb8480784

                          SHA512

                          ea9cbfa85ca522f822bcff152afa6a6a1f8c2ae8e91459f105d6f5e4eb53848c696fb2ec756241738fba5d9195972b9c7fecb3073708319af2c27cced0eb709b

                        • C:\Users\Admin\AppData\Local\Temp\jghfdsfadsfdds.exe
                          MD5

                          0ef5824f270cd5f0677a4b4dfccfcf7a

                          SHA1

                          7a08ec428f1cee638735440b932e7d9a202d3bcb

                          SHA256

                          9528962252a217d88d24e372be0b977639c7d00f6777687adec8054eb8480784

                          SHA512

                          ea9cbfa85ca522f822bcff152afa6a6a1f8c2ae8e91459f105d6f5e4eb53848c696fb2ec756241738fba5d9195972b9c7fecb3073708319af2c27cced0eb709b

                        • C:\Users\Admin\AppData\Local\Temp\jghfdsfadsfdds.exe
                          MD5

                          0ef5824f270cd5f0677a4b4dfccfcf7a

                          SHA1

                          7a08ec428f1cee638735440b932e7d9a202d3bcb

                          SHA256

                          9528962252a217d88d24e372be0b977639c7d00f6777687adec8054eb8480784

                          SHA512

                          ea9cbfa85ca522f822bcff152afa6a6a1f8c2ae8e91459f105d6f5e4eb53848c696fb2ec756241738fba5d9195972b9c7fecb3073708319af2c27cced0eb709b

                        • C:\Users\Admin\AppData\Local\Temp\ozflkjgfkldsad.exe
                          MD5

                          b573e394640d7c1d5493e0f57c905390

                          SHA1

                          040e9bb1ff744a02128e781b3763eb1908823e20

                          SHA256

                          e35475374a222d26bfb9f79785226629a92b18e1d0eea149daf2332e1c98ac12

                          SHA512

                          282d5147175bed23e8147e9ab0aa7d21f9bc6462b348850fbf42f16e5ce0c6463cfd0e19b1943901529d49dff2c02226237dbf3abd4218d82d9bbacb836bd63c

                        • C:\Users\Admin\AppData\Local\Temp\ozflkjgfkldsad.exe
                          MD5

                          b573e394640d7c1d5493e0f57c905390

                          SHA1

                          040e9bb1ff744a02128e781b3763eb1908823e20

                          SHA256

                          e35475374a222d26bfb9f79785226629a92b18e1d0eea149daf2332e1c98ac12

                          SHA512

                          282d5147175bed23e8147e9ab0aa7d21f9bc6462b348850fbf42f16e5ce0c6463cfd0e19b1943901529d49dff2c02226237dbf3abd4218d82d9bbacb836bd63c

                        • C:\Users\Admin\AppData\Local\Temp\tmp53AF.tmp
                          MD5

                          d4e89af4caa35b92c8f78cf4df7a8887

                          SHA1

                          9ed0d9f62587aee360adb2d9128e57efa5f0cbe8

                          SHA256

                          4abfb4aeeff5f17ea8ee1f4275e93b86f04172403c67c34c4a7bef10c839fdc8

                          SHA512

                          073d4932e22b4512eb1b13a1ed39e23f6af99952acdd5d17b8af667cf301b67f69272a1a266d021d6ac77a510ecedf0184436d2f8c9b79704ba489d4ebe6258c

                        • C:\Users\Admin\AppData\Local\Temp\wbJtI0Skv5.exe
                          MD5

                          3cdb00a25552429b06fb3be209614149

                          SHA1

                          7ecad79254adcd96c426ce99a22c12121fa220ca

                          SHA256

                          99de1acdd89d08fe0cc39b096ba36dc9149206bfbad5d4b12fa5f1bc462adb4c

                          SHA512

                          6a8a0b5bde09206f4246683f7de8065498f3f5f0786158ad64ce4aec0276344544f22ecfa9a7803e91b36efaadd702ccaaec818ed9538434a1df5611ea539623

                        • C:\Users\Admin\AppData\Local\Temp\wbJtI0Skv5.exe
                          MD5

                          3cdb00a25552429b06fb3be209614149

                          SHA1

                          7ecad79254adcd96c426ce99a22c12121fa220ca

                          SHA256

                          99de1acdd89d08fe0cc39b096ba36dc9149206bfbad5d4b12fa5f1bc462adb4c

                          SHA512

                          6a8a0b5bde09206f4246683f7de8065498f3f5f0786158ad64ce4aec0276344544f22ecfa9a7803e91b36efaadd702ccaaec818ed9538434a1df5611ea539623

                        • C:\Users\Admin\AppData\Local\Temp\wbJtI0Skv5.exe
                          MD5

                          3cdb00a25552429b06fb3be209614149

                          SHA1

                          7ecad79254adcd96c426ce99a22c12121fa220ca

                          SHA256

                          99de1acdd89d08fe0cc39b096ba36dc9149206bfbad5d4b12fa5f1bc462adb4c

                          SHA512

                          6a8a0b5bde09206f4246683f7de8065498f3f5f0786158ad64ce4aec0276344544f22ecfa9a7803e91b36efaadd702ccaaec818ed9538434a1df5611ea539623

                        • C:\Users\Admin\AppData\Local\Temp\wbJtI0Skv5.exe
                          MD5

                          3cdb00a25552429b06fb3be209614149

                          SHA1

                          7ecad79254adcd96c426ce99a22c12121fa220ca

                          SHA256

                          99de1acdd89d08fe0cc39b096ba36dc9149206bfbad5d4b12fa5f1bc462adb4c

                          SHA512

                          6a8a0b5bde09206f4246683f7de8065498f3f5f0786158ad64ce4aec0276344544f22ecfa9a7803e91b36efaadd702ccaaec818ed9538434a1df5611ea539623

                        • C:\Users\Admin\AppData\Local\Temp\wbJtI0Skv5.exe
                          MD5

                          3cdb00a25552429b06fb3be209614149

                          SHA1

                          7ecad79254adcd96c426ce99a22c12121fa220ca

                          SHA256

                          99de1acdd89d08fe0cc39b096ba36dc9149206bfbad5d4b12fa5f1bc462adb4c

                          SHA512

                          6a8a0b5bde09206f4246683f7de8065498f3f5f0786158ad64ce4aec0276344544f22ecfa9a7803e91b36efaadd702ccaaec818ed9538434a1df5611ea539623

                        • C:\Users\Admin\AppData\Local\Temp\wrgt0Sv1Lx.exe
                          MD5

                          6a61a028d6282029c5899a3ffcc84e60

                          SHA1

                          2b4cc8dc5d1993eb2851755e4b41325d204815d6

                          SHA256

                          d42beb6c20833eaed3d603706c03ae2a620f95a4a2fe0eea239636c97575ca24

                          SHA512

                          edc8fd2e1c2c14bb392c75259b61ee5d37278c086186dd1bdfa3907675d6ac2df8720c0ee18c20a9cfb3fd9097dc4129d58ba7d8576e2e9e7eb2bd8736939bbe

                        • C:\Users\Admin\AppData\Local\Temp\wrgt0Sv1Lx.exe
                          MD5

                          6a61a028d6282029c5899a3ffcc84e60

                          SHA1

                          2b4cc8dc5d1993eb2851755e4b41325d204815d6

                          SHA256

                          d42beb6c20833eaed3d603706c03ae2a620f95a4a2fe0eea239636c97575ca24

                          SHA512

                          edc8fd2e1c2c14bb392c75259b61ee5d37278c086186dd1bdfa3907675d6ac2df8720c0ee18c20a9cfb3fd9097dc4129d58ba7d8576e2e9e7eb2bd8736939bbe

                        • C:\Users\Admin\AppData\Local\Temp\wrgt0Sv1Lx.exe
                          MD5

                          6a61a028d6282029c5899a3ffcc84e60

                          SHA1

                          2b4cc8dc5d1993eb2851755e4b41325d204815d6

                          SHA256

                          d42beb6c20833eaed3d603706c03ae2a620f95a4a2fe0eea239636c97575ca24

                          SHA512

                          edc8fd2e1c2c14bb392c75259b61ee5d37278c086186dd1bdfa3907675d6ac2df8720c0ee18c20a9cfb3fd9097dc4129d58ba7d8576e2e9e7eb2bd8736939bbe

                        • C:\Users\Public\Cdex.bat
                          MD5

                          84de6cf0b720db43f85d95204a2c1902

                          SHA1

                          c87c4c1f3ad9f28968c46a89c4fff8bdb867b006

                          SHA256

                          bc4baad4a7983c54c1764b0aa57f12d536ce506253c82e06dd98e17bbb5f77ee

                          SHA512

                          5fd018b5f72797a64934f8f35d4510ef95c235442a807d476e7fd3c14eaa854c1a3092332edbdd1028f8954ab28acb5aab8720a74226cfcfab3cb3a7772a64b7

                        • C:\Users\Public\NETUTILS.dll
                          MD5

                          39507d772c63ca496a25a14a8b5d14b2

                          SHA1

                          5b603f5c11eb9ab4313694315b4d4894ff4641d4

                          SHA256

                          36d1fa474cd8271f9b74b9481025614b6ff309f767f69d9f1ff3960c7205ad12

                          SHA512

                          0c740fd7b6d67d9938b0d8e1ea7d6c41910dd6d0b85b4ec8b6015ff8c0c73798dee01f01da0b5b0c07038663aca7945faca0e2b5afc1cb751aaba7567d332f5f

                        • C:\Users\Public\Netplwiz.exe
                          MD5

                          f94b7fb6dac49844d03c7087b2d8b472

                          SHA1

                          0e84139fced0ee8ef929d0bd5f01559a7dcf1db0

                          SHA256

                          46e31f337ed0d9a6fe3f159abc91c9b9b6a6062982bbcd84a51784d7128e7ae4

                          SHA512

                          d63878f94f7699e4cc63c2cd885c29455e0c423d32dba750e4fc3aa74dbaca80a1a4b176719213b9fc6584de6a40cddff7864c7fb4cfba13dfcb437a36e41b80

                        • C:\Users\Public\PXOR.bat
                          MD5

                          0d8aef656413642f55e0902cc5df5e6f

                          SHA1

                          73ec56d08bd9b3c45d55c97bd1c1286b77c8ff49

                          SHA256

                          670f94b92f45bc2f3f44a80c7f3021f874aa16fde38ed7d7f3ebed13ae09fa11

                          SHA512

                          efe690b1bcf06e16be469622b45c98b5dc1f1e06410cbf7e7dccb2975524c4d6bc7e23de9a129d50d73cd924f02e23f925555894f2c7da1064dcc57151f50876

                        • C:\Users\Public\stt.bat
                          MD5

                          8a850253c31df9a7e1c00c80df2630d5

                          SHA1

                          e3da74081b027a3b591488b28da22742bcfe8495

                          SHA256

                          8fdeba3ec903bde700342083d16f72452366aa0b1b30d0e58dee0af74cebfa35

                          SHA512

                          30510bdc34680a0865a0811d9be29dec91c74717feccd58c9b4d88e77be9e5d13a539806a1b2901aff595b2fe2cc45926b69ed42e899d2dd2913c78a732e84d1

                        • C:\Windows \System32\Netplwiz.exe
                          MD5

                          f94b7fb6dac49844d03c7087b2d8b472

                          SHA1

                          0e84139fced0ee8ef929d0bd5f01559a7dcf1db0

                          SHA256

                          46e31f337ed0d9a6fe3f159abc91c9b9b6a6062982bbcd84a51784d7128e7ae4

                          SHA512

                          d63878f94f7699e4cc63c2cd885c29455e0c423d32dba750e4fc3aa74dbaca80a1a4b176719213b9fc6584de6a40cddff7864c7fb4cfba13dfcb437a36e41b80

                        • C:\Windows \System32\netutils.dll
                          MD5

                          39507d772c63ca496a25a14a8b5d14b2

                          SHA1

                          5b603f5c11eb9ab4313694315b4d4894ff4641d4

                          SHA256

                          36d1fa474cd8271f9b74b9481025614b6ff309f767f69d9f1ff3960c7205ad12

                          SHA512

                          0c740fd7b6d67d9938b0d8e1ea7d6c41910dd6d0b85b4ec8b6015ff8c0c73798dee01f01da0b5b0c07038663aca7945faca0e2b5afc1cb751aaba7567d332f5f

                        • C:\Windows\Temp\20zi1afn.exe
                          MD5

                          f4b5c1ebf4966256f52c4c4ceae87fb1

                          SHA1

                          ca70ec96d1a65cb2a4cbf4db46042275dc75813b

                          SHA256

                          88e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03

                          SHA512

                          02a7790b31525873ee506eec4ba47800310f7fb4ba58ea7ff4377bf76273ae3d0b4269c7ad866ee7af63471a920c4bd34a9808766e0c51bcaf54ba2e518e6c1e

                        • C:\Windows\temp\20zi1afn.exe
                          MD5

                          f4b5c1ebf4966256f52c4c4ceae87fb1

                          SHA1

                          ca70ec96d1a65cb2a4cbf4db46042275dc75813b

                          SHA256

                          88e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03

                          SHA512

                          02a7790b31525873ee506eec4ba47800310f7fb4ba58ea7ff4377bf76273ae3d0b4269c7ad866ee7af63471a920c4bd34a9808766e0c51bcaf54ba2e518e6c1e

                        • C:\Windows\temp\21grmlat.inf
                          MD5

                          37c2007262f8ff9ac44195efd6883be7

                          SHA1

                          93df4c1d03ead17f3ba7e8e57967cea21394fc45

                          SHA256

                          b93d9b3127578720c5ef9be2750b43d8306f4798255d7423318c0bbccdef8822

                          SHA512

                          3fca06a8a9abbecc89ef0b88348c3cd865a36efbbc10351c25277833f25c4f37c3149228b43f9227c4928c0e1443464c398e4542a7523d40dd178d8a401d2fb9

                        • \ProgramData\mozglue.dll
                          MD5

                          8f73c08a9660691143661bf7332c3c27

                          SHA1

                          37fa65dd737c50fda710fdbde89e51374d0c204a

                          SHA256

                          3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                          SHA512

                          0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                        • \ProgramData\nss3.dll
                          MD5

                          bfac4e3c5908856ba17d41edcd455a51

                          SHA1

                          8eec7e888767aa9e4cca8ff246eb2aacb9170428

                          SHA256

                          e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                          SHA512

                          2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                        • \ProgramData\sqlite3.dll
                          MD5

                          e477a96c8f2b18d6b5c27bde49c990bf

                          SHA1

                          e980c9bf41330d1e5bd04556db4646a0210f7409

                          SHA256

                          16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                          SHA512

                          335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                        • \Users\Admin\AppData\LocalLow\gC9tT2iQ3s\freebl3.dll
                          MD5

                          60acd24430204ad2dc7f148b8cfe9bdc

                          SHA1

                          989f377b9117d7cb21cbe92a4117f88f9c7693d9

                          SHA256

                          9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

                          SHA512

                          626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

                        • \Users\Admin\AppData\LocalLow\gC9tT2iQ3s\freebl3.dll
                          MD5

                          60acd24430204ad2dc7f148b8cfe9bdc

                          SHA1

                          989f377b9117d7cb21cbe92a4117f88f9c7693d9

                          SHA256

                          9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

                          SHA512

                          626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

                        • \Users\Admin\AppData\LocalLow\gC9tT2iQ3s\mozglue.dll
                          MD5

                          eae9273f8cdcf9321c6c37c244773139

                          SHA1

                          8378e2a2f3635574c106eea8419b5eb00b8489b0

                          SHA256

                          a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

                          SHA512

                          06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

                        • \Users\Admin\AppData\LocalLow\gC9tT2iQ3s\nss3.dll
                          MD5

                          02cc7b8ee30056d5912de54f1bdfc219

                          SHA1

                          a6923da95705fb81e368ae48f93d28522ef552fb

                          SHA256

                          1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

                          SHA512

                          0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

                        • \Users\Admin\AppData\LocalLow\gC9tT2iQ3s\softokn3.dll
                          MD5

                          4e8df049f3459fa94ab6ad387f3561ac

                          SHA1

                          06ed392bc29ad9d5fc05ee254c2625fd65925114

                          SHA256

                          25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

                          SHA512

                          3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

                        • \Users\Admin\AppData\LocalLow\sqlite3.dll
                          MD5

                          f964811b68f9f1487c2b41e1aef576ce

                          SHA1

                          b423959793f14b1416bc3b7051bed58a1034025f

                          SHA256

                          83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

                          SHA512

                          565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

                        • \Windows \System32\NETUTILS.dll
                          MD5

                          39507d772c63ca496a25a14a8b5d14b2

                          SHA1

                          5b603f5c11eb9ab4313694315b4d4894ff4641d4

                          SHA256

                          36d1fa474cd8271f9b74b9481025614b6ff309f767f69d9f1ff3960c7205ad12

                          SHA512

                          0c740fd7b6d67d9938b0d8e1ea7d6c41910dd6d0b85b4ec8b6015ff8c0c73798dee01f01da0b5b0c07038663aca7945faca0e2b5afc1cb751aaba7567d332f5f

                        • memory/192-289-0x0000000006D62000-0x0000000006D63000-memory.dmp
                          Filesize

                          4KB

                        • memory/192-312-0x000000007F030000-0x000000007F031000-memory.dmp
                          Filesize

                          4KB

                        • memory/192-288-0x0000000006D60000-0x0000000006D61000-memory.dmp
                          Filesize

                          4KB

                        • memory/192-279-0x0000000000000000-mapping.dmp
                        • memory/192-313-0x0000000006D63000-0x0000000006D64000-memory.dmp
                          Filesize

                          4KB

                        • memory/480-293-0x0000000000000000-mapping.dmp
                        • memory/584-273-0x0000000000000000-mapping.dmp
                        • memory/1016-287-0x0000000000000000-mapping.dmp
                        • memory/1016-291-0x000001F349C43000-0x000001F349C45000-memory.dmp
                          Filesize

                          8KB

                        • memory/1016-290-0x000001F349C40000-0x000001F349C42000-memory.dmp
                          Filesize

                          8KB

                        • memory/1016-297-0x000001F349C46000-0x000001F349C48000-memory.dmp
                          Filesize

                          8KB

                        • memory/1428-343-0x0000028B7EF46000-0x0000028B7EF48000-memory.dmp
                          Filesize

                          8KB

                        • memory/1428-319-0x0000028B7EF43000-0x0000028B7EF45000-memory.dmp
                          Filesize

                          8KB

                        • memory/1428-304-0x0000000000000000-mapping.dmp
                        • memory/1428-316-0x0000028B7EF40000-0x0000028B7EF42000-memory.dmp
                          Filesize

                          8KB

                        • memory/1592-296-0x0000000000400000-0x000000000046D000-memory.dmp
                          Filesize

                          436KB

                        • memory/1592-292-0x0000000000428EEC-mapping.dmp
                        • memory/1692-190-0x0000000000000000-mapping.dmp
                        • memory/1692-345-0x0000000000000000-mapping.dmp
                        • memory/1736-120-0x00000000005C0000-0x000000000070A000-memory.dmp
                          Filesize

                          1.3MB

                        • memory/1736-299-0x0000000000000000-mapping.dmp
                        • memory/1736-119-0x00000000005C0000-0x000000000070A000-memory.dmp
                          Filesize

                          1.3MB

                        • memory/1816-172-0x000000000043DC5B-mapping.dmp
                        • memory/1816-178-0x0000000000400000-0x0000000000492000-memory.dmp
                          Filesize

                          584KB

                        • memory/1816-179-0x0000000000590000-0x00000000006DA000-memory.dmp
                          Filesize

                          1.3MB

                        • memory/1824-303-0x0000000000000000-mapping.dmp
                        • memory/1824-315-0x000001CA69C23000-0x000001CA69C25000-memory.dmp
                          Filesize

                          8KB

                        • memory/1824-314-0x000001CA69C20000-0x000001CA69C22000-memory.dmp
                          Filesize

                          8KB

                        • memory/1824-347-0x000001CA69C28000-0x000001CA69C29000-memory.dmp
                          Filesize

                          4KB

                        • memory/1824-334-0x000001CA69C26000-0x000001CA69C28000-memory.dmp
                          Filesize

                          8KB

                        • memory/2012-284-0x0000000005790000-0x0000000005C8E000-memory.dmp
                          Filesize

                          5.0MB

                        • memory/2012-270-0x000000000040616E-mapping.dmp
                        • memory/2012-286-0x0000000005790000-0x0000000005C8E000-memory.dmp
                          Filesize

                          5.0MB

                        • memory/2076-131-0x0000000000680000-0x0000000000681000-memory.dmp
                          Filesize

                          4KB

                        • memory/2076-123-0x0000000000000000-mapping.dmp
                        • memory/2076-169-0x0000000002270000-0x0000000002277000-memory.dmp
                          Filesize

                          28KB

                        • memory/2192-197-0x0000000000400000-0x0000000000492000-memory.dmp
                          Filesize

                          584KB

                        • memory/2192-205-0x0000000000400000-0x0000000000492000-memory.dmp
                          Filesize

                          584KB

                        • memory/2192-199-0x000000000043DC5B-mapping.dmp
                        • memory/2380-265-0x0000000000000000-mapping.dmp
                        • memory/2412-128-0x0000000000000000-mapping.dmp
                        • memory/2412-152-0x0000000000690000-0x0000000000691000-memory.dmp
                          Filesize

                          4KB

                        • memory/2420-181-0x00000000001F0000-0x00000000001F1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2420-174-0x000000000041A684-mapping.dmp
                        • memory/2420-180-0x0000000000400000-0x0000000000420000-memory.dmp
                          Filesize

                          128KB

                        • memory/2480-251-0x0000000000000000-mapping.dmp
                        • memory/2732-281-0x0000000000000000-mapping.dmp
                        • memory/2868-153-0x00000000004D0000-0x00000000004D1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2868-134-0x0000000000000000-mapping.dmp
                        • memory/2940-164-0x00000000055A0000-0x0000000005632000-memory.dmp
                          Filesize

                          584KB

                        • memory/2940-147-0x0000000000000000-mapping.dmp
                        • memory/2964-295-0x0000000004FD0000-0x0000000004FD1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2964-267-0x000000000040C71E-mapping.dmp
                        • memory/3088-236-0x0000000000000000-mapping.dmp
                        • memory/3088-240-0x0000000000D40000-0x0000000000D41000-memory.dmp
                          Filesize

                          4KB

                        • memory/3088-248-0x0000000005550000-0x0000000005A4E000-memory.dmp
                          Filesize

                          5.0MB

                        • memory/3176-285-0x0000000000000000-mapping.dmp
                        • memory/3204-182-0x0000000000400000-0x0000000000434000-memory.dmp
                          Filesize

                          208KB

                        • memory/3204-183-0x00000000004A0000-0x00000000004A1000-memory.dmp
                          Filesize

                          4KB

                        • memory/3204-176-0x0000000000417A8B-mapping.dmp
                        • memory/3244-192-0x0000000000000000-mapping.dmp
                        • memory/3340-156-0x0000000000500000-0x000000000064A000-memory.dmp
                          Filesize

                          1.3MB

                        • memory/3340-171-0x0000000000500000-0x000000000064A000-memory.dmp
                          Filesize

                          1.3MB

                        • memory/3340-137-0x0000000000000000-mapping.dmp
                        • memory/3380-264-0x0000000004FF0000-0x00000000054EE000-memory.dmp
                          Filesize

                          5.0MB

                        • memory/3380-258-0x0000000000000000-mapping.dmp
                        • memory/3736-277-0x0000000000403BEE-mapping.dmp
                        • memory/3792-237-0x0000000000000000-mapping.dmp
                        • memory/3852-280-0x0000000000000000-mapping.dmp
                        • memory/3904-257-0x0000000008890000-0x00000000088FE000-memory.dmp
                          Filesize

                          440KB

                        • memory/3904-206-0x0000000005520000-0x00000000055B2000-memory.dmp
                          Filesize

                          584KB

                        • memory/3904-196-0x0000000000DE0000-0x0000000000DE1000-memory.dmp
                          Filesize

                          4KB

                        • memory/3904-193-0x0000000000000000-mapping.dmp
                        • memory/3940-226-0x0000000000000000-mapping.dmp
                        • memory/3940-230-0x0000000000910000-0x0000000000911000-memory.dmp
                          Filesize

                          4KB

                        • memory/3940-244-0x0000000005150000-0x000000000564E000-memory.dmp
                          Filesize

                          5.0MB

                        • memory/4000-222-0x0000000000000000-mapping.dmp
                        • memory/4000-227-0x0000000000530000-0x00000000005DE000-memory.dmp
                          Filesize

                          696KB

                        • memory/4000-254-0x0000000002870000-0x000000000288A000-memory.dmp
                          Filesize

                          104KB

                        • memory/4028-116-0x000000000040106C-mapping.dmp
                        • memory/4028-122-0x0000000000410000-0x000000000055A000-memory.dmp
                          Filesize

                          1.3MB

                        • memory/4028-225-0x0000000004E50000-0x000000000534E000-memory.dmp
                          Filesize

                          5.0MB

                        • memory/4028-217-0x0000000000420000-0x0000000000421000-memory.dmp
                          Filesize

                          4KB

                        • memory/4028-121-0x0000000000400000-0x0000000000405000-memory.dmp
                          Filesize

                          20KB

                        • memory/4028-214-0x0000000000000000-mapping.dmp
                        • memory/4060-348-0x0000000000000000-mapping.dmp
                        • memory/4080-154-0x0000000005760000-0x0000000005761000-memory.dmp
                          Filesize

                          4KB

                        • memory/4080-161-0x0000000005340000-0x0000000005341000-memory.dmp
                          Filesize

                          4KB

                        • memory/4080-148-0x0000000000890000-0x0000000000891000-memory.dmp
                          Filesize

                          4KB

                        • memory/4080-163-0x0000000005110000-0x00000000051A2000-memory.dmp
                          Filesize

                          584KB

                        • memory/4080-167-0x0000000006DC0000-0x0000000006DCE000-memory.dmp
                          Filesize

                          56KB

                        • memory/4080-165-0x0000000006DF0000-0x0000000006DF1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4080-141-0x0000000000000000-mapping.dmp
                        • memory/4080-187-0x0000000008B00000-0x0000000008BC8000-memory.dmp
                          Filesize

                          800KB

                        • memory/4080-189-0x0000000004C30000-0x0000000004CC1000-memory.dmp
                          Filesize

                          580KB

                        • memory/4080-157-0x00000000051B0000-0x00000000051B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4084-261-0x000000000041A684-mapping.dmp
                        • memory/4120-305-0x0000000000000000-mapping.dmp
                        • memory/4188-309-0x0000000000000000-mapping.dmp
                        • memory/4228-310-0x0000000000000000-mapping.dmp
                        • memory/4228-344-0x0000023C3CF36000-0x0000023C3CF38000-memory.dmp
                          Filesize

                          8KB

                        • memory/4228-317-0x0000023C3CF30000-0x0000023C3CF32000-memory.dmp
                          Filesize

                          8KB

                        • memory/4228-318-0x0000023C3CF33000-0x0000023C3CF35000-memory.dmp
                          Filesize

                          8KB

                        • memory/4320-311-0x0000000000000000-mapping.dmp
                        • memory/4320-329-0x000001EFFB5A3000-0x000001EFFB5A5000-memory.dmp
                          Filesize

                          8KB

                        • memory/4320-327-0x000001EFFB5A0000-0x000001EFFB5A2000-memory.dmp
                          Filesize

                          8KB

                        • memory/4320-340-0x000001EFFB5A6000-0x000001EFFB5A8000-memory.dmp
                          Filesize

                          8KB

                        • memory/4536-337-0x0000016233EA3000-0x0000016233EA5000-memory.dmp
                          Filesize

                          8KB

                        • memory/4536-330-0x0000016233EA0000-0x0000016233EA2000-memory.dmp
                          Filesize

                          8KB

                        • memory/4536-321-0x0000000000000000-mapping.dmp
                        • memory/4564-342-0x0000020BD7133000-0x0000020BD7135000-memory.dmp
                          Filesize

                          8KB

                        • memory/4564-322-0x0000000000000000-mapping.dmp
                        • memory/4564-346-0x0000020BD7136000-0x0000020BD7138000-memory.dmp
                          Filesize

                          8KB

                        • memory/4564-333-0x0000020BD7130000-0x0000020BD7132000-memory.dmp
                          Filesize

                          8KB

                        • memory/4648-338-0x0000028E6A3C0000-0x0000028E6A3C2000-memory.dmp
                          Filesize

                          8KB

                        • memory/4648-323-0x0000000000000000-mapping.dmp
                        • memory/4648-339-0x0000028E6A3C3000-0x0000028E6A3C5000-memory.dmp
                          Filesize

                          8KB

                        • memory/4708-328-0x0000027CFDA60000-0x0000027CFDA62000-memory.dmp
                          Filesize

                          8KB

                        • memory/4708-341-0x0000027CFDA63000-0x0000027CFDA65000-memory.dmp
                          Filesize

                          8KB

                        • memory/4708-324-0x0000000000000000-mapping.dmp
                        • memory/4788-331-0x000002DEA6810000-0x000002DEA6812000-memory.dmp
                          Filesize

                          8KB

                        • memory/4788-325-0x0000000000000000-mapping.dmp
                        • memory/4788-332-0x000002DEA6813000-0x000002DEA6815000-memory.dmp
                          Filesize

                          8KB

                        • memory/4888-326-0x0000000000000000-mapping.dmp
                        • memory/4888-335-0x000001B9B3F40000-0x000001B9B3F42000-memory.dmp
                          Filesize

                          8KB

                        • memory/4888-336-0x000001B9B3F43000-0x000001B9B3F45000-memory.dmp
                          Filesize

                          8KB

                        • memory/5272-349-0x0000000000000000-mapping.dmp
                        • memory/5604-356-0x0000000000417A8B-mapping.dmp
                        • memory/5664-357-0x0000000000000000-mapping.dmp
                        • memory/5708-358-0x0000000000000000-mapping.dmp