Analysis
-
max time kernel
150s -
max time network
164s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
26-07-2021 16:02
Static task
static1
Behavioral task
behavioral1
Sample
fb660cd8294a2f697bc610d746833d91.exe
Resource
win7v20210408
General
-
Target
fb660cd8294a2f697bc610d746833d91.exe
-
Size
760KB
-
MD5
fb660cd8294a2f697bc610d746833d91
-
SHA1
e9cfc83ec806592a49bd094e2bbc07c937e0c9e2
-
SHA256
28877275c2c938f24cd0bf43f2c0cef090c58b7a85a988b2f6dff4970660b07d
-
SHA512
10da1e75c4aeb3df811dd22a2da4528227f8d7350bfa5992ef6cc4f3f8822e2c7ffdf897040635c1476f95b0112f13376be7cb849a8dea81455db73056329c92
Malware Config
Extracted
cryptbot
ewaisg12.top
morvay01.top
-
payload_url
http://winezo01.top/download.php?file=lv.exe
Extracted
danabot
1987
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
Signatures
-
CryptBot Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3896-114-0x0000000002170000-0x0000000002251000-memory.dmp family_cryptbot behavioral2/memory/3896-115-0x0000000000400000-0x00000000004E5000-memory.dmp family_cryptbot -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Blocklisted process makes network request 6 IoCs
Processes:
WScript.exerundll32.exeRUNDLL32.EXEflow pid process 38 3556 WScript.exe 40 3556 WScript.exe 42 3556 WScript.exe 44 3556 WScript.exe 47 2008 rundll32.exe 48 3936 RUNDLL32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
FyUpUE.exevpn.exe4.exeConsumato.exe.comConsumato.exe.comSmartClock.execwddprougtpg.exepid process 2664 FyUpUE.exe 1248 vpn.exe 2720 4.exe 1820 Consumato.exe.com 3148 Consumato.exe.com 3992 SmartClock.exe 3956 cwddprougtpg.exe -
Drops startup file 1 IoCs
Processes:
4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 4 IoCs
Processes:
FyUpUE.exerundll32.exeRUNDLL32.EXEpid process 2664 FyUpUE.exe 2008 rundll32.exe 3936 RUNDLL32.EXE 3936 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vpn.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" vpn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 22 ip-api.com -
Drops file in Program Files directory 4 IoCs
Processes:
FyUpUE.exerundll32.exedescription ioc process File created C:\Program Files (x86)\foler\olader\acledit.dll FyUpUE.exe File created C:\PROGRA~3\Jvgzbfh.tmp rundll32.exe File created C:\Program Files (x86)\foler\olader\acppage.dll FyUpUE.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll FyUpUE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 30 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RUNDLL32.EXEConsumato.exe.comfb660cd8294a2f697bc610d746833d91.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Consumato.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fb660cd8294a2f697bc610d746833d91.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fb660cd8294a2f697bc610d746833d91.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Consumato.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1464 timeout.exe -
Modifies registry class 1 IoCs
Processes:
Consumato.exe.comdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings Consumato.exe.com -
Processes:
WScript.exeRUNDLL32.EXEdescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\EBBCC971D1F7101A97C13DC979DA3B22DA65764D RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\EBBCC971D1F7101A97C13DC979DA3B22DA65764D\Blob = 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 RUNDLL32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 3992 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
RUNDLL32.EXEpowershell.exepowershell.exepid process 3936 RUNDLL32.EXE 3936 RUNDLL32.EXE 3936 RUNDLL32.EXE 3936 RUNDLL32.EXE 3936 RUNDLL32.EXE 3936 RUNDLL32.EXE 3380 powershell.exe 3380 powershell.exe 3380 powershell.exe 3936 RUNDLL32.EXE 3936 RUNDLL32.EXE 2244 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RUNDLL32.EXEpowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3936 RUNDLL32.EXE Token: SeDebugPrivilege 3380 powershell.exe Token: SeDebugPrivilege 2244 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
fb660cd8294a2f697bc610d746833d91.exeRUNDLL32.EXEpid process 3896 fb660cd8294a2f697bc610d746833d91.exe 3896 fb660cd8294a2f697bc610d746833d91.exe 3936 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
fb660cd8294a2f697bc610d746833d91.execmd.exeFyUpUE.exevpn.execmd.execmd.exeConsumato.exe.comcmd.exe4.exeConsumato.exe.comcwddprougtpg.exerundll32.exeRUNDLL32.EXEdescription pid process target process PID 3896 wrote to memory of 3012 3896 fb660cd8294a2f697bc610d746833d91.exe cmd.exe PID 3896 wrote to memory of 3012 3896 fb660cd8294a2f697bc610d746833d91.exe cmd.exe PID 3896 wrote to memory of 3012 3896 fb660cd8294a2f697bc610d746833d91.exe cmd.exe PID 3012 wrote to memory of 2664 3012 cmd.exe FyUpUE.exe PID 3012 wrote to memory of 2664 3012 cmd.exe FyUpUE.exe PID 3012 wrote to memory of 2664 3012 cmd.exe FyUpUE.exe PID 2664 wrote to memory of 1248 2664 FyUpUE.exe vpn.exe PID 2664 wrote to memory of 1248 2664 FyUpUE.exe vpn.exe PID 2664 wrote to memory of 1248 2664 FyUpUE.exe vpn.exe PID 2664 wrote to memory of 2720 2664 FyUpUE.exe 4.exe PID 2664 wrote to memory of 2720 2664 FyUpUE.exe 4.exe PID 2664 wrote to memory of 2720 2664 FyUpUE.exe 4.exe PID 1248 wrote to memory of 2164 1248 vpn.exe cmd.exe PID 1248 wrote to memory of 2164 1248 vpn.exe cmd.exe PID 1248 wrote to memory of 2164 1248 vpn.exe cmd.exe PID 1248 wrote to memory of 3928 1248 vpn.exe cmd.exe PID 1248 wrote to memory of 3928 1248 vpn.exe cmd.exe PID 1248 wrote to memory of 3928 1248 vpn.exe cmd.exe PID 3928 wrote to memory of 1168 3928 cmd.exe cmd.exe PID 3928 wrote to memory of 1168 3928 cmd.exe cmd.exe PID 3928 wrote to memory of 1168 3928 cmd.exe cmd.exe PID 1168 wrote to memory of 3808 1168 cmd.exe findstr.exe PID 1168 wrote to memory of 3808 1168 cmd.exe findstr.exe PID 1168 wrote to memory of 3808 1168 cmd.exe findstr.exe PID 1168 wrote to memory of 1820 1168 cmd.exe Consumato.exe.com PID 1168 wrote to memory of 1820 1168 cmd.exe Consumato.exe.com PID 1168 wrote to memory of 1820 1168 cmd.exe Consumato.exe.com PID 1168 wrote to memory of 1684 1168 cmd.exe PING.EXE PID 1168 wrote to memory of 1684 1168 cmd.exe PING.EXE PID 1168 wrote to memory of 1684 1168 cmd.exe PING.EXE PID 1820 wrote to memory of 3148 1820 Consumato.exe.com Consumato.exe.com PID 1820 wrote to memory of 3148 1820 Consumato.exe.com Consumato.exe.com PID 1820 wrote to memory of 3148 1820 Consumato.exe.com Consumato.exe.com PID 3896 wrote to memory of 3436 3896 fb660cd8294a2f697bc610d746833d91.exe cmd.exe PID 3896 wrote to memory of 3436 3896 fb660cd8294a2f697bc610d746833d91.exe cmd.exe PID 3896 wrote to memory of 3436 3896 fb660cd8294a2f697bc610d746833d91.exe cmd.exe PID 3436 wrote to memory of 1464 3436 cmd.exe timeout.exe PID 3436 wrote to memory of 1464 3436 cmd.exe timeout.exe PID 3436 wrote to memory of 1464 3436 cmd.exe timeout.exe PID 2720 wrote to memory of 3992 2720 4.exe SmartClock.exe PID 2720 wrote to memory of 3992 2720 4.exe SmartClock.exe PID 2720 wrote to memory of 3992 2720 4.exe SmartClock.exe PID 3148 wrote to memory of 3956 3148 Consumato.exe.com cwddprougtpg.exe PID 3148 wrote to memory of 3956 3148 Consumato.exe.com cwddprougtpg.exe PID 3148 wrote to memory of 3956 3148 Consumato.exe.com cwddprougtpg.exe PID 3148 wrote to memory of 3712 3148 Consumato.exe.com WScript.exe PID 3148 wrote to memory of 3712 3148 Consumato.exe.com WScript.exe PID 3148 wrote to memory of 3712 3148 Consumato.exe.com WScript.exe PID 3956 wrote to memory of 2008 3956 cwddprougtpg.exe rundll32.exe PID 3956 wrote to memory of 2008 3956 cwddprougtpg.exe rundll32.exe PID 3956 wrote to memory of 2008 3956 cwddprougtpg.exe rundll32.exe PID 3148 wrote to memory of 3556 3148 Consumato.exe.com WScript.exe PID 3148 wrote to memory of 3556 3148 Consumato.exe.com WScript.exe PID 3148 wrote to memory of 3556 3148 Consumato.exe.com WScript.exe PID 2008 wrote to memory of 3936 2008 rundll32.exe RUNDLL32.EXE PID 2008 wrote to memory of 3936 2008 rundll32.exe RUNDLL32.EXE PID 2008 wrote to memory of 3936 2008 rundll32.exe RUNDLL32.EXE PID 3936 wrote to memory of 3380 3936 RUNDLL32.EXE powershell.exe PID 3936 wrote to memory of 3380 3936 RUNDLL32.EXE powershell.exe PID 3936 wrote to memory of 3380 3936 RUNDLL32.EXE powershell.exe PID 3936 wrote to memory of 2244 3936 RUNDLL32.EXE powershell.exe PID 3936 wrote to memory of 2244 3936 RUNDLL32.EXE powershell.exe PID 3936 wrote to memory of 2244 3936 RUNDLL32.EXE powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb660cd8294a2f697bc610d746833d91.exe"C:\Users\Admin\AppData\Local\Temp\fb660cd8294a2f697bc610d746833d91.exe"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\FyUpUE.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FyUpUE.exe"C:\Users\Admin\AppData\Local\Temp\FyUpUE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c hIDuoykI5⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Mise.adts5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^qtOjQgNmHjCVwYiUrmbuExhNxKjAZBgFkHhWYSyJRWCSKhgtOmIhJwAGRqRywhAyXWJxKkVlxOgHRxriviMmSq$" Magrezza.adts7⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Consumato.exe.comConsumato.exe.com U7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Consumato.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Consumato.exe.com U8⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cwddprougtpg.exe"C:\Users\Admin\AppData\Local\Temp\cwddprougtpg.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\CWDDPR~1.TMP,S C:\Users\Admin\AppData\Local\Temp\CWDDPR~1.EXE10⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\CWDDPR~1.TMP,hVsqR1U=11⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp9239.tmp.ps1"12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpA585.tmp.ps1"12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lubnldmkk.vbs"9⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\mrtqdsa.vbs"9⤵
- Blocklisted process makes network request
- Modifies system certificate store
-
C:\Windows\SysWOW64\PING.EXEping RJMQBVDN -n 307⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"4⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\ovJBcyRDSck & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\fb660cd8294a2f697bc610d746833d91.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~3\Jvgzbfh.tmpMD5
1caf4824589c57622a87d2d57a6afd70
SHA17ab945df69724ad2279b9e8176d33ede3612f5e6
SHA2561aa428e9d0b661c1f93a36de26ef4b296d30d753905a7787d6f6ed4419e3961d
SHA512c17d624acc8e0a9ebafc796f97ba0c8c7cf48891ecb3889d14908c6f6acabb7ef116322f905150d599a8e97742b93f3c93f60b62235173e270c4aff3220d71e7
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
47eebe401625bbc55e75dbfb72e9e89a
SHA1db3b2135942d2532c59b9788253638eb77e5995e
SHA256f1cd56000c44bbdb6880b5b133731f493fe8cba8198c5a861da6ae7b489ed0c3
SHA512590b149863d58be346e7927c28501375cc570858d2f156d234b03d68b86c5c0667a1038e2b6f6639172bf95638ca9f7c70f45270951abbcdf43b1be853b81d56
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
d5e5284a37a011610cb24702518a4886
SHA17c3a68f8a1658161f62ece1d8d6c57eb4af9c9bc
SHA256feb3e5dfc546524e292d306dc79f32dbbbd99cd9627e3b769dbcc05172542253
SHA512f2729ed40315750dae1b1fadf3af445e099924d8f02e1e95e4406895c7d4c73aec3d453ee46abb34a37757d1af4f85858303520ba7d049fdf1a669e134349d32
-
C:\Users\Admin\AppData\Local\Temp\CWDDPR~1.TMPMD5
219e20b69d099cab64444334e0874da8
SHA1b3ea46e786a2826f4c01c807fee22934aeeb5c7b
SHA256d50cbc7b8894f96af15f5e150bac2b7e74346dda50e9cd88ede07b56042e35a4
SHA512063a4105306c1eb8c0a4ab46f0c2788ba1419da0fab62e44520c972b5c1b0ff17b1233e8f61a46c5520d42ae184253ec8b716ae2ba7e2f05f423a2f6233221bb
-
C:\Users\Admin\AppData\Local\Temp\FyUpUE.exeMD5
6129b2f210fcaea8e5e3abe04bc7ee91
SHA125fd446400857193bd3cfd668c3d084342fb3c07
SHA256c5533df1a613354dbf5beee7c8eae3b6976998264b3337195128971bd2e8d996
SHA512ce985926e0971732675265664e606fad15078e9bca7b31219decad2405c0175a61d41bd2dd9cb4db3ea4b6fcab6f78b8a348bc4f0711127963b4d8a3153a2164
-
C:\Users\Admin\AppData\Local\Temp\FyUpUE.exeMD5
6129b2f210fcaea8e5e3abe04bc7ee91
SHA125fd446400857193bd3cfd668c3d084342fb3c07
SHA256c5533df1a613354dbf5beee7c8eae3b6976998264b3337195128971bd2e8d996
SHA512ce985926e0971732675265664e606fad15078e9bca7b31219decad2405c0175a61d41bd2dd9cb4db3ea4b6fcab6f78b8a348bc4f0711127963b4d8a3153a2164
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Consumato.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Consumato.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Consumato.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Copia.adtsMD5
b3ca9fa6e338f37cba89894f0dc0ccfb
SHA10e3a55ffa3af6b0396bc30a0e88eef61b357015b
SHA2563186ff707581468e32e4cef8157af27db76a54d26b9aeadd223a5034762fa073
SHA5127ad2050d56bd2a8068cd18f7ec7317032a95d94aa18c1c56580be15f27ba18b3a0748e420c1f0c1e1a50a385c0f2d07a2ef1e98c95c9463b543e2de1282754a7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Dov.adtsMD5
ab00680d714b342b90821af2a08cf844
SHA18f5b170496221ae5486ca226b562d2038d1732c9
SHA2562400176604e81c31c856208e96db9c8aba9c8e36aac5c9c52903e771ca8f4304
SHA512a1c9d600cc26513f6ab018d673e47ef9bb2a875b3bababf7e242d458222e1eab286e6fb61b9cd8d5c380230e62976d37144aab17babe1d81e0cd35cdb6e25369
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Magrezza.adtsMD5
6c74a02033d0fcd0c8cb96e8d7bc9363
SHA190ba3d5efd66628ff05db249f7d87c9eeb31633d
SHA256f2611e38c970b2cd06a81c40d36c3b687542278510b85aa4806820d161fb3242
SHA512826cd987ed933de45b770632e71b5fa78ec436681188c09cd245d6959fde96687b26fbcb7be4acb020cbc5e2dff8f6e8823e870174697d22429673f207d16073
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mise.adtsMD5
40b99134859b20ed28e8114f0cd89bff
SHA1245e5070ce852d3abdbe0b05b5e1f11b03096c6e
SHA256d15a60863bf720f676a7551cd6aa1edf190370ff0d94af59b6123ed21d24213a
SHA512ce26f830f68372f50f218ddc65edd486728a634d9a711443fd788ef55e32700f8f7c495ad43ef9c7bd0db85b54f3de5660ee17ffe7e11346cf8fb5cca253a256
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UMD5
b3ca9fa6e338f37cba89894f0dc0ccfb
SHA10e3a55ffa3af6b0396bc30a0e88eef61b357015b
SHA2563186ff707581468e32e4cef8157af27db76a54d26b9aeadd223a5034762fa073
SHA5127ad2050d56bd2a8068cd18f7ec7317032a95d94aa18c1c56580be15f27ba18b3a0748e420c1f0c1e1a50a385c0f2d07a2ef1e98c95c9463b543e2de1282754a7
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exeMD5
046ada851b9f6193733140c6e129696b
SHA122d58b62ab2d39b038055c7ec45f29213534e547
SHA25679d2d551a3085bd5de8368b329ee39666a7ac98692d4261c4da7cc07ca360d9a
SHA5120bf530df50656a5bb1722220738039348c0ff7a3078b5c64ca6af9ce564d5f68d5bf51ee146c0c80751e963fe7e679f0f08243a1a508029ce75b7de4d1e3ddef
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exeMD5
046ada851b9f6193733140c6e129696b
SHA122d58b62ab2d39b038055c7ec45f29213534e547
SHA25679d2d551a3085bd5de8368b329ee39666a7ac98692d4261c4da7cc07ca360d9a
SHA5120bf530df50656a5bb1722220738039348c0ff7a3078b5c64ca6af9ce564d5f68d5bf51ee146c0c80751e963fe7e679f0f08243a1a508029ce75b7de4d1e3ddef
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exeMD5
ada68de170539dde7dc0a4b24af07f11
SHA1fc130610603913222dd0cafa661ea20088e6d332
SHA256cf072d97c33e2ad28618a943aaf43d0240d9002a45d9bb3688a2bcf2b27c26b0
SHA51272d5db5d1182e91e36706ef044b61695bb14fac98ca287b6f535db8df5bfa1219570314004d0309adc18ee573c496c9f44c3e0e516608375db80850780a24d8e
-
C:\Users\Admin\AppData\Local\Temp\cwddprougtpg.exeMD5
2c269d932b52ff71a1429e94cd020c9f
SHA14de5a5fca618479c84e84f27bfdf589b692a5bea
SHA256f231fc321d5bfd7623b731251d4231ebd317916507696795ce0a091cb8e4dead
SHA5124f794cc19fdb840203782351d0b5216d34e8965892b47faa322b75b0b862d8d38362da314b0cd916bd6202f5a0c577bb7e7636042e65b03f1cf50b6730f73119
-
C:\Users\Admin\AppData\Local\Temp\cwddprougtpg.exeMD5
2c269d932b52ff71a1429e94cd020c9f
SHA14de5a5fca618479c84e84f27bfdf589b692a5bea
SHA256f231fc321d5bfd7623b731251d4231ebd317916507696795ce0a091cb8e4dead
SHA5124f794cc19fdb840203782351d0b5216d34e8965892b47faa322b75b0b862d8d38362da314b0cd916bd6202f5a0c577bb7e7636042e65b03f1cf50b6730f73119
-
C:\Users\Admin\AppData\Local\Temp\lubnldmkk.vbsMD5
7aef84fd3cf852400f7f5c45893b54dc
SHA16a5a3f04a20cd835eaf38d8e86989a73ca3fcb92
SHA256af1b1bf72f9b8ffea2856c8306302f1b738efbc47c903852d89840163369858e
SHA512c3087c3022863703cdd6d6466bf9bca03d9f144fefca037f9e058daa4cb2d10450204c1915f755b52c8160881a2ee5ebf8ed1c99386ddb3b39204db2cba13f16
-
C:\Users\Admin\AppData\Local\Temp\mrtqdsa.vbsMD5
109f4c42679f999996425d182171ef25
SHA12ba2c9b1d8d9a1fb9433914fbba35f361fbabd57
SHA2569ab2d89d32d037f82bec71b8e1d1fbb9bcf30d6c57071cb521c1411feee1df35
SHA51265839396e05210de37cc2e8a5f5f3ae1df7075dd0504e0bbc702cac6a91a4ee6872b27cecc41aabf8c33832121cbd0862828c93b89e32bf1ad0c817512266be1
-
C:\Users\Admin\AppData\Local\Temp\ovJBcyRDSck\NEXQDR~1.ZIPMD5
9a6f69aec6c2bd491859256cedcc4abf
SHA167c0227bb738841a5463e670b0f4f6e3993a2765
SHA25654de7a58e6bb4efc901e96f0bb5a5e572c3787d2f215d50c1600b6d8aeab45d6
SHA512d28831c8fadb323959ab6ccf53d08e49b2c9dd44dd260faafa95993c94d64f6149fbea38249bf8968038cb7f860dd175e3fd924fefa66f226614da93e63b45ee
-
C:\Users\Admin\AppData\Local\Temp\ovJBcyRDSck\QEFCFN~1.ZIPMD5
7d8faaa784dff4545253c7fadfec8387
SHA10ee538f8f2bd4aeb9221dbd212ec7fa0c3573670
SHA256f3790ced33688575c2615ea155795e9ec8ec31a2e7c955f8576a7310e97dff38
SHA5124156b219f13ed4ef8dc71c44ca4edbb7ec92d58b8ee8ec39cfb345028097afd3771e7dffed9d085a1c6e4c21b3c0fc11079250bb34769f9edca0942bf51256ff
-
C:\Users\Admin\AppData\Local\Temp\ovJBcyRDSck\_Files\_Files\CONNEC~1.TXTMD5
cee1f05e82b5770c7a9ea5eeca8fa67a
SHA134cfefdf3e01f3f8f2de83e863b2412a413f02c0
SHA256b74369130503d82230586dc2b9c43e471dd057b2db880bc3ae7ea8d99365d893
SHA51228a6093d3fb70862650fe311fcb961cae33a90de1d8beaef4981b8b70bac5342200e63d9c453815d36c88d32a7d29220d2583fb7d05d8a66813bde89ee979ae4
-
C:\Users\Admin\AppData\Local\Temp\ovJBcyRDSck\_Files\_INFOR~1.TXTMD5
99401ee218cc4c347c467465e218e985
SHA11084278fcbd3933fc0b383a46b511d98b08b8db4
SHA2567a2373998b74a6c9508f9d97942427656bbfd57ddf3c1db4069809e51aef87e2
SHA51219924de3e7113d901c79f2248cbf40d96611593fc0a5c8231e2fc2ebbea920062fb05570c49e950f4af251eebfba62165b513ada751043bd87aa7429eb61d727
-
C:\Users\Admin\AppData\Local\Temp\ovJBcyRDSck\_Files\_SCREE~1.JPEMD5
98f6ebf41e1affe24754591a89da9749
SHA187ba05bef1982840f88c6e35f458dcdb1c1a7ce7
SHA256b9e788f8388619d65eed302ffbcdd278312f3b8da0a425dff473de5096a3898e
SHA512e58b39593029ff7b818aa1cbf835fe7d034724051d753aab784bd436777cb59b027bb060461c266c00331361b3bcd5017cb4604aba0ed9041f76e662ffe2420f
-
C:\Users\Admin\AppData\Local\Temp\ovJBcyRDSck\files_\SCREEN~1.JPGMD5
98f6ebf41e1affe24754591a89da9749
SHA187ba05bef1982840f88c6e35f458dcdb1c1a7ce7
SHA256b9e788f8388619d65eed302ffbcdd278312f3b8da0a425dff473de5096a3898e
SHA512e58b39593029ff7b818aa1cbf835fe7d034724051d753aab784bd436777cb59b027bb060461c266c00331361b3bcd5017cb4604aba0ed9041f76e662ffe2420f
-
C:\Users\Admin\AppData\Local\Temp\ovJBcyRDSck\files_\SYSTEM~1.TXTMD5
d0f84a79690e213d4f6edc331b1fe009
SHA13e686dd800f37972be49f53bbdac7f55529cece9
SHA256a74e1ff299904247d99645c25d19e530fa0d67a2a2d5148b960dafe038e1c319
SHA512b9d0c43a1095ea91f8cf286c8231b46d83e258f0157e3cdc44ff110c664b59465b341c7b69f02c681bc042d32ebb48e426a9b159132c997811a4d41cf5b3d4c2
-
C:\Users\Admin\AppData\Local\Temp\ovJBcyRDSck\files_\files\CONNEC~1.TXTMD5
cee1f05e82b5770c7a9ea5eeca8fa67a
SHA134cfefdf3e01f3f8f2de83e863b2412a413f02c0
SHA256b74369130503d82230586dc2b9c43e471dd057b2db880bc3ae7ea8d99365d893
SHA51228a6093d3fb70862650fe311fcb961cae33a90de1d8beaef4981b8b70bac5342200e63d9c453815d36c88d32a7d29220d2583fb7d05d8a66813bde89ee979ae4
-
C:\Users\Admin\AppData\Local\Temp\tmp9239.tmp.ps1MD5
3a932b68ad91294877da41189cd74c2a
SHA10610fed18e8bc524cb4fc942687d6932caa7473c
SHA256e6b590ef4ce11b35d98e7cafc71a3c1b28eea1c467f6cabed5a4cea2faa2009d
SHA51278572eaac87c7e3b4de79030603a2af3facac6bd4edf6ed6ce4a012e3a109ec14e9136789f9d4f5b05724d3a190e6eecb21f8136e96463e35d9d0f01188b8715
-
C:\Users\Admin\AppData\Local\Temp\tmp923A.tmpMD5
c416c12d1b2b1da8c8655e393b544362
SHA1fb1a43cd8e1c556c2d25f361f42a21293c29e447
SHA2560600d59103840dff210778179fdfba904dcb737a4bfdb35384608698c86ea046
SHA512cb6d3636be4330aa2fd577c3636d0b7165f92ee817e98f21180ba0c918eb76f4e38f025086593a0e508234ca981cfec2c53482b0e9cc0acfa885fefbdf89913c
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
046ada851b9f6193733140c6e129696b
SHA122d58b62ab2d39b038055c7ec45f29213534e547
SHA25679d2d551a3085bd5de8368b329ee39666a7ac98692d4261c4da7cc07ca360d9a
SHA5120bf530df50656a5bb1722220738039348c0ff7a3078b5c64ca6af9ce564d5f68d5bf51ee146c0c80751e963fe7e679f0f08243a1a508029ce75b7de4d1e3ddef
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
046ada851b9f6193733140c6e129696b
SHA122d58b62ab2d39b038055c7ec45f29213534e547
SHA25679d2d551a3085bd5de8368b329ee39666a7ac98692d4261c4da7cc07ca360d9a
SHA5120bf530df50656a5bb1722220738039348c0ff7a3078b5c64ca6af9ce564d5f68d5bf51ee146c0c80751e963fe7e679f0f08243a1a508029ce75b7de4d1e3ddef
-
\Users\Admin\AppData\Local\Temp\CWDDPR~1.TMPMD5
219e20b69d099cab64444334e0874da8
SHA1b3ea46e786a2826f4c01c807fee22934aeeb5c7b
SHA256d50cbc7b8894f96af15f5e150bac2b7e74346dda50e9cd88ede07b56042e35a4
SHA512063a4105306c1eb8c0a4ab46f0c2788ba1419da0fab62e44520c972b5c1b0ff17b1233e8f61a46c5520d42ae184253ec8b716ae2ba7e2f05f423a2f6233221bb
-
\Users\Admin\AppData\Local\Temp\CWDDPR~1.TMPMD5
219e20b69d099cab64444334e0874da8
SHA1b3ea46e786a2826f4c01c807fee22934aeeb5c7b
SHA256d50cbc7b8894f96af15f5e150bac2b7e74346dda50e9cd88ede07b56042e35a4
SHA512063a4105306c1eb8c0a4ab46f0c2788ba1419da0fab62e44520c972b5c1b0ff17b1233e8f61a46c5520d42ae184253ec8b716ae2ba7e2f05f423a2f6233221bb
-
\Users\Admin\AppData\Local\Temp\CWDDPR~1.TMPMD5
219e20b69d099cab64444334e0874da8
SHA1b3ea46e786a2826f4c01c807fee22934aeeb5c7b
SHA256d50cbc7b8894f96af15f5e150bac2b7e74346dda50e9cd88ede07b56042e35a4
SHA512063a4105306c1eb8c0a4ab46f0c2788ba1419da0fab62e44520c972b5c1b0ff17b1233e8f61a46c5520d42ae184253ec8b716ae2ba7e2f05f423a2f6233221bb
-
\Users\Admin\AppData\Local\Temp\nsfA03E.tmp\UAC.dllMD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
memory/1168-129-0x0000000000000000-mapping.dmp
-
memory/1248-121-0x0000000000000000-mapping.dmp
-
memory/1464-149-0x0000000000000000-mapping.dmp
-
memory/1684-136-0x0000000000000000-mapping.dmp
-
memory/1820-133-0x0000000000000000-mapping.dmp
-
memory/2008-164-0x0000000000000000-mapping.dmp
-
memory/2008-182-0x0000000005330000-0x00000000065C6000-memory.dmpFilesize
18.6MB
-
memory/2164-126-0x0000000000000000-mapping.dmp
-
memory/2244-222-0x0000000007CF0000-0x0000000007CF1000-memory.dmpFilesize
4KB
-
memory/2244-210-0x0000000000000000-mapping.dmp
-
memory/2244-220-0x0000000002F50000-0x0000000002F51000-memory.dmpFilesize
4KB
-
memory/2244-225-0x0000000008600000-0x0000000008601000-memory.dmpFilesize
4KB
-
memory/2244-221-0x0000000002F52000-0x0000000002F53000-memory.dmpFilesize
4KB
-
memory/2664-117-0x0000000000000000-mapping.dmp
-
memory/2720-154-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/2720-153-0x00000000005D0000-0x000000000071A000-memory.dmpFilesize
1.3MB
-
memory/2720-123-0x0000000000000000-mapping.dmp
-
memory/3012-116-0x0000000000000000-mapping.dmp
-
memory/3148-158-0x0000000004460000-0x0000000004461000-memory.dmpFilesize
4KB
-
memory/3148-137-0x0000000000000000-mapping.dmp
-
memory/3380-195-0x0000000004162000-0x0000000004163000-memory.dmpFilesize
4KB
-
memory/3380-185-0x0000000000000000-mapping.dmp
-
memory/3380-219-0x0000000004163000-0x0000000004164000-memory.dmpFilesize
4KB
-
memory/3380-196-0x0000000007510000-0x0000000007511000-memory.dmpFilesize
4KB
-
memory/3380-207-0x0000000008C70000-0x0000000008C71000-memory.dmpFilesize
4KB
-
memory/3380-206-0x00000000089D0000-0x00000000089D1000-memory.dmpFilesize
4KB
-
memory/3380-205-0x0000000009430000-0x0000000009431000-memory.dmpFilesize
4KB
-
memory/3380-197-0x00000000079C0000-0x00000000079C1000-memory.dmpFilesize
4KB
-
memory/3380-188-0x00000000041B0000-0x00000000041B1000-memory.dmpFilesize
4KB
-
memory/3380-189-0x0000000006BC0000-0x0000000006BC1000-memory.dmpFilesize
4KB
-
memory/3380-190-0x0000000007220000-0x0000000007221000-memory.dmpFilesize
4KB
-
memory/3380-191-0x00000000074A0000-0x00000000074A1000-memory.dmpFilesize
4KB
-
memory/3380-192-0x00000000072C0000-0x00000000072C1000-memory.dmpFilesize
4KB
-
memory/3380-198-0x0000000007CD0000-0x0000000007CD1000-memory.dmpFilesize
4KB
-
memory/3380-194-0x0000000004160000-0x0000000004161000-memory.dmpFilesize
4KB
-
memory/3380-200-0x0000000007DF0000-0x0000000007DF1000-memory.dmpFilesize
4KB
-
memory/3380-193-0x00000000075B0000-0x00000000075B1000-memory.dmpFilesize
4KB
-
memory/3436-140-0x0000000000000000-mapping.dmp
-
memory/3556-169-0x0000000000000000-mapping.dmp
-
memory/3712-162-0x0000000000000000-mapping.dmp
-
memory/3808-130-0x0000000000000000-mapping.dmp
-
memory/3896-115-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/3896-114-0x0000000002170000-0x0000000002251000-memory.dmpFilesize
900KB
-
memory/3928-127-0x0000000000000000-mapping.dmp
-
memory/3936-184-0x0000000004810000-0x0000000005AA6000-memory.dmpFilesize
18.6MB
-
memory/3936-180-0x0000000000AE0000-0x0000000000C3F000-memory.dmpFilesize
1.4MB
-
memory/3936-177-0x0000000000000000-mapping.dmp
-
memory/3956-159-0x0000000000000000-mapping.dmp
-
memory/3956-168-0x0000000000400000-0x0000000000549000-memory.dmpFilesize
1.3MB
-
memory/3956-167-0x0000000002360000-0x0000000002460000-memory.dmpFilesize
1024KB
-
memory/3992-150-0x0000000000000000-mapping.dmp
-
memory/3992-156-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/3992-155-0x0000000000480000-0x000000000052E000-memory.dmpFilesize
696KB