Resubmissions

14-09-2021 09:06

210914-k2x6jaadeq 10

14-09-2021 08:57

210914-kw2a1afde8 10

Analysis

  • max time kernel
    113s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    14-09-2021 08:57

General

  • Target

    lv.exe

  • Size

    4.2MB

  • MD5

    1919bd531e95d9195dc53ee6af79ffc8

  • SHA1

    65c2dfb3ad6ff0b3f1b33db143ec9a65ea64e2b0

  • SHA256

    eb50c5447c789b7cab2a404cfbbd049c55fa70bc58783f2bb27df7d169474d27

  • SHA512

    b00029cdfeac8266653f2fefe07e40815c14c811dce68fc95b821a408f8cf60489366a461a1def3d423747a2f5559ce6c1acaee16a795d893036d2a8226ae9c6

Malware Config

Extracted

Family

danabot

C2

23.229.29.48:443

5.9.224.204:443

192.255.166.212:443

Attributes
  • embedded_hash

    0E1A7A1479C37094441FA911262B322A

rsa_pubkey.plain
rsa_privkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 6 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 23 IoCs
  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 10 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lv.exe
    "C:\Users\Admin\AppData\Local\Temp\lv.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe
      "C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c cmd < Giu.vst
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1700
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^xUlNXJkiuCtOHCFKpjDKUUxBRFKQlgBZHHJmaqfsJHlshynlliqvvnNmAJWsYcXSwtiqTyaoWjqjKehMumFehtDoUpZItXagJafpYnsyOSmlnAPbcpkmPVEXBYyJy$" Ape.vst
            5⤵
              PID:1784
            • C:\Users\Admin\AppData\Roaming\Estremita.exe.com
              Estremita.exe.com o
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1104
              • C:\Users\Admin\AppData\Roaming\Estremita.exe.com
                C:\Users\Admin\AppData\Roaming\Estremita.exe.com o
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:1452
                • C:\Users\Admin\AppData\Roaming\ipconfig.exe
                  C:\Users\Admin\AppData\Roaming\ipconfig.exe 
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks processor information in registry
                  • Gathers network information
                  • Modifies system certificate store
                  PID:288
                  • C:\Users\Admin\AppData\Local\Temp\ncndgyxg.exe
                    "C:\Users\Admin\AppData\Local\Temp\ncndgyxg.exe"
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:1076
                    • C:\Windows\SysWOW64\rundll32.exe
                      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\NCNDGY~1.DLL,s C:\Users\Admin\AppData\Local\Temp\ncndgyxg.exe
                      9⤵
                      • Loads dropped DLL
                      PID:1320
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\qcjbknunvtg.vbs"
                    8⤵
                      PID:1104
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\eyaxdirlrc.vbs"
                      8⤵
                      • Blocklisted process makes network request
                      • Modifies system certificate store
                      PID:1136
              • C:\Windows\SysWOW64\PING.EXE
                ping QWOCTUPM
                5⤵
                • Runs ping.exe
                PID:2024
        • C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe
          "C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe"
          2⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Drops startup file
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of WriteProcessMemory
          PID:1980
          • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
            "C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"
            3⤵
            • Executes dropped EXE
            • Checks BIOS information in registry
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: AddClipboardFormatListener
            PID:1304

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Command-Line Interface

      1
      T1059

      Defense Evasion

      Virtualization/Sandbox Evasion

      1
      T1497

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      3
      T1012

      Virtualization/Sandbox Evasion

      1
      T1497

      System Information Discovery

      5
      T1082

      Remote System Discovery

      1
      T1018

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        MD5

        f25e30776ee51098f924d378adf28fca

        SHA1

        e4bcddd56a568f89181721928726eb891210117e

        SHA256

        f41286b1d220523e18131c11978adfa29ea1a6c156d8a5b5f81434c176be6da6

        SHA512

        2837cefa0d271976be07bb76e654c131ee3c7be5b91755f05648975417d73173f7dde2a69463f885a2831f8f8663cb03532229e172cce1bdcd9e5eb5c2dd7640

      • C:\Users\Admin\AppData\Local\Temp\NCNDGY~1.DLL
        MD5

        8c476887f02491e79f9b8db96edde773

        SHA1

        90c4db8268a31901539d520803af312dde37b25b

        SHA256

        1123c1549156c4140fbca675d54bcade914d44a05e51cb2f13737db7fb652664

        SHA512

        820a12af8a33aaa2a80b9a5e34ffb91659ffbf4925c67ff385b1e2e265848ac11cf249a126acbd4b7105d4cff561d4f2946ff3de69df25abb0b6fed66ee1436b

      • C:\Users\Admin\AppData\Local\Temp\eyaxdirlrc.vbs
        MD5

        12f97409e68ba46fb0bfa15e7ee09db5

        SHA1

        c79a52e45842c004c4a20b082468879d931ed452

        SHA256

        95a7b404836be321acaf0a172c6650b8c1477dded6680d2e92adebeb133c8010

        SHA512

        31785fe10f9ef8709190fb394c72c4549ec54891c0f80237f5419e95d9df898f188db91ce89f60b8e37c5c4fa4dbc245883e57c83838febf9b6465b49208e145

      • C:\Users\Admin\AppData\Local\Temp\ncndgyxg.exe
        MD5

        b7a35ebacfed2c27abbb217cca8dca06

        SHA1

        e4d9ec5209e7bf6037de2f199e2f215c64751a92

        SHA256

        61bb57d4ddc1f9de56ffe1f1104af48a1a9dfdf72d084b8338730632fcfb54fc

        SHA512

        d39213c25d0cecb800fdad7212f1ad7f74429ae82986e5856e58012e949edb67c844ac7686cadc2a59bacc7325d499121eb98f1bc4e8e36b722cea5b9a9b7ebd

      • C:\Users\Admin\AppData\Local\Temp\ncndgyxg.exe
        MD5

        b7a35ebacfed2c27abbb217cca8dca06

        SHA1

        e4d9ec5209e7bf6037de2f199e2f215c64751a92

        SHA256

        61bb57d4ddc1f9de56ffe1f1104af48a1a9dfdf72d084b8338730632fcfb54fc

        SHA512

        d39213c25d0cecb800fdad7212f1ad7f74429ae82986e5856e58012e949edb67c844ac7686cadc2a59bacc7325d499121eb98f1bc4e8e36b722cea5b9a9b7ebd

      • C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe
        MD5

        a528555dff61a67168646ec8c542cb98

        SHA1

        74db3485a17d22befa1a7ba4d090434e47007fb1

        SHA256

        0513f7eee6e496728165e72393dc910e3319efce1a624e231ab47a6b57009570

        SHA512

        561aac7278d0411a163dbfc63149ba42f645d058545003168b95939fecdfe6b2e6a520fcedf80648f63481b3d9c1690c49d3919d7675e9463f3fee1d2535f77a

      • C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe
        MD5

        a528555dff61a67168646ec8c542cb98

        SHA1

        74db3485a17d22befa1a7ba4d090434e47007fb1

        SHA256

        0513f7eee6e496728165e72393dc910e3319efce1a624e231ab47a6b57009570

        SHA512

        561aac7278d0411a163dbfc63149ba42f645d058545003168b95939fecdfe6b2e6a520fcedf80648f63481b3d9c1690c49d3919d7675e9463f3fee1d2535f77a

      • C:\Users\Admin\AppData\Local\Temp\qcjbknunvtg.vbs
        MD5

        7119be99ad5e49007c9d1ee9ee0254ec

        SHA1

        636ae016527e4c63b3c8303dd802517961d8cdd1

        SHA256

        c02033f1674f8d8b5130db30e247fcf06ec209e3cc4dbde42917438145962a5a

        SHA512

        70e88bae848905f3e38b6838b42da54cbe8eff6822e264dbdbf5399756f8fd623f11dcbd27d29cbd8e8f7ead8c886565350390b9adbf92cef88cc61637ae42a8

      • C:\Users\Admin\AppData\Roaming\Ape.vst
        MD5

        0f95d588ea95ba041d1e1ab00ab5985a

        SHA1

        59b0f6f218ca27e6bb4a8f709a9bb5c322caa5d9

        SHA256

        e785765db1d69967274f7556a1bb7f58d03ac7a42ce30c898f8b82b5967a836c

        SHA512

        0f0bc00fb441342f01574eb95fd2ea82c01dfe358476226af2de5038b6529dab71da430b2394efb229eea75e6ea2a58f625d8d92cadb497a8cdbcfbe82b53d8a

      • C:\Users\Admin\AppData\Roaming\Estremita.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Roaming\Estremita.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Roaming\Estremita.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Roaming\Giu.vst
        MD5

        6b8f8744aed55fed3f2a4d8641a51b38

        SHA1

        7bb78b0d2cfaa007b004d664975fab47f8e61573

        SHA256

        dca7e57053322373679c95f82885555615554b4b6d614b271f733c1c32dccf08

        SHA512

        60e92939d82e6a6458c7928012d89c988b5b4d35fc5d4d1dfded22855dbb638c952dd4bf293360dc2ec89407b58d8cc47bd1cc19caa181ec84bbc8d933802aad

      • C:\Users\Admin\AppData\Roaming\Guardo.vst
        MD5

        ba3ab0710c08184730d023649fb798a7

        SHA1

        9681e1f7cbf4f69a4067993b64faf85faa6beb08

        SHA256

        69ff4fcbd902b901ade16bb5702560b0a13ee0b353f9cc16d90fe995e5b01498

        SHA512

        ea744158004880f643e947abeae924a58b4f95426970f688a8083b2d5a44fa566919e3271f5ede1e0c48de4aec43e50383f723fbe71915a96c3f1ced50c07b5a

      • C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • C:\Users\Admin\AppData\Roaming\ipconfig.exe
        MD5

        cabb20e171770ff64614a54c1f31c033

        SHA1

        ea18043fedaf888f04c07f71f2006f3f479c0b41

        SHA256

        c0e3087d87c84776fe7ffca768a0793c02d28e34a821f0c9da32339af8e7e6a6

        SHA512

        a6a6beff693f2e2c71c0d8e12f6964e789aa4b370c1e0191b2b0ff038801fdb0038a54c0a8f2dbc0d399d2c016f89701c6b6275b3a2b6fa74fb2a5ea817c2d3b

      • C:\Users\Admin\AppData\Roaming\ipconfig.exe
        MD5

        cabb20e171770ff64614a54c1f31c033

        SHA1

        ea18043fedaf888f04c07f71f2006f3f479c0b41

        SHA256

        c0e3087d87c84776fe7ffca768a0793c02d28e34a821f0c9da32339af8e7e6a6

        SHA512

        a6a6beff693f2e2c71c0d8e12f6964e789aa4b370c1e0191b2b0ff038801fdb0038a54c0a8f2dbc0d399d2c016f89701c6b6275b3a2b6fa74fb2a5ea817c2d3b

      • C:\Users\Admin\AppData\Roaming\o
        MD5

        ba3ab0710c08184730d023649fb798a7

        SHA1

        9681e1f7cbf4f69a4067993b64faf85faa6beb08

        SHA256

        69ff4fcbd902b901ade16bb5702560b0a13ee0b353f9cc16d90fe995e5b01498

        SHA512

        ea744158004880f643e947abeae924a58b4f95426970f688a8083b2d5a44fa566919e3271f5ede1e0c48de4aec43e50383f723fbe71915a96c3f1ced50c07b5a

      • \Users\Admin\AppData\Local\Temp\NCNDGY~1.DLL
        MD5

        8c476887f02491e79f9b8db96edde773

        SHA1

        90c4db8268a31901539d520803af312dde37b25b

        SHA256

        1123c1549156c4140fbca675d54bcade914d44a05e51cb2f13737db7fb652664

        SHA512

        820a12af8a33aaa2a80b9a5e34ffb91659ffbf4925c67ff385b1e2e265848ac11cf249a126acbd4b7105d4cff561d4f2946ff3de69df25abb0b6fed66ee1436b

      • \Users\Admin\AppData\Local\Temp\NCNDGY~1.DLL
        MD5

        8c476887f02491e79f9b8db96edde773

        SHA1

        90c4db8268a31901539d520803af312dde37b25b

        SHA256

        1123c1549156c4140fbca675d54bcade914d44a05e51cb2f13737db7fb652664

        SHA512

        820a12af8a33aaa2a80b9a5e34ffb91659ffbf4925c67ff385b1e2e265848ac11cf249a126acbd4b7105d4cff561d4f2946ff3de69df25abb0b6fed66ee1436b

      • \Users\Admin\AppData\Local\Temp\NCNDGY~1.DLL
        MD5

        8c476887f02491e79f9b8db96edde773

        SHA1

        90c4db8268a31901539d520803af312dde37b25b

        SHA256

        1123c1549156c4140fbca675d54bcade914d44a05e51cb2f13737db7fb652664

        SHA512

        820a12af8a33aaa2a80b9a5e34ffb91659ffbf4925c67ff385b1e2e265848ac11cf249a126acbd4b7105d4cff561d4f2946ff3de69df25abb0b6fed66ee1436b

      • \Users\Admin\AppData\Local\Temp\NCNDGY~1.DLL
        MD5

        8c476887f02491e79f9b8db96edde773

        SHA1

        90c4db8268a31901539d520803af312dde37b25b

        SHA256

        1123c1549156c4140fbca675d54bcade914d44a05e51cb2f13737db7fb652664

        SHA512

        820a12af8a33aaa2a80b9a5e34ffb91659ffbf4925c67ff385b1e2e265848ac11cf249a126acbd4b7105d4cff561d4f2946ff3de69df25abb0b6fed66ee1436b

      • \Users\Admin\AppData\Local\Temp\ncndgyxg.exe
        MD5

        b7a35ebacfed2c27abbb217cca8dca06

        SHA1

        e4d9ec5209e7bf6037de2f199e2f215c64751a92

        SHA256

        61bb57d4ddc1f9de56ffe1f1104af48a1a9dfdf72d084b8338730632fcfb54fc

        SHA512

        d39213c25d0cecb800fdad7212f1ad7f74429ae82986e5856e58012e949edb67c844ac7686cadc2a59bacc7325d499121eb98f1bc4e8e36b722cea5b9a9b7ebd

      • \Users\Admin\AppData\Local\Temp\ncndgyxg.exe
        MD5

        b7a35ebacfed2c27abbb217cca8dca06

        SHA1

        e4d9ec5209e7bf6037de2f199e2f215c64751a92

        SHA256

        61bb57d4ddc1f9de56ffe1f1104af48a1a9dfdf72d084b8338730632fcfb54fc

        SHA512

        d39213c25d0cecb800fdad7212f1ad7f74429ae82986e5856e58012e949edb67c844ac7686cadc2a59bacc7325d499121eb98f1bc4e8e36b722cea5b9a9b7ebd

      • \Users\Admin\AppData\Local\Temp\ncndgyxg.exe
        MD5

        b7a35ebacfed2c27abbb217cca8dca06

        SHA1

        e4d9ec5209e7bf6037de2f199e2f215c64751a92

        SHA256

        61bb57d4ddc1f9de56ffe1f1104af48a1a9dfdf72d084b8338730632fcfb54fc

        SHA512

        d39213c25d0cecb800fdad7212f1ad7f74429ae82986e5856e58012e949edb67c844ac7686cadc2a59bacc7325d499121eb98f1bc4e8e36b722cea5b9a9b7ebd

      • \Users\Admin\AppData\Local\Temp\ncndgyxg.exe
        MD5

        b7a35ebacfed2c27abbb217cca8dca06

        SHA1

        e4d9ec5209e7bf6037de2f199e2f215c64751a92

        SHA256

        61bb57d4ddc1f9de56ffe1f1104af48a1a9dfdf72d084b8338730632fcfb54fc

        SHA512

        d39213c25d0cecb800fdad7212f1ad7f74429ae82986e5856e58012e949edb67c844ac7686cadc2a59bacc7325d499121eb98f1bc4e8e36b722cea5b9a9b7ebd

      • \Users\Admin\AppData\Local\Temp\nsc4BEF.tmp\UAC.dll
        MD5

        adb29e6b186daa765dc750128649b63d

        SHA1

        160cbdc4cb0ac2c142d361df138c537aa7e708c9

        SHA256

        2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

        SHA512

        b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

      • \Users\Admin\AppData\Local\Temp\nsi4FB7.tmp\nsExec.dll
        MD5

        09c2e27c626d6f33018b8a34d3d98cb6

        SHA1

        8d6bf50218c8f201f06ecf98ca73b74752a2e453

        SHA256

        114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1

        SHA512

        883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

      • \Users\Admin\AppData\Local\Temp\picoid\fulzie.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • \Users\Admin\AppData\Local\Temp\picoid\fulzie.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • \Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe
        MD5

        a528555dff61a67168646ec8c542cb98

        SHA1

        74db3485a17d22befa1a7ba4d090434e47007fb1

        SHA256

        0513f7eee6e496728165e72393dc910e3319efce1a624e231ab47a6b57009570

        SHA512

        561aac7278d0411a163dbfc63149ba42f645d058545003168b95939fecdfe6b2e6a520fcedf80648f63481b3d9c1690c49d3919d7675e9463f3fee1d2535f77a

      • \Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe
        MD5

        a528555dff61a67168646ec8c542cb98

        SHA1

        74db3485a17d22befa1a7ba4d090434e47007fb1

        SHA256

        0513f7eee6e496728165e72393dc910e3319efce1a624e231ab47a6b57009570

        SHA512

        561aac7278d0411a163dbfc63149ba42f645d058545003168b95939fecdfe6b2e6a520fcedf80648f63481b3d9c1690c49d3919d7675e9463f3fee1d2535f77a

      • \Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe
        MD5

        a528555dff61a67168646ec8c542cb98

        SHA1

        74db3485a17d22befa1a7ba4d090434e47007fb1

        SHA256

        0513f7eee6e496728165e72393dc910e3319efce1a624e231ab47a6b57009570

        SHA512

        561aac7278d0411a163dbfc63149ba42f645d058545003168b95939fecdfe6b2e6a520fcedf80648f63481b3d9c1690c49d3919d7675e9463f3fee1d2535f77a

      • \Users\Admin\AppData\Roaming\Estremita.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • \Users\Admin\AppData\Roaming\Estremita.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe
        MD5

        03a2391c69f3fb0c90500a7713b83b0c

        SHA1

        72d5a9b0547a061ed86a060c699bfb89fe045e55

        SHA256

        9080c0afa31a3a559dcfc88d2377fe46a36e82d53f35d98fa44041a2ae081c37

        SHA512

        de94437b46f1163e4e06817b6c2f17944703c3e88a2ae57563d304d854f69fa4f61793b75f292e371e5d47ebed63055f27fad0df85e57c6f9b2707054495088d

      • \Users\Admin\AppData\Roaming\ipconfig.exe
        MD5

        cabb20e171770ff64614a54c1f31c033

        SHA1

        ea18043fedaf888f04c07f71f2006f3f479c0b41

        SHA256

        c0e3087d87c84776fe7ffca768a0793c02d28e34a821f0c9da32339af8e7e6a6

        SHA512

        a6a6beff693f2e2c71c0d8e12f6964e789aa4b370c1e0191b2b0ff038801fdb0038a54c0a8f2dbc0d399d2c016f89701c6b6275b3a2b6fa74fb2a5ea817c2d3b

      • \Users\Admin\AppData\Roaming\ipconfig.exe
        MD5

        cabb20e171770ff64614a54c1f31c033

        SHA1

        ea18043fedaf888f04c07f71f2006f3f479c0b41

        SHA256

        c0e3087d87c84776fe7ffca768a0793c02d28e34a821f0c9da32339af8e7e6a6

        SHA512

        a6a6beff693f2e2c71c0d8e12f6964e789aa4b370c1e0191b2b0ff038801fdb0038a54c0a8f2dbc0d399d2c016f89701c6b6275b3a2b6fa74fb2a5ea817c2d3b

      • \Users\Admin\AppData\Roaming\ipconfig.exe
        MD5

        cabb20e171770ff64614a54c1f31c033

        SHA1

        ea18043fedaf888f04c07f71f2006f3f479c0b41

        SHA256

        c0e3087d87c84776fe7ffca768a0793c02d28e34a821f0c9da32339af8e7e6a6

        SHA512

        a6a6beff693f2e2c71c0d8e12f6964e789aa4b370c1e0191b2b0ff038801fdb0038a54c0a8f2dbc0d399d2c016f89701c6b6275b3a2b6fa74fb2a5ea817c2d3b

      • memory/288-105-0x000000000040591E-mapping.dmp
      • memory/288-112-0x0000000000400000-0x0000000000427000-memory.dmp
        Filesize

        156KB

      • memory/1076-125-0x0000000000400000-0x0000000001860000-memory.dmp
        Filesize

        20.4MB

      • memory/1076-124-0x0000000003490000-0x0000000003595000-memory.dmp
        Filesize

        1.0MB

      • memory/1076-115-0x0000000000000000-mapping.dmp
      • memory/1104-88-0x0000000000000000-mapping.dmp
      • memory/1104-121-0x0000000000000000-mapping.dmp
      • memory/1136-126-0x0000000000000000-mapping.dmp
      • memory/1304-97-0x0000000000000000-mapping.dmp
      • memory/1304-103-0x000000013F140000-0x000000013FA54000-memory.dmp
        Filesize

        9.1MB

      • memory/1320-130-0x0000000000000000-mapping.dmp
      • memory/1320-137-0x0000000001E90000-0x0000000001FF2000-memory.dmp
        Filesize

        1.4MB

      • memory/1452-111-0x0000000000180000-0x0000000000182000-memory.dmp
        Filesize

        8KB

      • memory/1452-100-0x0000000000000000-mapping.dmp
      • memory/1700-77-0x0000000000000000-mapping.dmp
      • memory/1736-60-0x0000000075AF1000-0x0000000075AF3000-memory.dmp
        Filesize

        8KB

      • memory/1784-79-0x0000000000000000-mapping.dmp
      • memory/1908-63-0x0000000000000000-mapping.dmp
      • memory/1980-85-0x000007FEFBAA1000-0x000007FEFBAA3000-memory.dmp
        Filesize

        8KB

      • memory/1980-80-0x000000013FC40000-0x0000000140554000-memory.dmp
        Filesize

        9.1MB

      • memory/1980-73-0x0000000000000000-mapping.dmp
      • memory/2004-70-0x0000000000000000-mapping.dmp
      • memory/2024-90-0x0000000000000000-mapping.dmp