Analysis

  • max time kernel
    1800s
  • max time network
    1792s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    01-10-2021 15:59

General

  • Target

    Complaint-818191704-10012021.xls

  • Size

    129KB

  • MD5

    4867eebf4c3f7ee6b532e703d20d5585

  • SHA1

    d772036f1ca3eab516f016aa5073ffc2a65142f4

  • SHA256

    67173a667baf38b78448f969bcb53892536ddc279528553cadbf0a53d1637d5d

  • SHA512

    4b7ccb534a546b70f2453bf2dc456a8cc6a384cdb3f511a55bcaa933a4d2617cfcf1d0871add4d64d5037c762b805f4effafbe7395499be9266a3dc508e04662

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://101.99.90.18/44470.6666363426.dat

xlm40.dropper

http://194.36.191.19/44470.6666363426.dat

xlm40.dropper

http://45.144.29.109/44470.6666363426.dat

Extracted

Family

qakbot

Version

402.363

Botnet

obama107

Campaign

1633078880

C2

140.82.49.12:443

41.250.143.109:995

216.201.162.158:443

86.8.177.143:443

105.198.236.99:443

124.123.42.115:2222

217.17.56.163:443

37.210.152.224:995

190.198.206.189:2222

75.89.195.186:995

78.191.44.76:995

122.11.220.212:2222

68.186.192.69:443

159.2.51.200:2222

217.17.56.163:2222

217.17.56.163:2078

41.228.22.180:443

120.151.47.189:443

47.22.148.6:443

94.200.181.154:443

Extracted

Family

qakbot

Version

402.363

Botnet

notset

Campaign

1632819510

C2

196.217.156.63:995

120.150.218.241:995

95.77.223.148:443

185.250.148.74:443

181.118.183.94:443

105.198.236.99:443

140.82.49.12:443

37.210.152.224:995

89.101.97.139:443

81.241.252.59:2078

27.223.92.142:995

81.250.153.227:2222

73.151.236.31:443

47.22.148.6:443

122.11.220.212:2222

120.151.47.189:443

199.27.127.129:443

216.201.162.158:443

136.232.34.70:443

76.25.142.196:443

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Windows security bypass 2 TTPs
  • Downloads MZ/PE file
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 14 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Discovers systems in the same network 1 TTPs 2 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Gathers network information 2 TTPs 4 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Complaint-818191704-10012021.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 -silent ..\Drezd.red
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:460
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn dfpqspfre /tr "regsvr32.exe -s \"C:\Users\Admin\Drezd.red\"" /SC ONCE /Z /ST 16:02 /ET 16:14
          4⤵
          • Creates scheduled task(s)
          PID:1792
        • C:\Windows\SysWOW64\whoami.exe
          whoami /all
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1056
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c set
          4⤵
            PID:1740
          • C:\Windows\SysWOW64\arp.exe
            arp -a
            4⤵
              PID:1832
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /all
              4⤵
              • Gathers network information
              PID:880
            • C:\Windows\SysWOW64\net.exe
              net view /all
              4⤵
              • Discovers systems in the same network
              PID:744
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.WORKGROUP
              4⤵
                PID:824
              • C:\Windows\SysWOW64\net.exe
                net share
                4⤵
                  PID:1688
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 share
                    5⤵
                      PID:1640
                  • C:\Windows\SysWOW64\route.exe
                    route print
                    4⤵
                      PID:732
                    • C:\Windows\SysWOW64\netstat.exe
                      netstat -nao
                      4⤵
                      • Gathers network information
                      • Suspicious use of AdjustPrivilegeToken
                      PID:380
                    • C:\Windows\SysWOW64\net.exe
                      net localgroup
                      4⤵
                        PID:1816
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 localgroup
                          5⤵
                            PID:1628
                    • C:\Windows\SysWOW64\regsvr32.exe
                      regsvr32 -silent ..\Drezd.red1
                      2⤵
                      • Process spawned unexpected child process
                      • Loads dropped DLL
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of WriteProcessMemory
                      PID:792
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        3⤵
                          PID:1676
                      • C:\Windows\SysWOW64\regsvr32.exe
                        regsvr32 -silent ..\Drezd.red2
                        2⤵
                        • Process spawned unexpected child process
                        • Loads dropped DLL
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of WriteProcessMemory
                        PID:1704
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          3⤵
                            PID:1616
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {8C415B64-0758-4405-B27A-84A33F6E35D7} S-1-5-18:NT AUTHORITY\System:Service:
                        1⤵
                        • Suspicious use of WriteProcessMemory
                        PID:708
                        • C:\Windows\system32\regsvr32.exe
                          regsvr32.exe -s "C:\Users\Admin\Drezd.red"
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1964
                          • C:\Windows\SysWOW64\regsvr32.exe
                            -s "C:\Users\Admin\Drezd.red"
                            3⤵
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:1684
                            • C:\Windows\SysWOW64\explorer.exe
                              C:\Windows\SysWOW64\explorer.exe
                              4⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of WriteProcessMemory
                              PID:1792
                              • C:\Windows\system32\reg.exe
                                C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Mipynv" /d "0"
                                5⤵
                                  PID:1352
                                • C:\Windows\system32\reg.exe
                                  C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Dzwjsvzv" /d "0"
                                  5⤵
                                    PID:1572
                                  • C:\Windows\SysWOW64\whoami.exe
                                    whoami /all
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1692
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c set
                                    5⤵
                                      PID:852
                                    • C:\Windows\SysWOW64\arp.exe
                                      arp -a
                                      5⤵
                                        PID:912
                                      • C:\Windows\SysWOW64\ipconfig.exe
                                        ipconfig /all
                                        5⤵
                                        • Gathers network information
                                        PID:1596
                                      • C:\Windows\SysWOW64\net.exe
                                        net view /all
                                        5⤵
                                        • Discovers systems in the same network
                                        PID:1556
                                      • C:\Windows\SysWOW64\nslookup.exe
                                        nslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.WORKGROUP
                                        5⤵
                                          PID:2020
                                        • C:\Windows\SysWOW64\net.exe
                                          net share
                                          5⤵
                                            PID:748
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 share
                                              6⤵
                                                PID:1868
                                            • C:\Windows\SysWOW64\route.exe
                                              route print
                                              5⤵
                                                PID:1812
                                              • C:\Windows\SysWOW64\netstat.exe
                                                netstat -nao
                                                5⤵
                                                • Gathers network information
                                                PID:1204
                                              • C:\Windows\SysWOW64\net.exe
                                                net localgroup
                                                5⤵
                                                  PID:1948
                                                  • C:\Windows\SysWOW64\net1.exe
                                                    C:\Windows\system32\net1 localgroup
                                                    6⤵
                                                      PID:860
                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                    regsvr32.exe -s "C:\ProgramData\Microsoft\Mipynv\uqgrxvnipkgec.dll"
                                                    5⤵
                                                    • Loads dropped DLL
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious behavior: MapViewOfSection
                                                    PID:1064
                                                    • C:\Windows\SysWOW64\explorer.exe
                                                      C:\Windows\SysWOW64\explorer.exe
                                                      6⤵
                                                      • Drops file in System32 directory
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious behavior: MapViewOfSection
                                                      PID:1820
                                                      • C:\Windows\SysWOW64\explorer.exe
                                                        C:\Windows\SysWOW64\explorer.exe
                                                        7⤵
                                                        • Drops file in System32 directory
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1732
                                          • C:\Windows\system32\msiexec.exe
                                            C:\Windows\system32\msiexec.exe /V
                                            1⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:188
                                          • C:\Windows\system32\taskeng.exe
                                            taskeng.exe {3C9F8F61-CC82-4D8B-AA37-4A40439B53B7} S-1-5-18:NT AUTHORITY\System:Service:
                                            1⤵
                                              PID:1808
                                              • C:\Windows\system32\regsvr32.exe
                                                regsvr32.exe -s "C:\Users\Admin\Drezd.red"
                                                2⤵
                                                  PID:1756
                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                    -s "C:\Users\Admin\Drezd.red"
                                                    3⤵
                                                      PID:1900

                                                Network

                                                MITRE ATT&CK Matrix ATT&CK v6

                                                Execution

                                                Scheduled Task

                                                1
                                                T1053

                                                Command-Line Interface

                                                1
                                                T1059

                                                Persistence

                                                Scheduled Task

                                                1
                                                T1053

                                                Privilege Escalation

                                                Scheduled Task

                                                1
                                                T1053

                                                Defense Evasion

                                                Disabling Security Tools

                                                1
                                                T1089

                                                Modify Registry

                                                2
                                                T1112

                                                Discovery

                                                Remote System Discovery

                                                1
                                                T1018

                                                Query Registry

                                                1
                                                T1012

                                                System Information Discovery

                                                2
                                                T1082

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\ProgramData\Microsoft\Mipynv\uqgrxvnipkgec.dll
                                                  MD5

                                                  9ad3a0d8b2064d12a9098952c7ac3ee2

                                                  SHA1

                                                  bf59513b280b6a3d4fb7bf6c5c2836fa6d5ee4a2

                                                  SHA256

                                                  dd8b18f31dcfa89865629c0264283f6631d38d535b077a8afb3c55d8b677075c

                                                  SHA512

                                                  7a7e152c08889e399af1e126efa3f74638d2273ffecc8e779d752052bf75e2288b915909cd4d633045be9cb02bb84b948a82b958e1f8bdba200787320d23374e

                                                • C:\Users\Admin\Drezd.red
                                                  MD5

                                                  4106ecc0609d74c1f810b52b4dfd97de

                                                  SHA1

                                                  72a8fe9d2cc754d2405f65f5fb1693a7ffbd75f0

                                                  SHA256

                                                  4bd1f8c261fbd5e0d29d6574be4d184578b8dc71454266481c7904903dd1b3ff

                                                  SHA512

                                                  b020385b047f7c3af9505fb7058d23d723b33fe78e28bc24dbdc11d11d56b68294ccfae47497cc1010d168077a594eb969fb12199b86cb0662880902ed5e56f9

                                                • C:\Users\Admin\Drezd.red
                                                  MD5

                                                  12901df11d4b984c96b1acecaf003c5e

                                                  SHA1

                                                  1bf80548184933e8ad4c2f8c7fd9a6edcbd01659

                                                  SHA256

                                                  573756552faa64af9e40c4cde3eba7a88f07a3179aff03490634eb75a98d3e4c

                                                  SHA512

                                                  1567cf45f6a4b5b862494ad0d39f0051de45fe5cada6865bf613d6785147b45d5856e2b999586e384ea2e745be18d647c9b732e6344bf76ff57863917dd9e56b

                                                • C:\Users\Admin\Drezd.red
                                                  MD5

                                                  12901df11d4b984c96b1acecaf003c5e

                                                  SHA1

                                                  1bf80548184933e8ad4c2f8c7fd9a6edcbd01659

                                                  SHA256

                                                  573756552faa64af9e40c4cde3eba7a88f07a3179aff03490634eb75a98d3e4c

                                                  SHA512

                                                  1567cf45f6a4b5b862494ad0d39f0051de45fe5cada6865bf613d6785147b45d5856e2b999586e384ea2e745be18d647c9b732e6344bf76ff57863917dd9e56b

                                                • C:\Users\Admin\Drezd.red1
                                                  MD5

                                                  12901df11d4b984c96b1acecaf003c5e

                                                  SHA1

                                                  1bf80548184933e8ad4c2f8c7fd9a6edcbd01659

                                                  SHA256

                                                  573756552faa64af9e40c4cde3eba7a88f07a3179aff03490634eb75a98d3e4c

                                                  SHA512

                                                  1567cf45f6a4b5b862494ad0d39f0051de45fe5cada6865bf613d6785147b45d5856e2b999586e384ea2e745be18d647c9b732e6344bf76ff57863917dd9e56b

                                                • C:\Users\Admin\Drezd.red2
                                                  MD5

                                                  12901df11d4b984c96b1acecaf003c5e

                                                  SHA1

                                                  1bf80548184933e8ad4c2f8c7fd9a6edcbd01659

                                                  SHA256

                                                  573756552faa64af9e40c4cde3eba7a88f07a3179aff03490634eb75a98d3e4c

                                                  SHA512

                                                  1567cf45f6a4b5b862494ad0d39f0051de45fe5cada6865bf613d6785147b45d5856e2b999586e384ea2e745be18d647c9b732e6344bf76ff57863917dd9e56b

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                                                  MD5

                                                  ab5c36d10261c173c5896f3478cdc6b7

                                                  SHA1

                                                  87ac53810ad125663519e944bc87ded3979cbee4

                                                  SHA256

                                                  f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9

                                                  SHA512

                                                  e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
                                                  MD5

                                                  a266bb7dcc38a562631361bbf61dd11b

                                                  SHA1

                                                  3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                  SHA256

                                                  df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                  SHA512

                                                  0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                  MD5

                                                  4f2516c501054b3ff729ff0b60453ae6

                                                  SHA1

                                                  4577ba21bcf741af0ea9d7067d2668c835ba087a

                                                  SHA256

                                                  27bba22d0ee8d378ef0d4728ed02a34b406ac8ca81dcb5da7b6e439dc4da00a0

                                                  SHA512

                                                  d7cbc9f663bec182dacf63ca5c3980db822ab969ede717c408fc713ac4557e373ef530d9cc3de5307541085e1fb27362885e9ebfdfbb6b0d230177572b18855d

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                  MD5

                                                  8f2fdbe937b0cbbf4539956eb6e7a841

                                                  SHA1

                                                  0466f0dd2105cc9dfeca767e7a2e9d38d2bb0962

                                                  SHA256

                                                  a3b63633eea31368929c0259d5be22b3c134d81f2e7dd32fde21bb6dec953fa1

                                                  SHA512

                                                  29eb844ef098fe81fae3a98a21115cd78ac5ad7fbea3be7ee6d6e48d8b71783b109946ae1cb6b8b4454e6f85f476d63f95c6be8586b421124b14ef8a518b3db0

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                  MD5

                                                  4ab17ca1bf1e29df9815be2b72cbf64a

                                                  SHA1

                                                  e19ff058cc489ee80662ad3c471bd4ddcf2c694d

                                                  SHA256

                                                  7946c9d1720b3bedf32ee10c52c758b64f5c7ec1aafc2e4a9e569bf536b5f06c

                                                  SHA512

                                                  9d0f84ab0914853a725ac3f6936e82a42a25660d6a2811c5d62860173cec63616aa462dcd41619fd978f1b55c83a836e559ea7fc1a49cc76149082380bcdf5c2

                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
                                                  MD5

                                                  a1f8c9e45baffb82e77e5f24d02eac84

                                                  SHA1

                                                  167a555bf8c973d45c50464b1368c5d35ef506ee

                                                  SHA256

                                                  e49796b55bb0a8344722c70ae657e8019a751ce27c637bb2b39b8b943b3e74df

                                                  SHA512

                                                  9e5a209cdf1a317c97fd04a67f36f9b5e2cade29da1f64eba4bd34ed3a2f95e50df881fa1a9fdbd59f8f0c745a0fddf803f44b139adeebb3b07da33bfbe32e22

                                                • \??\PIPE\lsarpc
                                                  MD5

                                                  d41d8cd98f00b204e9800998ecf8427e

                                                  SHA1

                                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                  SHA256

                                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                  SHA512

                                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                • \??\PIPE\wkssvc
                                                  MD5

                                                  d41d8cd98f00b204e9800998ecf8427e

                                                  SHA1

                                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                  SHA256

                                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                  SHA512

                                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                • \??\PIPE\wkssvc
                                                  MD5

                                                  d41d8cd98f00b204e9800998ecf8427e

                                                  SHA1

                                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                  SHA256

                                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                  SHA512

                                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                • \??\PIPE\wkssvc
                                                  MD5

                                                  d41d8cd98f00b204e9800998ecf8427e

                                                  SHA1

                                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                  SHA256

                                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                  SHA512

                                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                • \ProgramData\Microsoft\Mipynv\uqgrxvnipkgec.dll
                                                  MD5

                                                  9ad3a0d8b2064d12a9098952c7ac3ee2

                                                  SHA1

                                                  bf59513b280b6a3d4fb7bf6c5c2836fa6d5ee4a2

                                                  SHA256

                                                  dd8b18f31dcfa89865629c0264283f6631d38d535b077a8afb3c55d8b677075c

                                                  SHA512

                                                  7a7e152c08889e399af1e126efa3f74638d2273ffecc8e779d752052bf75e2288b915909cd4d633045be9cb02bb84b948a82b958e1f8bdba200787320d23374e

                                                • \Users\Admin\Drezd.red
                                                  MD5

                                                  12901df11d4b984c96b1acecaf003c5e

                                                  SHA1

                                                  1bf80548184933e8ad4c2f8c7fd9a6edcbd01659

                                                  SHA256

                                                  573756552faa64af9e40c4cde3eba7a88f07a3179aff03490634eb75a98d3e4c

                                                  SHA512

                                                  1567cf45f6a4b5b862494ad0d39f0051de45fe5cada6865bf613d6785147b45d5856e2b999586e384ea2e745be18d647c9b732e6344bf76ff57863917dd9e56b

                                                • \Users\Admin\Drezd.red
                                                  MD5

                                                  12901df11d4b984c96b1acecaf003c5e

                                                  SHA1

                                                  1bf80548184933e8ad4c2f8c7fd9a6edcbd01659

                                                  SHA256

                                                  573756552faa64af9e40c4cde3eba7a88f07a3179aff03490634eb75a98d3e4c

                                                  SHA512

                                                  1567cf45f6a4b5b862494ad0d39f0051de45fe5cada6865bf613d6785147b45d5856e2b999586e384ea2e745be18d647c9b732e6344bf76ff57863917dd9e56b

                                                • \Users\Admin\Drezd.red1
                                                  MD5

                                                  12901df11d4b984c96b1acecaf003c5e

                                                  SHA1

                                                  1bf80548184933e8ad4c2f8c7fd9a6edcbd01659

                                                  SHA256

                                                  573756552faa64af9e40c4cde3eba7a88f07a3179aff03490634eb75a98d3e4c

                                                  SHA512

                                                  1567cf45f6a4b5b862494ad0d39f0051de45fe5cada6865bf613d6785147b45d5856e2b999586e384ea2e745be18d647c9b732e6344bf76ff57863917dd9e56b

                                                • \Users\Admin\Drezd.red2
                                                  MD5

                                                  12901df11d4b984c96b1acecaf003c5e

                                                  SHA1

                                                  1bf80548184933e8ad4c2f8c7fd9a6edcbd01659

                                                  SHA256

                                                  573756552faa64af9e40c4cde3eba7a88f07a3179aff03490634eb75a98d3e4c

                                                  SHA512

                                                  1567cf45f6a4b5b862494ad0d39f0051de45fe5cada6865bf613d6785147b45d5856e2b999586e384ea2e745be18d647c9b732e6344bf76ff57863917dd9e56b

                                                • memory/380-118-0x0000000000000000-mapping.dmp
                                                • memory/460-59-0x0000000075651000-0x0000000075653000-memory.dmp
                                                  Filesize

                                                  8KB

                                                • memory/460-68-0x00000000001E0000-0x00000000001E1000-memory.dmp
                                                  Filesize

                                                  4KB

                                                • memory/460-67-0x000000006C620000-0x000000006C6C0000-memory.dmp
                                                  Filesize

                                                  640KB

                                                • memory/460-58-0x0000000000000000-mapping.dmp
                                                • memory/460-66-0x000000006C620000-0x000000006C641000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/732-117-0x0000000000000000-mapping.dmp
                                                • memory/744-113-0x0000000000000000-mapping.dmp
                                                • memory/748-135-0x0000000000000000-mapping.dmp
                                                • memory/792-74-0x000000006C410000-0x000000006C431000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/792-75-0x000000006C410000-0x000000006C4B0000-memory.dmp
                                                  Filesize

                                                  640KB

                                                • memory/792-81-0x0000000000160000-0x0000000000161000-memory.dmp
                                                  Filesize

                                                  4KB

                                                • memory/792-62-0x0000000000000000-mapping.dmp
                                                • memory/824-114-0x0000000000000000-mapping.dmp
                                                • memory/852-129-0x0000000000000000-mapping.dmp
                                                • memory/860-140-0x0000000000000000-mapping.dmp
                                                • memory/880-111-0x0000000000000000-mapping.dmp
                                                • memory/912-130-0x0000000000000000-mapping.dmp
                                                • memory/1056-108-0x0000000000000000-mapping.dmp
                                                • memory/1064-148-0x00000000001E0000-0x0000000000201000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/1064-147-0x00000000000C0000-0x00000000000C1000-memory.dmp
                                                  Filesize

                                                  4KB

                                                • memory/1064-149-0x0000000000270000-0x0000000000291000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/1064-145-0x0000000000A60000-0x0000000000BA7000-memory.dmp
                                                  Filesize

                                                  1.3MB

                                                • memory/1064-141-0x0000000000000000-mapping.dmp
                                                • memory/1204-138-0x0000000000000000-mapping.dmp
                                                • memory/1308-57-0x0000000005F40000-0x0000000005F42000-memory.dmp
                                                  Filesize

                                                  8KB

                                                • memory/1308-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
                                                  Filesize

                                                  64KB

                                                • memory/1308-54-0x000000002FB51000-0x000000002FB54000-memory.dmp
                                                  Filesize

                                                  12KB

                                                • memory/1308-55-0x0000000071B11000-0x0000000071B13000-memory.dmp
                                                  Filesize

                                                  8KB

                                                • memory/1352-104-0x0000000000000000-mapping.dmp
                                                • memory/1556-133-0x0000000000000000-mapping.dmp
                                                • memory/1572-105-0x0000000000000000-mapping.dmp
                                                • memory/1596-131-0x0000000000000000-mapping.dmp
                                                • memory/1616-91-0x00000000000D0000-0x00000000000F1000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/1616-87-0x0000000000000000-mapping.dmp
                                                • memory/1628-120-0x0000000000000000-mapping.dmp
                                                • memory/1640-116-0x0000000000000000-mapping.dmp
                                                • memory/1656-72-0x00000000000C0000-0x00000000000E1000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/1656-71-0x000000006C271000-0x000000006C273000-memory.dmp
                                                  Filesize

                                                  8KB

                                                • memory/1656-69-0x0000000000000000-mapping.dmp
                                                • memory/1676-80-0x0000000000000000-mapping.dmp
                                                • memory/1676-84-0x0000000000080000-0x00000000000A1000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/1684-106-0x00000000000F0000-0x00000000000F1000-memory.dmp
                                                  Filesize

                                                  4KB

                                                • memory/1684-98-0x000000006C450000-0x000000006C471000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/1684-99-0x000000006C450000-0x000000006C4F0000-memory.dmp
                                                  Filesize

                                                  640KB

                                                • memory/1684-95-0x0000000000000000-mapping.dmp
                                                • memory/1688-115-0x0000000000000000-mapping.dmp
                                                • memory/1692-128-0x0000000000000000-mapping.dmp
                                                • memory/1704-76-0x0000000000000000-mapping.dmp
                                                • memory/1704-86-0x000000006C0A0000-0x000000006C140000-memory.dmp
                                                  Filesize

                                                  640KB

                                                • memory/1704-85-0x000000006C0A0000-0x000000006C0C1000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/1704-90-0x0000000000190000-0x0000000000191000-memory.dmp
                                                  Filesize

                                                  4KB

                                                • memory/1732-159-0x0000000000000000-mapping.dmp
                                                • memory/1732-163-0x00000000001A0000-0x00000000001BC000-memory.dmp
                                                  Filesize

                                                  112KB

                                                • memory/1732-162-0x00000000000A0000-0x00000000000C1000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/1740-109-0x0000000000000000-mapping.dmp
                                                • memory/1756-123-0x0000000000000000-mapping.dmp
                                                • memory/1792-73-0x0000000000000000-mapping.dmp
                                                • memory/1792-101-0x0000000000000000-mapping.dmp
                                                • memory/1792-107-0x0000000000080000-0x00000000000A1000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/1812-137-0x0000000000000000-mapping.dmp
                                                • memory/1816-119-0x0000000000000000-mapping.dmp
                                                • memory/1820-150-0x0000000000000000-mapping.dmp
                                                • memory/1820-154-0x0000000000080000-0x00000000000A1000-memory.dmp
                                                  Filesize

                                                  132KB

                                                • memory/1832-110-0x0000000000000000-mapping.dmp
                                                • memory/1868-136-0x0000000000000000-mapping.dmp
                                                • memory/1900-126-0x0000000000000000-mapping.dmp
                                                • memory/1948-139-0x0000000000000000-mapping.dmp
                                                • memory/1964-93-0x000007FEFC271000-0x000007FEFC273000-memory.dmp
                                                  Filesize

                                                  8KB

                                                • memory/1964-92-0x0000000000000000-mapping.dmp
                                                • memory/2020-134-0x0000000000000000-mapping.dmp