Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    08-10-2021 12:07

General

  • Target

    618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe

  • Size

    2.9MB

  • MD5

    b6841e1bdebcb206e38123af2ba3254c

  • SHA1

    0e3928f6de38d4b2d0badb245d1516721712b330

  • SHA256

    618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822

  • SHA512

    7d1c3670b8b3a3b911620949816e58103e827f4cd8318dceb1b513591e13485ccc131229709df04daae608b2f83369d90132f49095c0a9043f17e565ece0279d

Malware Config

Extracted

Family

raccoon

Version

1.8.2

Botnet

728e62b0300799f2a8741c39a71a1543c6759e8d

Attributes
  • url4cnc

    http://teletop.top/brikitiki

    http://teleta.top/brikitiki

    https://t.me/brikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

oski

C2

scarsa.ac.ug

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 22 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 8 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe
    "C:\Users\Admin\AppData\Local\Temp\618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Fabgaoysmhpndloesmbijrq.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
        "C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Pusemavwbnf.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1900
          • C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
            "C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1904
            • C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
              C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              PID:1832
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c taskkill /pid 1832 & erase C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe & RD /S /Q C:\\ProgramData\\463621890887522\\* & exit
                7⤵
                  PID:552
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /pid 1832
                    8⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:720
          • C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
            C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
            4⤵
            • Executes dropped EXE
            PID:616
      • C:\Users\Admin\AppData\Local\Temp\618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe
        C:\Users\Admin\AppData\Local\Temp\618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe
        2⤵
        • Loads dropped DLL
        • Accesses Microsoft Outlook accounts
        • Accesses Microsoft Outlook profiles
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:596
        • C:\Users\Admin\AppData\Local\Temp\Pe739r1ctk.exe
          "C:\Users\Admin\AppData\Local\Temp\Pe739r1ctk.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:952
          • C:\Users\Admin\AppData\Local\Temp\Pe739r1ctk.exe
            C:\Users\Admin\AppData\Local\Temp\Pe739r1ctk.exe
            4⤵
            • Executes dropped EXE
            PID:1120
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
              5⤵
              • Creates scheduled task(s)
              PID:672
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Public\Trast.bat" "
            4⤵
              PID:1792
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat
                5⤵
                  PID:1268
                  • C:\Windows\SysWOW64\reg.exe
                    reg delete hkcu\Environment /v windir /f
                    6⤵
                    • Modifies registry key
                    PID:1572
                  • C:\Windows\SysWOW64\reg.exe
                    reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM "
                    6⤵
                    • Modifies registry key
                    PID:1868
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I
                    6⤵
                      PID:1356
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Public\nest.bat" "
                  4⤵
                    PID:1168
                    • C:\Windows\SysWOW64\reg.exe
                      reg delete hkcu\Environment /v windir /f
                      5⤵
                      • Modifies registry key
                      PID:1080
                • C:\Users\Admin\AppData\Local\Temp\YqqEBifXbY.exe
                  "C:\Users\Admin\AppData\Local\Temp\YqqEBifXbY.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1688
                  • C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
                    C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
                    4⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1372
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe"
                  3⤵
                  • Deletes itself
                  • Suspicious use of WriteProcessMemory
                  PID:1148
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /T 10 /NOBREAK
                    4⤵
                    • Delays execution with timeout.exe
                    PID:2020
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {C7AC5555-0B98-441C-8301-16D9D8DCC147} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]
              1⤵
                PID:888
                • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                  C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:1936
                  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                    C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                    3⤵
                    • Executes dropped EXE
                    PID:1868
                    • C:\Windows\SysWOW64\schtasks.exe
                      /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
                      4⤵
                      • Creates scheduled task(s)
                      PID:1356

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              2
              T1112

              Credential Access

              Credentials in Files

              3
              T1081

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              2
              T1082

              Collection

              Data from Local System

              3
              T1005

              Email Collection

              2
              T1114

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
                MD5

                c04b9b3284af9915132860c0396ae290

                SHA1

                05f464880aac7b7532ffa6db0d5e6b4856ca2c45

                SHA256

                a12f6cdb010d03ad5e130356d0a5a5a66177c97a6791648590264f6562827b70

                SHA512

                edf23911822a770873e2dd056f12775e62dc495982b07b9291311b6d55977cb049c46ad0b3d0be10801555ff0e4323cae3617b3b7b237735ef3eec2e5fb77d7d

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
                MD5

                512d9a628cc327486e0690356fad834a

                SHA1

                81d4545459a22f426f543dbb562446c0e89fec3a

                SHA256

                2bf07c9087f144409d54144e0357309001e42ab727cb587ea79b543bbd5ac89c

                SHA512

                767ebc977eb0f3d357514c70e7199ce8f0fe4c4bcf59e28f804d4931de81b96c12c41b2f53893663f79a71820e1ced1323f05829253a3e15ac5bd2b04e35923c

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                MD5

                1c7d7d541a1cf2382a0538411b7f5a41

                SHA1

                0b386fda59c064d631670151de135977528bfb75

                SHA256

                15e75ba08628d90e3e95d11a040ca3225ce37ed93f676fc7b8e887e66366fb6a

                SHA512

                6cbbfbc724e12cf617cf5370e3904310648cf2f1f604b44b3b0586cdfac926d200f687820d218d85e8f49c8a07ea64ea2c99450c86ce1fea54da7eb5a231f9b2

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\20FS0QLA\Lnouxqkbbgkvxwmwtigvjxpvnenadlc[1]
                MD5

                f82884cc5e7cf22e9702adbfc1f12bee

                SHA1

                5e8d547dffe7611c737189ce22bb1a8393953e5d

                SHA256

                be474ece5c1a58bd3c86f1ce8e7fab9049aeadbca5e4690e00d0751153f55f72

                SHA512

                4bfa17059270dc17a0a9519ec989675116e869cdb6a1b68009c9e737e17dd2cc99cea17cc2db4798b25f3f888b2207f8b5f5360fdf847ae2850b79aff781244e

              • C:\Users\Admin\AppData\Local\Temp\Fabgaoysmhpndloesmbijrq.vbs
                MD5

                b8bdead0e1e0f92ce9d29aa3e6419913

                SHA1

                c347b99821bba1f9010e6a7a514f5e8ac91c0d0b

                SHA256

                e6f5fcb2b8614d30f07f30427023aa8a5977c0c3a087728df23aba75294e7cf1

                SHA512

                6c2cdd308fea8eb0ab505099044a5cde1b5a57b6842cc5c4d4ce7540286589a89cce065c5e5106de73f467764d9a4860887852932b1922cffdd970f20ada26a2

              • C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
                MD5

                b037454773691bf226efd218ab16d4c3

                SHA1

                6ed5a3d4187696d97e317565d94cd0f445f43cb3

                SHA256

                7ebbd92f07d9c8fe82dc72c0a875085dca39ff438533736b769c3eedbe1637bf

                SHA512

                942faa4de6809aa968d5fb77c9089df6e9639b26108bd6bced954b913868d5115b9a0537ecb76510ebcd2cadff10f9123a475e1fb89ac04b0ea8703be9b32cd1

              • C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
                MD5

                b037454773691bf226efd218ab16d4c3

                SHA1

                6ed5a3d4187696d97e317565d94cd0f445f43cb3

                SHA256

                7ebbd92f07d9c8fe82dc72c0a875085dca39ff438533736b769c3eedbe1637bf

                SHA512

                942faa4de6809aa968d5fb77c9089df6e9639b26108bd6bced954b913868d5115b9a0537ecb76510ebcd2cadff10f9123a475e1fb89ac04b0ea8703be9b32cd1

              • C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
                MD5

                b037454773691bf226efd218ab16d4c3

                SHA1

                6ed5a3d4187696d97e317565d94cd0f445f43cb3

                SHA256

                7ebbd92f07d9c8fe82dc72c0a875085dca39ff438533736b769c3eedbe1637bf

                SHA512

                942faa4de6809aa968d5fb77c9089df6e9639b26108bd6bced954b913868d5115b9a0537ecb76510ebcd2cadff10f9123a475e1fb89ac04b0ea8703be9b32cd1

              • C:\Users\Admin\AppData\Local\Temp\Pe739r1ctk.exe
                MD5

                a003b564bd23880f99a29006e780a89b

                SHA1

                8465374554a0c6c02f7914c1278afd79e96ed8c4

                SHA256

                5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

                SHA512

                0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

              • C:\Users\Admin\AppData\Local\Temp\Pe739r1ctk.exe
                MD5

                a003b564bd23880f99a29006e780a89b

                SHA1

                8465374554a0c6c02f7914c1278afd79e96ed8c4

                SHA256

                5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

                SHA512

                0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

              • C:\Users\Admin\AppData\Local\Temp\Pe739r1ctk.exe
                MD5

                a003b564bd23880f99a29006e780a89b

                SHA1

                8465374554a0c6c02f7914c1278afd79e96ed8c4

                SHA256

                5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

                SHA512

                0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

              • C:\Users\Admin\AppData\Local\Temp\Pusemavwbnf.vbs
                MD5

                187b267d5bf80b98f8f1996421b942f2

                SHA1

                9ca4c1e7549ac90b833d6edc101f573c1b88053d

                SHA256

                695840d5369071deefa3516a732d9d0943c60811297620e7364fec5277400d72

                SHA512

                6603af2a725ded45414f5e3dfcd708e6efd1d3d05d90fc208c5ab4c1eba44a0ff6b46ba571b48623409fedfe4b96a0170c95950cfd6ad80beecde94e56a3b511

              • C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
                MD5

                4feabb9ddecae0a7ac955cd1f8487aaf

                SHA1

                5d27ccefc79e7d9a1c16e07fe0d0ef36df30c30a

                SHA256

                bbc945e2e6dc6a9dac62077a82ce31e3dc882643bb3a4236a1a50b6106f404ab

                SHA512

                6ee1a3ebe305bc7ec90e454f8c72aa21de22e5fd5fce305ac3bc0d6d066aa8eac6e8675cdb6490aeebbec8f476555ed5ecbdbc0733d049e80649312af2a942dc

              • C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
                MD5

                4feabb9ddecae0a7ac955cd1f8487aaf

                SHA1

                5d27ccefc79e7d9a1c16e07fe0d0ef36df30c30a

                SHA256

                bbc945e2e6dc6a9dac62077a82ce31e3dc882643bb3a4236a1a50b6106f404ab

                SHA512

                6ee1a3ebe305bc7ec90e454f8c72aa21de22e5fd5fce305ac3bc0d6d066aa8eac6e8675cdb6490aeebbec8f476555ed5ecbdbc0733d049e80649312af2a942dc

              • C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
                MD5

                4feabb9ddecae0a7ac955cd1f8487aaf

                SHA1

                5d27ccefc79e7d9a1c16e07fe0d0ef36df30c30a

                SHA256

                bbc945e2e6dc6a9dac62077a82ce31e3dc882643bb3a4236a1a50b6106f404ab

                SHA512

                6ee1a3ebe305bc7ec90e454f8c72aa21de22e5fd5fce305ac3bc0d6d066aa8eac6e8675cdb6490aeebbec8f476555ed5ecbdbc0733d049e80649312af2a942dc

              • C:\Users\Admin\AppData\Local\Temp\YqqEBifXbY.exe
                MD5

                f6a627b01b8ac665add87b047e732613

                SHA1

                b50d28f58d0892708db4ca09658547fba013f73d

                SHA256

                bbabc0cb29dc697735ab4b2d4285e9bb608f992393b734b7b20d4a4ba42a75ce

                SHA512

                a196b0c1b5fa0bc8dbb2fd49f8e1fca4144240e38f876e73e9380b709e5dd4f5d2c3df585870d288699776add48a85fa8845e6eff5de76deb6b6f6b96f09c9aa

              • C:\Users\Admin\AppData\Local\Temp\YqqEBifXbY.exe
                MD5

                f6a627b01b8ac665add87b047e732613

                SHA1

                b50d28f58d0892708db4ca09658547fba013f73d

                SHA256

                bbabc0cb29dc697735ab4b2d4285e9bb608f992393b734b7b20d4a4ba42a75ce

                SHA512

                a196b0c1b5fa0bc8dbb2fd49f8e1fca4144240e38f876e73e9380b709e5dd4f5d2c3df585870d288699776add48a85fa8845e6eff5de76deb6b6f6b96f09c9aa

              • C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
                MD5

                843969865a92a4e82c26a2fa75ca4026

                SHA1

                c1046b49bc93cb3b37cebe1388d0b72bb66ab2e7

                SHA256

                3bd221cdc9867ee90ba3633f2266f298b4cb4fac98c70a0f208ce4afb6748637

                SHA512

                b9b30b9a69b5c7d536fe5d3c7d4615b2d9eec8410d20727c1ad17ba36c2876cb9ddbfe77353101fd80d92653724a176cd7f20c85cfaf69c6b74e95cf7de7440a

              • C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
                MD5

                843969865a92a4e82c26a2fa75ca4026

                SHA1

                c1046b49bc93cb3b37cebe1388d0b72bb66ab2e7

                SHA256

                3bd221cdc9867ee90ba3633f2266f298b4cb4fac98c70a0f208ce4afb6748637

                SHA512

                b9b30b9a69b5c7d536fe5d3c7d4615b2d9eec8410d20727c1ad17ba36c2876cb9ddbfe77353101fd80d92653724a176cd7f20c85cfaf69c6b74e95cf7de7440a

              • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                MD5

                a003b564bd23880f99a29006e780a89b

                SHA1

                8465374554a0c6c02f7914c1278afd79e96ed8c4

                SHA256

                5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

                SHA512

                0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

              • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                MD5

                a003b564bd23880f99a29006e780a89b

                SHA1

                8465374554a0c6c02f7914c1278afd79e96ed8c4

                SHA256

                5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

                SHA512

                0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

              • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                MD5

                a003b564bd23880f99a29006e780a89b

                SHA1

                8465374554a0c6c02f7914c1278afd79e96ed8c4

                SHA256

                5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

                SHA512

                0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

              • C:\Users\Public\Trast.bat
                MD5

                4068c9f69fcd8a171c67f81d4a952a54

                SHA1

                4d2536a8c28cdcc17465e20d6693fb9e8e713b36

                SHA256

                24222300c78180b50ed1f8361ba63cb27316ec994c1c9079708a51b4a1a9d810

                SHA512

                a64f9319acc51fffd0491c74dcd9c9084c2783b82f95727e4bfe387a8528c6dcf68f11418e88f1e133d115daf907549c86dd7ad866b2a7938add5225fbb2811d

              • C:\Users\Public\UKO.bat
                MD5

                eaf8d967454c3bbddbf2e05a421411f8

                SHA1

                6170880409b24de75c2dc3d56a506fbff7f6622c

                SHA256

                f35f2658455a2e40f151549a7d6465a836c33fa9109e67623916f889849eac56

                SHA512

                fe5be5c673e99f70c93019d01abb0a29dd2ecf25b2d895190ff551f020c28e7d8f99f65007f440f0f76c5bcac343b2a179a94d190c938ea3b9e1197890a412e9

              • C:\Users\Public\nest.bat
                MD5

                8ada51400b7915de2124baaf75e3414c

                SHA1

                1a7b9db12184ab7fd7fce1c383f9670a00adb081

                SHA256

                45aa3957c29865260a78f03eef18ae9aebdbf7bea751ecc88be4a799f2bb46c7

                SHA512

                9afc138157a4565294ca49942579cdb6f5d8084e56f9354738de62b585f4c0fa3e7f2cbc9541827f2084e3ff36c46eed29b46f5dd2444062ffcd05c599992e68

              • \ProgramData\mozglue.dll
                MD5

                8f73c08a9660691143661bf7332c3c27

                SHA1

                37fa65dd737c50fda710fdbde89e51374d0c204a

                SHA256

                3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                SHA512

                0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

              • \ProgramData\msvcp140.dll
                MD5

                109f0f02fd37c84bfc7508d4227d7ed5

                SHA1

                ef7420141bb15ac334d3964082361a460bfdb975

                SHA256

                334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                SHA512

                46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

              • \ProgramData\nss3.dll
                MD5

                bfac4e3c5908856ba17d41edcd455a51

                SHA1

                8eec7e888767aa9e4cca8ff246eb2aacb9170428

                SHA256

                e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                SHA512

                2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

              • \ProgramData\sqlite3.dll
                MD5

                e477a96c8f2b18d6b5c27bde49c990bf

                SHA1

                e980c9bf41330d1e5bd04556db4646a0210f7409

                SHA256

                16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                SHA512

                335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

              • \ProgramData\vcruntime140.dll
                MD5

                7587bf9cb4147022cd5681b015183046

                SHA1

                f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                SHA256

                c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                SHA512

                0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

              • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\freebl3.dll
                MD5

                60acd24430204ad2dc7f148b8cfe9bdc

                SHA1

                989f377b9117d7cb21cbe92a4117f88f9c7693d9

                SHA256

                9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

                SHA512

                626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

              • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\freebl3.dll
                MD5

                60acd24430204ad2dc7f148b8cfe9bdc

                SHA1

                989f377b9117d7cb21cbe92a4117f88f9c7693d9

                SHA256

                9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

                SHA512

                626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

              • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\mozglue.dll
                MD5

                eae9273f8cdcf9321c6c37c244773139

                SHA1

                8378e2a2f3635574c106eea8419b5eb00b8489b0

                SHA256

                a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

                SHA512

                06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

              • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\msvcp140.dll
                MD5

                109f0f02fd37c84bfc7508d4227d7ed5

                SHA1

                ef7420141bb15ac334d3964082361a460bfdb975

                SHA256

                334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                SHA512

                46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

              • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\nss3.dll
                MD5

                02cc7b8ee30056d5912de54f1bdfc219

                SHA1

                a6923da95705fb81e368ae48f93d28522ef552fb

                SHA256

                1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

                SHA512

                0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

              • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\softokn3.dll
                MD5

                4e8df049f3459fa94ab6ad387f3561ac

                SHA1

                06ed392bc29ad9d5fc05ee254c2625fd65925114

                SHA256

                25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

                SHA512

                3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

              • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\vcruntime140.dll
                MD5

                7587bf9cb4147022cd5681b015183046

                SHA1

                f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                SHA256

                c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                SHA512

                0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

              • \Users\Admin\AppData\LocalLow\sqlite3.dll
                MD5

                f964811b68f9f1487c2b41e1aef576ce

                SHA1

                b423959793f14b1416bc3b7051bed58a1034025f

                SHA256

                83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

                SHA512

                565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

              • \Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
                MD5

                b037454773691bf226efd218ab16d4c3

                SHA1

                6ed5a3d4187696d97e317565d94cd0f445f43cb3

                SHA256

                7ebbd92f07d9c8fe82dc72c0a875085dca39ff438533736b769c3eedbe1637bf

                SHA512

                942faa4de6809aa968d5fb77c9089df6e9639b26108bd6bced954b913868d5115b9a0537ecb76510ebcd2cadff10f9123a475e1fb89ac04b0ea8703be9b32cd1

              • \Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
                MD5

                b037454773691bf226efd218ab16d4c3

                SHA1

                6ed5a3d4187696d97e317565d94cd0f445f43cb3

                SHA256

                7ebbd92f07d9c8fe82dc72c0a875085dca39ff438533736b769c3eedbe1637bf

                SHA512

                942faa4de6809aa968d5fb77c9089df6e9639b26108bd6bced954b913868d5115b9a0537ecb76510ebcd2cadff10f9123a475e1fb89ac04b0ea8703be9b32cd1

              • \Users\Admin\AppData\Local\Temp\Pe739r1ctk.exe
                MD5

                a003b564bd23880f99a29006e780a89b

                SHA1

                8465374554a0c6c02f7914c1278afd79e96ed8c4

                SHA256

                5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

                SHA512

                0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

              • \Users\Admin\AppData\Local\Temp\Pe739r1ctk.exe
                MD5

                a003b564bd23880f99a29006e780a89b

                SHA1

                8465374554a0c6c02f7914c1278afd79e96ed8c4

                SHA256

                5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

                SHA512

                0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

              • \Users\Admin\AppData\Local\Temp\Pe739r1ctk.exe
                MD5

                a003b564bd23880f99a29006e780a89b

                SHA1

                8465374554a0c6c02f7914c1278afd79e96ed8c4

                SHA256

                5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

                SHA512

                0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

              • \Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
                MD5

                4feabb9ddecae0a7ac955cd1f8487aaf

                SHA1

                5d27ccefc79e7d9a1c16e07fe0d0ef36df30c30a

                SHA256

                bbc945e2e6dc6a9dac62077a82ce31e3dc882643bb3a4236a1a50b6106f404ab

                SHA512

                6ee1a3ebe305bc7ec90e454f8c72aa21de22e5fd5fce305ac3bc0d6d066aa8eac6e8675cdb6490aeebbec8f476555ed5ecbdbc0733d049e80649312af2a942dc

              • \Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
                MD5

                4feabb9ddecae0a7ac955cd1f8487aaf

                SHA1

                5d27ccefc79e7d9a1c16e07fe0d0ef36df30c30a

                SHA256

                bbc945e2e6dc6a9dac62077a82ce31e3dc882643bb3a4236a1a50b6106f404ab

                SHA512

                6ee1a3ebe305bc7ec90e454f8c72aa21de22e5fd5fce305ac3bc0d6d066aa8eac6e8675cdb6490aeebbec8f476555ed5ecbdbc0733d049e80649312af2a942dc

              • \Users\Admin\AppData\Local\Temp\YqqEBifXbY.exe
                MD5

                f6a627b01b8ac665add87b047e732613

                SHA1

                b50d28f58d0892708db4ca09658547fba013f73d

                SHA256

                bbabc0cb29dc697735ab4b2d4285e9bb608f992393b734b7b20d4a4ba42a75ce

                SHA512

                a196b0c1b5fa0bc8dbb2fd49f8e1fca4144240e38f876e73e9380b709e5dd4f5d2c3df585870d288699776add48a85fa8845e6eff5de76deb6b6f6b96f09c9aa

              • \Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
                MD5

                843969865a92a4e82c26a2fa75ca4026

                SHA1

                c1046b49bc93cb3b37cebe1388d0b72bb66ab2e7

                SHA256

                3bd221cdc9867ee90ba3633f2266f298b4cb4fac98c70a0f208ce4afb6748637

                SHA512

                b9b30b9a69b5c7d536fe5d3c7d4615b2d9eec8410d20727c1ad17ba36c2876cb9ddbfe77353101fd80d92653724a176cd7f20c85cfaf69c6b74e95cf7de7440a

              • memory/552-190-0x0000000000000000-mapping.dmp
              • memory/596-72-0x0000000000400000-0x0000000000491000-memory.dmp
                Filesize

                580KB

              • memory/596-67-0x0000000000400000-0x0000000000491000-memory.dmp
                Filesize

                580KB

              • memory/596-66-0x0000000000400000-0x0000000000491000-memory.dmp
                Filesize

                580KB

              • memory/596-73-0x0000000000400000-0x0000000000491000-memory.dmp
                Filesize

                580KB

              • memory/596-71-0x0000000000400000-0x0000000000491000-memory.dmp
                Filesize

                580KB

              • memory/596-76-0x0000000000400000-0x0000000000491000-memory.dmp
                Filesize

                580KB

              • memory/596-69-0x0000000000400000-0x0000000000491000-memory.dmp
                Filesize

                580KB

              • memory/596-74-0x000000000043ED49-mapping.dmp
              • memory/616-98-0x000000000041A684-mapping.dmp
              • memory/616-94-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/616-96-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/616-107-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/616-89-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/616-93-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/616-97-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/616-92-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/672-145-0x0000000000000000-mapping.dmp
              • memory/720-191-0x0000000000000000-mapping.dmp
              • memory/952-110-0x0000000000000000-mapping.dmp
              • memory/952-113-0x0000000000230000-0x0000000000231000-memory.dmp
                Filesize

                4KB

              • memory/952-114-0x00000000003D1000-0x00000000003E5000-memory.dmp
                Filesize

                80KB

              • memory/1080-161-0x0000000000000000-mapping.dmp
              • memory/1120-141-0x000000000040202B-mapping.dmp
              • memory/1120-152-0x0000000000400000-0x0000000000406000-memory.dmp
                Filesize

                24KB

              • memory/1120-139-0x0000000000400000-0x0000000000406000-memory.dmp
                Filesize

                24KB

              • memory/1120-140-0x0000000000400000-0x0000000000406000-memory.dmp
                Filesize

                24KB

              • memory/1148-133-0x0000000000000000-mapping.dmp
              • memory/1168-158-0x0000000000000000-mapping.dmp
              • memory/1268-147-0x0000000000000000-mapping.dmp
              • memory/1356-172-0x0000000000000000-mapping.dmp
              • memory/1356-151-0x0000000000000000-mapping.dmp
              • memory/1372-176-0x0000000140000000-0x0000000140070000-memory.dmp
                Filesize

                448KB

              • memory/1372-195-0x0000000000780000-0x0000000000785000-memory.dmp
                Filesize

                20KB

              • memory/1372-197-0x000000001C600000-0x000000001C646000-memory.dmp
                Filesize

                280KB

              • memory/1372-192-0x000000001B840000-0x000000001B8C5000-memory.dmp
                Filesize

                532KB

              • memory/1372-196-0x000000001C5B0000-0x000000001C5FF000-memory.dmp
                Filesize

                316KB

              • memory/1372-177-0x0000000140000000-0x0000000140070000-memory.dmp
                Filesize

                448KB

              • memory/1372-193-0x000000001ABE0000-0x000000001ABE2000-memory.dmp
                Filesize

                8KB

              • memory/1372-194-0x000000001AB90000-0x000000001ABDE000-memory.dmp
                Filesize

                312KB

              • memory/1372-179-0x0000000140000000-0x0000000140070000-memory.dmp
                Filesize

                448KB

              • memory/1372-175-0x0000000140000000-0x0000000140070000-memory.dmp
                Filesize

                448KB

              • memory/1372-180-0x0000000140000000-mapping.dmp
              • memory/1528-59-0x0000000004D90000-0x0000000004D91000-memory.dmp
                Filesize

                4KB

              • memory/1528-56-0x00000000050B0000-0x000000000538A000-memory.dmp
                Filesize

                2.9MB

              • memory/1528-60-0x00000000009E0000-0x0000000000A36000-memory.dmp
                Filesize

                344KB

              • memory/1528-54-0x00000000010B0000-0x00000000010B1000-memory.dmp
                Filesize

                4KB

              • memory/1556-57-0x0000000000000000-mapping.dmp
              • memory/1556-61-0x0000000074B91000-0x0000000074B93000-memory.dmp
                Filesize

                8KB

              • memory/1572-149-0x0000000000000000-mapping.dmp
              • memory/1656-87-0x0000000000A90000-0x0000000000AAB000-memory.dmp
                Filesize

                108KB

              • memory/1656-106-0x0000000004BE0000-0x0000000004BE1000-memory.dmp
                Filesize

                4KB

              • memory/1656-64-0x0000000000000000-mapping.dmp
              • memory/1656-68-0x0000000000CA0000-0x0000000000CA1000-memory.dmp
                Filesize

                4KB

              • memory/1656-85-0x0000000004F00000-0x000000000513F000-memory.dmp
                Filesize

                2.2MB

              • memory/1688-130-0x0000000000000000-mapping.dmp
              • memory/1688-166-0x000000001BDF0000-0x000000001BF20000-memory.dmp
                Filesize

                1.2MB

              • memory/1688-178-0x000000001ADD0000-0x000000001ADD2000-memory.dmp
                Filesize

                8KB

              • memory/1688-173-0x0000000002400000-0x0000000002478000-memory.dmp
                Filesize

                480KB

              • memory/1688-135-0x0000000000EC0000-0x0000000000EC1000-memory.dmp
                Filesize

                4KB

              • memory/1792-144-0x0000000000000000-mapping.dmp
              • memory/1832-122-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/1832-123-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/1832-118-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/1832-119-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/1832-120-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/1832-128-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/1832-121-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/1832-124-0x0000000000417A8B-mapping.dmp
              • memory/1868-150-0x0000000000000000-mapping.dmp
              • memory/1868-169-0x000000000040202B-mapping.dmp
              • memory/1900-86-0x0000000000000000-mapping.dmp
              • memory/1904-127-0x0000000004AE0000-0x0000000004AE1000-memory.dmp
                Filesize

                4KB

              • memory/1904-116-0x0000000000290000-0x00000000002B3000-memory.dmp
                Filesize

                140KB

              • memory/1904-115-0x0000000004950000-0x0000000004A76000-memory.dmp
                Filesize

                1.1MB

              • memory/1904-104-0x0000000001310000-0x0000000001311000-memory.dmp
                Filesize

                4KB

              • memory/1904-101-0x0000000000000000-mapping.dmp
              • memory/1936-159-0x0000000000331000-0x0000000000345000-memory.dmp
                Filesize

                80KB

              • memory/1936-154-0x0000000000000000-mapping.dmp
              • memory/1936-157-0x0000000000230000-0x0000000000231000-memory.dmp
                Filesize

                4KB

              • memory/2020-134-0x0000000000000000-mapping.dmp