Analysis

  • max time kernel
    161s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    08-10-2021 12:07

General

  • Target

    618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe

  • Size

    2.9MB

  • MD5

    b6841e1bdebcb206e38123af2ba3254c

  • SHA1

    0e3928f6de38d4b2d0badb245d1516721712b330

  • SHA256

    618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822

  • SHA512

    7d1c3670b8b3a3b911620949816e58103e827f4cd8318dceb1b513591e13485ccc131229709df04daae608b2f83369d90132f49095c0a9043f17e565ece0279d

Malware Config

Extracted

Family

raccoon

Version

1.8.2

Botnet

728e62b0300799f2a8741c39a71a1543c6759e8d

Attributes
  • url4cnc

    http://teletop.top/brikitiki

    http://teleta.top/brikitiki

    https://t.me/brikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

oski

C2

scarsa.ac.ug

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 8 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe
    "C:\Users\Admin\AppData\Local\Temp\618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Fabgaoysmhpndloesmbijrq.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
        "C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3260
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Pusemavwbnf.vbs"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1508
          • C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
            "C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2036
            • C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
              C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              PID:1224
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c taskkill /pid 1224 & erase C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe & RD /S /Q C:\\ProgramData\\383033411412043\\* & exit
                7⤵
                  PID:1212
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /pid 1224
                    8⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1516
          • C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
            C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
            4⤵
            • Executes dropped EXE
            PID:1716
      • C:\Users\Admin\AppData\Local\Temp\618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe
        C:\Users\Admin\AppData\Local\Temp\618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe
        2⤵
        • Loads dropped DLL
        • Accesses Microsoft Outlook accounts
        • Accesses Microsoft Outlook profiles
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:3496
        • C:\Users\Admin\AppData\Local\Temp\JemOi0u5Sx.exe
          "C:\Users\Admin\AppData\Local\Temp\JemOi0u5Sx.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3016
          • C:\Users\Admin\AppData\Local\Temp\JemOi0u5Sx.exe
            C:\Users\Admin\AppData\Local\Temp\JemOi0u5Sx.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1576
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
              5⤵
              • Creates scheduled task(s)
              PID:2492
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Trast.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2300
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3636
              • C:\Windows\SysWOW64\reg.exe
                reg delete hkcu\Environment /v windir /f
                6⤵
                • Modifies registry key
                PID:3676
              • C:\Windows\SysWOW64\reg.exe
                reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM "
                6⤵
                • Modifies registry key
                PID:2624
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I
                6⤵
                  PID:1708
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Public\nest.bat" "
              4⤵
                PID:404
                • C:\Windows\SysWOW64\reg.exe
                  reg delete hkcu\Environment /v windir /f
                  5⤵
                  • Modifies registry key
                  PID:1984
            • C:\Users\Admin\AppData\Local\Temp\xL7lWEBrQ1.exe
              "C:\Users\Admin\AppData\Local\Temp\xL7lWEBrQ1.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:868
              • C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
                C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1264
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\618c78fbf67d014137470a93c49571272e7777ce49ab31ccbf47ec11739ef822.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1748
              • C:\Windows\SysWOW64\timeout.exe
                timeout /T 10 /NOBREAK
                4⤵
                • Delays execution with timeout.exe
                PID:3728
        • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:2060
          • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
            2⤵
            • Executes dropped EXE
            PID:1512
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
              3⤵
              • Creates scheduled task(s)
              PID:1396
        • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
          1⤵
          • Executes dropped EXE
          PID:1752

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Modify Registry

        2
        T1112

        Credential Access

        Credentials in Files

        3
        T1081

        Discovery

        Query Registry

        2
        T1012

        System Information Discovery

        2
        T1082

        Collection

        Data from Local System

        3
        T1005

        Email Collection

        2
        T1114

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
          MD5

          c04b9b3284af9915132860c0396ae290

          SHA1

          05f464880aac7b7532ffa6db0d5e6b4856ca2c45

          SHA256

          a12f6cdb010d03ad5e130356d0a5a5a66177c97a6791648590264f6562827b70

          SHA512

          edf23911822a770873e2dd056f12775e62dc495982b07b9291311b6d55977cb049c46ad0b3d0be10801555ff0e4323cae3617b3b7b237735ef3eec2e5fb77d7d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
          MD5

          388f1a3f8401003feebefa7b3fd539a8

          SHA1

          f21e87c684195d8d8ed1845da4d92e025d5ca84e

          SHA256

          a941d629521cda891b0e55d3b985608d9d5592ebda5b3ce70d0279301c2902f7

          SHA512

          d012990a7207cd7be490f4a4c58a674d9d429ccbda519a8ac4ac45f452d51053d278fd0e1126c09888f59bb0ddfc39e1eca6975b5f984d8de21ffdcba6442eb5

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HBPS4WXS\Lnouxqkbbgkvxwmwtigvjxpvnenadlc[1]
          MD5

          f82884cc5e7cf22e9702adbfc1f12bee

          SHA1

          5e8d547dffe7611c737189ce22bb1a8393953e5d

          SHA256

          be474ece5c1a58bd3c86f1ce8e7fab9049aeadbca5e4690e00d0751153f55f72

          SHA512

          4bfa17059270dc17a0a9519ec989675116e869cdb6a1b68009c9e737e17dd2cc99cea17cc2db4798b25f3f888b2207f8b5f5360fdf847ae2850b79aff781244e

        • C:\Users\Admin\AppData\Local\Temp\Fabgaoysmhpndloesmbijrq.vbs
          MD5

          b8bdead0e1e0f92ce9d29aa3e6419913

          SHA1

          c347b99821bba1f9010e6a7a514f5e8ac91c0d0b

          SHA256

          e6f5fcb2b8614d30f07f30427023aa8a5977c0c3a087728df23aba75294e7cf1

          SHA512

          6c2cdd308fea8eb0ab505099044a5cde1b5a57b6842cc5c4d4ce7540286589a89cce065c5e5106de73f467764d9a4860887852932b1922cffdd970f20ada26a2

        • C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
          MD5

          b037454773691bf226efd218ab16d4c3

          SHA1

          6ed5a3d4187696d97e317565d94cd0f445f43cb3

          SHA256

          7ebbd92f07d9c8fe82dc72c0a875085dca39ff438533736b769c3eedbe1637bf

          SHA512

          942faa4de6809aa968d5fb77c9089df6e9639b26108bd6bced954b913868d5115b9a0537ecb76510ebcd2cadff10f9123a475e1fb89ac04b0ea8703be9b32cd1

        • C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
          MD5

          b037454773691bf226efd218ab16d4c3

          SHA1

          6ed5a3d4187696d97e317565d94cd0f445f43cb3

          SHA256

          7ebbd92f07d9c8fe82dc72c0a875085dca39ff438533736b769c3eedbe1637bf

          SHA512

          942faa4de6809aa968d5fb77c9089df6e9639b26108bd6bced954b913868d5115b9a0537ecb76510ebcd2cadff10f9123a475e1fb89ac04b0ea8703be9b32cd1

        • C:\Users\Admin\AppData\Local\Temp\Hclmqamnjemzssxdodpuesmdaconsoleapp14.exe
          MD5

          b037454773691bf226efd218ab16d4c3

          SHA1

          6ed5a3d4187696d97e317565d94cd0f445f43cb3

          SHA256

          7ebbd92f07d9c8fe82dc72c0a875085dca39ff438533736b769c3eedbe1637bf

          SHA512

          942faa4de6809aa968d5fb77c9089df6e9639b26108bd6bced954b913868d5115b9a0537ecb76510ebcd2cadff10f9123a475e1fb89ac04b0ea8703be9b32cd1

        • C:\Users\Admin\AppData\Local\Temp\JemOi0u5Sx.exe
          MD5

          a003b564bd23880f99a29006e780a89b

          SHA1

          8465374554a0c6c02f7914c1278afd79e96ed8c4

          SHA256

          5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

          SHA512

          0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

        • C:\Users\Admin\AppData\Local\Temp\JemOi0u5Sx.exe
          MD5

          a003b564bd23880f99a29006e780a89b

          SHA1

          8465374554a0c6c02f7914c1278afd79e96ed8c4

          SHA256

          5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

          SHA512

          0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

        • C:\Users\Admin\AppData\Local\Temp\JemOi0u5Sx.exe
          MD5

          a003b564bd23880f99a29006e780a89b

          SHA1

          8465374554a0c6c02f7914c1278afd79e96ed8c4

          SHA256

          5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

          SHA512

          0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

        • C:\Users\Admin\AppData\Local\Temp\Pusemavwbnf.vbs
          MD5

          187b267d5bf80b98f8f1996421b942f2

          SHA1

          9ca4c1e7549ac90b833d6edc101f573c1b88053d

          SHA256

          695840d5369071deefa3516a732d9d0943c60811297620e7364fec5277400d72

          SHA512

          6603af2a725ded45414f5e3dfcd708e6efd1d3d05d90fc208c5ab4c1eba44a0ff6b46ba571b48623409fedfe4b96a0170c95950cfd6ad80beecde94e56a3b511

        • C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
          MD5

          4feabb9ddecae0a7ac955cd1f8487aaf

          SHA1

          5d27ccefc79e7d9a1c16e07fe0d0ef36df30c30a

          SHA256

          bbc945e2e6dc6a9dac62077a82ce31e3dc882643bb3a4236a1a50b6106f404ab

          SHA512

          6ee1a3ebe305bc7ec90e454f8c72aa21de22e5fd5fce305ac3bc0d6d066aa8eac6e8675cdb6490aeebbec8f476555ed5ecbdbc0733d049e80649312af2a942dc

        • C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
          MD5

          4feabb9ddecae0a7ac955cd1f8487aaf

          SHA1

          5d27ccefc79e7d9a1c16e07fe0d0ef36df30c30a

          SHA256

          bbc945e2e6dc6a9dac62077a82ce31e3dc882643bb3a4236a1a50b6106f404ab

          SHA512

          6ee1a3ebe305bc7ec90e454f8c72aa21de22e5fd5fce305ac3bc0d6d066aa8eac6e8675cdb6490aeebbec8f476555ed5ecbdbc0733d049e80649312af2a942dc

        • C:\Users\Admin\AppData\Local\Temp\Xzegdxbuoconsoleapp3.exe
          MD5

          4feabb9ddecae0a7ac955cd1f8487aaf

          SHA1

          5d27ccefc79e7d9a1c16e07fe0d0ef36df30c30a

          SHA256

          bbc945e2e6dc6a9dac62077a82ce31e3dc882643bb3a4236a1a50b6106f404ab

          SHA512

          6ee1a3ebe305bc7ec90e454f8c72aa21de22e5fd5fce305ac3bc0d6d066aa8eac6e8675cdb6490aeebbec8f476555ed5ecbdbc0733d049e80649312af2a942dc

        • C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
          MD5

          843969865a92a4e82c26a2fa75ca4026

          SHA1

          c1046b49bc93cb3b37cebe1388d0b72bb66ab2e7

          SHA256

          3bd221cdc9867ee90ba3633f2266f298b4cb4fac98c70a0f208ce4afb6748637

          SHA512

          b9b30b9a69b5c7d536fe5d3c7d4615b2d9eec8410d20727c1ad17ba36c2876cb9ddbfe77353101fd80d92653724a176cd7f20c85cfaf69c6b74e95cf7de7440a

        • C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
          MD5

          843969865a92a4e82c26a2fa75ca4026

          SHA1

          c1046b49bc93cb3b37cebe1388d0b72bb66ab2e7

          SHA256

          3bd221cdc9867ee90ba3633f2266f298b4cb4fac98c70a0f208ce4afb6748637

          SHA512

          b9b30b9a69b5c7d536fe5d3c7d4615b2d9eec8410d20727c1ad17ba36c2876cb9ddbfe77353101fd80d92653724a176cd7f20c85cfaf69c6b74e95cf7de7440a

        • C:\Users\Admin\AppData\Local\Temp\xL7lWEBrQ1.exe
          MD5

          f6a627b01b8ac665add87b047e732613

          SHA1

          b50d28f58d0892708db4ca09658547fba013f73d

          SHA256

          bbabc0cb29dc697735ab4b2d4285e9bb608f992393b734b7b20d4a4ba42a75ce

          SHA512

          a196b0c1b5fa0bc8dbb2fd49f8e1fca4144240e38f876e73e9380b709e5dd4f5d2c3df585870d288699776add48a85fa8845e6eff5de76deb6b6f6b96f09c9aa

        • C:\Users\Admin\AppData\Local\Temp\xL7lWEBrQ1.exe
          MD5

          f6a627b01b8ac665add87b047e732613

          SHA1

          b50d28f58d0892708db4ca09658547fba013f73d

          SHA256

          bbabc0cb29dc697735ab4b2d4285e9bb608f992393b734b7b20d4a4ba42a75ce

          SHA512

          a196b0c1b5fa0bc8dbb2fd49f8e1fca4144240e38f876e73e9380b709e5dd4f5d2c3df585870d288699776add48a85fa8845e6eff5de76deb6b6f6b96f09c9aa

        • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
          MD5

          a003b564bd23880f99a29006e780a89b

          SHA1

          8465374554a0c6c02f7914c1278afd79e96ed8c4

          SHA256

          5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

          SHA512

          0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

        • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
          MD5

          a003b564bd23880f99a29006e780a89b

          SHA1

          8465374554a0c6c02f7914c1278afd79e96ed8c4

          SHA256

          5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

          SHA512

          0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

        • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
          MD5

          a003b564bd23880f99a29006e780a89b

          SHA1

          8465374554a0c6c02f7914c1278afd79e96ed8c4

          SHA256

          5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

          SHA512

          0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

        • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
          MD5

          a003b564bd23880f99a29006e780a89b

          SHA1

          8465374554a0c6c02f7914c1278afd79e96ed8c4

          SHA256

          5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e

          SHA512

          0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b

        • C:\Users\Public\Trast.bat
          MD5

          4068c9f69fcd8a171c67f81d4a952a54

          SHA1

          4d2536a8c28cdcc17465e20d6693fb9e8e713b36

          SHA256

          24222300c78180b50ed1f8361ba63cb27316ec994c1c9079708a51b4a1a9d810

          SHA512

          a64f9319acc51fffd0491c74dcd9c9084c2783b82f95727e4bfe387a8528c6dcf68f11418e88f1e133d115daf907549c86dd7ad866b2a7938add5225fbb2811d

        • C:\Users\Public\UKO.bat
          MD5

          eaf8d967454c3bbddbf2e05a421411f8

          SHA1

          6170880409b24de75c2dc3d56a506fbff7f6622c

          SHA256

          f35f2658455a2e40f151549a7d6465a836c33fa9109e67623916f889849eac56

          SHA512

          fe5be5c673e99f70c93019d01abb0a29dd2ecf25b2d895190ff551f020c28e7d8f99f65007f440f0f76c5bcac343b2a179a94d190c938ea3b9e1197890a412e9

        • C:\Users\Public\nest.bat
          MD5

          8ada51400b7915de2124baaf75e3414c

          SHA1

          1a7b9db12184ab7fd7fce1c383f9670a00adb081

          SHA256

          45aa3957c29865260a78f03eef18ae9aebdbf7bea751ecc88be4a799f2bb46c7

          SHA512

          9afc138157a4565294ca49942579cdb6f5d8084e56f9354738de62b585f4c0fa3e7f2cbc9541827f2084e3ff36c46eed29b46f5dd2444062ffcd05c599992e68

        • \ProgramData\mozglue.dll
          MD5

          8f73c08a9660691143661bf7332c3c27

          SHA1

          37fa65dd737c50fda710fdbde89e51374d0c204a

          SHA256

          3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

          SHA512

          0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

        • \ProgramData\nss3.dll
          MD5

          bfac4e3c5908856ba17d41edcd455a51

          SHA1

          8eec7e888767aa9e4cca8ff246eb2aacb9170428

          SHA256

          e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

          SHA512

          2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

        • \ProgramData\sqlite3.dll
          MD5

          e477a96c8f2b18d6b5c27bde49c990bf

          SHA1

          e980c9bf41330d1e5bd04556db4646a0210f7409

          SHA256

          16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

          SHA512

          335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

        • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\freebl3.dll
          MD5

          60acd24430204ad2dc7f148b8cfe9bdc

          SHA1

          989f377b9117d7cb21cbe92a4117f88f9c7693d9

          SHA256

          9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

          SHA512

          626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

        • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\freebl3.dll
          MD5

          60acd24430204ad2dc7f148b8cfe9bdc

          SHA1

          989f377b9117d7cb21cbe92a4117f88f9c7693d9

          SHA256

          9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

          SHA512

          626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

        • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\mozglue.dll
          MD5

          eae9273f8cdcf9321c6c37c244773139

          SHA1

          8378e2a2f3635574c106eea8419b5eb00b8489b0

          SHA256

          a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

          SHA512

          06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

        • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\nss3.dll
          MD5

          02cc7b8ee30056d5912de54f1bdfc219

          SHA1

          a6923da95705fb81e368ae48f93d28522ef552fb

          SHA256

          1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

          SHA512

          0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

        • \Users\Admin\AppData\LocalLow\FflibsFder.tmp\softokn3.dll
          MD5

          4e8df049f3459fa94ab6ad387f3561ac

          SHA1

          06ed392bc29ad9d5fc05ee254c2625fd65925114

          SHA256

          25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

          SHA512

          3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

        • \Users\Admin\AppData\LocalLow\sqlite3.dll
          MD5

          f964811b68f9f1487c2b41e1aef576ce

          SHA1

          b423959793f14b1416bc3b7051bed58a1034025f

          SHA256

          83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

          SHA512

          565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

        • memory/404-188-0x0000000000000000-mapping.dmp
        • memory/524-119-0x0000000000000000-mapping.dmp
        • memory/868-140-0x0000000000000000-mapping.dmp
        • memory/868-174-0x000000001C4E0000-0x000000001C610000-memory.dmp
          Filesize

          1.2MB

        • memory/868-144-0x0000000000950000-0x0000000000951000-memory.dmp
          Filesize

          4KB

        • memory/868-176-0x000000001C610000-0x000000001C612000-memory.dmp
          Filesize

          8KB

        • memory/868-175-0x000000001C010000-0x000000001C088000-memory.dmp
          Filesize

          480KB

        • memory/1212-196-0x0000000000000000-mapping.dmp
        • memory/1224-185-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/1224-192-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/1224-186-0x0000000000417A8B-mapping.dmp
        • memory/1264-177-0x0000000140000000-0x0000000140070000-memory.dmp
          Filesize

          448KB

        • memory/1264-205-0x0000028640A20000-0x0000028640A6F000-memory.dmp
          Filesize

          316KB

        • memory/1264-204-0x0000028628150000-0x0000028628155000-memory.dmp
          Filesize

          20KB

        • memory/1264-203-0x0000028628100000-0x000002862814E000-memory.dmp
          Filesize

          312KB

        • memory/1264-206-0x0000028640A70000-0x0000028640AB6000-memory.dmp
          Filesize

          280KB

        • memory/1264-199-0x0000028640AF0000-0x0000028640AF2000-memory.dmp
          Filesize

          8KB

        • memory/1264-198-0x0000028628180000-0x0000028628205000-memory.dmp
          Filesize

          532KB

        • memory/1264-217-0x0000028640AF2000-0x0000028640AF4000-memory.dmp
          Filesize

          8KB

        • memory/1264-178-0x0000000140000000-mapping.dmp
        • memory/1396-214-0x0000000000000000-mapping.dmp
        • memory/1508-148-0x0000000000000000-mapping.dmp
        • memory/1512-212-0x000000000040202B-mapping.dmp
        • memory/1516-197-0x0000000000000000-mapping.dmp
        • memory/1576-163-0x000000000040202B-mapping.dmp
        • memory/1576-162-0x0000000000400000-0x0000000000406000-memory.dmp
          Filesize

          24KB

        • memory/1576-173-0x0000000000400000-0x0000000000406000-memory.dmp
          Filesize

          24KB

        • memory/1708-172-0x0000000000000000-mapping.dmp
        • memory/1716-160-0x0000000000400000-0x0000000000420000-memory.dmp
          Filesize

          128KB

        • memory/1716-151-0x0000000000400000-0x0000000000420000-memory.dmp
          Filesize

          128KB

        • memory/1716-152-0x000000000041A684-mapping.dmp
        • memory/1748-142-0x0000000000000000-mapping.dmp
        • memory/1752-218-0x0000000002291000-0x00000000022A5000-memory.dmp
          Filesize

          80KB

        • memory/1752-216-0x0000000002200000-0x0000000002201000-memory.dmp
          Filesize

          4KB

        • memory/1984-190-0x0000000000000000-mapping.dmp
        • memory/2036-183-0x00000000059A0000-0x0000000005AC6000-memory.dmp
          Filesize

          1.1MB

        • memory/2036-191-0x0000000005B90000-0x0000000005B91000-memory.dmp
          Filesize

          4KB

        • memory/2036-158-0x0000000000FA0000-0x0000000000FA1000-memory.dmp
          Filesize

          4KB

        • memory/2036-156-0x0000000000000000-mapping.dmp
        • memory/2036-184-0x0000000001A10000-0x0000000001A33000-memory.dmp
          Filesize

          140KB

        • memory/2060-207-0x00000000023A1000-0x00000000023B5000-memory.dmp
          Filesize

          80KB

        • memory/2060-202-0x0000000000530000-0x00000000005DE000-memory.dmp
          Filesize

          696KB

        • memory/2300-165-0x0000000000000000-mapping.dmp
        • memory/2492-166-0x0000000000000000-mapping.dmp
        • memory/2620-117-0x0000000005160000-0x000000000543A000-memory.dmp
          Filesize

          2.9MB

        • memory/2620-115-0x0000000000670000-0x0000000000671000-memory.dmp
          Filesize

          4KB

        • memory/2620-118-0x00000000012F0000-0x00000000012F1000-memory.dmp
          Filesize

          4KB

        • memory/2620-120-0x0000000005650000-0x00000000056A6000-memory.dmp
          Filesize

          344KB

        • memory/2624-171-0x0000000000000000-mapping.dmp
        • memory/3016-161-0x00000000022D1000-0x00000000022E5000-memory.dmp
          Filesize

          80KB

        • memory/3016-136-0x0000000000000000-mapping.dmp
        • memory/3016-139-0x00000000006C0000-0x00000000006C1000-memory.dmp
          Filesize

          4KB

        • memory/3260-125-0x0000000000000000-mapping.dmp
        • memory/3260-150-0x0000000006700000-0x000000000671B000-memory.dmp
          Filesize

          108KB

        • memory/3260-149-0x00000000057E0000-0x00000000057E1000-memory.dmp
          Filesize

          4KB

        • memory/3260-127-0x0000000000D10000-0x0000000000D11000-memory.dmp
          Filesize

          4KB

        • memory/3260-147-0x0000000005830000-0x0000000005A6F000-memory.dmp
          Filesize

          2.2MB

        • memory/3496-123-0x000000000043ED49-mapping.dmp
        • memory/3496-122-0x0000000000400000-0x0000000000491000-memory.dmp
          Filesize

          580KB

        • memory/3496-129-0x0000000000400000-0x0000000000491000-memory.dmp
          Filesize

          580KB

        • memory/3636-168-0x0000000000000000-mapping.dmp
        • memory/3676-170-0x0000000000000000-mapping.dmp
        • memory/3728-146-0x0000000000000000-mapping.dmp