Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
11-12-2021 22:41
Static task
static1
Behavioral task
behavioral1
Sample
312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe
Resource
win10-en-20211208
General
-
Target
312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe
-
Size
182KB
-
MD5
b9c71e27f638983b8c3d20c05942241f
-
SHA1
07c5ac500fc053c9e3684f7540dcfb5cdc2a92da
-
SHA256
312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a
-
SHA512
0209f32df520f1da598558eb513f1b1cfd7cc3a32cc8c50744b36db70af390c31c85a0ff4341551b09f3b635f21167c9c95987431775219a6053ae8cf29f235d
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
mubrikych.top
oxxyfix.xyz
Extracted
raccoon
1.8.3-hotfix
eab89db8f8e51b4a23c6cffb85db8684a0f53e06
-
url4cnc
http://91.219.236.27/zalmanssx
http://94.158.245.167/zalmanssx
http://185.163.204.216/zalmanssx
http://185.225.19.238/zalmanssx
http://185.163.204.218/zalmanssx
https://t.me/zalmanssx
Extracted
amadey
2.86
185.215.113.35/d2VxjasuwS/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1408-133-0x0000000000CE0000-0x0000000000D49000-memory.dmp family_redline behavioral1/memory/660-150-0x00000000009A0000-0x0000000000AB4000-memory.dmp family_redline behavioral1/memory/2424-285-0x0000000001370000-0x0000000001474000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3960 created 2304 3960 WerFault.exe D469.exe -
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
suricata: ET MALWARE Possible Dridex Download URI Struct with no referer
suricata: ET MALWARE Possible Dridex Download URI Struct with no referer
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
-
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1488-190-0x00000000001E0000-0x00000000001FC000-memory.dmp family_arkei behavioral1/memory/1488-191-0x0000000000400000-0x0000000000827000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 17 IoCs
Processes:
3285.exe95B5.exe9AA8.exeA027.exe95B5.exeB9AB.exeD226.exeD469.exeD881.exeED62.exeF765.exeRitornata.exe.comRitornata.exe.comblzqtgds.exeRitornata.exe.comtkools.exe7977.exepid process 4024 3285.exe 1604 95B5.exe 1408 9AA8.exe 660 A027.exe 2228 95B5.exe 1488 B9AB.exe 3464 D226.exe 2304 D469.exe 3200 D881.exe 2264 ED62.exe 3608 F765.exe 1052 Ritornata.exe.com 2208 Ritornata.exe.com 2140 blzqtgds.exe 1720 Ritornata.exe.com 3156 tkools.exe 2424 7977.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
D469.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion D469.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion D469.exe -
Deletes itself 1 IoCs
Processes:
pid process 3056 -
Drops startup file 1 IoCs
Processes:
Ritornata.exe.comdescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WjVcWskkmD.url Ritornata.exe.com -
Loads dropped DLL 3 IoCs
Processes:
B9AB.exepid process 1488 B9AB.exe 1488 B9AB.exe 1488 B9AB.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ED62.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ED62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ED62.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
D469.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA D469.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
9AA8.exeA027.exeD469.exe7977.exepid process 1408 9AA8.exe 660 A027.exe 2304 D469.exe 2304 D469.exe 2424 7977.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe95B5.exeblzqtgds.exedescription pid process target process PID 2640 set thread context of 3648 2640 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe PID 1604 set thread context of 2228 1604 95B5.exe 95B5.exe PID 2140 set thread context of 1080 2140 blzqtgds.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3960 2304 WerFault.exe D469.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3285.exeD226.exe312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe95B5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3285.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3285.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D226.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3285.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95B5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95B5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95B5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D226.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
B9AB.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 B9AB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString B9AB.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3560 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exepid process 3648 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe 3648 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3056 -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe3285.exe95B5.exeD226.exepid process 3648 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe 4024 3285.exe 2228 95B5.exe 3056 3056 3464 D226.exe 3056 3056 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
9AA8.exeA027.exedescription pid process Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeDebugPrivilege 1408 9AA8.exe Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeDebugPrivilege 660 A027.exe Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 -
Suspicious use of FindShellTrayWindow 21 IoCs
Processes:
Ritornata.exe.comRitornata.exe.comRitornata.exe.compid process 1052 Ritornata.exe.com 3056 3056 1052 Ritornata.exe.com 1052 Ritornata.exe.com 3056 3056 2208 Ritornata.exe.com 3056 3056 2208 Ritornata.exe.com 2208 Ritornata.exe.com 3056 3056 1720 Ritornata.exe.com 3056 3056 1720 Ritornata.exe.com 1720 Ritornata.exe.com 3056 3056 -
Suspicious use of SendNotifyMessage 10 IoCs
Processes:
Ritornata.exe.comRitornata.exe.comRitornata.exe.compid process 1052 Ritornata.exe.com 1052 Ritornata.exe.com 1052 Ritornata.exe.com 2208 Ritornata.exe.com 2208 Ritornata.exe.com 2208 Ritornata.exe.com 1720 Ritornata.exe.com 1720 Ritornata.exe.com 1720 Ritornata.exe.com 3056 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe95B5.exeED62.exeD881.execmd.execmd.exedescription pid process target process PID 2640 wrote to memory of 3648 2640 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe PID 2640 wrote to memory of 3648 2640 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe PID 2640 wrote to memory of 3648 2640 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe PID 2640 wrote to memory of 3648 2640 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe PID 2640 wrote to memory of 3648 2640 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe PID 2640 wrote to memory of 3648 2640 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe 312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe PID 3056 wrote to memory of 4024 3056 3285.exe PID 3056 wrote to memory of 4024 3056 3285.exe PID 3056 wrote to memory of 4024 3056 3285.exe PID 3056 wrote to memory of 1604 3056 95B5.exe PID 3056 wrote to memory of 1604 3056 95B5.exe PID 3056 wrote to memory of 1604 3056 95B5.exe PID 3056 wrote to memory of 1408 3056 9AA8.exe PID 3056 wrote to memory of 1408 3056 9AA8.exe PID 3056 wrote to memory of 1408 3056 9AA8.exe PID 3056 wrote to memory of 660 3056 A027.exe PID 3056 wrote to memory of 660 3056 A027.exe PID 3056 wrote to memory of 660 3056 A027.exe PID 1604 wrote to memory of 2228 1604 95B5.exe 95B5.exe PID 1604 wrote to memory of 2228 1604 95B5.exe 95B5.exe PID 1604 wrote to memory of 2228 1604 95B5.exe 95B5.exe PID 1604 wrote to memory of 2228 1604 95B5.exe 95B5.exe PID 1604 wrote to memory of 2228 1604 95B5.exe 95B5.exe PID 1604 wrote to memory of 2228 1604 95B5.exe 95B5.exe PID 3056 wrote to memory of 1488 3056 B9AB.exe PID 3056 wrote to memory of 1488 3056 B9AB.exe PID 3056 wrote to memory of 1488 3056 B9AB.exe PID 3056 wrote to memory of 3464 3056 D226.exe PID 3056 wrote to memory of 3464 3056 D226.exe PID 3056 wrote to memory of 3464 3056 D226.exe PID 3056 wrote to memory of 2304 3056 D469.exe PID 3056 wrote to memory of 2304 3056 D469.exe PID 3056 wrote to memory of 2304 3056 D469.exe PID 3056 wrote to memory of 3200 3056 D881.exe PID 3056 wrote to memory of 3200 3056 D881.exe PID 3056 wrote to memory of 3200 3056 D881.exe PID 3056 wrote to memory of 2264 3056 ED62.exe PID 3056 wrote to memory of 2264 3056 ED62.exe PID 3056 wrote to memory of 2264 3056 ED62.exe PID 2264 wrote to memory of 3780 2264 ED62.exe expand.exe PID 2264 wrote to memory of 3780 2264 ED62.exe expand.exe PID 2264 wrote to memory of 3780 2264 ED62.exe expand.exe PID 3056 wrote to memory of 3608 3056 F765.exe PID 3056 wrote to memory of 3608 3056 F765.exe PID 3056 wrote to memory of 3608 3056 F765.exe PID 3200 wrote to memory of 3764 3200 D881.exe cmd.exe PID 3200 wrote to memory of 3764 3200 D881.exe cmd.exe PID 3200 wrote to memory of 3764 3200 D881.exe cmd.exe PID 3056 wrote to memory of 4044 3056 explorer.exe PID 3056 wrote to memory of 4044 3056 explorer.exe PID 3056 wrote to memory of 4044 3056 explorer.exe PID 3056 wrote to memory of 4044 3056 explorer.exe PID 3200 wrote to memory of 2920 3200 D881.exe cmd.exe PID 3200 wrote to memory of 2920 3200 D881.exe cmd.exe PID 3200 wrote to memory of 2920 3200 D881.exe cmd.exe PID 2264 wrote to memory of 2436 2264 ED62.exe cmd.exe PID 2264 wrote to memory of 2436 2264 ED62.exe cmd.exe PID 2264 wrote to memory of 2436 2264 ED62.exe cmd.exe PID 2436 wrote to memory of 364 2436 cmd.exe cmd.exe PID 2436 wrote to memory of 364 2436 cmd.exe cmd.exe PID 2436 wrote to memory of 364 2436 cmd.exe cmd.exe PID 364 wrote to memory of 1428 364 cmd.exe findstr.exe PID 364 wrote to memory of 1428 364 cmd.exe findstr.exe PID 364 wrote to memory of 1428 364 cmd.exe findstr.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe"C:\Users\Admin\AppData\Local\Temp\312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe"C:\Users\Admin\AppData\Local\Temp\312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3285.exeC:\Users\Admin\AppData\Local\Temp\3285.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\95B5.exeC:\Users\Admin\AppData\Local\Temp\95B5.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\95B5.exeC:\Users\Admin\AppData\Local\Temp\95B5.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\9AA8.exeC:\Users\Admin\AppData\Local\Temp\9AA8.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\A027.exeC:\Users\Admin\AppData\Local\Temp\A027.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\B9AB.exeC:\Users\Admin\AppData\Local\Temp\B9AB.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\B9AB.exe" & exit2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\D226.exeC:\Users\Admin\AppData\Local\Temp\D226.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\D469.exeC:\Users\Admin\AppData\Local\Temp\D469.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 7482⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\D881.exeC:\Users\Admin\AppData\Local\Temp\D881.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tiqkibbk\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\blzqtgds.exe" C:\Windows\SysWOW64\tiqkibbk\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tiqkibbk binPath= "C:\Windows\SysWOW64\tiqkibbk\blzqtgds.exe /d\"C:\Users\Admin\AppData\Local\Temp\D881.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tiqkibbk "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tiqkibbk2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Users\Admin\AppData\Local\Temp\ED62.exeC:\Users\Admin\AppData\Local\Temp\ED62.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\expand.exeexpand2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Sua.swf & ping 127.0.0.1 -n 302⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^rMRqhEQoWQMXQgLMfHZtmEjotrVzghKKxWsooRyoMqguqYanogPNqINnAJVlIvUIywCTXCDbBRanduoyKblqnXJMpSInVVmf$" Obliare.swf4⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.comRitornata.exe.com G4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.com G5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.com G6⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\nslookup.exeC:\Windows\SysWOW64\nslookup.exe7⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 303⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\F765.exeC:\Users\Admin\AppData\Local\Temp\F765.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\4⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\tiqkibbk\blzqtgds.exeC:\Windows\SysWOW64\tiqkibbk\blzqtgds.exe /d"C:\Users\Admin\AppData\Local\Temp\D881.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\7977.exeC:\Users\Admin\AppData\Local\Temp\7977.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
New Service
1Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3285.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\3285.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\7977.exeMD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
C:\Users\Admin\AppData\Local\Temp\7977.exeMD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
C:\Users\Admin\AppData\Local\Temp\95B5.exeMD5
b9c71e27f638983b8c3d20c05942241f
SHA107c5ac500fc053c9e3684f7540dcfb5cdc2a92da
SHA256312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a
SHA5120209f32df520f1da598558eb513f1b1cfd7cc3a32cc8c50744b36db70af390c31c85a0ff4341551b09f3b635f21167c9c95987431775219a6053ae8cf29f235d
-
C:\Users\Admin\AppData\Local\Temp\95B5.exeMD5
b9c71e27f638983b8c3d20c05942241f
SHA107c5ac500fc053c9e3684f7540dcfb5cdc2a92da
SHA256312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a
SHA5120209f32df520f1da598558eb513f1b1cfd7cc3a32cc8c50744b36db70af390c31c85a0ff4341551b09f3b635f21167c9c95987431775219a6053ae8cf29f235d
-
C:\Users\Admin\AppData\Local\Temp\95B5.exeMD5
b9c71e27f638983b8c3d20c05942241f
SHA107c5ac500fc053c9e3684f7540dcfb5cdc2a92da
SHA256312896cbc7900bd2a9934c18df9f2106aa3adb3c293e9712f543d54b122e5e9a
SHA5120209f32df520f1da598558eb513f1b1cfd7cc3a32cc8c50744b36db70af390c31c85a0ff4341551b09f3b635f21167c9c95987431775219a6053ae8cf29f235d
-
C:\Users\Admin\AppData\Local\Temp\98686542063830006056MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\9AA8.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\9AA8.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\A027.exeMD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
C:\Users\Admin\AppData\Local\Temp\A027.exeMD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
C:\Users\Admin\AppData\Local\Temp\B9AB.exeMD5
d7188f8eb1c931db25a646b4f86b31ec
SHA156a1905dc6923010a3b77416b28d9eac351bcdd5
SHA25685cfbc65e713937317030f052ae1f0764eeda611de7194d37cbdda340811399a
SHA51235466d38ec23990cbc5b0df379dc9cafcf40c6e45d43e1b0577cc822b9461f3c23a6c511c6192f1b8639d0c2ee5fc10cf3c92f082e77b32224fa4da5febc084f
-
C:\Users\Admin\AppData\Local\Temp\B9AB.exeMD5
d7188f8eb1c931db25a646b4f86b31ec
SHA156a1905dc6923010a3b77416b28d9eac351bcdd5
SHA25685cfbc65e713937317030f052ae1f0764eeda611de7194d37cbdda340811399a
SHA51235466d38ec23990cbc5b0df379dc9cafcf40c6e45d43e1b0577cc822b9461f3c23a6c511c6192f1b8639d0c2ee5fc10cf3c92f082e77b32224fa4da5febc084f
-
C:\Users\Admin\AppData\Local\Temp\D226.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\D226.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\D469.exeMD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
C:\Users\Admin\AppData\Local\Temp\D469.exeMD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
C:\Users\Admin\AppData\Local\Temp\D881.exeMD5
85803afc90c693d81f1ede3621a7aa98
SHA1eedc9bee3dc6421569bcc9a09f7228d0fef1e49f
SHA25679a7ad9e948977a36eebb733538725e8ffc743acf5ccd7823d1216cdb2eec6fc
SHA5123a84a481f9eb9932daf2c2611e4c01c2b1769b3436ca689c161fc4bdcf809a3303b482adcef055a17195eaa969e39aad995a1e8b78d11eaef89c606e8bd2986b
-
C:\Users\Admin\AppData\Local\Temp\D881.exeMD5
85803afc90c693d81f1ede3621a7aa98
SHA1eedc9bee3dc6421569bcc9a09f7228d0fef1e49f
SHA25679a7ad9e948977a36eebb733538725e8ffc743acf5ccd7823d1216cdb2eec6fc
SHA5123a84a481f9eb9932daf2c2611e4c01c2b1769b3436ca689c161fc4bdcf809a3303b482adcef055a17195eaa969e39aad995a1e8b78d11eaef89c606e8bd2986b
-
C:\Users\Admin\AppData\Local\Temp\ED62.exeMD5
7b98554d2ad0041be3a00121d8fcf9c3
SHA1187a35c3e84d0b4afef32705987c840f6729e133
SHA256f83ad7329b642727ff0e4b9f4b690ad55588f605000ecb6643ac959f1a8f0b61
SHA512324abecfd87060a9dd7b7a151eb8502f72123c242dee4ac3387c6d6ba3c92f6a4a452a006e58bf897b1a8af803686c5975e58dfb29bb3bd45aebc810ed264cab
-
C:\Users\Admin\AppData\Local\Temp\ED62.exeMD5
7b98554d2ad0041be3a00121d8fcf9c3
SHA1187a35c3e84d0b4afef32705987c840f6729e133
SHA256f83ad7329b642727ff0e4b9f4b690ad55588f605000ecb6643ac959f1a8f0b61
SHA512324abecfd87060a9dd7b7a151eb8502f72123c242dee4ac3387c6d6ba3c92f6a4a452a006e58bf897b1a8af803686c5975e58dfb29bb3bd45aebc810ed264cab
-
C:\Users\Admin\AppData\Local\Temp\F765.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\F765.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Dio.swfMD5
95c74f05449c333404f7950c69d3e33f
SHA1240e2f9e7618205c1f8ffbdd69fc52a5c91cbb91
SHA256b668e2177b7fa3d46043a44207727d3f34ade3ef705b79b9282baa9af95c2237
SHA512af09e16f506c3ef6abefcb8b498adc26b86d298b9f62326b267a79a8bcadcb50f262399218ab9f773c39e4b6e36806f6868929d75ae38ee44f97b4e2c579bfe8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GMD5
95c74f05449c333404f7950c69d3e33f
SHA1240e2f9e7618205c1f8ffbdd69fc52a5c91cbb91
SHA256b668e2177b7fa3d46043a44207727d3f34ade3ef705b79b9282baa9af95c2237
SHA512af09e16f506c3ef6abefcb8b498adc26b86d298b9f62326b267a79a8bcadcb50f262399218ab9f773c39e4b6e36806f6868929d75ae38ee44f97b4e2c579bfe8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Obliare.swfMD5
334523bbfc07a1b34a74818abca7c0f9
SHA14e907ef95f8688cc664f8a7c7bea8528326b5c13
SHA256e6eeee3a8b0e45f40a91009c7e9d88fead35488be479ea2e6c1551ea7e0b858d
SHA512f6201203ccff5e84a52bb2dd8b97424d8af2477b95eff050ccae9183c00d920b57a6f7f59676a9b4a3c5d41b4167af5881f187e858beaff2b277257e45cc0a44
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sua.swfMD5
2a32b7f3c1946406510c9e4ea9c7a596
SHA18f76d3378f55ed00db68d0d6436ce762bf2fbc3c
SHA25641713060860a2ee98e0179860cbec578256b1552199b7ad8b1bbfc1e464436f5
SHA51278982b49045b808375cadf600647b7610b41a120f17d45639471541805b011eaa61693cd20ba9841c494b6ee5e22ab05c94e4a63b3e8b77fa22b1a8603dbae43
-
C:\Users\Admin\AppData\Local\Temp\blzqtgds.exeMD5
fa504de25062eb4d47560b4e57a4a335
SHA1066d2d5b395bd0f25d20d5ad85eda6e79c7d1419
SHA256f13ae48b7a408e63482f5542c550a160747f2e485ad706cb410d59fc3ca726a6
SHA5128427dc8112a2dcc71113200b3515fe7ba11430eedc893ba751a9ddb1c08f5f1fde764e62d9f4112786fd0a735afaef56cfa5936e7073dd5e457bfc1b87be19e7
-
C:\Windows\SysWOW64\tiqkibbk\blzqtgds.exeMD5
fa504de25062eb4d47560b4e57a4a335
SHA1066d2d5b395bd0f25d20d5ad85eda6e79c7d1419
SHA256f13ae48b7a408e63482f5542c550a160747f2e485ad706cb410d59fc3ca726a6
SHA5128427dc8112a2dcc71113200b3515fe7ba11430eedc893ba751a9ddb1c08f5f1fde764e62d9f4112786fd0a735afaef56cfa5936e7073dd5e457bfc1b87be19e7
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\ProgramData\sqlite3.dllMD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
memory/348-242-0x0000000000000000-mapping.dmp
-
memory/364-239-0x0000000000000000-mapping.dmp
-
memory/660-156-0x00000000009A0000-0x00000000009A1000-memory.dmpFilesize
4KB
-
memory/660-146-0x0000000000000000-mapping.dmp
-
memory/660-165-0x0000000075120000-0x00000000756A4000-memory.dmpFilesize
5.5MB
-
memory/660-166-0x0000000075B90000-0x0000000076ED8000-memory.dmpFilesize
19.3MB
-
memory/660-168-0x00000000704B0000-0x00000000704FB000-memory.dmpFilesize
300KB
-
memory/660-169-0x0000000005380000-0x0000000005381000-memory.dmpFilesize
4KB
-
memory/660-206-0x0000000007E30000-0x0000000007E31000-memory.dmpFilesize
4KB
-
memory/660-158-0x0000000072260000-0x00000000722E0000-memory.dmpFilesize
512KB
-
memory/660-150-0x00000000009A0000-0x0000000000AB4000-memory.dmpFilesize
1.1MB
-
memory/660-151-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/660-154-0x0000000000E60000-0x0000000000EA5000-memory.dmpFilesize
276KB
-
memory/660-153-0x0000000075960000-0x0000000075B22000-memory.dmpFilesize
1.8MB
-
memory/660-155-0x0000000075860000-0x0000000075951000-memory.dmpFilesize
964KB
-
memory/1052-253-0x0000000000000000-mapping.dmp
-
memory/1080-274-0x0000000000040000-0x0000000000041000-memory.dmpFilesize
4KB
-
memory/1080-271-0x0000000000130000-0x0000000000145000-memory.dmpFilesize
84KB
-
memory/1080-272-0x0000000000139A6B-mapping.dmp
-
memory/1080-273-0x0000000000040000-0x0000000000041000-memory.dmpFilesize
4KB
-
memory/1368-278-0x0000000000000000-mapping.dmp
-
memory/1408-133-0x0000000000CE0000-0x0000000000D49000-memory.dmpFilesize
420KB
-
memory/1408-179-0x0000000006540000-0x0000000006541000-memory.dmpFilesize
4KB
-
memory/1408-142-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/1408-178-0x0000000005FA0000-0x0000000005FA1000-memory.dmpFilesize
4KB
-
memory/1408-141-0x00000000025F0000-0x0000000002635000-memory.dmpFilesize
276KB
-
memory/1408-177-0x0000000005E80000-0x0000000005E81000-memory.dmpFilesize
4KB
-
memory/1408-140-0x00000000057F0000-0x00000000057F1000-memory.dmpFilesize
4KB
-
memory/1408-176-0x00000000053E0000-0x00000000053E1000-memory.dmpFilesize
4KB
-
memory/1408-139-0x0000000072260000-0x00000000722E0000-memory.dmpFilesize
512KB
-
memory/1408-182-0x0000000007310000-0x0000000007311000-memory.dmpFilesize
4KB
-
memory/1408-181-0x0000000006C10000-0x0000000006C11000-memory.dmpFilesize
4KB
-
memory/1408-180-0x0000000006260000-0x0000000006261000-memory.dmpFilesize
4KB
-
memory/1408-144-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/1408-145-0x0000000075120000-0x00000000756A4000-memory.dmpFilesize
5.5MB
-
memory/1408-137-0x0000000000CE0000-0x0000000000CE1000-memory.dmpFilesize
4KB
-
memory/1408-130-0x0000000000000000-mapping.dmp
-
memory/1408-152-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/1408-143-0x00000000051E0000-0x00000000051E1000-memory.dmpFilesize
4KB
-
memory/1408-147-0x0000000075B90000-0x0000000076ED8000-memory.dmpFilesize
19.3MB
-
memory/1408-136-0x0000000075860000-0x0000000075951000-memory.dmpFilesize
964KB
-
memory/1408-159-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/1408-135-0x0000000075960000-0x0000000075B22000-memory.dmpFilesize
1.8MB
-
memory/1408-134-0x0000000000C50000-0x0000000000C51000-memory.dmpFilesize
4KB
-
memory/1408-161-0x00000000704B0000-0x00000000704FB000-memory.dmpFilesize
300KB
-
memory/1428-241-0x0000000000000000-mapping.dmp
-
memory/1448-250-0x0000000000000000-mapping.dmp
-
memory/1488-190-0x00000000001E0000-0x00000000001FC000-memory.dmpFilesize
112KB
-
memory/1488-191-0x0000000000400000-0x0000000000827000-memory.dmpFilesize
4.2MB
-
memory/1488-189-0x00000000001C0000-0x00000000001D1000-memory.dmpFilesize
68KB
-
memory/1488-173-0x0000000000000000-mapping.dmp
-
memory/1604-127-0x0000000000000000-mapping.dmp
-
memory/1720-262-0x0000000000000000-mapping.dmp
-
memory/1896-257-0x0000000000000000-mapping.dmp
-
memory/2072-249-0x0000000000950000-0x000000000095C000-memory.dmpFilesize
48KB
-
memory/2072-248-0x0000000000960000-0x0000000000967000-memory.dmpFilesize
28KB
-
memory/2072-245-0x0000000000000000-mapping.dmp
-
memory/2092-261-0x0000000000000000-mapping.dmp
-
memory/2140-275-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/2208-258-0x0000000000000000-mapping.dmp
-
memory/2228-171-0x0000000000402F47-mapping.dmp
-
memory/2264-217-0x0000000000000000-mapping.dmp
-
memory/2304-215-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-207-0x0000000075960000-0x0000000075B22000-memory.dmpFilesize
1.8MB
-
memory/2304-201-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-198-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-195-0x0000000000000000-mapping.dmp
-
memory/2304-234-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-203-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-204-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-205-0x00000000013F0000-0x00000000013F1000-memory.dmpFilesize
4KB
-
memory/2304-199-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-229-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-227-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-211-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-212-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-226-0x00000000777F0000-0x000000007797E000-memory.dmpFilesize
1.6MB
-
memory/2304-228-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-216-0x0000000000D30000-0x0000000001294000-memory.dmpFilesize
5.4MB
-
memory/2304-209-0x0000000075860000-0x0000000075951000-memory.dmpFilesize
964KB
-
memory/2304-208-0x00000000013A0000-0x00000000013E5000-memory.dmpFilesize
276KB
-
memory/2348-252-0x0000000000000000-mapping.dmp
-
memory/2424-286-0x0000000000430000-0x0000000000431000-memory.dmpFilesize
4KB
-
memory/2424-285-0x0000000001370000-0x0000000001474000-memory.dmpFilesize
1.0MB
-
memory/2424-300-0x0000000000BF0000-0x0000000000C35000-memory.dmpFilesize
276KB
-
memory/2424-301-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/2424-282-0x0000000000000000-mapping.dmp
-
memory/2436-237-0x0000000000000000-mapping.dmp
-
memory/2640-115-0x0000000000030000-0x0000000000038000-memory.dmpFilesize
32KB
-
memory/2640-116-0x00000000001C0000-0x00000000001C9000-memory.dmpFilesize
36KB
-
memory/2920-236-0x0000000000000000-mapping.dmp
-
memory/3056-119-0x0000000000AC0000-0x0000000000AD6000-memory.dmpFilesize
88KB
-
memory/3056-247-0x0000000002AE0000-0x0000000002AF6000-memory.dmpFilesize
88KB
-
memory/3056-126-0x00000000027F0000-0x0000000002806000-memory.dmpFilesize
88KB
-
memory/3056-188-0x0000000004300000-0x0000000004316000-memory.dmpFilesize
88KB
-
memory/3156-281-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/3156-264-0x0000000000000000-mapping.dmp
-
memory/3156-280-0x0000000000840000-0x000000000098A000-memory.dmpFilesize
1.3MB
-
memory/3200-233-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/3200-231-0x0000000000030000-0x000000000003D000-memory.dmpFilesize
52KB
-
memory/3200-232-0x00000000001C0000-0x00000000001D3000-memory.dmpFilesize
76KB
-
memory/3200-210-0x0000000000000000-mapping.dmp
-
memory/3464-225-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/3464-277-0x0000000000000000-mapping.dmp
-
memory/3464-192-0x0000000000000000-mapping.dmp
-
memory/3464-221-0x00000000007C1000-0x00000000007D2000-memory.dmpFilesize
68KB
-
memory/3560-313-0x0000000000000000-mapping.dmp
-
memory/3608-268-0x0000000000940000-0x0000000000A8A000-memory.dmpFilesize
1.3MB
-
memory/3608-267-0x00000000001C0000-0x00000000001DD000-memory.dmpFilesize
116KB
-
memory/3608-269-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/3608-222-0x0000000000000000-mapping.dmp
-
memory/3648-117-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3648-118-0x0000000000402F47-mapping.dmp
-
memory/3764-230-0x0000000000000000-mapping.dmp
-
memory/3780-220-0x0000000000000000-mapping.dmp
-
memory/3964-279-0x0000000000000000-mapping.dmp
-
memory/4024-124-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/4024-120-0x0000000000000000-mapping.dmp
-
memory/4024-125-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/4044-246-0x0000000003080000-0x00000000030EB000-memory.dmpFilesize
428KB
-
memory/4044-244-0x00000000030F0000-0x0000000003164000-memory.dmpFilesize
464KB
-
memory/4044-235-0x0000000000000000-mapping.dmp
-
memory/4048-312-0x0000000000000000-mapping.dmp