Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 03:17

General

  • Target

    2b869c809ac19759798be63e56ff36567e35b641bbde5f5b6c0e17d4137d6965.exe

  • Size

    716KB

  • MD5

    dec0a88203e4f73a3682c8a8bbc76d14

  • SHA1

    e6178afe89a702a12f3f604cebde0299e7f68c09

  • SHA256

    2b869c809ac19759798be63e56ff36567e35b641bbde5f5b6c0e17d4137d6965

  • SHA512

    5172b582dc6fd55e9e03eab4755c0fcfc8bd2c29eaa04c612f5ce32a355bbfec73b6ae25b8a8000b99d80c998729d09dc7d627c6d4da38874ce64ac7bb268db3

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs
  • Executes dropped EXE 9 IoCs
  • Modifies Installed Components in the registry 2 TTPs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 47 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 40 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b869c809ac19759798be63e56ff36567e35b641bbde5f5b6c0e17d4137d6965.exe
    "C:\Users\Admin\AppData\Local\Temp\2b869c809ac19759798be63e56ff36567e35b641bbde5f5b6c0e17d4137d6965.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4060
    • \??\c:\users\admin\appdata\local\temp\2b869c809ac19759798be63e56ff36567e35b641bbde5f5b6c0e17d4137d6965.exe 
      c:\users\admin\appdata\local\temp\2b869c809ac19759798be63e56ff36567e35b641bbde5f5b6c0e17d4137d6965.exe 
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:4500
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AutoClick.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\AutoClick.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4384
        • C:\Windows\SysWOW64\iexplore.exe
          C:\Windows\system32\iexplore.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:5100
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4588
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2676
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4884
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4640
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2060
            • C:\Windows\SysWOW64\at.exe
              at 03:24 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:2704
              • C:\Windows\SysWOW64\at.exe
                at 03:25 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                6⤵
                  PID:5040
                • C:\Windows\SysWOW64\at.exe
                  at 03:26 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  6⤵
                    PID:4756

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Winlogon Helper DLL

        1
        T1004

        Hidden Files and Directories

        1
        T1158

        Registry Run Keys / Startup Folder

        2
        T1060

        Browser Extensions

        1
        T1176

        Defense Evasion

        Modify Registry

        5
        T1112

        Hidden Files and Directories

        1
        T1158

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        3
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2b869c809ac19759798be63e56ff36567e35b641bbde5f5b6c0e17d4137d6965.exe 
          Filesize

          509KB

          MD5

          17b5d3f71dd49aafe803c77ef4755b84

          SHA1

          7618ce99913d09a2be20aeb3584bf0262f30217a

          SHA256

          2f2dde9447808267504111cc8cce1eb30e9efabd3c7e9663435d526a70777dd2

          SHA512

          53855ab8119bcb9034ea87c4aceb032f6948ccdf42b38b0920aac41a2cd4a38f87b9fbb663b40b01df14242baab6062349de45243d083cae6be4bf2888d3c46c

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AutoClick.exe
          Filesize

          270KB

          MD5

          3bc8526cb02d572a6590061d8d775b47

          SHA1

          9835f5df476f38036b2320531ee0a3e3b493fd30

          SHA256

          97810558180c71b18b0b4ce3e223797546172fea12790b7681bcad127745ca96

          SHA512

          58bf3ad8252cba662903ee9435c13f14b504c35934b833ef6b848448ca0eaee85d096837173520c68991140944b09a676575df212a9028049cf2a9dad26c2fad

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AutoClick.exe
          Filesize

          270KB

          MD5

          3bc8526cb02d572a6590061d8d775b47

          SHA1

          9835f5df476f38036b2320531ee0a3e3b493fd30

          SHA256

          97810558180c71b18b0b4ce3e223797546172fea12790b7681bcad127745ca96

          SHA512

          58bf3ad8252cba662903ee9435c13f14b504c35934b833ef6b848448ca0eaee85d096837173520c68991140944b09a676575df212a9028049cf2a9dad26c2fad

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\iexplore.exe
          Filesize

          424KB

          MD5

          2a98fb1ede3a77f0e62488536138ddca

          SHA1

          ee010c5a0d8c18e19df19a28f9d52a9ca2c8a76b

          SHA256

          3020c04e8a872357e196467b36a171714939896a15f6a36716f426f25d38faba

          SHA512

          915dc92ab2658e0ab0dab53fa26907b45503085de73ab1f509183a1b8afb6ddf028cd907cb5ff026d7b8cb3005d2416722f1af3a1ced87efa0562d1e1fd857e1

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\iexplorehk.dll
          Filesize

          24KB

          MD5

          81b7f40ff53a778463dd904957da4fa9

          SHA1

          1500786a0ac422fbed0c072b90b3a38627ded5cd

          SHA256

          0ba48c0c16f2fa5622adb5aeb5dbb67da8a449a01096ccc6d8eee3b967332275

          SHA512

          61b7fa5e16f7b789576dc0293df8983992099d50b386620016bcc800eee5569956a13750e95d987841617dac49b1783a0e6adfc2f4761164d78a09f2c16c83fa

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\iexplorewb.dll
          Filesize

          40KB

          MD5

          26859450dd1e2e4f7344ac521f0f4101

          SHA1

          5533f421dfdc970d89ab44431b333eea9736fa38

          SHA256

          5c7d6a0ef482dc3ee561d4b3f69010fe9709d8735532e4154a7d5c0489d81be5

          SHA512

          b9382d52aea91b8b5bada292ba00089cb4a34a9852a932b3b41ac2e9ad1c298e9dc355559dca4d2206d820d60da39be2dde77d94608994a12d3b2b2fdd4cae44

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\inst.dat
          Filesize

          996B

          MD5

          3810682c780fb6403bcaf08ff959c8c2

          SHA1

          d93607ccf3b66ee644a939e6a313fbe3a613a503

          SHA256

          50f5ee95c0f2dbae9af5fb8738f3acc580f1559938ed7fd20423f89dba9e1b7c

          SHA512

          a4f300a8bcd0cbdaf7b70cd455538a72585cca7964f1859b2e10227c8a5ec3ffef402bd06943692618a5d5e5783596529dfc19a419741c5db4e383543421e970

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kw.dat
          Filesize

          197B

          MD5

          b04b517debaa87fa12e501073834e13c

          SHA1

          42732afdd5e7e31887b10a7a6a2dca545826549b

          SHA256

          57170f7d966924d21c3aca9d5e976fc702451bd87f0c8a9381fac9f09852209e

          SHA512

          ad558442a078b469d126541ab0ad7492b1de213dd1f988d9397cc02e7e371f0ee4edd21a0a3f93a7acf4886834f7a5d120e9396396bb73751edc5899d93a3f71

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mc.dat
          Filesize

          69B

          MD5

          3cf9476e9d7cc713dfbf21d1553d9127

          SHA1

          2b449c0df6cef085fae4b10cc8a1d65923896014

          SHA256

          2cd5d5daa1f7feabdec8c9c2f1faf752c5db59c9713d506966eeaa4785eb01ce

          SHA512

          3eaa956e78e0801a5179f94065911199d461d6dd7b75fc6b53d3d703ed348d85c30e015f2016faab52a5f9b0bba1b4b31ee5fe15af831f5d6924a67372bbae0f

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pk.bin
          Filesize

          4KB

          MD5

          99604b6570b0e8764587d1373220add5

          SHA1

          1dc8672a7097f787d5d7a381bfe46e9d2fd756f6

          SHA256

          a6e878f13794b3a1abce99c0a063883292e14a8f3d5ab7ba4bec6136d3578bc2

          SHA512

          3468f9b138ece3a59e7f96f1128b0533f875dcb3976a996fe8ffa0aa4206b55d45158db262a42daecf0597af94938d496a23f3c1bb296198f6a9206c59358263

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
          Filesize

          7KB

          MD5

          fbe4bab53f74d3049ef4b306d4cd8742

          SHA1

          6504b63908997a71a65997fa31eda4ae4de013e7

          SHA256

          446658dd5af649857fff445c600f26cdc1d0c19c86a080f312b89b1890182092

          SHA512

          d458ab806a3ed3d1494a13ad8a75df874a0b227cb4f337996cb82df3c4a26dc9c4fe48a664b53b052a4af123ea8d89911d9d9493870e6b5992d5621a32260c2f

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
          Filesize

          7KB

          MD5

          fbe4bab53f74d3049ef4b306d4cd8742

          SHA1

          6504b63908997a71a65997fa31eda4ae4de013e7

          SHA256

          446658dd5af649857fff445c600f26cdc1d0c19c86a080f312b89b1890182092

          SHA512

          d458ab806a3ed3d1494a13ad8a75df874a0b227cb4f337996cb82df3c4a26dc9c4fe48a664b53b052a4af123ea8d89911d9d9493870e6b5992d5621a32260c2f

        • C:\Users\Admin\AppData\Local\icsys.icn.exe
          Filesize

          206KB

          MD5

          d1eab72f8cc2dd9ad688d676c6e02167

          SHA1

          4a70fba3b529ce1264dd953f044e684282a2cb78

          SHA256

          f0c9827d2402672216201898887b2fbecd078a98198b519ab37469ab61f0288b

          SHA512

          66ec0558f4bda827323a051ef486b59ec472fe3223ae01a222306df5fd58399712d1363bff5b638d66086a1486ce08ac0ee4cef126ccb00da65d1dc8ed9338bc

        • C:\Users\Admin\AppData\Local\icsys.icn.exe
          Filesize

          206KB

          MD5

          d1eab72f8cc2dd9ad688d676c6e02167

          SHA1

          4a70fba3b529ce1264dd953f044e684282a2cb78

          SHA256

          f0c9827d2402672216201898887b2fbecd078a98198b519ab37469ab61f0288b

          SHA512

          66ec0558f4bda827323a051ef486b59ec472fe3223ae01a222306df5fd58399712d1363bff5b638d66086a1486ce08ac0ee4cef126ccb00da65d1dc8ed9338bc

        • C:\Users\Admin\AppData\Roaming\mrsys.exe
          Filesize

          206KB

          MD5

          fc5cfe421c01f41e8e3413007f297d7c

          SHA1

          323c4ad7cc0e30b1147d54f4a3167c9027c17e68

          SHA256

          77345fbd5949842a238e770444f41ac73c807cb57250388b1ee89b17258fb0a4

          SHA512

          f61da7481687c0ff479b2b08156531c480ce57e464f53e0a17ed090c8d44dc7ca4a56744bdb1c1146ce222c578c4681baa77169101a728e4beaa79e1817fbf0c

        • C:\Windows\SysWOW64\iexplore.exe
          Filesize

          424KB

          MD5

          994ffae187f4e567c6efee378af66ad0

          SHA1

          0cc35d07e909b7f6595b9c698fe1a8b9b39c7def

          SHA256

          f0b707b1ab25024ba5a65f68cd4380a66ef0ce9bb880a92e1feee818854fe423

          SHA512

          bd5320327a24fbab8934395d272869bfa97d77a2ee44ac6eec8fa79b3ffbd4a049bf9dfeeb6b8cc946c295a07bd07ddba41d81c76d452d2c5587b4bf92559e0a

        • C:\Windows\SysWOW64\iexplore.exe
          Filesize

          424KB

          MD5

          994ffae187f4e567c6efee378af66ad0

          SHA1

          0cc35d07e909b7f6595b9c698fe1a8b9b39c7def

          SHA256

          f0b707b1ab25024ba5a65f68cd4380a66ef0ce9bb880a92e1feee818854fe423

          SHA512

          bd5320327a24fbab8934395d272869bfa97d77a2ee44ac6eec8fa79b3ffbd4a049bf9dfeeb6b8cc946c295a07bd07ddba41d81c76d452d2c5587b4bf92559e0a

        • C:\Windows\SysWOW64\iexplorehk.dll
          Filesize

          24KB

          MD5

          9ac9028338d1b353a7cacb563bb91df7

          SHA1

          a20c5dee8f05c91686324cec2d5b092bafe58339

          SHA256

          93c0e7f41d5d74217189e4cc2d5cdb8f97d8e5eeef0a0dcf4cecd67e3393682c

          SHA512

          ac83c8f7b6fe913487015d8d7a2e430e917d230b6b2907150f6c4a73bf64c3a02320dddc29fea03db5df8ac5620d8a902fe7be80ba1b1bd1e6f5b8b1b016ddfe

        • C:\Windows\SysWOW64\iexplorehk.dll
          Filesize

          24KB

          MD5

          9ac9028338d1b353a7cacb563bb91df7

          SHA1

          a20c5dee8f05c91686324cec2d5b092bafe58339

          SHA256

          93c0e7f41d5d74217189e4cc2d5cdb8f97d8e5eeef0a0dcf4cecd67e3393682c

          SHA512

          ac83c8f7b6fe913487015d8d7a2e430e917d230b6b2907150f6c4a73bf64c3a02320dddc29fea03db5df8ac5620d8a902fe7be80ba1b1bd1e6f5b8b1b016ddfe

        • C:\Windows\SysWOW64\iexplorehk.dll
          Filesize

          24KB

          MD5

          9ac9028338d1b353a7cacb563bb91df7

          SHA1

          a20c5dee8f05c91686324cec2d5b092bafe58339

          SHA256

          93c0e7f41d5d74217189e4cc2d5cdb8f97d8e5eeef0a0dcf4cecd67e3393682c

          SHA512

          ac83c8f7b6fe913487015d8d7a2e430e917d230b6b2907150f6c4a73bf64c3a02320dddc29fea03db5df8ac5620d8a902fe7be80ba1b1bd1e6f5b8b1b016ddfe

        • C:\Windows\SysWOW64\iexplorehk.dll
          Filesize

          24KB

          MD5

          9ac9028338d1b353a7cacb563bb91df7

          SHA1

          a20c5dee8f05c91686324cec2d5b092bafe58339

          SHA256

          93c0e7f41d5d74217189e4cc2d5cdb8f97d8e5eeef0a0dcf4cecd67e3393682c

          SHA512

          ac83c8f7b6fe913487015d8d7a2e430e917d230b6b2907150f6c4a73bf64c3a02320dddc29fea03db5df8ac5620d8a902fe7be80ba1b1bd1e6f5b8b1b016ddfe

        • C:\Windows\SysWOW64\iexplorehk.dll
          Filesize

          24KB

          MD5

          9ac9028338d1b353a7cacb563bb91df7

          SHA1

          a20c5dee8f05c91686324cec2d5b092bafe58339

          SHA256

          93c0e7f41d5d74217189e4cc2d5cdb8f97d8e5eeef0a0dcf4cecd67e3393682c

          SHA512

          ac83c8f7b6fe913487015d8d7a2e430e917d230b6b2907150f6c4a73bf64c3a02320dddc29fea03db5df8ac5620d8a902fe7be80ba1b1bd1e6f5b8b1b016ddfe

        • C:\Windows\SysWOW64\iexplorehk.dll
          Filesize

          24KB

          MD5

          9ac9028338d1b353a7cacb563bb91df7

          SHA1

          a20c5dee8f05c91686324cec2d5b092bafe58339

          SHA256

          93c0e7f41d5d74217189e4cc2d5cdb8f97d8e5eeef0a0dcf4cecd67e3393682c

          SHA512

          ac83c8f7b6fe913487015d8d7a2e430e917d230b6b2907150f6c4a73bf64c3a02320dddc29fea03db5df8ac5620d8a902fe7be80ba1b1bd1e6f5b8b1b016ddfe

        • C:\Windows\SysWOW64\iexplorehk.dll
          Filesize

          24KB

          MD5

          9ac9028338d1b353a7cacb563bb91df7

          SHA1

          a20c5dee8f05c91686324cec2d5b092bafe58339

          SHA256

          93c0e7f41d5d74217189e4cc2d5cdb8f97d8e5eeef0a0dcf4cecd67e3393682c

          SHA512

          ac83c8f7b6fe913487015d8d7a2e430e917d230b6b2907150f6c4a73bf64c3a02320dddc29fea03db5df8ac5620d8a902fe7be80ba1b1bd1e6f5b8b1b016ddfe

        • C:\Windows\SysWOW64\iexplorewb.dll
          Filesize

          40KB

          MD5

          21d4e01f38b5efd64ad6816fa0b44677

          SHA1

          5242d2c5b450c773b9fa3ad014a8aba9b7bb206a

          SHA256

          3285df0c25d4b9b6d5ccbe166a3ce3d04f5cb3a0d61c8bf29bf5f953e51b0977

          SHA512

          77dae941676a56664da89c7670d29ed5402032c8040df1cc231986733c78f0dc56c41f7a276ec9ea8336e3fa2bfc68d3121048e9585bf0d8a98917d799f669b8

        • C:\Windows\SysWOW64\iexplorewb.dll
          Filesize

          40KB

          MD5

          21d4e01f38b5efd64ad6816fa0b44677

          SHA1

          5242d2c5b450c773b9fa3ad014a8aba9b7bb206a

          SHA256

          3285df0c25d4b9b6d5ccbe166a3ce3d04f5cb3a0d61c8bf29bf5f953e51b0977

          SHA512

          77dae941676a56664da89c7670d29ed5402032c8040df1cc231986733c78f0dc56c41f7a276ec9ea8336e3fa2bfc68d3121048e9585bf0d8a98917d799f669b8

        • C:\Windows\SysWOW64\iexplorewb.dll
          Filesize

          40KB

          MD5

          21d4e01f38b5efd64ad6816fa0b44677

          SHA1

          5242d2c5b450c773b9fa3ad014a8aba9b7bb206a

          SHA256

          3285df0c25d4b9b6d5ccbe166a3ce3d04f5cb3a0d61c8bf29bf5f953e51b0977

          SHA512

          77dae941676a56664da89c7670d29ed5402032c8040df1cc231986733c78f0dc56c41f7a276ec9ea8336e3fa2bfc68d3121048e9585bf0d8a98917d799f669b8

        • C:\Windows\SysWOW64\inst.dat
          Filesize

          996B

          MD5

          3810682c780fb6403bcaf08ff959c8c2

          SHA1

          d93607ccf3b66ee644a939e6a313fbe3a613a503

          SHA256

          50f5ee95c0f2dbae9af5fb8738f3acc580f1559938ed7fd20423f89dba9e1b7c

          SHA512

          a4f300a8bcd0cbdaf7b70cd455538a72585cca7964f1859b2e10227c8a5ec3ffef402bd06943692618a5d5e5783596529dfc19a419741c5db4e383543421e970

        • C:\Windows\SysWOW64\kw.dat
          Filesize

          197B

          MD5

          26a22fbcbbb3b4a5ebb06606f6dce669

          SHA1

          f166da6556b08a1afbb6d567cd5906d93d393df1

          SHA256

          06fe040fc318a78fab63b06a5ecabf1ea4989a047b56cf2e37428fe5f8a0122e

          SHA512

          b67a600e1338c24f5cbff2d0e63f007e97037459849047a5d7e0f2ab5008b96254a1beffb33450e2347d51dec5c2d20e1857a69c0a5a64952615ceaefe6659ad

        • C:\Windows\SysWOW64\mc.dat
          Filesize

          69B

          MD5

          5788324f0a5c6814b96809ad21a604dd

          SHA1

          a4de6a189aebdafa04486ad7dd07933d1ab97396

          SHA256

          59fac42242e78d77d29e7181b9509f13a9b03d1bd24c91b0f075d4c347ea0942

          SHA512

          c0ef5ba1fe29a3cd77aace738e4cf1d5a43c593aa1b1f32e664553d7a3e39067b812b0c83e9f2f1682218d4c8f29916a5e11b8d0e51cef9c6fb6373231350093

        • C:\Windows\SysWOW64\pk.bin
          Filesize

          4KB

          MD5

          38ced90e39523199c83279394da05015

          SHA1

          99d503b1239476d5f10f6c44f7f842626621b65e

          SHA256

          81f51675376ea55c6296393d02f274a4caf90e2e26a5ee70e50ec13d55697389

          SHA512

          3d82768fa9f2ed9b575dac661709b672b26090da7a622106d12a14903118bb69d7125ca1f6e3c381561509c9aea76c2c8cf8cc08ed34da53b89e97d4fd8f2b81

        • C:\Windows\SysWOW64\rinst.exe
          Filesize

          7KB

          MD5

          fbe4bab53f74d3049ef4b306d4cd8742

          SHA1

          6504b63908997a71a65997fa31eda4ae4de013e7

          SHA256

          446658dd5af649857fff445c600f26cdc1d0c19c86a080f312b89b1890182092

          SHA512

          d458ab806a3ed3d1494a13ad8a75df874a0b227cb4f337996cb82df3c4a26dc9c4fe48a664b53b052a4af123ea8d89911d9d9493870e6b5992d5621a32260c2f

        • C:\Windows\System\explorer.exe
          Filesize

          206KB

          MD5

          63b85356563df76fc4a89c2042cd678e

          SHA1

          8e0e87f959adf99f48504a0ad80d507bbe8f36e4

          SHA256

          cd1e50589d672157c22edc3c8957c1fa1ebacd0e3e05b8026a976a02739adac4

          SHA512

          6fcdcb24c464ec7194bc83dcf32f6eb5fc8ce8e139e35ec371a6bbbb24e9556ba2bed8701cf031c858effac65cf36ed5bd4052e7c8728283c650bca131b96ac3

        • C:\Windows\System\spoolsv.exe
          Filesize

          206KB

          MD5

          b23d4971f9bf437323f3a619e94e5d29

          SHA1

          1fabcd789f60c438fd0b4a08a11de442124e0a52

          SHA256

          f7ac656594d47244d5efe354db6eefed8791c089e2aa82bcbac91712f68d8dca

          SHA512

          f0dd88f7c8fa4b53fb27432e93eb15f8537552318935830e1cbbabd21da84ae524075e2bf979207aa42cae0149c449f813418b1c056a10a1166d152c7c9e9bf8

        • C:\Windows\System\spoolsv.exe
          Filesize

          206KB

          MD5

          b23d4971f9bf437323f3a619e94e5d29

          SHA1

          1fabcd789f60c438fd0b4a08a11de442124e0a52

          SHA256

          f7ac656594d47244d5efe354db6eefed8791c089e2aa82bcbac91712f68d8dca

          SHA512

          f0dd88f7c8fa4b53fb27432e93eb15f8537552318935830e1cbbabd21da84ae524075e2bf979207aa42cae0149c449f813418b1c056a10a1166d152c7c9e9bf8

        • C:\Windows\System\svchost.exe
          Filesize

          206KB

          MD5

          f8342fbf050a91edba29cef99663f565

          SHA1

          ac4eac9bb610563b5c54ad82c55024b78c57b3cb

          SHA256

          54a28e94bf9a4a5b15e49957a5ffddb8b9eb73caf4ad0f5585915878fe5922bc

          SHA512

          574966e91a686239e196024ddf94fe957d65d119ce22f06fd204ab1f6d9a5ef0f9aa3d318ea61eab810b0112afd6d9ab32fc187e58c5692d868c983f83471a44

        • \??\c:\users\admin\appdata\local\temp\2b869c809ac19759798be63e56ff36567e35b641bbde5f5b6c0e17d4137d6965.exe 
          Filesize

          509KB

          MD5

          17b5d3f71dd49aafe803c77ef4755b84

          SHA1

          7618ce99913d09a2be20aeb3584bf0262f30217a

          SHA256

          2f2dde9447808267504111cc8cce1eb30e9efabd3c7e9663435d526a70777dd2

          SHA512

          53855ab8119bcb9034ea87c4aceb032f6948ccdf42b38b0920aac41a2cd4a38f87b9fbb663b40b01df14242baab6062349de45243d083cae6be4bf2888d3c46c

        • \??\c:\windows\system\explorer.exe
          Filesize

          206KB

          MD5

          63b85356563df76fc4a89c2042cd678e

          SHA1

          8e0e87f959adf99f48504a0ad80d507bbe8f36e4

          SHA256

          cd1e50589d672157c22edc3c8957c1fa1ebacd0e3e05b8026a976a02739adac4

          SHA512

          6fcdcb24c464ec7194bc83dcf32f6eb5fc8ce8e139e35ec371a6bbbb24e9556ba2bed8701cf031c858effac65cf36ed5bd4052e7c8728283c650bca131b96ac3

        • \??\c:\windows\system\spoolsv.exe
          Filesize

          206KB

          MD5

          b23d4971f9bf437323f3a619e94e5d29

          SHA1

          1fabcd789f60c438fd0b4a08a11de442124e0a52

          SHA256

          f7ac656594d47244d5efe354db6eefed8791c089e2aa82bcbac91712f68d8dca

          SHA512

          f0dd88f7c8fa4b53fb27432e93eb15f8537552318935830e1cbbabd21da84ae524075e2bf979207aa42cae0149c449f813418b1c056a10a1166d152c7c9e9bf8

        • \??\c:\windows\system\svchost.exe
          Filesize

          206KB

          MD5

          f8342fbf050a91edba29cef99663f565

          SHA1

          ac4eac9bb610563b5c54ad82c55024b78c57b3cb

          SHA256

          54a28e94bf9a4a5b15e49957a5ffddb8b9eb73caf4ad0f5585915878fe5922bc

          SHA512

          574966e91a686239e196024ddf94fe957d65d119ce22f06fd204ab1f6d9a5ef0f9aa3d318ea61eab810b0112afd6d9ab32fc187e58c5692d868c983f83471a44

        • memory/2060-160-0x0000000000000000-mapping.dmp
        • memory/2676-142-0x0000000000000000-mapping.dmp
        • memory/2704-165-0x0000000000000000-mapping.dmp
        • memory/3036-133-0x0000000000000000-mapping.dmp
        • memory/4384-172-0x0000000000000000-mapping.dmp
        • memory/4500-167-0x0000000000000000-mapping.dmp
        • memory/4588-136-0x0000000000000000-mapping.dmp
        • memory/4640-154-0x0000000000000000-mapping.dmp
        • memory/4756-200-0x0000000000000000-mapping.dmp
        • memory/4884-148-0x0000000000000000-mapping.dmp
        • memory/5040-199-0x0000000000000000-mapping.dmp
        • memory/5100-197-0x0000000002FE1000-0x0000000002FE5000-memory.dmp
          Filesize

          16KB

        • memory/5100-180-0x0000000000000000-mapping.dmp