Analysis

  • max time kernel
    137s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-07-2022 09:52

General

  • Target

    4b75a200664d5e43fb297347fd6f93e8f8685320bd1959c5b07f3c597918c8f2.exe

  • Size

    124KB

  • MD5

    c6ce21c4c9389a23d6deac23d9d43190

  • SHA1

    36036d346993df07681926111f73891dd8f19846

  • SHA256

    4b75a200664d5e43fb297347fd6f93e8f8685320bd1959c5b07f3c597918c8f2

  • SHA512

    fa90bc5a6d1753ae08ee384c6e7d333da416f166edc4b72b605029a01d636773e728743c86d547413e4a9bcd8ea40ddf3d89588c3aca747d20dd9575f2d2110f

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 8 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Creates a Windows Service
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b75a200664d5e43fb297347fd6f93e8f8685320bd1959c5b07f3c597918c8f2.exe
    "C:\Users\Admin\AppData\Local\Temp\4b75a200664d5e43fb297347fd6f93e8f8685320bd1959c5b07f3c597918c8f2.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Users\Admin\AppData\Local\Temp\ByNC.exe
      C:\Users\Admin\AppData\Local\Temp\ByNC.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Drops file in Program Files directory
      PID:4088
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\05c231e4.bat" "
        3⤵
          PID:5088
      • C:\Users\Admin\AppData\Local\Temp\4b75a200664d5e43fb297347fd6f93e8f8685320bd1959c5b07f3c597918c8f2Srv.exe
        C:\Users\Admin\AppData\Local\Temp\4b75a200664d5e43fb297347fd6f93e8f8685320bd1959c5b07f3c597918c8f2Srv.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5008
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4256
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4108
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4108 CREDAT:17410 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:204
    • C:\Program Files (x86)\Eugoqy.exe
      "C:\Program Files (x86)\Eugoqy.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4368
      • C:\Windows\TEMP\ByNC.exe
        C:\Windows\TEMP\ByNC.exe
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies data under HKEY_USERS
        PID:2296
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Windows\TEMP\05c231e4.bat" "
          3⤵
            PID:924
        • C:\Program Files (x86)\EugoqySrv.exe
          "C:\Program Files (x86)\EugoqySrv.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:5016
          • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
            "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3276
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4512
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4512 CREDAT:17410 /prefetch:2
                5⤵
                • Modifies data under HKEY_USERS
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4732
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe" --from-ie-to-edge=3 --ie-frame-hwnd=1004e
                  6⤵
                  • Modifies data under HKEY_USERS
                  • Suspicious use of WriteProcessMemory
                  PID:832
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --from-ie-to-edge=3 --ie-frame-hwnd=1004e
                    7⤵
                    • Drops file in System32 directory
                    • Enumerates system info in registry
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of WriteProcessMemory
                    PID:4236
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb552946f8,0x7ffb55294708,0x7ffb55294718
                      8⤵
                      • Drops file in System32 directory
                      PID:3520
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,13891084916255831604,15341809889404410398,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:2
                      8⤵
                        PID:1884
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,13891084916255831604,15341809889404410398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
                        8⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3948
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,13891084916255831604,15341809889404410398,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:8
                        8⤵
                          PID:3256
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,13891084916255831604,15341809889404410398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:1
                          8⤵
                          • Modifies data under HKEY_USERS
                          PID:4360
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,13891084916255831604,15341809889404410398,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                          8⤵
                          • Modifies data under HKEY_USERS
                          PID:1100
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,13891084916255831604,15341809889404410398,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:1
                          8⤵
                            PID:4148
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,13891084916255831604,15341809889404410398,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:1
                            8⤵
                              PID:4392
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,13891084916255831604,15341809889404410398,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:1
                              8⤵
                                PID:1300
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,13891084916255831604,15341809889404410398,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1
                                8⤵
                                  PID:4672
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,13891084916255831604,15341809889404410398,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:1
                                  8⤵
                                    PID:2580
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,13891084916255831604,15341809889404410398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:8
                                    8⤵
                                      PID:5284
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                      8⤵
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      PID:5300
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff687d65460,0x7ff687d65470,0x7ff687d65480
                                        9⤵
                                          PID:5352
                          • C:\Program Files (x86)\Eugoqy.exe
                            "C:\Program Files (x86)\Eugoqy.exe" Win7
                            2⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            PID:3340
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2472

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Defense Evasion

                          Modify Registry

                          1
                          T1112

                          Discovery

                          Query Registry

                          2
                          T1012

                          System Information Discovery

                          3
                          T1082

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Program Files (x86)\Eugoqy.exe
                            Filesize

                            124KB

                            MD5

                            c6ce21c4c9389a23d6deac23d9d43190

                            SHA1

                            36036d346993df07681926111f73891dd8f19846

                            SHA256

                            4b75a200664d5e43fb297347fd6f93e8f8685320bd1959c5b07f3c597918c8f2

                            SHA512

                            fa90bc5a6d1753ae08ee384c6e7d333da416f166edc4b72b605029a01d636773e728743c86d547413e4a9bcd8ea40ddf3d89588c3aca747d20dd9575f2d2110f

                          • C:\Program Files (x86)\Eugoqy.exe
                            Filesize

                            124KB

                            MD5

                            c6ce21c4c9389a23d6deac23d9d43190

                            SHA1

                            36036d346993df07681926111f73891dd8f19846

                            SHA256

                            4b75a200664d5e43fb297347fd6f93e8f8685320bd1959c5b07f3c597918c8f2

                            SHA512

                            fa90bc5a6d1753ae08ee384c6e7d333da416f166edc4b72b605029a01d636773e728743c86d547413e4a9bcd8ea40ddf3d89588c3aca747d20dd9575f2d2110f

                          • C:\Program Files (x86)\Eugoqy.exe
                            Filesize

                            124KB

                            MD5

                            c6ce21c4c9389a23d6deac23d9d43190

                            SHA1

                            36036d346993df07681926111f73891dd8f19846

                            SHA256

                            4b75a200664d5e43fb297347fd6f93e8f8685320bd1959c5b07f3c597918c8f2

                            SHA512

                            fa90bc5a6d1753ae08ee384c6e7d333da416f166edc4b72b605029a01d636773e728743c86d547413e4a9bcd8ea40ddf3d89588c3aca747d20dd9575f2d2110f

                          • C:\Program Files (x86)\EugoqySrv.exe
                            Filesize

                            83KB

                            MD5

                            c5c99988728c550282ae76270b649ea1

                            SHA1

                            113e8ff0910f393a41d5e63d43ec3653984c63d6

                            SHA256

                            d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

                            SHA512

                            66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

                          • C:\Program Files (x86)\EugoqySrv.exe
                            Filesize

                            83KB

                            MD5

                            c5c99988728c550282ae76270b649ea1

                            SHA1

                            113e8ff0910f393a41d5e63d43ec3653984c63d6

                            SHA256

                            d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

                            SHA512

                            66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

                          • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
                            Filesize

                            83KB

                            MD5

                            c5c99988728c550282ae76270b649ea1

                            SHA1

                            113e8ff0910f393a41d5e63d43ec3653984c63d6

                            SHA256

                            d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

                            SHA512

                            66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

                          • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
                            Filesize

                            83KB

                            MD5

                            c5c99988728c550282ae76270b649ea1

                            SHA1

                            113e8ff0910f393a41d5e63d43ec3653984c63d6

                            SHA256

                            d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

                            SHA512

                            66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

                          • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
                            Filesize

                            83KB

                            MD5

                            c5c99988728c550282ae76270b649ea1

                            SHA1

                            113e8ff0910f393a41d5e63d43ec3653984c63d6

                            SHA256

                            d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

                            SHA512

                            66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

                          • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
                            Filesize

                            83KB

                            MD5

                            c5c99988728c550282ae76270b649ea1

                            SHA1

                            113e8ff0910f393a41d5e63d43ec3653984c63d6

                            SHA256

                            d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

                            SHA512

                            66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

                          • C:\Program Files\7-Zip\Uninstall.exe
                            Filesize

                            31KB

                            MD5

                            21a38254c8ec22910e4e9a7727ed0965

                            SHA1

                            5b3352ec3cd8a68abfcfef82cdca321fdf5fc551

                            SHA256

                            cbb790274944d4fff711ddc5a7a46d34a79fc8c2f473e608f8faa972ada8231b

                            SHA512

                            d687f67d478bad7a9c6187a13436190e25a85222276fc8ce2953e59f549266571e0e8d54329fa8cbdd4bb9aa3916364cb6ecb779ddb393c9d456d3f2b4a71fa7

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
                            Filesize

                            471B

                            MD5

                            f926125f68ade028c2d35d69c2ba8f2f

                            SHA1

                            c5a34f75d9788131c87708e527849319b857287f

                            SHA256

                            17904874e9f80d18373ea20197df2841b140d6fce600720fa7f3b4ec335c68a4

                            SHA512

                            bc6a947542759fd913f84ea6bf457f190331fda1f8266233017eaa473782603e0367ae67698b2cff29b3a247bc1a2e82018412ff5158f8528efa5cddd4841c8b

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
                            Filesize

                            434B

                            MD5

                            48c1f4ade46db14fa5f3506e96c8d3f9

                            SHA1

                            fbc92796ed7bd8a067b112c0f962efc9557f992e

                            SHA256

                            a4361231d5cf4bab3d6870c4d807825d84101db6d12dcc212097130b208f8327

                            SHA512

                            bab297c56497386fb12fc00c79cb1b73f6ff25c3af4b511afd3248e2d1f0e549bf43a7f1aec5e1d4ff4dc6be2f7aa100d8decb458dac52b45ab0660876f9dbf5

                          • C:\Users\Admin\AppData\Local\Temp\05c231e4.bat
                            Filesize

                            183B

                            MD5

                            858ffceee1e326e4065268b901f698d2

                            SHA1

                            2667c3bf485930ecc975c468d8532614f5abaf9a

                            SHA256

                            303b2fdfb80a1368ff691c56d8e42c4f189d662481d8d235af535b1c38224782

                            SHA512

                            c2c32ee29fdebd2b2a07915e5282727faa7a9721ee17d18ec622b4ad4da9275a6df23a633d3c103f87f97295cd3ea407c412d3ed478f07240bae02e78ac295dc

                          • C:\Users\Admin\AppData\Local\Temp\4b75a200664d5e43fb297347fd6f93e8f8685320bd1959c5b07f3c597918c8f2Srv.exe
                            Filesize

                            83KB

                            MD5

                            c5c99988728c550282ae76270b649ea1

                            SHA1

                            113e8ff0910f393a41d5e63d43ec3653984c63d6

                            SHA256

                            d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

                            SHA512

                            66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

                          • C:\Users\Admin\AppData\Local\Temp\4b75a200664d5e43fb297347fd6f93e8f8685320bd1959c5b07f3c597918c8f2Srv.exe
                            Filesize

                            83KB

                            MD5

                            c5c99988728c550282ae76270b649ea1

                            SHA1

                            113e8ff0910f393a41d5e63d43ec3653984c63d6

                            SHA256

                            d7ec3fcd80b3961e5bab97015c91c843803bb915c13a4a35dfb5e9bdf556c6d3

                            SHA512

                            66e45f6fabff097a7997c5d4217408405f17bad11748e835403559b526d2d031490b2b74a5ffcb218fa9621a1c3a3caa197f2e5738ebea00f2cf6161d8d0af0d

                          • C:\Users\Admin\AppData\Local\Temp\ByNC.exe
                            Filesize

                            15KB

                            MD5

                            56b2c3810dba2e939a8bb9fa36d3cf96

                            SHA1

                            99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

                            SHA256

                            4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

                            SHA512

                            27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

                          • C:\Users\Admin\AppData\Local\Temp\ByNC.exe
                            Filesize

                            15KB

                            MD5

                            56b2c3810dba2e939a8bb9fa36d3cf96

                            SHA1

                            99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

                            SHA256

                            4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

                            SHA512

                            27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

                          • C:\Windows\TEMP\05c231e4.bat
                            Filesize

                            129B

                            MD5

                            7135386de4b82cafb162c1e3c3840ff3

                            SHA1

                            2b35a866de05b4a9360c4a7f944e69c0b6ba7085

                            SHA256

                            ff1050cecb6b7ca6472930556407d9277de723fc22fd42a0120cadcc10fd6af1

                            SHA512

                            e0a25c3f2771b39a543387f8de760acac9160b25bc9028c9f623f0789bcbd8885daaeb619df82ff4feba1e62aa36aa2d237715886204b7bc180fd8e2229ddd2f

                          • C:\Windows\TEMP\ByNC.exe
                            Filesize

                            15KB

                            MD5

                            56b2c3810dba2e939a8bb9fa36d3cf96

                            SHA1

                            99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

                            SHA256

                            4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

                            SHA512

                            27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

                          • C:\Windows\Temp\ByNC.exe
                            Filesize

                            15KB

                            MD5

                            56b2c3810dba2e939a8bb9fa36d3cf96

                            SHA1

                            99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

                            SHA256

                            4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

                            SHA512

                            27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

                          • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
                            Filesize

                            1KB

                            MD5

                            8c8793779f737bc2399d1408079dd882

                            SHA1

                            1841589ca658d6216673c5022210f942c9872b94

                            SHA256

                            d8e66cce178979bcc2dad6f6d8e0265e5297b43804ea9644199d4ac580764bd9

                            SHA512

                            928d3cc0f439a9cfacc52f8a0956f8218050483e8859fe910a71412bdef4487fdc931d186f4ea2a2e693f2c46da0f11af2ed3611b8d5037911a66bfb16e71afb

                          • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
                            Filesize

                            404B

                            MD5

                            b01fd412cbcfa6ba15a871da6e58044c

                            SHA1

                            e0d5dbc045a178ebec3ef21fee172001d59821e2

                            SHA256

                            2307335e493bf0e48286643fa0121dc2ff7bf7e888b217cb81076329485a1aca

                            SHA512

                            d33f476f3027caaa5acdb958dfc03e91c4f1e3f6b67beba6a3d9a9ba774b915e34df3023795f71b62eb450559a86a9bf23c03657b23530aa771937845cd61e9f

                          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                            Filesize

                            152B

                            MD5

                            35e56bbe83f8b9b2515e934a84b55de1

                            SHA1

                            c6d9394c5c0ccb2bb089a868267ed45cda104af1

                            SHA256

                            57a48fb5c3d3f2ef3740ee5786a2d6f161964e21029e3e2412e5b95519169937

                            SHA512

                            e0d53237ae3203cd43d6ea5b3e8d4d981fa68d77bf34249743fa49c4968cb25f40e48fe7ba831b3597087445ebe6f9622f5efb1bc6990188decf3b5243fa16ac

                          • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad\throttle_store.dat
                            Filesize

                            20B

                            MD5

                            9e4e94633b73f4a7680240a0ffd6cd2c

                            SHA1

                            e68e02453ce22736169a56fdb59043d33668368f

                            SHA256

                            41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                            SHA512

                            193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                          • \??\pipe\LOCAL\crashpad_4236_MOYVYHGMBAOSSEQX
                            MD5

                            d41d8cd98f00b204e9800998ecf8427e

                            SHA1

                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                            SHA256

                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                            SHA512

                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                          • memory/832-165-0x0000000000000000-mapping.dmp
                          • memory/924-178-0x0000000000000000-mapping.dmp
                          • memory/1100-185-0x0000000000000000-mapping.dmp
                          • memory/1300-192-0x0000000000000000-mapping.dmp
                          • memory/1884-171-0x0000000000000000-mapping.dmp
                          • memory/2296-179-0x0000000000450000-0x0000000000459000-memory.dmp
                            Filesize

                            36KB

                          • memory/2296-145-0x0000000000000000-mapping.dmp
                          • memory/2296-156-0x0000000000450000-0x0000000000459000-memory.dmp
                            Filesize

                            36KB

                          • memory/2580-196-0x0000000000000000-mapping.dmp
                          • memory/3256-174-0x0000000000000000-mapping.dmp
                          • memory/3276-153-0x0000000000000000-mapping.dmp
                          • memory/3276-164-0x0000000000440000-0x000000000044F000-memory.dmp
                            Filesize

                            60KB

                          • memory/3276-186-0x0000000000440000-0x000000000044F000-memory.dmp
                            Filesize

                            60KB

                          • memory/3340-163-0x0000000000400000-0x000000000042C000-memory.dmp
                            Filesize

                            176KB

                          • memory/3340-201-0x0000000000400000-0x000000000042C000-memory.dmp
                            Filesize

                            176KB

                          • memory/3340-155-0x0000000000000000-mapping.dmp
                          • memory/3520-167-0x0000000000000000-mapping.dmp
                          • memory/3948-172-0x0000000000000000-mapping.dmp
                          • memory/4088-176-0x0000000000C10000-0x0000000000C19000-memory.dmp
                            Filesize

                            36KB

                          • memory/4088-136-0x0000000000C10000-0x0000000000C19000-memory.dmp
                            Filesize

                            36KB

                          • memory/4088-130-0x0000000000000000-mapping.dmp
                          • memory/4148-188-0x0000000000000000-mapping.dmp
                          • memory/4236-166-0x0000000000000000-mapping.dmp
                          • memory/4256-149-0x0000000000400000-0x0000000000435000-memory.dmp
                            Filesize

                            212KB

                          • memory/4256-139-0x0000000000000000-mapping.dmp
                          • memory/4360-183-0x0000000000000000-mapping.dmp
                          • memory/4368-159-0x0000000000400000-0x000000000042C000-memory.dmp
                            Filesize

                            176KB

                          • memory/4392-190-0x0000000000000000-mapping.dmp
                          • memory/4392-154-0x0000000000400000-0x000000000042C000-memory.dmp
                            Filesize

                            176KB

                          • memory/4392-135-0x0000000000400000-0x000000000042C000-memory.dmp
                            Filesize

                            176KB

                          • memory/4672-194-0x0000000000000000-mapping.dmp
                          • memory/5008-144-0x0000000000400000-0x0000000000435000-memory.dmp
                            Filesize

                            212KB

                          • memory/5008-137-0x0000000000400000-0x0000000000435000-memory.dmp
                            Filesize

                            212KB

                          • memory/5008-133-0x0000000000000000-mapping.dmp
                          • memory/5016-157-0x0000000000400000-0x0000000000435000-memory.dmp
                            Filesize

                            212KB

                          • memory/5016-150-0x0000000000000000-mapping.dmp
                          • memory/5016-158-0x0000000000480000-0x000000000048F000-memory.dmp
                            Filesize

                            60KB

                          • memory/5088-175-0x0000000000000000-mapping.dmp
                          • memory/5300-199-0x0000000000000000-mapping.dmp
                          • memory/5352-200-0x0000000000000000-mapping.dmp