Analysis

  • max time kernel
    111s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • submitted
    19-09-2022 07:06

General

  • Target

    file.exe

  • Size

    879KB

  • MD5

    bd2b464bbcc0e12f585c3d300d4b7fc5

  • SHA1

    3fa46371470b2c92898e85e9b34f2462360f79be

  • SHA256

    144c0fcf6f803810d13f85bb4541c9916eb80e0d0d59bd24e03b5dd9159710df

  • SHA512

    c8fe242280f34b25fd96d2035f33c0fc06a33d887ce64717f4a4e5c8dd38b5e4bea38125563efb18f95696514d96fb0e4aae5433e49d6439c10f3e248cb1bf3a

  • SSDEEP

    24576:IKJ47SlzspERub0FCJVlvh7Ng6sCpgGMouSzNKkC1lMIftWkHvWA7:T45IftWkHvW

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

gg.gemkan.online/gate.php

Signatures

  • Mars Stealer

    An infostealer written in C++ based on other infostealers.

  • Detectes Phoenix Miner Payload 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:408
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
          C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3388
          • C:\Users\Admin\AppData\Roaming\explorer\svchost.exe
            -pool us-etc.2miners.com:1010 -wal 0xB7b2553E9b6DC10186ddD09AB9fbE71C68da0851.ferms -epsw x -mode 1 -log 0 -mport 0 -etha 0 -ftime 55 -retrydelay 1 -coin etc
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:1460
      • C:\Users\Admin\AppData\Local\Temp\J57HGGDG7HKHBFH.exe
        "C:\Users\Admin\AppData\Local\Temp\J57HGGDG7HKHBFH.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:3156
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\J57HGGDG7HKHBFH.exe" & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2864
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 5
            5⤵
            • Delays execution with timeout.exe
            PID:2692
      • C:\Users\Admin\AppData\Local\Temp\EGL3EHGEKEK9911.exe
        "C:\Users\Admin\AppData\Local\Temp\EGL3EHGEKEK9911.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\EGL3EHGEKEK9911.exe" & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3160
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 5
            5⤵
            • Delays execution with timeout.exe
            PID:4932
      • C:\Users\Admin\AppData\Local\Temp\BH2M03BHA7C9L7F.exe
        "C:\Users\Admin\AppData\Local\Temp\BH2M03BHA7C9L7F.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1160
        • C:\Users\Admin\AppData\Local\Temp\BH2M03BHA7C9L7F.exe
          "C:\Users\Admin\AppData\Local\Temp\BH2M03BHA7C9L7F.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C start C:\Windows\Temp\xsv.exe
            5⤵
              PID:4948
              • C:\Windows\Temp\xsv.exe
                C:\Windows\Temp\xsv.exe
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                PID:4860
        • C:\Users\Admin\AppData\Local\Temp\9LCCJJC49C417A7.exe
          "C:\Users\Admin\AppData\Local\Temp\9LCCJJC49C417A7.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3404
          • C:\Windows\SysWOW64\control.exe
            "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2984
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",
              5⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:4376
              • C:\Windows\system32\RunDll32.exe
                C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4008
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",
                  7⤵
                  • Loads dropped DLL
                  PID:2324
        • C:\Users\Admin\AppData\Local\Temp\716294DL80J9GD7.exe
          https://iplogger.org/1x5az7
          3⤵
          • Executes dropped EXE
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:5116

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    3
    T1082

    Collection

    Data from Local System

    2
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\freebl3.dll
      Filesize

      326KB

      MD5

      ef2834ac4ee7d6724f255beaf527e635

      SHA1

      5be8c1e73a21b49f353c2ecfa4108e43a883cb7b

      SHA256

      a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba

      SHA512

      c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2

    • C:\ProgramData\freebl3.dll
      Filesize

      326KB

      MD5

      ef2834ac4ee7d6724f255beaf527e635

      SHA1

      5be8c1e73a21b49f353c2ecfa4108e43a883cb7b

      SHA256

      a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba

      SHA512

      c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2

    • C:\ProgramData\mozglue.dll
      Filesize

      133KB

      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • C:\ProgramData\mozglue.dll
      Filesize

      133KB

      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • C:\ProgramData\mozglue.dll
      Filesize

      133KB

      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • C:\ProgramData\mozglue.dll
      Filesize

      133KB

      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • C:\ProgramData\msvcp140.dll
      Filesize

      429KB

      MD5

      109f0f02fd37c84bfc7508d4227d7ed5

      SHA1

      ef7420141bb15ac334d3964082361a460bfdb975

      SHA256

      334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

      SHA512

      46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

    • C:\ProgramData\msvcp140.dll
      Filesize

      429KB

      MD5

      109f0f02fd37c84bfc7508d4227d7ed5

      SHA1

      ef7420141bb15ac334d3964082361a460bfdb975

      SHA256

      334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

      SHA512

      46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

    • C:\ProgramData\nss3.dll
      Filesize

      1.2MB

      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • C:\ProgramData\nss3.dll
      Filesize

      1.2MB

      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • C:\ProgramData\nss3.dll
      Filesize

      1.2MB

      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • C:\ProgramData\nss3.dll
      Filesize

      1.2MB

      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • C:\ProgramData\softokn3.dll
      Filesize

      141KB

      MD5

      a2ee53de9167bf0d6c019303b7ca84e5

      SHA1

      2a3c737fa1157e8483815e98b666408a18c0db42

      SHA256

      43536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083

      SHA512

      45b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8

    • C:\ProgramData\softokn3.dll
      Filesize

      141KB

      MD5

      a2ee53de9167bf0d6c019303b7ca84e5

      SHA1

      2a3c737fa1157e8483815e98b666408a18c0db42

      SHA256

      43536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083

      SHA512

      45b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8

    • C:\ProgramData\vcruntime140.dll
      Filesize

      81KB

      MD5

      7587bf9cb4147022cd5681b015183046

      SHA1

      f2106306a8f6f0da5afb7fc765cfa0757ad5a628

      SHA256

      c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

      SHA512

      0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

    • C:\ProgramData\vcruntime140.dll
      Filesize

      81KB

      MD5

      7587bf9cb4147022cd5681b015183046

      SHA1

      f2106306a8f6f0da5afb7fc765cfa0757ad5a628

      SHA256

      c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

      SHA512

      0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BH2M03BHA7C9L7F.exe.log
      Filesize

      42B

      MD5

      84cfdb4b995b1dbf543b26b86c863adc

      SHA1

      d2f47764908bf30036cf8248b9ff5541e2711fa2

      SHA256

      d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

      SHA512

      485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

    • C:\Users\Admin\AppData\Local\Temp\716294DL80J9GD7.exe
      Filesize

      8KB

      MD5

      8719ce641e7c777ac1b0eaec7b5fa7c7

      SHA1

      c04de52cb511480cc7d00d67f1d9e17b02d6406b

      SHA256

      6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

      SHA512

      7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

    • C:\Users\Admin\AppData\Local\Temp\716294DL80J9GD7.exe
      Filesize

      8KB

      MD5

      8719ce641e7c777ac1b0eaec7b5fa7c7

      SHA1

      c04de52cb511480cc7d00d67f1d9e17b02d6406b

      SHA256

      6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

      SHA512

      7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

    • C:\Users\Admin\AppData\Local\Temp\9LCCJJC49C417A7.exe
      Filesize

      1.9MB

      MD5

      182baf929b35d5d63747617d2007c77a

      SHA1

      0dfe91ab115ed862b48b1e4006a44e86c33eb772

      SHA256

      582150ba4379122253eeb2a1a7ace968394ee7e566f0d0d794f6ba7d937037d5

      SHA512

      55bab5bbec04389f94f297843f7fcb4d71173c8f1f6e5007b6a2eaf5d937f50f9b2d9f61f983c86b20d342a4a4cb6691e23c3a0322575c826d23b55ee61a19f7

    • C:\Users\Admin\AppData\Local\Temp\9LCCJJC49C417A7.exe
      Filesize

      1.9MB

      MD5

      182baf929b35d5d63747617d2007c77a

      SHA1

      0dfe91ab115ed862b48b1e4006a44e86c33eb772

      SHA256

      582150ba4379122253eeb2a1a7ace968394ee7e566f0d0d794f6ba7d937037d5

      SHA512

      55bab5bbec04389f94f297843f7fcb4d71173c8f1f6e5007b6a2eaf5d937f50f9b2d9f61f983c86b20d342a4a4cb6691e23c3a0322575c826d23b55ee61a19f7

    • C:\Users\Admin\AppData\Local\Temp\BH2M03BHA7C9L7F.exe
      Filesize

      2.0MB

      MD5

      cbf6eddcc128179bbec51e10a47b5f53

      SHA1

      6297a6c253b45f0da2081bb32353290a09032571

      SHA256

      e351e1c2fb176108dd78b2d2cb9bf677a70831abf232c11dd4b861228e9881b7

      SHA512

      1f6de55bc589e92162263587d95adfd627d8d8a030e466896b64ccfb570501e2155af5093506b029350f78d664b9c929479ae85d36a8c2962f61376d4d17c494

    • C:\Users\Admin\AppData\Local\Temp\BH2M03BHA7C9L7F.exe
      Filesize

      2.0MB

      MD5

      cbf6eddcc128179bbec51e10a47b5f53

      SHA1

      6297a6c253b45f0da2081bb32353290a09032571

      SHA256

      e351e1c2fb176108dd78b2d2cb9bf677a70831abf232c11dd4b861228e9881b7

      SHA512

      1f6de55bc589e92162263587d95adfd627d8d8a030e466896b64ccfb570501e2155af5093506b029350f78d664b9c929479ae85d36a8c2962f61376d4d17c494

    • C:\Users\Admin\AppData\Local\Temp\BH2M03BHA7C9L7F.exe
      Filesize

      2.0MB

      MD5

      cbf6eddcc128179bbec51e10a47b5f53

      SHA1

      6297a6c253b45f0da2081bb32353290a09032571

      SHA256

      e351e1c2fb176108dd78b2d2cb9bf677a70831abf232c11dd4b861228e9881b7

      SHA512

      1f6de55bc589e92162263587d95adfd627d8d8a030e466896b64ccfb570501e2155af5093506b029350f78d664b9c929479ae85d36a8c2962f61376d4d17c494

    • C:\Users\Admin\AppData\Local\Temp\EGL3EHGEKEK9911.exe
      Filesize

      159KB

      MD5

      95749d6bae439efc267962c9bc3cb2d6

      SHA1

      236763d6a739c9a68350c5e9775ea8723de2a916

      SHA256

      f464ed5d98af0625c6c4678b916aa465f47a938e1cf4ad3bf5a95d129f8fb5f9

      SHA512

      3ee8697c54d69b837f0f81979edde35049904d677a849cfcd943d45d2615581cc18e78318e8d5d35e75273d732d6e06545edca7a4000222c766b4d8789a95fc6

    • C:\Users\Admin\AppData\Local\Temp\EGL3EHGEKEK9911.exe
      Filesize

      159KB

      MD5

      95749d6bae439efc267962c9bc3cb2d6

      SHA1

      236763d6a739c9a68350c5e9775ea8723de2a916

      SHA256

      f464ed5d98af0625c6c4678b916aa465f47a938e1cf4ad3bf5a95d129f8fb5f9

      SHA512

      3ee8697c54d69b837f0f81979edde35049904d677a849cfcd943d45d2615581cc18e78318e8d5d35e75273d732d6e06545edca7a4000222c766b4d8789a95fc6

    • C:\Users\Admin\AppData\Local\Temp\J57HGGDG7HKHBFH.exe
      Filesize

      159KB

      MD5

      95749d6bae439efc267962c9bc3cb2d6

      SHA1

      236763d6a739c9a68350c5e9775ea8723de2a916

      SHA256

      f464ed5d98af0625c6c4678b916aa465f47a938e1cf4ad3bf5a95d129f8fb5f9

      SHA512

      3ee8697c54d69b837f0f81979edde35049904d677a849cfcd943d45d2615581cc18e78318e8d5d35e75273d732d6e06545edca7a4000222c766b4d8789a95fc6

    • C:\Users\Admin\AppData\Local\Temp\J57HGGDG7HKHBFH.exe
      Filesize

      159KB

      MD5

      95749d6bae439efc267962c9bc3cb2d6

      SHA1

      236763d6a739c9a68350c5e9775ea8723de2a916

      SHA256

      f464ed5d98af0625c6c4678b916aa465f47a938e1cf4ad3bf5a95d129f8fb5f9

      SHA512

      3ee8697c54d69b837f0f81979edde35049904d677a849cfcd943d45d2615581cc18e78318e8d5d35e75273d732d6e06545edca7a4000222c766b4d8789a95fc6

    • C:\Users\Admin\AppData\Local\Temp\vNN6.cpl
      Filesize

      2.4MB

      MD5

      56c188ca285aee639d71fde9fee3a509

      SHA1

      a40fd871f035e2b635af266b17023d58f3eb803e

      SHA256

      5d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f

      SHA512

      72b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad

    • C:\Users\Admin\AppData\Local\Temp\vnN6.cpl
      Filesize

      2.4MB

      MD5

      56c188ca285aee639d71fde9fee3a509

      SHA1

      a40fd871f035e2b635af266b17023d58f3eb803e

      SHA256

      5d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f

      SHA512

      72b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad

    • C:\Users\Admin\AppData\Local\Temp\vnN6.cpl
      Filesize

      2.4MB

      MD5

      56c188ca285aee639d71fde9fee3a509

      SHA1

      a40fd871f035e2b635af266b17023d58f3eb803e

      SHA256

      5d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f

      SHA512

      72b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad

    • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
      Filesize

      17KB

      MD5

      d9e2fc3a247db17e03d220092e4756ff

      SHA1

      c409057b469fcefe230ee170a5b2bc33d3bb28ec

      SHA256

      ee36cfc26f2b4205cf7de07cd257af6d1d992919e58047ec7a4fdd6cf70140dd

      SHA512

      b973884a248e162dd7f83d981d6c7774eb21bce3983012474799b9b96f18846d60a2995cc82d4f7c362d4495626d36f6f39ff76d22c806b755c7cb2c7bfcb4af

    • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
      Filesize

      17KB

      MD5

      d9e2fc3a247db17e03d220092e4756ff

      SHA1

      c409057b469fcefe230ee170a5b2bc33d3bb28ec

      SHA256

      ee36cfc26f2b4205cf7de07cd257af6d1d992919e58047ec7a4fdd6cf70140dd

      SHA512

      b973884a248e162dd7f83d981d6c7774eb21bce3983012474799b9b96f18846d60a2995cc82d4f7c362d4495626d36f6f39ff76d22c806b755c7cb2c7bfcb4af

    • C:\Users\Admin\AppData\Roaming\explorer\svchost.exe
      Filesize

      9.7MB

      MD5

      afe1d7271ec50bf3332edf6ba5f8ba01

      SHA1

      b07633f2274ffc7d8f02fdca4da94aec88534b0c

      SHA256

      d645e1c6408572a8e4e7e20e099a8301a6b811131a00bc8b28ca97a4ec951222

      SHA512

      9e1248618a54956f0b9d455e33eb63fbeeb5c3b16ee168d5f5c002eac9863568f844ed0b47ec1eb9bb452e6e63e7784eebb76693e90e5789c94f0193a9e0737a

    • C:\Users\Admin\AppData\Roaming\explorer\svchost.exe
      Filesize

      9.7MB

      MD5

      afe1d7271ec50bf3332edf6ba5f8ba01

      SHA1

      b07633f2274ffc7d8f02fdca4da94aec88534b0c

      SHA256

      d645e1c6408572a8e4e7e20e099a8301a6b811131a00bc8b28ca97a4ec951222

      SHA512

      9e1248618a54956f0b9d455e33eb63fbeeb5c3b16ee168d5f5c002eac9863568f844ed0b47ec1eb9bb452e6e63e7784eebb76693e90e5789c94f0193a9e0737a

    • C:\Windows\Temp\xsv.exe
      Filesize

      91KB

      MD5

      f590338220ffbb5c8a39be984d7bde91

      SHA1

      1c64d067e2c4e935763bc039b1112bb81b35caa8

      SHA256

      c25e688a05e1ca37ff52fea542e2ab003759cf1618c9f8d7c98ec289aa850d7c

      SHA512

      98c0e6b443cd58992fa1179c5580479c97c10b2314c1020c4b2717453fb96114687d4080d556de985a93dc3247e3f7b600d05496f59cb397f6d606b56f8b70a4

    • C:\Windows\Temp\xsv.exe
      Filesize

      91KB

      MD5

      f590338220ffbb5c8a39be984d7bde91

      SHA1

      1c64d067e2c4e935763bc039b1112bb81b35caa8

      SHA256

      c25e688a05e1ca37ff52fea542e2ab003759cf1618c9f8d7c98ec289aa850d7c

      SHA512

      98c0e6b443cd58992fa1179c5580479c97c10b2314c1020c4b2717453fb96114687d4080d556de985a93dc3247e3f7b600d05496f59cb397f6d606b56f8b70a4

    • memory/408-141-0x0000000000EC0000-0x0000000000EF6000-memory.dmp
      Filesize

      216KB

    • memory/408-138-0x0000000000EC0000-0x0000000000EF6000-memory.dmp
      Filesize

      216KB

    • memory/408-134-0x0000000000EC0000-0x0000000000EF6000-memory.dmp
      Filesize

      216KB

    • memory/408-133-0x0000000000000000-mapping.dmp
    • memory/1160-160-0x0000000000A00000-0x0000000000C07000-memory.dmp
      Filesize

      2.0MB

    • memory/1160-157-0x0000000000000000-mapping.dmp
    • memory/1176-547-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/1176-153-0x0000000000000000-mapping.dmp
    • memory/1176-156-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/1216-203-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-179-0x0000000000000000-mapping.dmp
    • memory/1216-195-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-197-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-199-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-201-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-193-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-205-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-207-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-209-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-211-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-215-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-213-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-217-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-219-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-221-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-223-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-225-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-227-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-229-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-231-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-233-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-180-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-185-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-191-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-189-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1216-187-0x0000000000C30000-0x0000000000C84000-memory.dmp
      Filesize

      336KB

    • memory/1460-146-0x0000000000000000-mapping.dmp
    • memory/1460-161-0x00007FF7133A0000-0x00007FF7148F7000-memory.dmp
      Filesize

      21.3MB

    • memory/1460-173-0x00007FF7133A0000-0x00007FF7148F7000-memory.dmp
      Filesize

      21.3MB

    • memory/1800-142-0x0000000000000000-mapping.dmp
    • memory/2324-922-0x0000000003780000-0x00000000038BC000-memory.dmp
      Filesize

      1.2MB

    • memory/2324-915-0x0000000000000000-mapping.dmp
    • memory/2324-921-0x00000000034A0000-0x000000000363B000-memory.dmp
      Filesize

      1.6MB

    • memory/2324-927-0x0000000003780000-0x00000000038BC000-memory.dmp
      Filesize

      1.2MB

    • memory/2692-572-0x0000000000000000-mapping.dmp
    • memory/2864-531-0x0000000000000000-mapping.dmp
    • memory/2984-174-0x0000000000000000-mapping.dmp
    • memory/3156-151-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/3156-535-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/3156-148-0x0000000000000000-mapping.dmp
    • memory/3160-545-0x0000000000000000-mapping.dmp
    • memory/3388-143-0x0000000000000000-mapping.dmp
    • memory/3404-162-0x0000000000000000-mapping.dmp
    • memory/4008-914-0x0000000000000000-mapping.dmp
    • memory/4260-132-0x0000000000FF0000-0x00000000010CF000-memory.dmp
      Filesize

      892KB

    • memory/4376-578-0x00000000035F0000-0x000000000378B000-memory.dmp
      Filesize

      1.6MB

    • memory/4376-329-0x00000000035F0000-0x000000000378B000-memory.dmp
      Filesize

      1.6MB

    • memory/4376-928-0x00000000038D0000-0x0000000003A0C000-memory.dmp
      Filesize

      1.2MB

    • memory/4376-356-0x00000000038D0000-0x0000000003A0C000-memory.dmp
      Filesize

      1.2MB

    • memory/4376-175-0x0000000000000000-mapping.dmp
    • memory/4860-918-0x0000000000000000-mapping.dmp
    • memory/4932-588-0x0000000000000000-mapping.dmp
    • memory/4948-917-0x0000000000000000-mapping.dmp
    • memory/5116-558-0x00007FFB84A40000-0x00007FFB85501000-memory.dmp
      Filesize

      10.8MB

    • memory/5116-166-0x0000000000000000-mapping.dmp
    • memory/5116-171-0x000001969AAD0000-0x000001969AAD6000-memory.dmp
      Filesize

      24KB

    • memory/5116-172-0x00007FFB84A40000-0x00007FFB85501000-memory.dmp
      Filesize

      10.8MB

    • memory/5116-182-0x0000019EB9550000-0x0000019EB9CF6000-memory.dmp
      Filesize

      7.6MB