Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2022 07:21

General

  • Target

    4e.exe

  • Size

    37KB

  • MD5

    ff981f29daba877bc365211aabfe8801

  • SHA1

    f9d94bb62c230210afdde498ec0b0c119edb3466

  • SHA256

    4e9c392b5532fd3823e854c4db17212b392d41c0f3310021022d9cbf1bca8658

  • SHA512

    14740e902bec6ebe8fafd62b8042d087888a35f4f7906c13723fe8c85f48fb5cc65aa37222404d0b641ba60c37fa44aeea03bfd12fd37dc1d832fd13e2c48d43

  • SSDEEP

    768:WtGIijUZYyyS3LaihVw8X/vrJEKmK9FhbYaMx4LqLriNdDAVGYRa09BV31C:gZi947aivwmrJEKmK9VMxWOrMd4X7p

Malware Config

Extracted

Family

gozi_ifsb

Botnet

1900

C2

tel.msn.com

194.76.225.60

185.212.47.133

Attributes
  • base_path

    /doorway/

  • build

    250235

  • exe_type

    loader

  • extension

    .drr

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi_ifsb

Botnet

1900

C2

apnfy.msn.com

194.76.225.61

185.212.47.186

45.11.180.215

45.11.180.219

Attributes
  • base_path

    /doorway/

  • build

    250240

  • exe_type

    worker

  • extension

    .drr

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Discovers systems in the same network 1 TTPs 3 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3456
  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
    • Modifies registry class
    PID:2320
  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:4620
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:3764
      • C:\Users\Admin\AppData\Local\Temp\4e.exe
        "C:\Users\Admin\AppData\Local\Temp\4e.exe"
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3012
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Windows\System32\mshta.exe
          "C:\Windows\System32\mshta.exe" "about:<hta:application><script>Cqde='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Cqde).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\C8075711-8708-3A2C-517C-AB0E15700F22\\\DriverDocument'));if(!window.flag)close()</script>"
          2⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:2456
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name vfurwx -value gp; new-alias -name vlrcmoj -value iex; vlrcmoj ([System.Text.Encoding]::ASCII.GetString((vfurwx "HKCU:Software\AppDataLow\Software\Microsoft\C8075711-8708-3A2C-517C-AB0E15700F22").ControlJunk))
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2256
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\e4h3wv4j\e4h3wv4j.cmdline"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1436
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7B6A.tmp" "c:\Users\Admin\AppData\Local\Temp\e4h3wv4j\CSC4317AF4E638B444AA2816876D87514.TMP"
                5⤵
                  PID:4664
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qqftx3ny\qqftx3ny.cmdline"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1480
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7C83.tmp" "c:\Users\Admin\AppData\Local\Temp\qqftx3ny\CSC8CFC0D6B1DC148C989FA43BA82461A9.TMP"
                  5⤵
                    PID:1104
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\4e.exe"
              2⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:3368
              • C:\Windows\system32\PING.EXE
                ping localhost -n 5
                3⤵
                • Runs ping.exe
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                PID:4900
            • C:\Windows\syswow64\cmd.exe
              "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
              2⤵
                PID:4224
              • C:\Windows\system32\cmd.exe
                cmd /C "wmic computersystem get domain |more > C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4828
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic computersystem get domain
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4080
                • C:\Windows\system32\more.com
                  more
                  3⤵
                    PID:4288
                • C:\Windows\system32\cmd.exe
                  cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                  2⤵
                    PID:2412
                  • C:\Windows\system32\cmd.exe
                    cmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1380
                    • C:\Windows\system32\systeminfo.exe
                      systeminfo.exe
                      3⤵
                      • Gathers system information
                      PID:340
                  • C:\Windows\system32\cmd.exe
                    cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                    2⤵
                      PID:4348
                    • C:\Windows\system32\cmd.exe
                      cmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2408
                      • C:\Windows\system32\net.exe
                        net view
                        3⤵
                        • Discovers systems in the same network
                        PID:8
                    • C:\Windows\system32\cmd.exe
                      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                      2⤵
                        PID:2960
                      • C:\Windows\system32\cmd.exe
                        cmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                        2⤵
                          PID:3436
                          • C:\Windows\system32\nslookup.exe
                            nslookup 127.0.0.1
                            3⤵
                              PID:1148
                          • C:\Windows\system32\cmd.exe
                            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                            2⤵
                              PID:3704
                            • C:\Windows\system32\cmd.exe
                              cmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                              2⤵
                                PID:1328
                                • C:\Windows\system32\tasklist.exe
                                  tasklist.exe /SVC
                                  3⤵
                                  • Enumerates processes with tasklist
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3140
                              • C:\Windows\system32\cmd.exe
                                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                2⤵
                                  PID:808
                                • C:\Windows\system32\cmd.exe
                                  cmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                  2⤵
                                    PID:1092
                                    • C:\Windows\system32\driverquery.exe
                                      driverquery.exe
                                      3⤵
                                        PID:4060
                                    • C:\Windows\system32\cmd.exe
                                      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                      2⤵
                                        PID:624
                                      • C:\Windows\system32\cmd.exe
                                        cmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                        2⤵
                                          PID:3688
                                          • C:\Windows\system32\reg.exe
                                            reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s
                                            3⤵
                                              PID:424
                                          • C:\Windows\system32\cmd.exe
                                            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                            2⤵
                                              PID:3208
                                            • C:\Windows\system32\cmd.exe
                                              cmd /C "net config workstation >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                              2⤵
                                                PID:3084
                                                • C:\Windows\system32\net.exe
                                                  net config workstation
                                                  3⤵
                                                    PID:400
                                                    • C:\Windows\system32\net1.exe
                                                      C:\Windows\system32\net1 config workstation
                                                      4⤵
                                                        PID:2332
                                                  • C:\Windows\system32\cmd.exe
                                                    cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                                    2⤵
                                                      PID:2064
                                                    • C:\Windows\system32\cmd.exe
                                                      cmd /C "nltest /domain_trusts >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                                      2⤵
                                                        PID:224
                                                        • C:\Windows\system32\nltest.exe
                                                          nltest /domain_trusts
                                                          3⤵
                                                            PID:3908
                                                        • C:\Windows\system32\cmd.exe
                                                          cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                                          2⤵
                                                            PID:4056
                                                          • C:\Windows\system32\cmd.exe
                                                            cmd /C "nltest /domain_trusts /all_trusts >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                                            2⤵
                                                              PID:4616
                                                              • C:\Windows\system32\nltest.exe
                                                                nltest /domain_trusts /all_trusts
                                                                3⤵
                                                                  PID:4188
                                                              • C:\Windows\system32\cmd.exe
                                                                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                                                2⤵
                                                                  PID:4772
                                                                • C:\Windows\system32\cmd.exe
                                                                  cmd /C "net view /all /domain >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                                                  2⤵
                                                                    PID:5032
                                                                    • C:\Windows\system32\net.exe
                                                                      net view /all /domain
                                                                      3⤵
                                                                      • Discovers systems in the same network
                                                                      PID:2404
                                                                  • C:\Windows\system32\cmd.exe
                                                                    cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                                                    2⤵
                                                                      PID:1924
                                                                    • C:\Windows\system32\cmd.exe
                                                                      cmd /C "net view /all >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                                                      2⤵
                                                                        PID:5004
                                                                        • C:\Windows\system32\net.exe
                                                                          net view /all
                                                                          3⤵
                                                                          • Discovers systems in the same network
                                                                          PID:2200
                                                                      • C:\Windows\system32\cmd.exe
                                                                        cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                                                        2⤵
                                                                          PID:4736
                                                                        • C:\Windows\system32\cmd.exe
                                                                          cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\3F30.bin1 > C:\Users\Admin\AppData\Local\Temp\3F30.bin & del C:\Users\Admin\AppData\Local\Temp\3F30.bin1"
                                                                          2⤵
                                                                            PID:2008

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v6

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin

                                                                          Filesize

                                                                          65KB

                                                                          MD5

                                                                          8eb75d8b05ec34f3f1806cc70677385b

                                                                          SHA1

                                                                          7c2557cfc7a333368c35b8fa08a1b3c862fa3dfa

                                                                          SHA256

                                                                          f002c7f9eae0c829a0db6c5cc9913102c132210a22e6c21e52800c7f2a53afdb

                                                                          SHA512

                                                                          5b4ba71ceb5af0df709b630d5c381ec7d377577b6c1a5d119ca0e7a320d2ea7957ed9f6aca41c6f5442387b2af3c5e95032a6a99b87a879cbaf9447a3d73f1af

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          44B

                                                                          MD5

                                                                          f7aea2435aa888b709ca20f816c33bfd

                                                                          SHA1

                                                                          38717c9a73b5f8bd399839cbe0aa57518427e758

                                                                          SHA256

                                                                          f0c30a157e0a0ea84b114c2b66a66d444a3824c2bfe7829d929b40e6548fa5d5

                                                                          SHA512

                                                                          1ea828fc1932c97f5ba5f6ebf05f2816d4d89f003b094f2d0868d54f52b53774437037e2c8837e97b820d5f2e5d5707825b048a9ab2af261af00810f01bd8232

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          MD5

                                                                          d41d8cd98f00b204e9800998ecf8427e

                                                                          SHA1

                                                                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                          SHA256

                                                                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                          SHA512

                                                                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          464ed4ebf6a6f2e364b066fc8acbff39

                                                                          SHA1

                                                                          45f92e6187fd77344d6cf505534441e09f67ff47

                                                                          SHA256

                                                                          f1e5e79d4f817cbddec3fbbf2a650c75b6473215e66bae0e86979a72d91f0d1b

                                                                          SHA512

                                                                          9efdbd3a03a73d0f83a012bd047ef7d6c381a93f0a350a74b79ba0affd5e3a5c4f5fb256a27cb4ec0e6787e9bd004050e7078cd80d96d39eccae01b83bf17456

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          464ed4ebf6a6f2e364b066fc8acbff39

                                                                          SHA1

                                                                          45f92e6187fd77344d6cf505534441e09f67ff47

                                                                          SHA256

                                                                          f1e5e79d4f817cbddec3fbbf2a650c75b6473215e66bae0e86979a72d91f0d1b

                                                                          SHA512

                                                                          9efdbd3a03a73d0f83a012bd047ef7d6c381a93f0a350a74b79ba0affd5e3a5c4f5fb256a27cb4ec0e6787e9bd004050e7078cd80d96d39eccae01b83bf17456

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          dfae92fe3ef9eac61b817eb93a97aab8

                                                                          SHA1

                                                                          1f05700b27ef45d0f8c4cd88ac50d0213a90251b

                                                                          SHA256

                                                                          778a5862181d0e25a543e5cd4bc80c2d779de2e538424bb64f53bcf2f2d3c591

                                                                          SHA512

                                                                          8a69f6a5ba9ab90a9cee250aa6a0b9e32e22c9b90b11e4b7ebd77e3e97710709f1c8192fbc21a3480941dc3d98cffdb8ab4fb0624f389ce2a23d94fc2f04fbad

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          3bbda85fe8f57f0f508147f078f36e8a

                                                                          SHA1

                                                                          30f36b48e0878a514a9b6aca0475f75c95a05e69

                                                                          SHA256

                                                                          639e9170b22225901d713c7753c02abad18883c36ebecb5b411305845516d622

                                                                          SHA512

                                                                          990fe592cf77ef35fb38d7f3474af936724c4aa316952507322fcff3269920067abb477df855fe7dcd037f706ecb0a2b620f19c68bce324dcdd6c2139678a3dd

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          3bbda85fe8f57f0f508147f078f36e8a

                                                                          SHA1

                                                                          30f36b48e0878a514a9b6aca0475f75c95a05e69

                                                                          SHA256

                                                                          639e9170b22225901d713c7753c02abad18883c36ebecb5b411305845516d622

                                                                          SHA512

                                                                          990fe592cf77ef35fb38d7f3474af936724c4aa316952507322fcff3269920067abb477df855fe7dcd037f706ecb0a2b620f19c68bce324dcdd6c2139678a3dd

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          9KB

                                                                          MD5

                                                                          0fffd884e09e6d8f698526fc64803ae3

                                                                          SHA1

                                                                          e95510857aa81274eb57887db5eba67fb6a9ace2

                                                                          SHA256

                                                                          f8700b9183d5f04e854f6781a9a5d336ee814d338fc7585e2bb10c813f69731c

                                                                          SHA512

                                                                          aaccddb721a33ce361c4584f5ff8ce2e87d55c8877108ca5dea20fb7a188026da3b4beb9d33e4d1c344a47ba1ead88e3688cbdd4c281390ec0504f8f3d867a33

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          9KB

                                                                          MD5

                                                                          0fffd884e09e6d8f698526fc64803ae3

                                                                          SHA1

                                                                          e95510857aa81274eb57887db5eba67fb6a9ace2

                                                                          SHA256

                                                                          f8700b9183d5f04e854f6781a9a5d336ee814d338fc7585e2bb10c813f69731c

                                                                          SHA512

                                                                          aaccddb721a33ce361c4584f5ff8ce2e87d55c8877108ca5dea20fb7a188026da3b4beb9d33e4d1c344a47ba1ead88e3688cbdd4c281390ec0504f8f3d867a33

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          35KB

                                                                          MD5

                                                                          5d17477066f24cc03ae2670f4fbce948

                                                                          SHA1

                                                                          0d6112c1ed5f32f7ddeb72d643053e4d20e9bb87

                                                                          SHA256

                                                                          deb39fa9441113866df47cb109d6f90641b25f125aa5097450d9214ee1f8f9c8

                                                                          SHA512

                                                                          3c2e5d6149312779fa41a1bf61da56cda6dc119b34c5ed325076dfd79cd8e870e6dd9fec859789e2b77245d683a250d14585937d710af6a799d9be003933013c

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          35KB

                                                                          MD5

                                                                          5d17477066f24cc03ae2670f4fbce948

                                                                          SHA1

                                                                          0d6112c1ed5f32f7ddeb72d643053e4d20e9bb87

                                                                          SHA256

                                                                          deb39fa9441113866df47cb109d6f90641b25f125aa5097450d9214ee1f8f9c8

                                                                          SHA512

                                                                          3c2e5d6149312779fa41a1bf61da56cda6dc119b34c5ed325076dfd79cd8e870e6dd9fec859789e2b77245d683a250d14585937d710af6a799d9be003933013c

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          64KB

                                                                          MD5

                                                                          383f80c1f53beeec486ea89b4ff73eaa

                                                                          SHA1

                                                                          b6ac006e0c642227ac800d24708e6c6f5462a704

                                                                          SHA256

                                                                          f45c3b4f2c2298a61c4da41489b4314ae2198afb4b769ade0c507f48f272e5be

                                                                          SHA512

                                                                          8d25005367709cc826bf43633ca938f47226cb607870d491ef58247637ecd3de7d780b93dea2704d270e4da0d95a29d8151d6510fd4842feee8b2f831e20aaf7

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          64KB

                                                                          MD5

                                                                          383f80c1f53beeec486ea89b4ff73eaa

                                                                          SHA1

                                                                          b6ac006e0c642227ac800d24708e6c6f5462a704

                                                                          SHA256

                                                                          f45c3b4f2c2298a61c4da41489b4314ae2198afb4b769ade0c507f48f272e5be

                                                                          SHA512

                                                                          8d25005367709cc826bf43633ca938f47226cb607870d491ef58247637ecd3de7d780b93dea2704d270e4da0d95a29d8151d6510fd4842feee8b2f831e20aaf7

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          65KB

                                                                          MD5

                                                                          b8eeb649c2323aa7c17d80f14eff27ac

                                                                          SHA1

                                                                          99a08640a2a4a186b19947d52d1e093bd63a579f

                                                                          SHA256

                                                                          2913b804e5511cf14586847e9a2d61985b1b5417e2940fd5c760f4cd0f09245e

                                                                          SHA512

                                                                          291dfe37cc44731ce2e83fae78f0d3a6db448e74b0c298e6adffa5f7f56ff40aed3245a11cef3d2ea0706596e37b421d6c63e47c07cd7abb252f41de357f51fa

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          65KB

                                                                          MD5

                                                                          b8eeb649c2323aa7c17d80f14eff27ac

                                                                          SHA1

                                                                          99a08640a2a4a186b19947d52d1e093bd63a579f

                                                                          SHA256

                                                                          2913b804e5511cf14586847e9a2d61985b1b5417e2940fd5c760f4cd0f09245e

                                                                          SHA512

                                                                          291dfe37cc44731ce2e83fae78f0d3a6db448e74b0c298e6adffa5f7f56ff40aed3245a11cef3d2ea0706596e37b421d6c63e47c07cd7abb252f41de357f51fa

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          65KB

                                                                          MD5

                                                                          367ae5d77a61b43745d9a5a288d98d7e

                                                                          SHA1

                                                                          79399a702c6ae7b7ae8e6ac74e5a5c65af2b0c01

                                                                          SHA256

                                                                          c0c13f5cb23f521d8bb4c81edfe9ad1f0675854145cd7bd8078597f0af1b1126

                                                                          SHA512

                                                                          5fcb4e50295fa3d0eedaacf0e14467c866089d181732c965107e63379159301bcb8c7b54ea587c2dcf81b344435e3afbc91f35b91fec4379354a621abbe59ce6

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          65KB

                                                                          MD5

                                                                          2665f652d887979f591a2c1b5610cde8

                                                                          SHA1

                                                                          336d93597c43a3e9b1f7326c971a4a11842ad12a

                                                                          SHA256

                                                                          01fd99edd8ca648beb42f2f669f0ed1d5cce3938cfd8a973345e281273aff7da

                                                                          SHA512

                                                                          72f45866dd2628e872fa2528a88c453a1bd9a42f1588a1563a774c3010094d3a280a86a7ab1f2c41a94c161127302f63740d434e3004750dbd1700c48de891b8

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          65KB

                                                                          MD5

                                                                          4b7c0d8881070ca00daba5fa8bc3e915

                                                                          SHA1

                                                                          de86f777d178370714370d65a8c0275771c6959c

                                                                          SHA256

                                                                          06ca844167a1b6928c2496cb4dfa7f0ffeca05126134fdd217a50770e16768b9

                                                                          SHA512

                                                                          e4b495f510d4a781d758080f3f5fa4c8d1dcfbf8ecfe3be6fc6d576597e7357048ff33f3772d2a98f0aa35f5501109d35f5e84bec80f18dad3de49bf1c37a55a

                                                                        • C:\Users\Admin\AppData\Local\Temp\3F30.bin1

                                                                          Filesize

                                                                          65KB

                                                                          MD5

                                                                          8eb75d8b05ec34f3f1806cc70677385b

                                                                          SHA1

                                                                          7c2557cfc7a333368c35b8fa08a1b3c862fa3dfa

                                                                          SHA256

                                                                          f002c7f9eae0c829a0db6c5cc9913102c132210a22e6c21e52800c7f2a53afdb

                                                                          SHA512

                                                                          5b4ba71ceb5af0df709b630d5c381ec7d377577b6c1a5d119ca0e7a320d2ea7957ed9f6aca41c6f5442387b2af3c5e95032a6a99b87a879cbaf9447a3d73f1af

                                                                        • C:\Users\Admin\AppData\Local\Temp\RES7B6A.tmp

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          9e7c2742a9a7efd347b66bb9b70d63be

                                                                          SHA1

                                                                          807d9b29976462ce70323e1ecba225d26932caec

                                                                          SHA256

                                                                          0e0a3d1e666c5249e0962373f9cadef4bf4c42ef886da651524f3725cf95a2b0

                                                                          SHA512

                                                                          de1e39f135640983f90fa6c983635bd19b7655529f113744a3ca55671652349e0f2f8d576eff16653cf1e43b36b8350f0521a67d361aedb81c3fce8701f89ac7

                                                                        • C:\Users\Admin\AppData\Local\Temp\RES7C83.tmp

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          d0613851732b363f3751b219a0444fd2

                                                                          SHA1

                                                                          1ba80345b41e263020486e421d63333202e780e9

                                                                          SHA256

                                                                          2637208a21a2b107529e4b412ce4b14c159ce3a24c816ea1b679bc5389a859ff

                                                                          SHA512

                                                                          599b05aecfb4f40fcee0dff23802ba3f128e1d51a6f9cb55be6df2271cfbbf40a51cf3a6fb9d37bf50a8b6399f9bec57651874d02a67a62920ef570bc3465870

                                                                        • C:\Users\Admin\AppData\Local\Temp\e4h3wv4j\e4h3wv4j.dll

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          79f21935016f9becc5def98399ed9d44

                                                                          SHA1

                                                                          d9bf30c5e7c1c2a0de0a267bae320804529eb178

                                                                          SHA256

                                                                          261b882f6c2ffcc582f3a70673fce866a30e3e2a12507d3cdb2ad6b6b1dcbfb2

                                                                          SHA512

                                                                          33c9cd90cb432db7e9bb9103bc5528e5ca6036fef7dc4f0d1e749fc0d54d255b28e113bf5f7121f7ef1b9807957e1c00bd3b5cc666c3364c1d7d7474260fe8b0

                                                                        • C:\Users\Admin\AppData\Local\Temp\qqftx3ny\qqftx3ny.dll

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          e743e504995ad858aca5b8edeee1f0fa

                                                                          SHA1

                                                                          67e3206b9507a50e928c4146dd59397e742f8209

                                                                          SHA256

                                                                          5e1c0996ea5d197c6c40f1495091d17f8a995fbf987b7d3df6e02d69bac12907

                                                                          SHA512

                                                                          116c18fd34582bcfdab2d4959eab2a65e72e7cf0894ac92b8f0af66207f854c3bdc85b4bc356087bd16292d553fba4781bf4cde8f18faa8d88d360b03410234f

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\e4h3wv4j\CSC4317AF4E638B444AA2816876D87514.TMP

                                                                          Filesize

                                                                          652B

                                                                          MD5

                                                                          f359f766dd0955bdf083bb27eaff5bb9

                                                                          SHA1

                                                                          f161b6be66d87ca2cbba515d48c34bbd66d64720

                                                                          SHA256

                                                                          9015479d930c98d204d6c6cf5ec57af39bc32f2a0979cce2ba169d0d192e6e9e

                                                                          SHA512

                                                                          5ce344fb197dd4a5e6bf75c10bce670ed3b3ffd718f48b9c86f819dae79bc8e4bd29f2dbeb1879bb3050049a51a158979ac2d360168493bac714ecb03a24defb

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\e4h3wv4j\e4h3wv4j.0.cs

                                                                          Filesize

                                                                          410B

                                                                          MD5

                                                                          9a10482acb9e6952b96f4efc24d9d783

                                                                          SHA1

                                                                          5cfc9bf668351df25fcda98c3c2d0bb056c026c3

                                                                          SHA256

                                                                          a0424e1530f002761a882c19c22504153a5e86d7fbb41391e940452bfa15f377

                                                                          SHA512

                                                                          e932914ad99d7bd39561e020d1e8c1f4e175c16eae66df720100c65e40ccc3383b5145f703432885f3f1ce080e8a4feb045ddd5c8bbc2f3231c619d04182ac28

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\e4h3wv4j\e4h3wv4j.cmdline

                                                                          Filesize

                                                                          369B

                                                                          MD5

                                                                          e799d0059397cd0ec86c4cb27100671a

                                                                          SHA1

                                                                          e59025d098ea5733e253fd0cec36324ee7042626

                                                                          SHA256

                                                                          65ef67580ac97c35be9c9eae14df09cd034393f0528f9c5f560d86f2ede11b82

                                                                          SHA512

                                                                          03bca3c62a53dd7b2cc65b41c0abbfc5752a0d7df1363c67e372fa3d56bdfc72dcbb0437e7b8b7cd1db9ac2a9b85bc1f3433390d2ef334400c157f5ac748e1c3

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\qqftx3ny\CSC8CFC0D6B1DC148C989FA43BA82461A9.TMP

                                                                          Filesize

                                                                          652B

                                                                          MD5

                                                                          aa2522f6857843b7573ae82b96cf8bb3

                                                                          SHA1

                                                                          9dc330bec0cd74f9c312a2d01d971668ed57aada

                                                                          SHA256

                                                                          70b4385f8ac7a2f629193f37fe2807a9f90fb488d8c3cab39d9df1e70116f8d6

                                                                          SHA512

                                                                          21b4e54bd9ad8bb2c1b6a0dfb0ecd6b5987a69b36ae7c2013fd68e20aa23cc224429aefee4bdc6191982f7faeee001e6237d24f67fa346904c24f49a3bfe775a

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\qqftx3ny\qqftx3ny.0.cs

                                                                          Filesize

                                                                          400B

                                                                          MD5

                                                                          aca9704199c51fde14b8bf8165bc2a4c

                                                                          SHA1

                                                                          789b408ccad29240bd093515cbd19a199ad2c1c8

                                                                          SHA256

                                                                          cb3da8a9768252634f8ed4c62e026dc8217b055e00f11b6012a52ed130c92c27

                                                                          SHA512

                                                                          a8c1df598581f508ecbf1e516744f11abfb71ec6bb9895d0b61f15e70e56e27cb40b4e5395b9411b787f8bb4f264ca704d815260677909dc1e599d601d0b5de6

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\qqftx3ny\qqftx3ny.cmdline

                                                                          Filesize

                                                                          369B

                                                                          MD5

                                                                          23f91703765d07f4d4e6779f78def54f

                                                                          SHA1

                                                                          9e634754723d8a088f8fbfa50f4a6423be33f6b5

                                                                          SHA256

                                                                          104af545dc17b00a96d90e9556667d891ecf507ecdbc39105d38c31982d6f12b

                                                                          SHA512

                                                                          0f7e17b889519565e4f0a1529c605e521d5b80581ea675d316233db65695f43164aeab8e33f7f88a4f5c12b6f7fdb63e3c7667ee6340384bcf33481c1af7ab9e

                                                                        • memory/8-180-0x0000000000000000-mapping.dmp

                                                                        • memory/224-209-0x0000000000000000-mapping.dmp

                                                                        • memory/340-174-0x0000000000000000-mapping.dmp

                                                                        • memory/400-205-0x0000000000000000-mapping.dmp

                                                                        • memory/424-200-0x0000000000000000-mapping.dmp

                                                                        • memory/624-196-0x0000000000000000-mapping.dmp

                                                                        • memory/808-191-0x0000000000000000-mapping.dmp

                                                                        • memory/1092-193-0x0000000000000000-mapping.dmp

                                                                        • memory/1104-149-0x0000000000000000-mapping.dmp

                                                                        • memory/1148-185-0x0000000000000000-mapping.dmp

                                                                        • memory/1328-188-0x0000000000000000-mapping.dmp

                                                                        • memory/1380-172-0x0000000000000000-mapping.dmp

                                                                        • memory/1436-139-0x0000000000000000-mapping.dmp

                                                                        • memory/1480-146-0x0000000000000000-mapping.dmp

                                                                        • memory/1924-220-0x0000000000000000-mapping.dmp

                                                                        • memory/2008-225-0x0000000000000000-mapping.dmp

                                                                        • memory/2064-207-0x0000000000000000-mapping.dmp

                                                                        • memory/2200-223-0x0000000000000000-mapping.dmp

                                                                        • memory/2256-154-0x00007FF983E60000-0x00007FF984921000-memory.dmp

                                                                          Filesize

                                                                          10.8MB

                                                                        • memory/2256-138-0x00007FF983E60000-0x00007FF984921000-memory.dmp

                                                                          Filesize

                                                                          10.8MB

                                                                        • memory/2256-137-0x000001AB38AF0000-0x000001AB38B12000-memory.dmp

                                                                          Filesize

                                                                          136KB

                                                                        • memory/2256-155-0x000001AB38E40000-0x000001AB38E7D000-memory.dmp

                                                                          Filesize

                                                                          244KB

                                                                        • memory/2256-136-0x0000000000000000-mapping.dmp

                                                                        • memory/2320-167-0x000002749FE00000-0x000002749FEA3000-memory.dmp

                                                                          Filesize

                                                                          652KB

                                                                        • memory/2332-206-0x0000000000000000-mapping.dmp

                                                                        • memory/2404-219-0x0000000000000000-mapping.dmp

                                                                        • memory/2408-178-0x0000000000000000-mapping.dmp

                                                                        • memory/2412-170-0x0000000000000000-mapping.dmp

                                                                        • memory/2440-181-0x0000000007DF0000-0x0000000007E93000-memory.dmp

                                                                          Filesize

                                                                          652KB

                                                                        • memory/2440-159-0x0000000007DF0000-0x0000000007E93000-memory.dmp

                                                                          Filesize

                                                                          652KB

                                                                        • memory/2960-182-0x0000000000000000-mapping.dmp

                                                                        • memory/3012-132-0x0000000000490000-0x000000000049D000-memory.dmp

                                                                          Filesize

                                                                          52KB

                                                                        • memory/3084-203-0x0000000000000000-mapping.dmp

                                                                        • memory/3140-190-0x0000000000000000-mapping.dmp

                                                                        • memory/3208-201-0x0000000000000000-mapping.dmp

                                                                        • memory/3368-153-0x0000000000000000-mapping.dmp

                                                                        • memory/3368-175-0x000002A2DB8B0000-0x000002A2DB953000-memory.dmp

                                                                          Filesize

                                                                          652KB

                                                                        • memory/3368-161-0x000002A2DB8B0000-0x000002A2DB953000-memory.dmp

                                                                          Filesize

                                                                          652KB

                                                                        • memory/3436-183-0x0000000000000000-mapping.dmp

                                                                        • memory/3456-157-0x00000208A9E70000-0x00000208A9F13000-memory.dmp

                                                                          Filesize

                                                                          652KB

                                                                        • memory/3688-198-0x0000000000000000-mapping.dmp

                                                                        • memory/3704-186-0x0000000000000000-mapping.dmp

                                                                        • memory/3764-158-0x000001C4ADD20000-0x000001C4ADDC3000-memory.dmp

                                                                          Filesize

                                                                          652KB

                                                                        • memory/3908-211-0x0000000000000000-mapping.dmp

                                                                        • memory/4056-212-0x0000000000000000-mapping.dmp

                                                                        • memory/4060-195-0x0000000000000000-mapping.dmp

                                                                        • memory/4080-164-0x0000000000000000-mapping.dmp

                                                                        • memory/4188-215-0x0000000000000000-mapping.dmp

                                                                        • memory/4224-163-0x0000000000000000-mapping.dmp

                                                                        • memory/4224-166-0x0000000000E26B20-0x0000000000E26B24-memory.dmp

                                                                          Filesize

                                                                          4B

                                                                        • memory/4224-169-0x0000000000D60000-0x0000000000DF6000-memory.dmp

                                                                          Filesize

                                                                          600KB

                                                                        • memory/4288-165-0x0000000000000000-mapping.dmp

                                                                        • memory/4348-176-0x0000000000000000-mapping.dmp

                                                                        • memory/4616-213-0x0000000000000000-mapping.dmp

                                                                        • memory/4620-160-0x000001D8F3780000-0x000001D8F3823000-memory.dmp

                                                                          Filesize

                                                                          652KB

                                                                        • memory/4664-142-0x0000000000000000-mapping.dmp

                                                                        • memory/4736-224-0x0000000000000000-mapping.dmp

                                                                        • memory/4772-216-0x0000000000000000-mapping.dmp

                                                                        • memory/4828-162-0x0000000000000000-mapping.dmp

                                                                        • memory/4900-168-0x0000016A5DFB0000-0x0000016A5E053000-memory.dmp

                                                                          Filesize

                                                                          652KB

                                                                        • memory/4900-156-0x0000000000000000-mapping.dmp

                                                                        • memory/5004-221-0x0000000000000000-mapping.dmp

                                                                        • memory/5032-217-0x0000000000000000-mapping.dmp