Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 06:27

General

  • Target

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658.exe

  • Size

    1016KB

  • MD5

    928e5ae49d212720359baa5f7a310b70

  • SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

  • SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

  • SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • SSDEEP

    6144:2IXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHU:2IXsgtvm1De5YlOx6lzBH46U

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • UAC bypass 3 TTPs 13 IoCs
  • Adds policy Run key to start application 2 TTPs 29 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658.exe
    "C:\Users\Admin\AppData\Local\Temp\660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe
      "C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe" "c:\users\admin\appdata\local\temp\660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2576
      • C:\Users\Admin\AppData\Local\Temp\ceiuajs.exe
        "C:\Users\Admin\AppData\Local\Temp\ceiuajs.exe" "-C:\Users\Admin\AppData\Local\Temp\bmzujbtjxiubzdln.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:1420
      • C:\Users\Admin\AppData\Local\Temp\ceiuajs.exe
        "C:\Users\Admin\AppData\Local\Temp\ceiuajs.exe" "-C:\Users\Admin\AppData\Local\Temp\bmzujbtjxiubzdln.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:1980
    • C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe
      "C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe" "c:\users\admin\appdata\local\temp\660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System policy modification
      PID:2352

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bmzujbtjxiubzdln.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Users\Admin\AppData\Local\Temp\ceiuajs.exe

    Filesize

    720KB

    MD5

    f79be529253dd0c0fa089817eb74109a

    SHA1

    0cec0655d77ea96c6177063c6a81c2dfca13ad42

    SHA256

    09183c58710998fda6fa33ec961633d337b09ccb284dbc0ca2296fdc26768bf8

    SHA512

    0b065eb05aa766b6ded4eb4f23049235a2d0fd2eea0548af21f7b472cf21ee034b97b2957868415378526e46dcd02c53f2cfbb771bf77e19a93d9dd5974b54aa

  • C:\Users\Admin\AppData\Local\Temp\ceiuajs.exe

    Filesize

    720KB

    MD5

    f79be529253dd0c0fa089817eb74109a

    SHA1

    0cec0655d77ea96c6177063c6a81c2dfca13ad42

    SHA256

    09183c58710998fda6fa33ec961633d337b09ccb284dbc0ca2296fdc26768bf8

    SHA512

    0b065eb05aa766b6ded4eb4f23049235a2d0fd2eea0548af21f7b472cf21ee034b97b2957868415378526e46dcd02c53f2cfbb771bf77e19a93d9dd5974b54aa

  • C:\Users\Admin\AppData\Local\Temp\ceiuajs.exe

    Filesize

    720KB

    MD5

    f79be529253dd0c0fa089817eb74109a

    SHA1

    0cec0655d77ea96c6177063c6a81c2dfca13ad42

    SHA256

    09183c58710998fda6fa33ec961633d337b09ccb284dbc0ca2296fdc26768bf8

    SHA512

    0b065eb05aa766b6ded4eb4f23049235a2d0fd2eea0548af21f7b472cf21ee034b97b2957868415378526e46dcd02c53f2cfbb771bf77e19a93d9dd5974b54aa

  • C:\Users\Admin\AppData\Local\Temp\cqgewrmfwkzjkrchknb.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Users\Admin\AppData\Local\Temp\eummgdavoevhktgnsxnff.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Users\Admin\AppData\Local\Temp\iuieungxmyltsxgjk.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Users\Admin\AppData\Local\Temp\pevunjfzrgwhjrdjnrgx.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe

    Filesize

    320KB

    MD5

    1224ca930de8f7f8571b4f06466512b1

    SHA1

    6b1acf6e03160e27af72d6fb6e4320413589e79c

    SHA256

    abebc60c7e6e740fe24d032c2d03310f0f8d551906f307097ff1599a1d0b2a13

    SHA512

    b200b77e011e372e40326d96522324a7c75ff1d146c46c6b49fb3b66886b66f8a6b964f96cf2100d6901e164f0b1bb3ca4dca68253d22238ece077e55e2606cc

  • C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe

    Filesize

    320KB

    MD5

    1224ca930de8f7f8571b4f06466512b1

    SHA1

    6b1acf6e03160e27af72d6fb6e4320413589e79c

    SHA256

    abebc60c7e6e740fe24d032c2d03310f0f8d551906f307097ff1599a1d0b2a13

    SHA512

    b200b77e011e372e40326d96522324a7c75ff1d146c46c6b49fb3b66886b66f8a6b964f96cf2100d6901e164f0b1bb3ca4dca68253d22238ece077e55e2606cc

  • C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe

    Filesize

    320KB

    MD5

    1224ca930de8f7f8571b4f06466512b1

    SHA1

    6b1acf6e03160e27af72d6fb6e4320413589e79c

    SHA256

    abebc60c7e6e740fe24d032c2d03310f0f8d551906f307097ff1599a1d0b2a13

    SHA512

    b200b77e011e372e40326d96522324a7c75ff1d146c46c6b49fb3b66886b66f8a6b964f96cf2100d6901e164f0b1bb3ca4dca68253d22238ece077e55e2606cc

  • C:\Users\Admin\AppData\Local\Temp\retqhbvndqenntdhjl.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Users\Admin\AppData\Local\Temp\vmfgbzxtnewjnxltzfwpql.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\SysWOW64\bmzujbtjxiubzdln.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\SysWOW64\cqgewrmfwkzjkrchknb.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\SysWOW64\eummgdavoevhktgnsxnff.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\SysWOW64\iuieungxmyltsxgjk.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\SysWOW64\pevunjfzrgwhjrdjnrgx.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\SysWOW64\retqhbvndqenntdhjl.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\SysWOW64\vmfgbzxtnewjnxltzfwpql.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\bmzujbtjxiubzdln.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\bmzujbtjxiubzdln.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\bmzujbtjxiubzdln.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\cqgewrmfwkzjkrchknb.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\cqgewrmfwkzjkrchknb.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\cqgewrmfwkzjkrchknb.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\eummgdavoevhktgnsxnff.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\eummgdavoevhktgnsxnff.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\eummgdavoevhktgnsxnff.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\iuieungxmyltsxgjk.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\iuieungxmyltsxgjk.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\iuieungxmyltsxgjk.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\pevunjfzrgwhjrdjnrgx.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\pevunjfzrgwhjrdjnrgx.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\pevunjfzrgwhjrdjnrgx.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\retqhbvndqenntdhjl.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\retqhbvndqenntdhjl.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\retqhbvndqenntdhjl.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\vmfgbzxtnewjnxltzfwpql.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\vmfgbzxtnewjnxltzfwpql.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • C:\Windows\vmfgbzxtnewjnxltzfwpql.exe

    Filesize

    1016KB

    MD5

    928e5ae49d212720359baa5f7a310b70

    SHA1

    d88f71ef69600762a9cd122b4506235bb3d5319d

    SHA256

    660abfaa776f2ad8db69d82bbf076d9e773cf7c2ec24b8246fe47ac303569658

    SHA512

    41907f1d2b4c8d77494b21bc0c62dae86a2fc098c67d0375c091ee4272f38048a69ea658b7a1b16d8c8fb98fcb362ef60e1bd497fd19d9d5856273fbc98454b9

  • memory/1420-137-0x0000000000000000-mapping.dmp

  • memory/1980-140-0x0000000000000000-mapping.dmp

  • memory/2352-170-0x0000000000000000-mapping.dmp

  • memory/2576-134-0x0000000000000000-mapping.dmp