Resubmissions

23-11-2022 10:53

221123-mzc4pafd69 10

23-11-2022 10:50

221123-mxb4lsad5z 10

23-11-2022 10:33

221123-mlme7sed38 10

Analysis

  • max time kernel
    330s
  • max time network
    331s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:53

General

  • Target

    311e174087ecfc0bd85f78bd70829570ee3b4b567afcf293ebb32f4f887c6d1b.xls

  • Size

    91KB

  • MD5

    a806fe6c8dd09faaee6dbb0b9de33655

  • SHA1

    7371f78f2b6706bed87882bf257e9f862fd047c3

  • SHA256

    311e174087ecfc0bd85f78bd70829570ee3b4b567afcf293ebb32f4f887c6d1b

  • SHA512

    3ed93f152450b9d981bc0b4c08c52c915cb7e7b4c4ff0e9ad5ab39d2ec54b6d44a5bff1d4220c71cae6cec8a961948435b67541ca529313ab2b1aae5c59c9636

  • SSDEEP

    1536:vKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgHbCXuZH4gb4CEn9J4ZnX5:vKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg9

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://datie-tw.com/img/O8G0RDZj7MYCuJyPoP/

xlm40.dropper

http://sbm.xinmoshiwang.com/upload/VaOfWEb3pW76UO/

xlm40.dropper

https://copunupo.ac.zm/cgi-bin/WFFcGx/

xlm40.dropper

http://ly.yjlianyi.top/wp-admin/4cChao/

Extracted

Family

emotet

Botnet

Epoch4

C2

185.4.135.165:8080

159.89.202.34:443

82.223.21.224:8080

187.63.160.88:80

188.44.20.25:443

91.187.140.35:8080

110.232.117.186:8080

197.242.150.244:8080

119.59.103.152:8080

182.162.143.56:443

72.15.201.15:8080

173.255.211.88:443

206.189.28.199:8080

94.23.45.86:4143

45.63.99.23:7080

153.126.146.25:7080

45.118.115.99:8080

115.68.227.76:8080

163.44.196.120:8080

159.65.140.115:443

ecs1.plain
eck1.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\311e174087ecfc0bd85f78bd70829570ee3b4b567afcf293ebb32f4f887c6d1b.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      PID:3136
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4604
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\TWktcXRLKQx\kzcyBtx.dll"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:732
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YGMtwhTMvYHUcupG\BXiCuD.dll"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:3104
    • C:\Windows\System32\regsvr32.exe
      C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OsqmloaQQOOzNzSxU\QfqVMAWmVqSku.dll"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:4892
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4616
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Program Files\Microsoft Office\root\Templates\311e174087ecfc0bd85f78bd70829570ee3b4b567afcf293ebb32f4f887c6d1b.xls"
      1⤵
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4844
      • C:\Windows\System32\regsvr32.exe
        C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx
        2⤵
        • Process spawned unexpected child process
        PID:2340
      • C:\Windows\System32\regsvr32.exe
        C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx
        2⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\QsLzXnyi\KygzyWYhscrJu.dll"
          3⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:1552
      • C:\Windows\System32\regsvr32.exe
        C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx
        2⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\EwwjcLEv\UcztsWCDEnls.dll"
          3⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:2576
      • C:\Windows\System32\regsvr32.exe
        C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx
        2⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3804
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IamcJtygffhU\kfKACH.dll"
          3⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:1440
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Program Files\Microsoft Office\root\Templates\311e174087ecfc0bd85f78bd70829570ee3b4b567afcf293ebb32f4f887c6d1b.xls"
      1⤵
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Windows\System32\regsvr32.exe
        C:\Windows\System32\regsvr32.exe /S ..\elv1.ooocccxxx
        2⤵
        • Process spawned unexpected child process
        PID:1392
      • C:\Windows\System32\regsvr32.exe
        C:\Windows\System32\regsvr32.exe /S ..\elv2.ooocccxxx
        2⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3744
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YARSNttqsXGyeO\afLRPlOJYHTaJ.dll"
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:1664
      • C:\Windows\System32\regsvr32.exe
        C:\Windows\System32\regsvr32.exe /S ..\elv3.ooocccxxx
        2⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4720
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YrrUuvZUhl\AXppVfDlAn.dll"
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:4564
      • C:\Windows\System32\regsvr32.exe
        C:\Windows\System32\regsvr32.exe /S ..\elv4.ooocccxxx
        2⤵
        • Process spawned unexpected child process
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4352
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YCIGLkkRNzgkBL\fOZidzd.dll"
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:384

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
      Filesize

      717B

      MD5

      ec8ff3b1ded0246437b1472c69dd1811

      SHA1

      d813e874c2524e3a7da6c466c67854ad16800326

      SHA256

      e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

      SHA512

      e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
      Filesize

      471B

      MD5

      ce2cbbd56a884116b4f8d80552b3a598

      SHA1

      c455120209c2559b9906a5f88f9fdb9d4b6bf964

      SHA256

      c53f35460b36dc6c56e33c59ed99ed3567a1c4424add4e34db3cea337b946e32

      SHA512

      637b8303d0f83722e678a340a8f51fa40391cc1367871b4cbc968325ca1dd44ce6234a52e59c7c37a93b1d714a20a70b2a12a17131752a56739a19a8c981d0bb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\895969C7D9D324862C5EE7E958502A72
      Filesize

      503B

      MD5

      d0f0a2aad56d1ba60dbab77de426629f

      SHA1

      894936f008f9ab240503161bd31854f8aa8f29d3

      SHA256

      8f1304d1eb25be35d6b378283ccd9996e216c1023a20f8f714bb0dc78f2d1581

      SHA512

      ed1310279bfe4d10ad567e55877c6641cd0394a7915602dde3232596b9126d98a589601f3d765bd43e4612ccbb418827bc0145baf533fde2a7d44c1764dc5f2e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
      Filesize

      192B

      MD5

      91cbbf895d0c1adacc99c5faba8a64f3

      SHA1

      8561a8e2918bf35e73fd0fae36b49343d9c5a405

      SHA256

      46350ef30e3081ea48935de5cf85b2f9f3308b9961acb84201ff8625c1533e9b

      SHA512

      bd7f79cf86407057cc13b028fe6f9f8b2fb938097a3988a8da13ed13643cd825e06a56713104d095e359ffa8c3dae93afc1e815fab63e5283cec2f354f417714

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE
      Filesize

      446B

      MD5

      63e7778f69fcf6166882808101b734da

      SHA1

      8d5e552e0e695855099c249e70dd9bc040848ef8

      SHA256

      1ed5e28ac190fc704b6855fe705577fd71bbb345e6e9472032994bc931e22ae6

      SHA512

      2d8aa5f7a9819757c7d42173d7fbeeeb05e2b49040b51fe70b6f22a210a6f0fc92971bca39250da7ff84ec77294d345cbd157b6ab958d9ca2058a1c09121c395

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\895969C7D9D324862C5EE7E958502A72
      Filesize

      548B

      MD5

      c08cef6e1aeb3569df215cef802a4de2

      SHA1

      298dc7e9c40844b199c0d07392c78f2185c8ad2d

      SHA256

      0d0a332a7a352984e7a4a583d67228678a2a8e63e47968822adad7945e64b0f3

      SHA512

      2ba5100f10b7d913a3291495a8148a887c06518b9d77a206010d4fda122cf90321ed58956c7cb07f017b23f7b892020cc1cbc595260a729919f918653b364fc9

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Excel.CampaignStates.json
      Filesize

      537B

      MD5

      54def82aa4f367976b5839069438e824

      SHA1

      2738ab760c893ec1293138ea73be9209184da9b2

      SHA256

      dbe4900f7ba2d7c219170710e3951faa9a0222a7a93c51164bda091f191824cf

      SHA512

      e4bd73be2415833d89bc9d856e1441100f58deedd98e8c30af42497ba67cb121a5b655f7fbdc1dd77be2ceb89d2ad5d12f9e2ea70835cb4d8be6f8b5f75588df

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Excel.GovernedChannelStates.json
      Filesize

      417B

      MD5

      c56ff60fbd601e84edd5a0ff1010d584

      SHA1

      342abb130dabeacde1d8ced806d67a3aef00a749

      SHA256

      200e8cc8dd12e22c9720be73092eafb620435d4569dbdcdba9404ace2aa4343c

      SHA512

      acd2054fddb33b55b58b870edd4eb6a3cdd3131dfe6139cb3d27054ac2b2a460694c9be9c2a1da0f85606e95e7f393cf16868b6c654e78a664799bc3418da86e

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Excel.Settings.json
      Filesize

      87B

      MD5

      e4e83f8123e9740b8aa3c3dfa77c1c04

      SHA1

      5281eae96efde7b0e16a1d977f005f0d3bd7aad0

      SHA256

      6034f27b0823b2a6a76fe296e851939fd05324d0af9d55f249c79af118b0eb31

      SHA512

      bd6b33fd2bbce4a46991bc0d877695d16f7e60b1959a0defc79b627e569e5c6cac7b4ad4e3e1d8389a08584602a51cf84d44cf247f03beb95f7d307fbba12bb9

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Excel.SurveyEventActivityStats.json
      Filesize

      14B

      MD5

      6ca4960355e4951c72aa5f6364e459d5

      SHA1

      2fd90b4ec32804dff7a41b6e63c8b0a40b592113

      SHA256

      88301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3

      SHA512

      8544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Excel.SurveyHistoryStats.json
      Filesize

      14B

      MD5

      6ca4960355e4951c72aa5f6364e459d5

      SHA1

      2fd90b4ec32804dff7a41b6e63c8b0a40b592113

      SHA256

      88301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3

      SHA512

      8544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\26E6EB19-B09A-4A40-A099-703BD382C9C8
      Filesize

      147KB

      MD5

      565ddeecdf9f75ccd7998e087e3cbb58

      SHA1

      7020d2a06a1a010e68e8b6040690ab4868c68d30

      SHA256

      ded102ad522b6bef1e2f44b8357c47bf5608289236e67a52d46483f48199abe6

      SHA512

      0b33e0aefc395103fc49f25c2b5ff12ee059d0a5fdc7f70c0baf22a1752449009a5ac64e76dd780292f7f01792bb894803da204137884129638d749aca7d56b7

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml
      Filesize

      324KB

      MD5

      09054487e8c69240c9416b375b2916a9

      SHA1

      f00ff01ae8c39170c57f9b27cedea8ef75f455b3

      SHA256

      2d895d38c2f9874b296b8d5d8eef1e3738230d416f4b10517099027c0fe9b876

      SHA512

      971c817f16331dbf06bd908ae5440ee5bc55ddab549cee258b792170c1f2144d4cfcbd14cee31e3e2f9606d0e3e48f226564131023fc035ed67d4e1b171b97f2

    • C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\TenantInfo.xml
      Filesize

      76B

      MD5

      0f8eb2423d2bf6cb5b8bdb44cb170ca3

      SHA1

      242755226012b4449a49b45491c0b1538ebf6410

      SHA256

      385347c0cbacdd3c61d2635fbd390e0095a008fd75eeb23af2f14f975c083944

      SHA512

      a9f23a42340b83a2f59df930d7563e8abd669b9f0955562cd3c2872e2e081f26d6d8b26357972b6d0423af05b2392bddbb46da769788e77fd169b3264ff53886

    • C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\TenantInfo.xml
      Filesize

      76B

      MD5

      0f8eb2423d2bf6cb5b8bdb44cb170ca3

      SHA1

      242755226012b4449a49b45491c0b1538ebf6410

      SHA256

      385347c0cbacdd3c61d2635fbd390e0095a008fd75eeb23af2f14f975c083944

      SHA512

      a9f23a42340b83a2f59df930d7563e8abd669b9f0955562cd3c2872e2e081f26d6d8b26357972b6d0423af05b2392bddbb46da769788e77fd169b3264ff53886

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db
      Filesize

      24KB

      MD5

      a6064fc9ce640751e063d9af443990da

      SHA1

      367a3a7d57bfb3e9a6ec356dfc411a5f14dfde2a

      SHA256

      5f72c11fd2fa88d8b8bfae1214551f8d5ee07b8895df824fa717ebbcec118a6c

      SHA512

      0e42dd8e341e2334eda1e19e1a344475ed3a0539a21c70ba2247f480c706ab8e2ff6dbeb790614cbde9fb547699b24e69c85c54e99ed77a08fe7e1d1b4b488d0

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db
      Filesize

      24KB

      MD5

      8665de22b67e46648a5a147c1ed296ca

      SHA1

      b289a96fee9fa77dd8e045ae8fd161debd376f48

      SHA256

      b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f

      SHA512

      bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MBR7CLLA\2yXcjy57oZTTUNweDidCGUY[1].dll
      Filesize

      423KB

      MD5

      b88be642ea7e4f9ad82b5d843edf0ec1

      SHA1

      25fd3517b996858e28cb6cee21ea17c528192ed6

      SHA256

      7738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708

      SHA512

      8635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PREIF6EH\2yXcjy57oZTTUNweDidCGUY[1].dll
      Filesize

      423KB

      MD5

      b88be642ea7e4f9ad82b5d843edf0ec1

      SHA1

      25fd3517b996858e28cb6cee21ea17c528192ed6

      SHA256

      7738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708

      SHA512

      8635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PREIF6EH\EvvmhfKiKFhKrSuHfBq[1].dll
      Filesize

      423KB

      MD5

      3929b889987f447cb837ed326860afc6

      SHA1

      9bb1a7622f2bc5a6a51487434a77f395de5e50d7

      SHA256

      b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902

      SHA512

      ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\EvvmhfKiKFhKrSuHfBq[1].dll
      Filesize

      423KB

      MD5

      3929b889987f447cb837ed326860afc6

      SHA1

      9bb1a7622f2bc5a6a51487434a77f395de5e50d7

      SHA256

      b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902

      SHA512

      ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\311e174087ecfc0bd85f78bd70829570ee3b4b567afcf293ebb32f4f887c6d1b.xls.LNK
      Filesize

      1KB

      MD5

      73ffdea8cc38956f50aed24159bd068b

      SHA1

      76dc835b713d4e48d82353bb8fde75e6f75c6d4a

      SHA256

      f02d75c1c67b4028373f14dbc75e37da3b36770a7276120237b44d0fe627fc75

      SHA512

      3b5a14d1e7433581dfcbb25f720a7a6bdfb62a19733c8af888af52ec5266948e1040f54e612b30c23e4d453d3c7362ddebc046e55dd867964c26b0b0a1268af3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Filesize

      361B

      MD5

      295c7f1d3e338ff3329ec5c1c05790b0

      SHA1

      0571fec0252fb1cd94562fd1a76034842778b3d9

      SHA256

      ed6ac46cb63cc4b68669c499f6fdab45fc435fbcb45944019272748002a2faea

      SHA512

      024a2135d9743fb7770ca75909d2de4a3f2b4b07bfe75f45be151fba5edaa284a9ad5d7e9bc71b875a0e3d648aef87e9f9d6a9cb899c759b5767b7f1033eb778

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
      Filesize

      24B

      MD5

      4fcb2a3ee025e4a10d21e1b154873fe2

      SHA1

      57658e2fa594b7d0b99d02e041d0f3418e58856b

      SHA256

      90bf6baa6f968a285f88620fbf91e1f5aa3e66e2bad50fd16f37913280ad8228

      SHA512

      4e85d48db8c0ee5c4dd4149ab01d33e4224456c3f3e3b0101544a5ca87a0d74b3ccd8c0509650008e2abed65efd1e140b1e65ae5215ab32de6f6a49c9d3ec3ff

    • C:\Users\Admin\elv2.ooocccxxx
      Filesize

      423KB

      MD5

      3929b889987f447cb837ed326860afc6

      SHA1

      9bb1a7622f2bc5a6a51487434a77f395de5e50d7

      SHA256

      b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902

      SHA512

      ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715

    • C:\Users\Admin\elv2.ooocccxxx
      Filesize

      423KB

      MD5

      3929b889987f447cb837ed326860afc6

      SHA1

      9bb1a7622f2bc5a6a51487434a77f395de5e50d7

      SHA256

      b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902

      SHA512

      ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715

    • C:\Users\Admin\elv2.ooocccxxx
      Filesize

      423KB

      MD5

      3929b889987f447cb837ed326860afc6

      SHA1

      9bb1a7622f2bc5a6a51487434a77f395de5e50d7

      SHA256

      b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902

      SHA512

      ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715

    • C:\Users\Admin\elv2.ooocccxxx
      Filesize

      423KB

      MD5

      3929b889987f447cb837ed326860afc6

      SHA1

      9bb1a7622f2bc5a6a51487434a77f395de5e50d7

      SHA256

      b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902

      SHA512

      ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715

    • C:\Users\Admin\elv2.ooocccxxx
      Filesize

      423KB

      MD5

      3929b889987f447cb837ed326860afc6

      SHA1

      9bb1a7622f2bc5a6a51487434a77f395de5e50d7

      SHA256

      b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902

      SHA512

      ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715

    • C:\Users\Admin\elv2.ooocccxxx
      Filesize

      423KB

      MD5

      3929b889987f447cb837ed326860afc6

      SHA1

      9bb1a7622f2bc5a6a51487434a77f395de5e50d7

      SHA256

      b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902

      SHA512

      ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715

    • C:\Users\Admin\elv3.ooocccxxx
      Filesize

      423KB

      MD5

      dd7105e9748a29b5bd61ea57214d57e3

      SHA1

      827b323bda769ba7fb838a231aa4160209266b14

      SHA256

      c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1

      SHA512

      beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7

    • C:\Users\Admin\elv3.ooocccxxx
      Filesize

      423KB

      MD5

      dd7105e9748a29b5bd61ea57214d57e3

      SHA1

      827b323bda769ba7fb838a231aa4160209266b14

      SHA256

      c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1

      SHA512

      beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7

    • C:\Users\Admin\elv3.ooocccxxx
      Filesize

      423KB

      MD5

      dd7105e9748a29b5bd61ea57214d57e3

      SHA1

      827b323bda769ba7fb838a231aa4160209266b14

      SHA256

      c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1

      SHA512

      beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7

    • C:\Users\Admin\elv3.ooocccxxx
      Filesize

      423KB

      MD5

      dd7105e9748a29b5bd61ea57214d57e3

      SHA1

      827b323bda769ba7fb838a231aa4160209266b14

      SHA256

      c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1

      SHA512

      beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7

    • C:\Users\Admin\elv3.ooocccxxx
      Filesize

      423KB

      MD5

      dd7105e9748a29b5bd61ea57214d57e3

      SHA1

      827b323bda769ba7fb838a231aa4160209266b14

      SHA256

      c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1

      SHA512

      beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7

    • C:\Users\Admin\elv3.ooocccxxx
      Filesize

      423KB

      MD5

      dd7105e9748a29b5bd61ea57214d57e3

      SHA1

      827b323bda769ba7fb838a231aa4160209266b14

      SHA256

      c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1

      SHA512

      beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7

    • C:\Users\Admin\elv4.ooocccxxx
      Filesize

      423KB

      MD5

      b88be642ea7e4f9ad82b5d843edf0ec1

      SHA1

      25fd3517b996858e28cb6cee21ea17c528192ed6

      SHA256

      7738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708

      SHA512

      8635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec

    • C:\Users\Admin\elv4.ooocccxxx
      Filesize

      423KB

      MD5

      b88be642ea7e4f9ad82b5d843edf0ec1

      SHA1

      25fd3517b996858e28cb6cee21ea17c528192ed6

      SHA256

      7738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708

      SHA512

      8635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec

    • C:\Users\Admin\elv4.ooocccxxx
      Filesize

      423KB

      MD5

      b88be642ea7e4f9ad82b5d843edf0ec1

      SHA1

      25fd3517b996858e28cb6cee21ea17c528192ed6

      SHA256

      7738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708

      SHA512

      8635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec

    • C:\Users\Admin\elv4.ooocccxxx
      Filesize

      423KB

      MD5

      b88be642ea7e4f9ad82b5d843edf0ec1

      SHA1

      25fd3517b996858e28cb6cee21ea17c528192ed6

      SHA256

      7738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708

      SHA512

      8635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec

    • C:\Users\Admin\elv4.ooocccxxx
      Filesize

      423KB

      MD5

      b88be642ea7e4f9ad82b5d843edf0ec1

      SHA1

      25fd3517b996858e28cb6cee21ea17c528192ed6

      SHA256

      7738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708

      SHA512

      8635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec

    • C:\Users\Admin\elv4.ooocccxxx
      Filesize

      423KB

      MD5

      b88be642ea7e4f9ad82b5d843edf0ec1

      SHA1

      25fd3517b996858e28cb6cee21ea17c528192ed6

      SHA256

      7738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708

      SHA512

      8635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec

    • C:\Windows\System32\EwwjcLEv\UcztsWCDEnls.dll
      Filesize

      423KB

      MD5

      dd7105e9748a29b5bd61ea57214d57e3

      SHA1

      827b323bda769ba7fb838a231aa4160209266b14

      SHA256

      c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1

      SHA512

      beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7

    • C:\Windows\System32\IamcJtygffhU\kfKACH.dll
      Filesize

      423KB

      MD5

      b88be642ea7e4f9ad82b5d843edf0ec1

      SHA1

      25fd3517b996858e28cb6cee21ea17c528192ed6

      SHA256

      7738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708

      SHA512

      8635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec

    • C:\Windows\System32\OsqmloaQQOOzNzSxU\QfqVMAWmVqSku.dll
      Filesize

      423KB

      MD5

      b88be642ea7e4f9ad82b5d843edf0ec1

      SHA1

      25fd3517b996858e28cb6cee21ea17c528192ed6

      SHA256

      7738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708

      SHA512

      8635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec

    • C:\Windows\System32\QsLzXnyi\KygzyWYhscrJu.dll
      Filesize

      423KB

      MD5

      3929b889987f447cb837ed326860afc6

      SHA1

      9bb1a7622f2bc5a6a51487434a77f395de5e50d7

      SHA256

      b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902

      SHA512

      ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715

    • C:\Windows\System32\TWktcXRLKQx\kzcyBtx.dll
      Filesize

      423KB

      MD5

      3929b889987f447cb837ed326860afc6

      SHA1

      9bb1a7622f2bc5a6a51487434a77f395de5e50d7

      SHA256

      b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902

      SHA512

      ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715

    • C:\Windows\System32\YARSNttqsXGyeO\afLRPlOJYHTaJ.dll
      Filesize

      423KB

      MD5

      3929b889987f447cb837ed326860afc6

      SHA1

      9bb1a7622f2bc5a6a51487434a77f395de5e50d7

      SHA256

      b2aa99def35f913b42b882122c8dd5f72ceeab82f6747f1b659c8632cd6eb902

      SHA512

      ef4db4f06ee1f85ab96aa70fc5dd05a062da6a5d13f9a643afe471f6fdc9fea62ff39f3c951286b7a865c66c53e0e73fd84e2e5030e1843f24fe014ce7ba9715

    • C:\Windows\System32\YCIGLkkRNzgkBL\fOZidzd.dll
      Filesize

      423KB

      MD5

      b88be642ea7e4f9ad82b5d843edf0ec1

      SHA1

      25fd3517b996858e28cb6cee21ea17c528192ed6

      SHA256

      7738d0b8b7c927ca3a92aa49988e2d8bb9bcfa67c09aaa139ae4289f35191708

      SHA512

      8635936e878d2839463e7adb2cd1cbb7b3c0d842d922355d8f281dd4e70a94d5a67222fd8c795a9f1a021ec7a75b78018e5f33b059b5a684bb625930b7a391ec

    • C:\Windows\System32\YGMtwhTMvYHUcupG\BXiCuD.dll
      Filesize

      423KB

      MD5

      dd7105e9748a29b5bd61ea57214d57e3

      SHA1

      827b323bda769ba7fb838a231aa4160209266b14

      SHA256

      c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1

      SHA512

      beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7

    • C:\Windows\System32\YrrUuvZUhl\AXppVfDlAn.dll
      Filesize

      423KB

      MD5

      dd7105e9748a29b5bd61ea57214d57e3

      SHA1

      827b323bda769ba7fb838a231aa4160209266b14

      SHA256

      c987ad0cc79b598bdee9ec7da96b07e82a04cadd73cb3caf85b799731deef9a1

      SHA512

      beca102422697e4cd50b81289bdc5097935f11c0c5acc86b7a69893fb819a3cd225e4b2594a2bb40163fbd68d7ac281b0ff260f30b55cf188112445eb26986b7

    • memory/384-283-0x0000000000000000-mapping.dmp
    • memory/732-146-0x0000000000000000-mapping.dmp
    • memory/1392-251-0x0000000000000000-mapping.dmp
    • memory/1428-151-0x0000000000000000-mapping.dmp
    • memory/1440-224-0x0000000000000000-mapping.dmp
    • memory/1552-201-0x0000000000000000-mapping.dmp
    • memory/1664-260-0x0000000000000000-mapping.dmp
    • memory/2340-190-0x0000000000000000-mapping.dmp
    • memory/2576-213-0x0000000000000000-mapping.dmp
    • memory/2724-206-0x0000000000000000-mapping.dmp
    • memory/2984-195-0x0000000000000000-mapping.dmp
    • memory/3104-157-0x0000000000000000-mapping.dmp
    • memory/3136-139-0x0000000000000000-mapping.dmp
    • memory/3744-254-0x0000000000000000-mapping.dmp
    • memory/3804-218-0x0000000000000000-mapping.dmp
    • memory/4292-162-0x0000000000000000-mapping.dmp
    • memory/4352-277-0x0000000000000000-mapping.dmp
    • memory/4564-272-0x0000000000000000-mapping.dmp
    • memory/4604-143-0x0000000180000000-0x0000000180030000-memory.dmp
      Filesize

      192KB

    • memory/4604-140-0x0000000000000000-mapping.dmp
    • memory/4720-265-0x0000000000000000-mapping.dmp
    • memory/4844-178-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4844-180-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4844-181-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4844-235-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4844-184-0x00007FFB61FD0000-0x00007FFB61FE0000-memory.dmp
      Filesize

      64KB

    • memory/4844-182-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4844-234-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4844-232-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4844-183-0x00007FFB61FD0000-0x00007FFB61FE0000-memory.dmp
      Filesize

      64KB

    • memory/4844-233-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4844-179-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4892-168-0x0000000000000000-mapping.dmp
    • memory/4956-135-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4956-177-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4956-132-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4956-176-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4956-175-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4956-174-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4956-136-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4956-137-0x00007FFB61FD0000-0x00007FFB61FE0000-memory.dmp
      Filesize

      64KB

    • memory/4956-138-0x00007FFB61FD0000-0x00007FFB61FE0000-memory.dmp
      Filesize

      64KB

    • memory/4956-134-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB

    • memory/4956-133-0x00007FFB64030000-0x00007FFB64040000-memory.dmp
      Filesize

      64KB