Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 06:55

General

  • Target

    0ece2c6fb27475e05d1a1cb97f90bf071e25b1614284e1180a9aedccb047a32d.exe

  • Size

    784KB

  • MD5

    ec47a45603a8236c6dc98b0ce551435f

  • SHA1

    99244390c76cb52fd8c3369f080029674dec8e7f

  • SHA256

    0ece2c6fb27475e05d1a1cb97f90bf071e25b1614284e1180a9aedccb047a32d

  • SHA512

    44391baed8b77cd9b385049510dc07af48058e7d29d4797f2fa8ccc07c76b0375164a86f4a61e7f88fd8fd7b5923d6ee5d03a3afb3d83010ff0e808b2c70b5dc

  • SSDEEP

    12288:sRWNcr8oxn1k/Kl6bwysjYjN8qTtPn/32R94XfnmDWYpCdXOPw1/9o0679XQon36:HNBI1azsEpTtPnWWmDWOCdeoRqgonq

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:664
    • C:\Windows\system32\winlogon.exe
      winlogon.exe
      1⤵
        PID:588
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          2⤵
            PID:60
          • C:\Windows\system32\fontdrvhost.exe
            "fontdrvhost.exe"
            2⤵
              PID:784
          • C:\Windows\system32\fontdrvhost.exe
            "fontdrvhost.exe"
            1⤵
              PID:776
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
              1⤵
                PID:952
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                1⤵
                  PID:444
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                  1⤵
                    PID:696
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:992
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                        PID:1120
                        • C:\Windows\system32\taskhostw.exe
                          taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                          2⤵
                            PID:2852
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                          1⤵
                            PID:1212
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1324
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:2716
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                1⤵
                                  PID:1468
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                  1⤵
                                    PID:1540
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                    1⤵
                                      PID:1636
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                      1⤵
                                        PID:1656
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                        1⤵
                                          PID:1792
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                          1⤵
                                            PID:1892
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1900
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                              1⤵
                                                PID:1956
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                1⤵
                                                  PID:1972
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
                                                  1⤵
                                                    PID:1688
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                    1⤵
                                                      PID:1716
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                      1⤵
                                                        PID:2308
                                                      • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                        "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                        1⤵
                                                          PID:2404
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                          1⤵
                                                            PID:2316
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                            1⤵
                                                              PID:2412
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                              1⤵
                                                                PID:2440
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                1⤵
                                                                  PID:2504
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                  1⤵
                                                                    PID:2780
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                    1⤵
                                                                      PID:2512
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                      1⤵
                                                                        PID:428
                                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                        1⤵
                                                                          PID:3360
                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                          1⤵
                                                                            PID:3428
                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                            1⤵
                                                                              PID:3724
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                              1⤵
                                                                                PID:5092
                                                                              • C:\Windows\System32\svchost.exe
                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                1⤵
                                                                                  PID:1112
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                  1⤵
                                                                                    PID:4724
                                                                                  • C:\Windows\system32\SppExtComObj.exe
                                                                                    C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                    1⤵
                                                                                      PID:3384
                                                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                      C:\Windows\system32\wbem\wmiprvse.exe
                                                                                      1⤵
                                                                                        PID:5008
                                                                                      • C:\Windows\System32\svchost.exe
                                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                        1⤵
                                                                                          PID:3648
                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                          1⤵
                                                                                            PID:2276
                                                                                          • C:\Windows\System32\svchost.exe
                                                                                            C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                            1⤵
                                                                                              PID:4140
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                                                                                              1⤵
                                                                                                PID:4980
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                1⤵
                                                                                                  PID:2540
                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                  1⤵
                                                                                                    PID:3996
                                                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                    1⤵
                                                                                                      PID:3512
                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                      1⤵
                                                                                                        PID:3252
                                                                                                      • C:\Windows\Explorer.EXE
                                                                                                        C:\Windows\Explorer.EXE
                                                                                                        1⤵
                                                                                                          PID:2644
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\0ece2c6fb27475e05d1a1cb97f90bf071e25b1614284e1180a9aedccb047a32d.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\0ece2c6fb27475e05d1a1cb97f90bf071e25b1614284e1180a9aedccb047a32d.exe"
                                                                                                            2⤵
                                                                                                            • Checks computer location settings
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:4708
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\stub.bat" "
                                                                                                              3⤵
                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                              PID:3976
                                                                                                              • C:\Users\Admin\AppData\Roaming\2file.sfx.exe
                                                                                                                2file.sfx.exe -p123456 -dC:\Users\Admin\AppData\Roaming
                                                                                                                4⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Checks computer location settings
                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                PID:1244
                                                                                                                • C:\Users\Admin\AppData\Roaming\2file.exe
                                                                                                                  "C:\Users\Admin\AppData\Roaming\2file.exe"
                                                                                                                  5⤵
                                                                                                                  • Modifies firewall policy service
                                                                                                                  • Drops file in Drivers directory
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                  PID:4644
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Compress0\java.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Compress0\java.exe"
                                                                                                                    6⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                    PID:2828
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 844
                                                                                                                      7⤵
                                                                                                                      • Program crash
                                                                                                                      PID:1644
                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                                          1⤵
                                                                                                            PID:2472
                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                                                            1⤵
                                                                                                              PID:2148
                                                                                                            • C:\Windows\System32\spoolsv.exe
                                                                                                              C:\Windows\System32\spoolsv.exe
                                                                                                              1⤵
                                                                                                                PID:1056
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                                                                                1⤵
                                                                                                                  PID:1784
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                                                                                                  1⤵
                                                                                                                    PID:1664
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                                                                                    1⤵
                                                                                                                      PID:1576
                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                                                                                      1⤵
                                                                                                                        PID:1432
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                                                                                        1⤵
                                                                                                                          PID:1404
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                                                                                          1⤵
                                                                                                                            PID:1292
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                                                                                            1⤵
                                                                                                                              PID:1168
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
                                                                                                                              1⤵
                                                                                                                                PID:1072
                                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                                                                1⤵
                                                                                                                                  PID:916
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k RPCSS -p
                                                                                                                                  1⤵
                                                                                                                                    PID:900
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k DcomLaunch -p
                                                                                                                                    1⤵
                                                                                                                                      PID:792
                                                                                                                                      • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                        2⤵
                                                                                                                                          PID:4904
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                        1⤵
                                                                                                                                          PID:4116
                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2828 -ip 2828
                                                                                                                                          1⤵
                                                                                                                                            PID:4004
                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2828 -ip 2828
                                                                                                                                            1⤵
                                                                                                                                              PID:1732

                                                                                                                                            Network

                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Compress0\ass.dll

                                                                                                                                                    Filesize

                                                                                                                                                    1B

                                                                                                                                                    MD5

                                                                                                                                                    c4ca4238a0b923820dcc509a6f75849b

                                                                                                                                                    SHA1

                                                                                                                                                    356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                                                    SHA256

                                                                                                                                                    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                                                    SHA512

                                                                                                                                                    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Compress0\java.exe

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                    MD5

                                                                                                                                                    e68122c713a188dcf168fb3043308116

                                                                                                                                                    SHA1

                                                                                                                                                    305e6e76d6a8c659b4a7840dd410e7fb3a90c13f

                                                                                                                                                    SHA256

                                                                                                                                                    38ca9161f576038ef5e197dafe101a10018655ab681e5fc8a9430a427f2fb5a2

                                                                                                                                                    SHA512

                                                                                                                                                    e2f3af7ccd8d7b90c074bfb74b6b9141afe4fc1298ad34d69605a3d6f8c8decab8c72cfbe4202f3b0ad1359f432a38720d91ac15c3f683ef74de9b6e449bad66

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Compress0\java.exe

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                    MD5

                                                                                                                                                    e68122c713a188dcf168fb3043308116

                                                                                                                                                    SHA1

                                                                                                                                                    305e6e76d6a8c659b4a7840dd410e7fb3a90c13f

                                                                                                                                                    SHA256

                                                                                                                                                    38ca9161f576038ef5e197dafe101a10018655ab681e5fc8a9430a427f2fb5a2

                                                                                                                                                    SHA512

                                                                                                                                                    e2f3af7ccd8d7b90c074bfb74b6b9141afe4fc1298ad34d69605a3d6f8c8decab8c72cfbe4202f3b0ad1359f432a38720d91ac15c3f683ef74de9b6e449bad66

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Compress0\type.dll

                                                                                                                                                    Filesize

                                                                                                                                                    3B

                                                                                                                                                    MD5

                                                                                                                                                    98e83379d45538379c2ac4e47c3be81d

                                                                                                                                                    SHA1

                                                                                                                                                    d659d96d15c7a1206f44eb36ed72495563140859

                                                                                                                                                    SHA256

                                                                                                                                                    9095bdb859308b62acf04036ffd4adfe366d7f737d276eb6c46ae434f3816c9b

                                                                                                                                                    SHA512

                                                                                                                                                    789f09c2868b1f6aa75bcdc4a2c761525d7a50617c76a8892307bc268bd0c4a6e4c5359486e556f9f6233a32dc4b5b97e41a63d03a28d2da37d1aa7bf15f8ddb

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\2file.exe

                                                                                                                                                    Filesize

                                                                                                                                                    491KB

                                                                                                                                                    MD5

                                                                                                                                                    fdfee586a74b63a7df7c3f2b38e0f376

                                                                                                                                                    SHA1

                                                                                                                                                    9a631ab43d21fa87b67c7dd8fe39e96304e21e1e

                                                                                                                                                    SHA256

                                                                                                                                                    e702f82dc9223f967c7f3e75310d461e7bf54bb5b86ec7c5b5ce2897962ebfe9

                                                                                                                                                    SHA512

                                                                                                                                                    202ee5529451a7357c7bbbd34eacebf78442d202d03fd95672ddcc3b322d7adb36b3813f2ed7dd6dbecad04f418eadbe3f3f308ee2eb12b816b96891df87b01c

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\2file.exe

                                                                                                                                                    Filesize

                                                                                                                                                    491KB

                                                                                                                                                    MD5

                                                                                                                                                    fdfee586a74b63a7df7c3f2b38e0f376

                                                                                                                                                    SHA1

                                                                                                                                                    9a631ab43d21fa87b67c7dd8fe39e96304e21e1e

                                                                                                                                                    SHA256

                                                                                                                                                    e702f82dc9223f967c7f3e75310d461e7bf54bb5b86ec7c5b5ce2897962ebfe9

                                                                                                                                                    SHA512

                                                                                                                                                    202ee5529451a7357c7bbbd34eacebf78442d202d03fd95672ddcc3b322d7adb36b3813f2ed7dd6dbecad04f418eadbe3f3f308ee2eb12b816b96891df87b01c

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\2file.sfx.exe

                                                                                                                                                    Filesize

                                                                                                                                                    669KB

                                                                                                                                                    MD5

                                                                                                                                                    5d55a4de1afa290c9753f8409576311f

                                                                                                                                                    SHA1

                                                                                                                                                    e119defb23d40070de7fd5f11580e947ffe28a0c

                                                                                                                                                    SHA256

                                                                                                                                                    33c1f9144785744cddf1cb2d971696776359429ed12b44b51905ca7c9f1d51af

                                                                                                                                                    SHA512

                                                                                                                                                    ec2e8375ac6019124ff6e8b79d1309b5ebbc3958ba3a8459a196018f7eaae521be3f9c8794d5a30c2bcfd2ce8784db48f279ea9ab1de8d0357101e9db9b9d95f

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\2file.sfx.exe

                                                                                                                                                    Filesize

                                                                                                                                                    669KB

                                                                                                                                                    MD5

                                                                                                                                                    5d55a4de1afa290c9753f8409576311f

                                                                                                                                                    SHA1

                                                                                                                                                    e119defb23d40070de7fd5f11580e947ffe28a0c

                                                                                                                                                    SHA256

                                                                                                                                                    33c1f9144785744cddf1cb2d971696776359429ed12b44b51905ca7c9f1d51af

                                                                                                                                                    SHA512

                                                                                                                                                    ec2e8375ac6019124ff6e8b79d1309b5ebbc3958ba3a8459a196018f7eaae521be3f9c8794d5a30c2bcfd2ce8784db48f279ea9ab1de8d0357101e9db9b9d95f

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\stub.bat

                                                                                                                                                    Filesize

                                                                                                                                                    34B

                                                                                                                                                    MD5

                                                                                                                                                    fac0485b43c259e150cbeecf6389cde1

                                                                                                                                                    SHA1

                                                                                                                                                    408f98abe8f35947cf01295517a031c8d49e4821

                                                                                                                                                    SHA256

                                                                                                                                                    0b8db8008901617b4eea76655475e44b0e8df91b104112f9191cf269339e06ba

                                                                                                                                                    SHA512

                                                                                                                                                    0e2604a780722876d4475c36b3d49ce0e763dca6fff0b3e3ef0fe831085e473cfe2821377d6f4dc085014d8052179cf611ac5d847161d0de0cbd1f97244fae9f

                                                                                                                                                  • memory/2828-143-0x0000000000400000-0x000000000041D000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    116KB

                                                                                                                                                  • memory/2828-149-0x0000000000400000-0x000000000041D000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    116KB

                                                                                                                                                  • memory/4644-145-0x000000007FE40000-0x000000007FE4C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    48KB

                                                                                                                                                  • memory/4644-150-0x000000007FE40000-0x000000007FE4C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    48KB

                                                                                                                                                  • memory/4644-151-0x000000007FE40000-0x000000007FE4C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    48KB