Analysis

  • max time kernel
    596s
  • max time network
    602s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/02/2023, 19:10

General

  • Target

    ItroublveTSC.exe

  • Size

    3.1MB

  • MD5

    b1d5fd5b035a167b43f81974dbd3a985

  • SHA1

    02cd3e37db9e2ad65fbd952f3e8aacd7c7fae809

  • SHA256

    76267027ff50a34f1257b2b537262aa067eec6c3c4f88ef23349944200ef240b

  • SHA512

    ad75e2cacf989470d8d3b43ce980307e0c3977a0a0e12e8442dece90afc4381b11e514f044c095ec9c2a97002e238f36c1cf1b52d7836f7c0493eaf1145964d4

  • SSDEEP

    98304:UqXpy05Q0N1rsYSZ6BoXh1kkypSH3Oh5BemgOYUm:N405QYtsTEB08T8HehLvlm

Score
9/10

Malware Config

Signatures

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 9 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ItroublveTSC.exe
    "C:\Users\Admin\AppData\Local\Temp\ItroublveTSC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe
      "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs6yFNWE5NnUCCXQIubRI9rZaOa8V31v+LWYEqDLsbfyjy6qS07EfLHzCCRI4729HmGY60lcWMd86WunmSRB2mgunEgpVP5kkzIqNe4FytaiFj7QixVE/C6TyOexZnp+XCE=
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4532
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c compile.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4492
          • C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe
            C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:4188
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4904
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c compile.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3716
          • C:\Users\Admin\AppData\Local\Temp\winhlp32.exe
            C:\Users\Admin\AppData\Local\Temp\winhlp32.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies1"
            5⤵
            • Executes dropped EXE
            PID:3844
          • C:\Users\Admin\AppData\Local\Temp\splwow64.exe
            C:\Users\Admin\AppData\Local\Temp\splwow64.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies2"
            5⤵
            • Executes dropped EXE
            PID:4628
          • C:\Users\Admin\AppData\Local\Temp\hh.exe
            C:\Users\Admin\AppData\Local\Temp\hh.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies3"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:412
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c compile.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2292
          • C:\Users\Admin\AppData\Local\Temp\xwizard.exe
            C:\Users\Admin\AppData\Local\Temp\xwizard.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_History.txt"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2392
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Windows\system32\choice.exe
          choice /C Y /N /D Y /T 3
          4⤵
            PID:428
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe"
        2⤵
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3668
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3668.0.617218523\658311043" -parentBuildID 20200403170909 -prefsHandle 1556 -prefMapHandle 1548 -prefsLen 1 -prefMapSize 220115 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3668 "\\.\pipe\gecko-crash-server-pipe.3668" 1640 gpu
          3⤵
            PID:4184
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3668.3.537126274\2095236218" -childID 1 -isForBrowser -prefsHandle 2268 -prefMapHandle 2232 -prefsLen 122 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3668 "\\.\pipe\gecko-crash-server-pipe.3668" 2252 tab
            3⤵
              PID:3028
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3668.13.727912625\974130537" -childID 2 -isForBrowser -prefsHandle 3424 -prefMapHandle 3420 -prefsLen 6904 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3668 "\\.\pipe\gecko-crash-server-pipe.3668" 3436 tab
              3⤵
                PID:4172
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe"
            1⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:192
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7ffe9ea14f50,0x7ffe9ea14f60,0x7ffe9ea14f70
              2⤵
                PID:224
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1500 /prefetch:2
                2⤵
                  PID:2080
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1860 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:756
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2324 /prefetch:8
                  2⤵
                    PID:2672
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2612 /prefetch:1
                    2⤵
                      PID:2600
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2604 /prefetch:1
                      2⤵
                        PID:2700
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1464 /prefetch:1
                        2⤵
                          PID:3452
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1520
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:1
                          2⤵
                            PID:5008
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:1
                            2⤵
                              PID:4992
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2880 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:512
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3056 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:496
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2600 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3164
                            • C:\Windows\system32\control.exe
                              "C:\Windows\system32\control.exe" /name Microsoft.DateAndTime
                              2⤵
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3924
                              • C:\Windows\System32\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Windows\System32\shell32.dll,Control_RunDLL C:\Windows\System32\timedate.cpl
                                3⤵
                                  PID:1004
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1920 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2248
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4276 /prefetch:8
                                2⤵
                                  PID:5088
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1420 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3396
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,9796483435086129750,10195741724196129310,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3164 /prefetch:8
                                  2⤵
                                    PID:592
                                • C:\Windows\SysWOW64\DllHost.exe
                                  C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                  1⤵
                                    PID:4048

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Temp\Admin_History.txt

                                    Filesize

                                    2B

                                    MD5

                                    f3b25701fe362ec84616a93a45ce9998

                                    SHA1

                                    d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                    SHA256

                                    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                    SHA512

                                    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                  • C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt

                                    Filesize

                                    4KB

                                    MD5

                                    ade77bc657a5e79b695d63d405229395

                                    SHA1

                                    d1dbc18a60cde14ffe99f5408039462033d4230f

                                    SHA256

                                    9c2586ee052f263a0ec4101cd10710787abd43b941207ed3cccb9b0443073ead

                                    SHA512

                                    8e7d1d90f172caa4105c55c3ec42a945e368c3726d53f118508e09553ed50f41972e529a92420490b5c68aa2ee3669e7dbf5db4311d4f1f44092c766f829e408

                                  • C:\Users\Admin\AppData\Local\Temp\Cookies1

                                    Filesize

                                    2B

                                    MD5

                                    f3b25701fe362ec84616a93a45ce9998

                                    SHA1

                                    d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                    SHA256

                                    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                    SHA512

                                    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                  • C:\Users\Admin\AppData\Local\Temp\Cookies3

                                    Filesize

                                    2B

                                    MD5

                                    f3b25701fe362ec84616a93a45ce9998

                                    SHA1

                                    d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                    SHA256

                                    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                    SHA512

                                    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                  • C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    88ab0bb59b0b20816a833ba91c1606d3

                                    SHA1

                                    72c09b7789a4bac8fee41227d101daed8437edeb

                                    SHA256

                                    f4fb42c8312a6002a8783e2a1ab4571eb89e92cd192b1a21e8c4582205c37312

                                    SHA512

                                    05cff2ca00ba940d9371c469bce6ffb4795c845d77525b8a1d4919f708296e66c0a6f3143c5964f5e963955e4f527a70624651113e72dc977f5ef40fa0276857

                                  • C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    88ab0bb59b0b20816a833ba91c1606d3

                                    SHA1

                                    72c09b7789a4bac8fee41227d101daed8437edeb

                                    SHA256

                                    f4fb42c8312a6002a8783e2a1ab4571eb89e92cd192b1a21e8c4582205c37312

                                    SHA512

                                    05cff2ca00ba940d9371c469bce6ffb4795c845d77525b8a1d4919f708296e66c0a6f3143c5964f5e963955e4f527a70624651113e72dc977f5ef40fa0276857

                                  • C:\Users\Admin\AppData\Local\Temp\compile.bat

                                    Filesize

                                    74B

                                    MD5

                                    808099bfbd62ec04f0ed44959bbc6160

                                    SHA1

                                    f4b6853d958c2c4416f6e4a5be8a11d86f64c023

                                    SHA256

                                    f465a1bd2f9a3efcf0589f0b1c234d285f2bebf7416b324271d987a282915ca8

                                    SHA512

                                    e4f75253a402f0f5d5c651cde045757dad0d4312be023fabf279d7c053fde6ba63cf387551a0451585a87f929634e0bfa73a06dac85ecd1bb5bc0b72bb98e1f0

                                  • C:\Users\Admin\AppData\Local\Temp\compile.bat

                                    Filesize

                                    156B

                                    MD5

                                    eb51755b637423154d1341c6ee505f50

                                    SHA1

                                    d71d27e283b26e75e58c0d02f91d91a2e914c959

                                    SHA256

                                    db903aae119dc795581080a528ba04286be11be7e9d417305d77123545fbf0f9

                                    SHA512

                                    e23463fe0a3719c2700826b55f375f60e5e67f3e432aa8e90c5afc8f449fc635aa4c031f9b6fa71344a8da9542585b74e4c812383043868a10a1065d477acee5

                                  • C:\Users\Admin\AppData\Local\Temp\compile.bat

                                    Filesize

                                    71B

                                    MD5

                                    91128da441ad667b8c54ebeadeca7525

                                    SHA1

                                    24b5c77fb68db64cba27c338e4373a455111a8cc

                                    SHA256

                                    50801c4db374acec11831bf7602cd2635bc8964800c67217b25683dce4a45873

                                    SHA512

                                    bd2a8bc4458b1bc85c5a59db872278197bb0a2a2086a1a9aa5b6b876965b9f5586959171f334237588cc6b0f9643f580db2e959f82e451f4a3043a27e4a95cdd

                                  • C:\Users\Admin\AppData\Local\Temp\compile.vbs

                                    Filesize

                                    265B

                                    MD5

                                    ca906422a558f4bc9e471709f62ec1a9

                                    SHA1

                                    e3da070007fdeae52779964df6f71fcb697ffb06

                                    SHA256

                                    abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee

                                    SHA512

                                    661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b

                                  • C:\Users\Admin\AppData\Local\Temp\compile.vbs

                                    Filesize

                                    265B

                                    MD5

                                    ca906422a558f4bc9e471709f62ec1a9

                                    SHA1

                                    e3da070007fdeae52779964df6f71fcb697ffb06

                                    SHA256

                                    abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee

                                    SHA512

                                    661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b

                                  • C:\Users\Admin\AppData\Local\Temp\compile.vbs

                                    Filesize

                                    265B

                                    MD5

                                    ca906422a558f4bc9e471709f62ec1a9

                                    SHA1

                                    e3da070007fdeae52779964df6f71fcb697ffb06

                                    SHA256

                                    abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee

                                    SHA512

                                    661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b

                                  • C:\Users\Admin\AppData\Local\Temp\config

                                    Filesize

                                    108B

                                    MD5

                                    1ba367d0f9aac0f650e65ab7401776c0

                                    SHA1

                                    75cf3295125cfaa0c247ebccc57e63f915198683

                                    SHA256

                                    68c4ec552c98f3b5a4744e4eefadd6364dc8075c2e718b7bcbfc76625aa60d03

                                    SHA512

                                    45ccdf02314fe01948aa2ecddb3b50f68d5b32d8542e3a3aeaf3f2920e2285d3b75ebb81b9eb9fb9e0a446af5a3708720e07672874d5d38871dbdcd09483449c

                                  • C:\Users\Admin\AppData\Local\Temp\hh.exe

                                    Filesize

                                    103KB

                                    MD5

                                    4d4c98eca32b14aeb074db34cd0881e4

                                    SHA1

                                    92f213d609bba05d41d6941652a88c44936663a4

                                    SHA256

                                    4182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f

                                    SHA512

                                    959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf

                                  • C:\Users\Admin\AppData\Local\Temp\hh.exe

                                    Filesize

                                    103KB

                                    MD5

                                    4d4c98eca32b14aeb074db34cd0881e4

                                    SHA1

                                    92f213d609bba05d41d6941652a88c44936663a4

                                    SHA256

                                    4182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f

                                    SHA512

                                    959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf

                                  • C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe

                                    Filesize

                                    391KB

                                    MD5

                                    053778713819beab3df309df472787cd

                                    SHA1

                                    99c7b5827df89b4fafc2b565abed97c58a3c65b8

                                    SHA256

                                    f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe

                                    SHA512

                                    35a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb

                                  • C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe

                                    Filesize

                                    391KB

                                    MD5

                                    053778713819beab3df309df472787cd

                                    SHA1

                                    99c7b5827df89b4fafc2b565abed97c58a3c65b8

                                    SHA256

                                    f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe

                                    SHA512

                                    35a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb

                                  • C:\Users\Admin\AppData\Local\Temp\splwow64.exe

                                    Filesize

                                    49KB

                                    MD5

                                    0d8360781e488e250587a17fbefa646c

                                    SHA1

                                    29bc9b438efd70defa8fc45a6f8ee524143f6d04

                                    SHA256

                                    ebff7d07efda7245192ce6ecd7767578152b515b510c887ca2880a2566071f64

                                    SHA512

                                    940a98f282473c6f706783b41b72eccce88620e12db1f91be6425f087284746e6e10d4d9420b5e79e87ec3a2fd595b9fe301576e39a4db6bd3daa4aa93a9042e

                                  • C:\Users\Admin\AppData\Local\Temp\splwow64.exe

                                    Filesize

                                    49KB

                                    MD5

                                    0d8360781e488e250587a17fbefa646c

                                    SHA1

                                    29bc9b438efd70defa8fc45a6f8ee524143f6d04

                                    SHA256

                                    ebff7d07efda7245192ce6ecd7767578152b515b510c887ca2880a2566071f64

                                    SHA512

                                    940a98f282473c6f706783b41b72eccce88620e12db1f91be6425f087284746e6e10d4d9420b5e79e87ec3a2fd595b9fe301576e39a4db6bd3daa4aa93a9042e

                                  • C:\Users\Admin\AppData\Local\Temp\whysosad

                                    Filesize

                                    3KB

                                    MD5

                                    fc3c88c2080884d6c995d48e172fbc4f

                                    SHA1

                                    cb1dcc479ad2533f390786b0480f66296b847ad3

                                    SHA256

                                    1637ce704a463bd3c91a38aa02d1030107670f91ee3f0dd4fa13d07a77ba2664

                                    SHA512

                                    4807d3bd44a3197d1a9dcf709a1e70e1cf3bf71fe1a9fa1479441b598154c282a620208557a4415a34d23ceb4fd32dda41edbb940b46acb2f00c696648703bf1

                                  • C:\Users\Admin\AppData\Local\Temp\winhlp32.exe

                                    Filesize

                                    184KB

                                    MD5

                                    a776e68f497c996788b406a3dc5089eb

                                    SHA1

                                    45bf5e512752389fe71f20b64aa344f6ca0cad50

                                    SHA256

                                    071e26ddf5323dd9ed6671bcde89df73d78bac2336070e6cb9e3e4b93bde78d1

                                    SHA512

                                    02b1234ad37b768b9bcba74daf16e6b45b777f340dac0b64a85166fdd793955e3d7f88a95142b603b198e504ef1173618f840511bcdb70448f71aed19c009073

                                  • C:\Users\Admin\AppData\Local\Temp\winhlp32.exe

                                    Filesize

                                    184KB

                                    MD5

                                    a776e68f497c996788b406a3dc5089eb

                                    SHA1

                                    45bf5e512752389fe71f20b64aa344f6ca0cad50

                                    SHA256

                                    071e26ddf5323dd9ed6671bcde89df73d78bac2336070e6cb9e3e4b93bde78d1

                                    SHA512

                                    02b1234ad37b768b9bcba74daf16e6b45b777f340dac0b64a85166fdd793955e3d7f88a95142b603b198e504ef1173618f840511bcdb70448f71aed19c009073

                                  • C:\Users\Admin\AppData\Local\Temp\xwizard.cfg

                                    Filesize

                                    1KB

                                    MD5

                                    ae8eed5a6b1470aec0e7fece8b0669ef

                                    SHA1

                                    ca0e896f90c38f3a8bc679ea14c808726d8ef730

                                    SHA256

                                    3f6ca2bc068c8436044daab867f8ff8f75060048b29882cb2ac9fdef1800df9e

                                    SHA512

                                    e79d04f4041edb867fd6bdf4485f78352292782d9405ba81888a1bc62f5039cc46c6cc786ba1fd53284baafa7128e0f875390cb573584ed2d03c3b33c7f93eb6

                                  • C:\Users\Admin\AppData\Local\Temp\xwizard.exe

                                    Filesize

                                    544KB

                                    MD5

                                    df991217f1cfadd9acfa56f878da5ee7

                                    SHA1

                                    0b03b34cfb2985a840db279778ca828e69813116

                                    SHA256

                                    deb1246347ce88e8cdd63a233a64bc2090b839f2d933a3097a2fd8fd913c4112

                                    SHA512

                                    175cde9e0def550f6380b4a9feb6845dfddbb641e2455d9d25dc6bfc7ffc08e654ea731946588961a5825dcc45c8b31972454a330fd97d7170f1991a8dac0316

                                  • C:\Users\Admin\AppData\Local\Temp\xwizard.exe

                                    Filesize

                                    544KB

                                    MD5

                                    df991217f1cfadd9acfa56f878da5ee7

                                    SHA1

                                    0b03b34cfb2985a840db279778ca828e69813116

                                    SHA256

                                    deb1246347ce88e8cdd63a233a64bc2090b839f2d933a3097a2fd8fd913c4112

                                    SHA512

                                    175cde9e0def550f6380b4a9feb6845dfddbb641e2455d9d25dc6bfc7ffc08e654ea731946588961a5825dcc45c8b31972454a330fd97d7170f1991a8dac0316

                                  • memory/3520-177-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-136-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-151-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-152-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-153-0x0000000005190000-0x000000000568E000-memory.dmp

                                    Filesize

                                    5.0MB

                                  • memory/3520-154-0x0000000004E40000-0x0000000004EA6000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/3520-155-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-156-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-157-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-158-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-160-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-159-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-161-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-162-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-163-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-164-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-165-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-166-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-167-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-168-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-169-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-170-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-171-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-172-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-173-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-174-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-175-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-176-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-116-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-117-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-149-0x0000000000E50000-0x0000000001176000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3520-148-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-181-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-118-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-120-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-119-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-121-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-122-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-147-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-123-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-124-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-125-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-126-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-127-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-128-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-129-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-130-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-131-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-146-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-132-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-145-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-133-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-144-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-134-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-135-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-150-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-137-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-143-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-142-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-139-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-141-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-138-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3520-140-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/3608-188-0x000002167B1E0000-0x000002167B202000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3608-189-0x0000021679810000-0x0000021679840000-memory.dmp

                                    Filesize

                                    192KB

                                  • memory/3608-185-0x000002167B160000-0x000002167B1D6000-memory.dmp

                                    Filesize

                                    472KB

                                  • memory/3608-192-0x000002167B9A0000-0x000002167B9D2000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/3608-182-0x0000021679110000-0x00000216793EA000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/3608-183-0x000002167BA60000-0x000002167BDA2000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/3608-193-0x000002167BFD0000-0x000002167C072000-memory.dmp

                                    Filesize

                                    648KB

                                  • memory/3608-194-0x000002167B210000-0x000002167B218000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3608-195-0x000002167B9F0000-0x000002167BA0E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/3608-190-0x0000021679840000-0x000002167984C000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/3608-186-0x000002167B8F0000-0x000002167B9A0000-memory.dmp

                                    Filesize

                                    704KB

                                  • memory/3608-191-0x0000021679880000-0x000002167989A000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/3608-184-0x00000216796D0000-0x00000216796D6000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/3844-349-0x0000000000400000-0x000000000045B000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/3844-277-0x0000000000400000-0x000000000045B000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/4188-204-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/4188-202-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/4188-203-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/4188-205-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/4628-351-0x0000000000400000-0x000000000041B000-memory.dmp

                                    Filesize

                                    108KB

                                  • memory/4628-279-0x0000000000400000-0x000000000041B000-memory.dmp

                                    Filesize

                                    108KB