Analysis

  • max time kernel
    18s
  • max time network
    21s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-03-2024 14:51

General

  • Target

    230323-gnlc2afg8y.exe

  • Size

    148KB

  • MD5

    6ed3e3327246cc457d22bb92bd3bba8b

  • SHA1

    1329a6af26f16bb371782ff404d526eec1af9d22

  • SHA256

    72d4375c5fe2533acb5e378ddbd3c55f87c61003a492caffdcb40db988c49503

  • SHA512

    f6c5428adffc10294204e0b068510d91fced02bbe02158a21294ebd5baf249aff0264021cbf7b2b9b37533b1db4daa09113abaa84435f4aa7660849f9b9257f7

  • SSDEEP

    3072:gqMedjZ064qkGda5bFxs0ZUfBpfF6Mq6qUbHlVexC6exvLsBB16UVsh8iSd:+A0rAda5bFxvYptdHl4xV+Efuh

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 4 IoCs
  • Detects executables packed with ConfuserEx Mod 3 IoCs
  • UPX dump on OEP (original entry point) 7 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\230323-gnlc2afg8y.exe
    "C:\Users\Admin\AppData\Local\Temp\230323-gnlc2afg8y.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\on3m1ycz.0rd\[email protected]
      "C:\Users\Admin\AppData\Local\Temp\on3m1ycz.0rd\[email protected]"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4140
        • C:\Windows\SysWOW64\cmd.exe
          /c schtasks /Delete /F /TN rhaegal
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2796
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Delete /F /TN rhaegal
            5⤵
              PID:4028
          • C:\Windows\SysWOW64\cmd.exe
            /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 482776516 && exit"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4220
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 482776516 && exit"
              5⤵
              • Creates scheduled task(s)
              PID:1204
          • C:\Windows\SysWOW64\cmd.exe
            /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 15:09:00
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:636
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 15:09:00
              5⤵
              • Creates scheduled task(s)
              PID:4704
          • C:\Windows\44BA.tmp
            "C:\Windows\44BA.tmp" \\.\pipe\{03A0A3D1-9A61-443B-B207-59853C9638D5}
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2008
      • C:\Users\Admin\AppData\Local\Temp\4zwqwajf.ncq\[email protected]
        "C:\Users\Admin\AppData\Local\Temp\4zwqwajf.ncq\[email protected]"
        2⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1296
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM explorer.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4252
      • C:\Users\Admin\AppData\Local\Temp\xkh0f1j5.yv0\[email protected]
        "C:\Users\Admin\AppData\Local\Temp\xkh0f1j5.yv0\[email protected]"
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4864
        • C:\Windows\SysWOW64\netsh.exe
          C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
          3⤵
          • Modifies Windows Firewall
          PID:3888
        • C:\Windows\SysWOW64\netsh.exe
          C:\Windows\system32\netsh.exe advfirewall reset
          3⤵
          • Modifies Windows Firewall
          PID:5020
      • C:\Users\Admin\AppData\Local\Temp\nsogxkx0.uf1\[email protected]
        "C:\Users\Admin\AppData\Local\Temp\nsogxkx0.uf1\[email protected]"
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5100
      • C:\Users\Admin\AppData\Local\Temp\y3ibplgc.ppx\Fantom.exe
        "C:\Users\Admin\AppData\Local\Temp\y3ibplgc.ppx\Fantom.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1896
      • C:\Users\Admin\AppData\Local\Temp\ltuatjb4.px0\[email protected]
        "C:\Users\Admin\AppData\Local\Temp\ltuatjb4.px0\[email protected]"
        2⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Checks processor information in registry
        PID:4848
      • C:\Users\Admin\AppData\Local\Temp\mqrsbokt.lmf\[email protected]
        "C:\Users\Admin\AppData\Local\Temp\mqrsbokt.lmf\[email protected]"
        2⤵
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies WinLogon
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:4192
      • C:\Users\Admin\AppData\Local\Temp\inq1wxvh.rqy\[email protected]
        "C:\Users\Admin\AppData\Local\Temp\inq1wxvh.rqy\[email protected]"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:4152
      • C:\Users\Admin\AppData\Local\Temp\2s3ptohg.bik\[email protected]
        "C:\Users\Admin\AppData\Local\Temp\2s3ptohg.bik\[email protected]"
        2⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of AdjustPrivilegeToken
        PID:4472
      • C:\Users\Admin\AppData\Local\Temp\cx1fdrff.rfj\[email protected]
        "C:\Users\Admin\AppData\Local\Temp\cx1fdrff.rfj\[email protected]"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3740
        • C:\Users\Admin\feoMIMQI\dgMkgUsI.exe
          "C:\Users\Admin\feoMIMQI\dgMkgUsI.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:2552
        • C:\ProgramData\XEwMIsIY\LWIAwkoQ.exe
          "C:\ProgramData\XEwMIsIY\LWIAwkoQ.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:4232
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cx1fdrff.rfj\Endermanch@PolyRansom"
          3⤵
            PID:2480
            • C:\Users\Admin\AppData\Local\Temp\cx1fdrff.rfj\[email protected]
              C:\Users\Admin\AppData\Local\Temp\cx1fdrff.rfj\Endermanch@PolyRansom
              4⤵
              • Executes dropped EXE
              PID:5020
          • C:\Windows\SysWOW64\reg.exe
            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
            3⤵
            • Modifies registry key
            PID:3628
          • C:\Windows\SysWOW64\reg.exe
            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
            3⤵
            • Modifies registry key
            PID:3784
          • C:\Windows\SysWOW64\reg.exe
            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
            3⤵
            • Modifies registry key
            PID:3708
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KIoQswMo.bat" "C:\Users\Admin\AppData\Local\Temp\cx1fdrff.rfj\[email protected]""
            3⤵
              PID:3492

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\icudtl.dat.67D2B1B89C2585D2EE67B417B476F92EA0D26D9FDAE7330325B07A2B54FBD49F

          Filesize

          16B

          MD5

          bb49bd8186549f8689085fbfa3393bb5

          SHA1

          58cb966418485862130e0bfed8242f575ab852b6

          SHA256

          eb13a894b87080ade1d494dba75bd3505f54578a6c21f146c989240a8ad401c7

          SHA512

          31acc677dc33dc6e7994ef690f28145471682d5b41ea61bb27d082a845c271f475d07a62ee94458596d34e01fe22e605d72854e30b95371a2d9dc4387bbf9b61

        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_remove_18.svg.67D2B1B89C2585D2EE67B417B476F92EA0D26D9FDAE7330325B07A2B54FBD49F

          Filesize

          720B

          MD5

          42c7e8b976cc6a8b5a7490bcb87ec8bf

          SHA1

          ba45df0b6f1932a8635f302d3b1e940d20ab1961

          SHA256

          446eee561a09049bfd41e27ef386e165a2b16065b3c28d04d6c5ed9a7aa3b252

          SHA512

          0f2d8233b31c298db75bc0a07f438493b20cfb0272566a5e032e2288e7af62683476e8cb86540f1ab90adf6d9af83ae9d66202dcc8f1afbb467d1dd7c42cce53

        • C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.67D2B1B89C2585D2EE67B417B476F92EA0D26D9FDAE7330325B07A2B54FBD49F

          Filesize

          32KB

          MD5

          1f50c52264bb189ddc4e56d786d7d0ec

          SHA1

          b4eab07a2909d297e8284841a2bc25763282646f

          SHA256

          3c3daaf68dd6762837044fbef0b87fcf1dcd4efdc21a824d0fed17a3243b13df

          SHA512

          7c4c7f271a9bc1f79128b4c69216b7190e9ac7a1ea4ef8b7abc4a4360319bd2c0177795bbffe372d0431f4a8e61d841088c3e2a2cd07bfaee9319b605a6f7173

        • C:\ProgramData\XEwMIsIY\LWIAwkoQ.exe

          Filesize

          186KB

          MD5

          1d4ad9f9604a99c997884fd5ca17e511

          SHA1

          776bf53860b5dcae53f4f611880e84b631296589

          SHA256

          a9e23859e5c1a8a5c52b7d3fd2a1db6b3bb80d1e9e512083aebe9fafae41c5d3

          SHA512

          ac15a75dd772ef86122d1d94d1407982e1538bec8eec4f65398d2b6bfd6eebf31802d2a9059c626dde34b35b8af99f0156e890eef83e7b8564064cafeaffb00f

        • C:\Users\Admin\AppData\Local\Temp\2s3ptohg.bik\[email protected]

          Filesize

          225KB

          MD5

          af2379cc4d607a45ac44d62135fb7015

          SHA1

          39b6d40906c7f7f080e6befa93324dddadcbd9fa

          SHA256

          26b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739

          SHA512

          69899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99

        • C:\Users\Admin\AppData\Local\Temp\4zwqwajf.ncq\[email protected]

          Filesize

          116KB

          MD5

          41789c704a0eecfdd0048b4b4193e752

          SHA1

          fb1e8385691fa3293b7cbfb9b2656cf09f20e722

          SHA256

          b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23

          SHA512

          76391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea

        • C:\Users\Admin\AppData\Local\Temp\cx1fdrff.rfj\[email protected]

          Filesize

          220KB

          MD5

          3ed3fb296a477156bc51aba43d825fc0

          SHA1

          9caa5c658b1a88fee149893d3a00b34a8bb8a1a6

          SHA256

          1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423

          SHA512

          dc3d6e409cee4d54f48d1a25912243d07e2f800578c8e0e348ce515a047ecf5fa3089b46284e0956bbced345957a000eecdc082e6f3060971759d70a14c1c97e

        • C:\Users\Admin\AppData\Local\Temp\inq1wxvh.rqy\[email protected]

          Filesize

          1.4MB

          MD5

          63210f8f1dde6c40a7f3643ccf0ff313

          SHA1

          57edd72391d710d71bead504d44389d0462ccec9

          SHA256

          2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f

          SHA512

          87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11

        • C:\Users\Admin\AppData\Local\Temp\ltuatjb4.px0\[email protected]

          Filesize

          211KB

          MD5

          b805db8f6a84475ef76b795b0d1ed6ae

          SHA1

          7711cb4873e58b7adcf2a2b047b090e78d10c75b

          SHA256

          f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

          SHA512

          62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

        • C:\Users\Admin\AppData\Local\Temp\ltuatjb4.px0\[email protected]

          Filesize

          128KB

          MD5

          3dc436bf6e5358d1e0be5bce3e2110e5

          SHA1

          5ff1e5176f85c06bb34c030f0b50298d5b735fe9

          SHA256

          0a770767756c5f2fa8e7f03c24ea2576c4a515f4bad4c6841304f3ae96719901

          SHA512

          cbbd9813030131b2cf8e568c15b58f6715c98a76cc7f19c55a926089ccef603b9062cee824c04c85916fefc2efde367f928295bef295da19cf3e259f6506de4e

        • C:\Users\Admin\AppData\Local\Temp\mqrsbokt.lmf\[email protected]

          Filesize

          53KB

          MD5

          87ccd6f4ec0e6b706d65550f90b0e3c7

          SHA1

          213e6624bff6064c016b9cdc15d5365823c01f5f

          SHA256

          e79f164ccc75a5d5c032b4c5a96d6ad7604faffb28afe77bc29b9173fa3543e4

          SHA512

          a72403d462e2e2e181dbdabfcc02889f001387943571391befed491aaecba830b0869bdd4d82bca137bd4061bbbfb692871b1b4622c4a7d9f16792c60999c990

        • C:\Users\Admin\AppData\Local\Temp\nsogxkx0.uf1\[email protected]

          Filesize

          484KB

          MD5

          0a7b70efba0aa93d4bc0857b87ac2fcb

          SHA1

          01a6c963b2f5f36ff21a1043587dcf921ae5f5cd

          SHA256

          4f5bff64160044d9a769ab277ff85ba954e2a2e182c6da4d0672790cf1d48309

          SHA512

          2033f9637b8d023242c93f54c140dd561592a3380a15a9fdc8ebfa33385ff4fc569d66c846a01b4ac005f0521b3c219e87f4b1ed2a83557f9d95fa066ad25e14

        • C:\Users\Admin\AppData\Local\Temp\on3m1ycz.0rd\[email protected]

          Filesize

          431KB

          MD5

          fbbdc39af1139aebba4da004475e8839

          SHA1

          de5c8d858e6e41da715dca1c019df0bfb92d32c0

          SHA256

          630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

          SHA512

          74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

        • C:\Users\Admin\AppData\Local\Temp\xkh0f1j5.yv0\[email protected]

          Filesize

          313KB

          MD5

          fe1bc60a95b2c2d77cd5d232296a7fa4

          SHA1

          c07dfdea8da2da5bad036e7c2f5d37582e1cf684

          SHA256

          b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d

          SHA512

          266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89

        • C:\Users\Admin\AppData\Local\Temp\y3ibplgc.ppx\Fantom.exe

          Filesize

          261KB

          MD5

          7d80230df68ccba871815d68f016c282

          SHA1

          e10874c6108a26ceedfc84f50881824462b5b6b6

          SHA256

          f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b

          SHA512

          64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

        • C:\Users\Admin\feoMIMQI\dgMkgUsI.exe

          Filesize

          193KB

          MD5

          8b3a7827a574eb8028e796ea337fffb8

          SHA1

          4112bd1bb956df29b7314f784a48c47ff8a2cd5d

          SHA256

          36e23e4195405a29d36eab82f5fffe5aff053a1cf16dff68bd0ab6746ddd0eee

          SHA512

          d87ed2ca863cc34dd4019631908cc065bb22349407e9e68f1dd56c1e8f1fae73dbbcaac4bfef85bd151cdfceaa1f6d946681b9f0b2645bf3de31e1b5c692bf0a

        • C:\Users\Admin\feoMIMQI\dgMkgUsI.inf

          Filesize

          4B

          MD5

          dc190f13c4e71349fff3025fa635f602

          SHA1

          f1dac85e0f997bb10184e6f6490eaf14829fe574

          SHA256

          4dab8ae7f85626bb568456614e3dfd38648b549e7eb70d89be1d05a7e7be01dc

          SHA512

          404434d0f330a376e1003fd67add156cff53c27285150617d684346c2aab2e41e85caacfe1730e1b98db572825ee5614206626e8531fc6d41f09a5c0335aefb0

        • C:\Users\Admin\feoMIMQI\dgMkgUsI.inf

          Filesize

          4B

          MD5

          ed7ceef7d9e9142201fc14b786d1216c

          SHA1

          0a0e293ed455f0c01d8127e3b7073b868758ff56

          SHA256

          334f70e9b952f20d693cf8c5857a4994936988ae5e9cbf613e0e69a6e68079b7

          SHA512

          6fa12d30b4fb34e2856f2f1ac6625e2e6af087b650cd7161bd540a208efcf5cdc07c169fd93bccb9ec37d94700a386a70fbebb0f8524fb06f3f1730e8df94ab0

        • C:\Users\Admin\feoMIMQI\dgMkgUsI.inf

          Filesize

          4B

          MD5

          ddf643d0ac7369d926d06ca25d0f4dfa

          SHA1

          86d806a8a57fe64114ff2d573e815f642abb1cf9

          SHA256

          5095f1528ccc47be1e17ea14b0126ffce2de55f5fbfd3ac4c74c8a81383da889

          SHA512

          6f5add05100bf25afefa3e76140b000fcc85d55bfc02507ad98f83df2b5e375cb4e58140571e21c78c74ac79c2010ca979aac53787b9ad5c692a44f2518b3c23

        • C:\Users\Admin\feoMIMQI\dgMkgUsI.inf

          Filesize

          4B

          MD5

          b2ce12d2246909faedd22eb62e0f7d3d

          SHA1

          eea8940eae526e8bfe5eb2fa155c73f5eb860c06

          SHA256

          d6c6d7da35af1879d2787d5c0d9566c6d267cea32e7bc8af4df19611173da3e2

          SHA512

          d32b91ae99b1c6b7e2e4063e94aadc2ede9332d4e520f6d490f2be4f025f159cfe46f14e1f7bf35cd182942a969c0a9e23c369624c7ca1e106f65c680b1b3b47

        • C:\Windows\44BA.tmp

          Filesize

          60KB

          MD5

          347ac3b6b791054de3e5720a7144a977

          SHA1

          413eba3973a15c1a6429d9f170f3e8287f98c21c

          SHA256

          301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

          SHA512

          9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

        • C:\Windows\infpub.dat

          Filesize

          401KB

          MD5

          1d724f95c61f1055f0d02c2154bbccd3

          SHA1

          79116fe99f2b421c52ef64097f0f39b815b20907

          SHA256

          579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

          SHA512

          f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

        • memory/1296-52-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1296-51-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1296-48-0x00000000005A0000-0x00000000005A6000-memory.dmp

          Filesize

          24KB

        • memory/1296-49-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1296-47-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1296-139-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1896-136-0x0000000002020000-0x0000000002030000-memory.dmp

          Filesize

          64KB

        • memory/1896-210-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-130-0x00000000023A0000-0x00000000023D2000-memory.dmp

          Filesize

          200KB

        • memory/1896-463-0x0000000002020000-0x0000000002030000-memory.dmp

          Filesize

          64KB

        • memory/1896-216-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-133-0x0000000072AC0000-0x0000000073270000-memory.dmp

          Filesize

          7.7MB

        • memory/1896-135-0x0000000004980000-0x00000000049B2000-memory.dmp

          Filesize

          200KB

        • memory/1896-134-0x0000000002020000-0x0000000002030000-memory.dmp

          Filesize

          64KB

        • memory/1896-212-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-214-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-471-0x00000000049C0000-0x00000000049C1000-memory.dmp

          Filesize

          4KB

        • memory/1896-208-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-140-0x0000000002020000-0x0000000002030000-memory.dmp

          Filesize

          64KB

        • memory/1896-138-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-141-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-490-0x0000000072AC0000-0x0000000073270000-memory.dmp

          Filesize

          7.7MB

        • memory/1896-197-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-195-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-161-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-187-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-157-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-163-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-185-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-183-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-166-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-177-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/1896-181-0x0000000004980000-0x00000000049AB000-memory.dmp

          Filesize

          172KB

        • memory/2552-400-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2696-3-0x00007FFA2BAA0000-0x00007FFA2C561000-memory.dmp

          Filesize

          10.8MB

        • memory/2696-1-0x000001FA01E10000-0x000001FA01E26000-memory.dmp

          Filesize

          88KB

        • memory/2696-131-0x00007FFA2BAA0000-0x00007FFA2C561000-memory.dmp

          Filesize

          10.8MB

        • memory/2696-2-0x000001FA01E30000-0x000001FA01E36000-memory.dmp

          Filesize

          24KB

        • memory/2696-4-0x000001FA1A800000-0x000001FA1A810000-memory.dmp

          Filesize

          64KB

        • memory/2696-473-0x00007FFA2BAA0000-0x00007FFA2C561000-memory.dmp

          Filesize

          10.8MB

        • memory/2696-137-0x000001FA1A800000-0x000001FA1A810000-memory.dmp

          Filesize

          64KB

        • memory/2696-5-0x000001FA1A6E0000-0x000001FA1A718000-memory.dmp

          Filesize

          224KB

        • memory/2696-0-0x000001FA00290000-0x000001FA002BC000-memory.dmp

          Filesize

          176KB

        • memory/3740-366-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/3740-393-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/4140-23-0x0000000002460000-0x00000000024C8000-memory.dmp

          Filesize

          416KB

        • memory/4140-31-0x0000000002460000-0x00000000024C8000-memory.dmp

          Filesize

          416KB

        • memory/4140-80-0x0000000002460000-0x00000000024C8000-memory.dmp

          Filesize

          416KB

        • memory/4152-278-0x0000000002290000-0x000000000235E000-memory.dmp

          Filesize

          824KB

        • memory/4152-285-0x0000000000400000-0x00000000005DE000-memory.dmp

          Filesize

          1.9MB

        • memory/4232-402-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/4472-397-0x0000000000490000-0x00000000004A2000-memory.dmp

          Filesize

          72KB

        • memory/4472-394-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/4848-158-0x0000000072AC0000-0x0000000073270000-memory.dmp

          Filesize

          7.7MB

        • memory/4848-165-0x0000000005560000-0x0000000005570000-memory.dmp

          Filesize

          64KB

        • memory/4848-160-0x0000000000A50000-0x0000000000A8C000-memory.dmp

          Filesize

          240KB

        • memory/4864-388-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4864-67-0x0000000005DA0000-0x0000000005DD1000-memory.dmp

          Filesize

          196KB

        • memory/4864-68-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4864-105-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4864-746-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/5020-495-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/5100-112-0x0000000005D70000-0x0000000006314000-memory.dmp

          Filesize

          5.6MB

        • memory/5100-474-0x0000000072AC0000-0x0000000073270000-memory.dmp

          Filesize

          7.7MB

        • memory/5100-505-0x00000000059C0000-0x00000000059D0000-memory.dmp

          Filesize

          64KB

        • memory/5100-111-0x0000000072AC0000-0x0000000073270000-memory.dmp

          Filesize

          7.7MB

        • memory/5100-110-0x0000000005720000-0x00000000057BC000-memory.dmp

          Filesize

          624KB

        • memory/5100-109-0x0000000000CF0000-0x0000000000D72000-memory.dmp

          Filesize

          520KB

        • memory/5100-113-0x0000000005860000-0x00000000058F2000-memory.dmp

          Filesize

          584KB

        • memory/5100-128-0x00000000059C0000-0x00000000059D0000-memory.dmp

          Filesize

          64KB

        • memory/5100-129-0x00000000057E0000-0x00000000057EA000-memory.dmp

          Filesize

          40KB

        • memory/5100-132-0x0000000005900000-0x0000000005956000-memory.dmp

          Filesize

          344KB