Analysis

  • max time kernel
    151s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2024 00:56

General

  • Target

    x326.exe

  • Size

    455KB

  • MD5

    c8d9593196962fa5d706a207c16674cd

  • SHA1

    686a8e674e6615d5cd91f7b2cba0c755054b3f69

  • SHA256

    a50078c294c3980c23fc8da34f3fd1dc8ca042e07e0f7f67696d7035ec84700d

  • SHA512

    5ddae80780c6091bfe0ab5e29bc63732c08ce34f677fc341366dcecf6db9e1bd2e0ed24cfe57eface0d19c6f46010f47eb2d74888b91a503dae00651c4a756bf

  • SSDEEP

    12288:XcTpGLwWpFGIWFfDtaY4S0LEy7w0iymL/:XOpEwiFYxsEyHiyK

Malware Config

Extracted

Family

xworm

Version

5.1

C2

104.194.9.116:7000

Mutex

bUezpCDHVjUVS3W9

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot6330888131:AAE5ycZdHuNqV5SVYhHeCfRENn6GuCjwXjs/sendMessage?chat_id=1046049845

aes.plain

Extracted

Family

eternity

Wallets

47vk9PbPuHnEnazCn4tLpwPCWRLSMhpX9PD8WqpjchhTXisimD6j8EvRFDbPQHKUmHVq3vAM3DLytXLg8CqcdRXRFdPe92Q

Attributes
  • payload_urls

    https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Creates new service(s) 1 TTPs
  • Stops running service(s) 3 TTPs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Launches sc.exe 9 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:60
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:668
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:952
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:404
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:432
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1028
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:1052
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1168
                      • C:\Users\Admin\AppData\Local\ServiceHub\msbuild.exe
                        C:\Users\Admin\AppData\Local\ServiceHub\msbuild.exe
                        2⤵
                        • Executes dropped EXE
                        PID:4376
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                      1⤵
                        PID:1200
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                        1⤵
                          PID:1216
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1260
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                            1⤵
                              PID:1332
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                              1⤵
                                PID:1380
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                1⤵
                                  PID:1388
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                  1⤵
                                    PID:1464
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1512
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:4804
                                        • C:\Windows\system32\sihost.exe
                                          sihost.exe
                                          2⤵
                                            PID:4432
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                          1⤵
                                            PID:1548
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1600
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                              1⤵
                                                PID:1648
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1736
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                  1⤵
                                                    PID:1772
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                    1⤵
                                                      PID:1804
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1820
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                        1⤵
                                                          PID:1896
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                          1⤵
                                                            PID:1916
                                                          • C:\Windows\System32\spoolsv.exe
                                                            C:\Windows\System32\spoolsv.exe
                                                            1⤵
                                                              PID:2016
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                              1⤵
                                                                PID:1276
                                                              • C:\Windows\sysmon.exe
                                                                C:\Windows\sysmon.exe
                                                                1⤵
                                                                  PID:2580
                                                                • C:\Users\Admin\AppData\Local\Temp\x326.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\x326.exe"
                                                                  1⤵
                                                                  • Suspicious use of SetThreadContext
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of WriteProcessMemory
                                                                  PID:3572
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                                                                    2⤵
                                                                      PID:632
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                                                                      2⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of WriteProcessMemory
                                                                      PID:1068
                                                                      • C:\Users\Admin\AppData\Local\Temp\envnmy.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\envnmy.exe"
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetThreadContext
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:4340
                                                                        • C:\Program Files\Windows Mail\wab.exe
                                                                          "C:\Program Files\Windows Mail\wab.exe"
                                                                          4⤵
                                                                          • Drops startup file
                                                                          PID:1692
                                                                        • C:\Program Files\Windows Mail\wab.exe
                                                                          "C:\Program Files\Windows Mail\wab.exe"
                                                                          4⤵
                                                                            PID:4348
                                                                        • C:\Users\Admin\AppData\Local\Temp\vvifah.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\vvifah.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetThreadContext
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of WriteProcessMemory
                                                                          PID:3620
                                                                          • C:\Windows\explorer.exe
                                                                            "C:\Windows\explorer.exe"
                                                                            4⤵
                                                                              PID:2948
                                                                            • C:\Windows\explorer.exe
                                                                              "C:\Windows\explorer.exe"
                                                                              4⤵
                                                                                PID:5036
                                                                            • C:\Users\Admin\AppData\Local\Temp\axwtcr.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\axwtcr.exe"
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetThreadContext
                                                                              • Suspicious use of WriteProcessMemory
                                                                              PID:3472
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                                                                                4⤵
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:3644
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "msbuild" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\msbuild.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\msbuild.exe"
                                                                                  5⤵
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:3068
                                                                                  • C:\Windows\SysWOW64\chcp.com
                                                                                    chcp 65001
                                                                                    6⤵
                                                                                      PID:4824
                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                      ping 127.0.0.1
                                                                                      6⤵
                                                                                      • Runs ping.exe
                                                                                      PID:1756
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /create /tn "msbuild" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\msbuild.exe" /rl HIGHEST /f
                                                                                      6⤵
                                                                                      • Creates scheduled task(s)
                                                                                      PID:768
                                                                                    • C:\Users\Admin\AppData\Local\ServiceHub\msbuild.exe
                                                                                      "C:\Users\Admin\AppData\Local\ServiceHub\msbuild.exe"
                                                                                      6⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:4340
                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                                                                                  4⤵
                                                                                    PID:4440
                                                                                • C:\Users\Admin\AppData\Local\Temp\xcukme.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\xcukme.exe"
                                                                                  3⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetThreadContext
                                                                                  PID:4572
                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
                                                                                    4⤵
                                                                                    • Drops file in System32 directory
                                                                                    • Suspicious use of SetThreadContext
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:5048
                                                                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                      5⤵
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:2604
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                      5⤵
                                                                                        PID:1840
                                                                                        • C:\Windows\system32\wusa.exe
                                                                                          wusa /uninstall /kb:890830 /quiet /norestart
                                                                                          6⤵
                                                                                            PID:4768
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          C:\Windows\system32\sc.exe stop UsoSvc
                                                                                          5⤵
                                                                                          • Launches sc.exe
                                                                                          PID:1416
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                          5⤵
                                                                                          • Launches sc.exe
                                                                                          PID:4808
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          C:\Windows\system32\sc.exe stop wuauserv
                                                                                          5⤵
                                                                                          • Launches sc.exe
                                                                                          PID:3180
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          C:\Windows\system32\sc.exe stop bits
                                                                                          5⤵
                                                                                          • Launches sc.exe
                                                                                          PID:2036
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          C:\Windows\system32\sc.exe stop dosvc
                                                                                          5⤵
                                                                                          • Launches sc.exe
                                                                                          PID:2932
                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                          5⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2052
                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                          5⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2076
                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                          5⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2784
                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                          5⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:1876
                                                                                        • C:\Windows\system32\dialer.exe
                                                                                          C:\Windows\system32\dialer.exe
                                                                                          5⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:4712
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          C:\Windows\system32\sc.exe delete "AHIMMUFK"
                                                                                          5⤵
                                                                                          • Launches sc.exe
                                                                                          PID:800
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          C:\Windows\system32\sc.exe create "AHIMMUFK" binpath= "C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe" start= "auto"
                                                                                          5⤵
                                                                                          • Launches sc.exe
                                                                                          PID:2620
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          C:\Windows\system32\sc.exe stop eventlog
                                                                                          5⤵
                                                                                          • Launches sc.exe
                                                                                          PID:2280
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          C:\Windows\system32\sc.exe start "AHIMMUFK"
                                                                                          5⤵
                                                                                          • Launches sc.exe
                                                                                          PID:804
                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                                                                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
                                                                                        4⤵
                                                                                          PID:4740
                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                                                                                      2⤵
                                                                                        PID:1072
                                                                                    • C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe
                                                                                      C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe
                                                                                      1⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:4880

                                                                                    Network

                                                                                    MITRE ATT&CK Enterprise v15

                                                                                    Replay Monitor

                                                                                    Loading Replay Monitor...

                                                                                    Downloads

                                                                                    • C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe

                                                                                      Filesize

                                                                                      51KB

                                                                                      MD5

                                                                                      a5d8dc023c41ebb43e246e09a4ab7344

                                                                                      SHA1

                                                                                      fca59a613fadd61e862d95b7c86df83190307ec9

                                                                                      SHA256

                                                                                      48964056f33d8dd9d1e141e5dedddf645acbb9fa85075ab19bd4590fb3f066df

                                                                                      SHA512

                                                                                      cc47a29abf1580afbe1044f565ca400a6fe0b754539d4866bc3e93c50df311bc397d027d901a489d8cf28db2931449780f5337c359841a9311488b8d64082220

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\msbuild.exe.log

                                                                                      Filesize

                                                                                      321B

                                                                                      MD5

                                                                                      baf5d1398fdb79e947b60fe51e45397f

                                                                                      SHA1

                                                                                      49e7b8389f47b93509d621b8030b75e96bb577af

                                                                                      SHA256

                                                                                      10c8c7b5fa58f8c6b69f44e92a4e2af111b59fcf4f21a07e04b19e14876ccdf8

                                                                                      SHA512

                                                                                      b2c9ef5581d5eae7c17ae260fe9f52344ed737fa851cb44d1cea58a32359d0ac5d0ca3099c970209bd30a0d4af6e504101f21b7054cf5eca91c0831cf12fb413

                                                                                    • C:\Users\Admin\AppData\Local\ServiceHub\msbuild.exe

                                                                                      Filesize

                                                                                      256KB

                                                                                      MD5

                                                                                      8fdf47e0ff70c40ed3a17014aeea4232

                                                                                      SHA1

                                                                                      e6256a0159688f0560b015da4d967f41cbf8c9bd

                                                                                      SHA256

                                                                                      ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82

                                                                                      SHA512

                                                                                      bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uigzkl41.445.ps1

                                                                                      Filesize

                                                                                      60B

                                                                                      MD5

                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                      SHA1

                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                      SHA256

                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                      SHA512

                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                    • C:\Users\Admin\AppData\Local\Temp\axwtcr.exe

                                                                                      Filesize

                                                                                      393KB

                                                                                      MD5

                                                                                      3f3a51617811e9581aba50376599efa6

                                                                                      SHA1

                                                                                      9b26aa73f43a4db9b216b90d1aa3e2e4d602fde8

                                                                                      SHA256

                                                                                      5f3403e13e316d9320d46233e9f62b183623c46ec80c6c55139efdd72c5ada37

                                                                                      SHA512

                                                                                      9ad5cfb29281dd462b726c7ee239926f83050181fe4f6c3e9057e51df65ae7f850cecbf1cb453287720314275335df36bb8d5299d09a1f73329a5b9292db3ee3

                                                                                    • C:\Users\Admin\AppData\Local\Temp\envnmy.exe

                                                                                      Filesize

                                                                                      627KB

                                                                                      MD5

                                                                                      df5334af39271bda89d9ac884f203f2c

                                                                                      SHA1

                                                                                      cef639c80598577e4068ee9acf084fbd5d21d9c1

                                                                                      SHA256

                                                                                      a2002c8e863f630af9fd7bbfbbc4c3f2deae17a513e0cdbc62cf72bb488bdbed

                                                                                      SHA512

                                                                                      e29e252d3ac0c57a97238242bd11014c876cd52ca64d04ea6886977801431be3abd7ab4c4cbbe80540aa5e1b8e4f9c0f47970cda52731425423c98c0bcae645d

                                                                                    • C:\Users\Admin\AppData\Local\Temp\envnmy.exe

                                                                                      Filesize

                                                                                      756KB

                                                                                      MD5

                                                                                      d76027fe4cfd48c7f8999c796e50e731

                                                                                      SHA1

                                                                                      5026422e84bf445e2d141529e2b808187a30d9f6

                                                                                      SHA256

                                                                                      148da274864c690a7c01119e025bdc0ab94fa9c110c30afb42e51b1c990a2799

                                                                                      SHA512

                                                                                      2e2c4a5319a61555913648702ddcfb8b40d548dcfda1a536a2e85f9cb85d25d9a463743dc866f86b4de99fd10f9c402def424b9e8a203189518f45e924b89d2d

                                                                                    • C:\Users\Admin\AppData\Local\Temp\vvifah.exe

                                                                                      Filesize

                                                                                      12.1MB

                                                                                      MD5

                                                                                      618328df20388d5ed3f44d36d7771886

                                                                                      SHA1

                                                                                      b4ddb6b9beae208c4ef5d4f7e12f7dcf44e5e9b0

                                                                                      SHA256

                                                                                      e489c668b9cccbfa23af8c1be2754983b2fcce21a7e060ac68b8dce7b6239530

                                                                                      SHA512

                                                                                      d59ecc2ab5a3def28e38a3eb844ba43f086b8821368f23d0bfdc98349f2bc646265033bbf7639dd226be40ca4482e56a16a2c40095ed4d7cbfaaeba3726c5bdd

                                                                                    • C:\Users\Admin\AppData\Local\Temp\vvifah.exe

                                                                                      Filesize

                                                                                      12.2MB

                                                                                      MD5

                                                                                      daae7ab5e1324bee8a1c4e95b078838a

                                                                                      SHA1

                                                                                      989815a9a306835bd670a3ce9b5ecb842e390788

                                                                                      SHA256

                                                                                      93f0e71979ee8f6f0a150a66d1cfba3e3b95edad1eed0f43b1c6a2fa9a407351

                                                                                      SHA512

                                                                                      ba30fce5b98a7b20889442cb7a337022f977486410b8d3ae76f24a2edbb5fe62308cdcc167cf70f41d91ebef52843dc10997ec15f510ad02ab753381bf015465

                                                                                    • C:\Users\Admin\AppData\Local\Temp\vvifah.exe

                                                                                      Filesize

                                                                                      10.2MB

                                                                                      MD5

                                                                                      c8d58439084cafa75c41a07313b7160c

                                                                                      SHA1

                                                                                      08d97fd615d5fac241600002788d50df9d81f87a

                                                                                      SHA256

                                                                                      225b4e0a3f21666aee522f910a64b77954cda810174ec8327255b0bef2703b09

                                                                                      SHA512

                                                                                      d0fb41a540bb9401e449fbc36c0c87a32c5f8923bc4097b90ab88cc9143dbbd8f805649cb17d118b1818af4bad18c35f1f426f442d99dbc9d547f139396d0b71

                                                                                    • C:\Users\Admin\AppData\Local\Temp\xcukme.exe

                                                                                      Filesize

                                                                                      3.1MB

                                                                                      MD5

                                                                                      86e00d529b3b454a84b942ac916211e3

                                                                                      SHA1

                                                                                      021c733e5448436b384bf0d3a0ba81f4d0d93f9a

                                                                                      SHA256

                                                                                      30e01b261cb5d7524a303cdbe9d177fc05d74279642e4a87b46ee70045e68d53

                                                                                      SHA512

                                                                                      9a08379b35a3bf1699b925c6dbfc6e85123f1155e567929eaff3683e5e9f196a16775e3a2f6a7585f7c0f0f201ef4be009cda5cf94b160742642145837c3de1e

                                                                                    • memory/60-562-0x0000021CC0200000-0x0000021CC022B000-memory.dmp

                                                                                      Filesize

                                                                                      172KB

                                                                                    • memory/60-566-0x00007FFEA2870000-0x00007FFEA2880000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/612-550-0x00000275886E0000-0x0000027588704000-memory.dmp

                                                                                      Filesize

                                                                                      144KB

                                                                                    • memory/612-552-0x0000027588AD0000-0x0000027588AFB000-memory.dmp

                                                                                      Filesize

                                                                                      172KB

                                                                                    • memory/668-553-0x0000013FFF800000-0x0000013FFF82B000-memory.dmp

                                                                                      Filesize

                                                                                      172KB

                                                                                    • memory/668-556-0x00007FFEA2870000-0x00007FFEA2880000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/952-561-0x00000195B38D0000-0x00000195B38FB000-memory.dmp

                                                                                      Filesize

                                                                                      172KB

                                                                                    • memory/952-565-0x00007FFEA2870000-0x00007FFEA2880000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1068-11-0x0000000005140000-0x0000000005150000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1068-26-0x0000000075090000-0x0000000075840000-memory.dmp

                                                                                      Filesize

                                                                                      7.7MB

                                                                                    • memory/1068-13-0x00000000070C0000-0x0000000007664000-memory.dmp

                                                                                      Filesize

                                                                                      5.6MB

                                                                                    • memory/1068-12-0x0000000006A70000-0x0000000006B02000-memory.dmp

                                                                                      Filesize

                                                                                      584KB

                                                                                    • memory/1068-10-0x0000000005040000-0x00000000050A6000-memory.dmp

                                                                                      Filesize

                                                                                      408KB

                                                                                    • memory/1068-8-0x0000000004FA0000-0x000000000503C000-memory.dmp

                                                                                      Filesize

                                                                                      624KB

                                                                                    • memory/1068-7-0x0000000075090000-0x0000000075840000-memory.dmp

                                                                                      Filesize

                                                                                      7.7MB

                                                                                    • memory/1068-6-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                      Filesize

                                                                                      56KB

                                                                                    • memory/1692-260-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                      Filesize

                                                                                      248KB

                                                                                    • memory/1692-262-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                      Filesize

                                                                                      248KB

                                                                                    • memory/2948-349-0x0000000140000000-0x0000000140058000-memory.dmp

                                                                                      Filesize

                                                                                      352KB

                                                                                    • memory/2948-350-0x0000000140000000-0x0000000140058000-memory.dmp

                                                                                      Filesize

                                                                                      352KB

                                                                                    • memory/2948-352-0x0000000140000000-0x0000000140058000-memory.dmp

                                                                                      Filesize

                                                                                      352KB

                                                                                    • memory/3472-409-0x00007FFED4030000-0x00007FFED404A000-memory.dmp

                                                                                      Filesize

                                                                                      104KB

                                                                                    • memory/3472-401-0x00007FFED4020000-0x00007FFED4042000-memory.dmp

                                                                                      Filesize

                                                                                      136KB

                                                                                    • memory/3472-398-0x00007FFED4030000-0x00007FFED4049000-memory.dmp

                                                                                      Filesize

                                                                                      100KB

                                                                                    • memory/3472-393-0x00007FFED4030000-0x00007FFED404C000-memory.dmp

                                                                                      Filesize

                                                                                      112KB

                                                                                    • memory/3472-391-0x00007FFED43F0000-0x00007FFED4411000-memory.dmp

                                                                                      Filesize

                                                                                      132KB

                                                                                    • memory/3472-375-0x0000018356D60000-0x0000018356D74000-memory.dmp

                                                                                      Filesize

                                                                                      80KB

                                                                                    • memory/3472-412-0x00007FFED4000000-0x00007FFED401C000-memory.dmp

                                                                                      Filesize

                                                                                      112KB

                                                                                    • memory/3572-0-0x000001AF310A0000-0x000001AF310B6000-memory.dmp

                                                                                      Filesize

                                                                                      88KB

                                                                                    • memory/3572-5-0x000001AF4B540000-0x000001AF4B5A4000-memory.dmp

                                                                                      Filesize

                                                                                      400KB

                                                                                    • memory/3572-4-0x000001AF4B520000-0x000001AF4B53E000-memory.dmp

                                                                                      Filesize

                                                                                      120KB

                                                                                    • memory/3572-3-0x000001AF4B7C0000-0x000001AF4B836000-memory.dmp

                                                                                      Filesize

                                                                                      472KB

                                                                                    • memory/3572-2-0x000001AF32DD0000-0x000001AF32DE0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3572-1-0x00007FFEC48E0000-0x00007FFEC53A1000-memory.dmp

                                                                                      Filesize

                                                                                      10.8MB

                                                                                    • memory/3572-9-0x00007FFEC48E0000-0x00007FFEC53A1000-memory.dmp

                                                                                      Filesize

                                                                                      10.8MB

                                                                                    • memory/3644-358-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                                      Filesize

                                                                                      40KB

                                                                                    • memory/4340-40-0x000002A5C4620000-0x000002A5C4650000-memory.dmp

                                                                                      Filesize

                                                                                      192KB

                                                                                    • memory/4340-48-0x000002A5C3910000-0x000002A5C3918000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-58-0x000002A5C4AA0000-0x000002A5C4AC2000-memory.dmp

                                                                                      Filesize

                                                                                      136KB

                                                                                    • memory/4340-59-0x000002A5C5B70000-0x000002A5C5D7A000-memory.dmp

                                                                                      Filesize

                                                                                      2.0MB

                                                                                    • memory/4340-60-0x000002A5C45D0000-0x000002A5C45E0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4340-61-0x000002A5C4AA0000-0x000002A5C4ACA000-memory.dmp

                                                                                      Filesize

                                                                                      168KB

                                                                                    • memory/4340-63-0x000002A5C45D0000-0x000002A5C45D8000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-62-0x000002A5C45D0000-0x000002A5C45D8000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-64-0x000002A5C45D0000-0x000002A5C45D8000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-65-0x000002A5C45D0000-0x000002A5C45D8000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-66-0x000002A5C45D0000-0x000002A5C45D8000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-67-0x000002A5C45D0000-0x000002A5C45D8000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-68-0x000002A5C4DB0000-0x000002A5C4DFA000-memory.dmp

                                                                                      Filesize

                                                                                      296KB

                                                                                    • memory/4340-69-0x000002A5C45D0000-0x000002A5C45E0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4340-70-0x000002A5C4B30000-0x000002A5C4B50000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/4340-71-0x000002A5C45D0000-0x000002A5C45D8000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-72-0x000002A5C45D0000-0x000002A5C45D8000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-73-0x000002A5C45D0000-0x000002A5C45D8000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-74-0x000002A5C45D0000-0x000002A5C45D8000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-75-0x000002A5C4F10000-0x000002A5C4F76000-memory.dmp

                                                                                      Filesize

                                                                                      408KB

                                                                                    • memory/4340-56-0x000002A5C4EC0000-0x000002A5C4F70000-memory.dmp

                                                                                      Filesize

                                                                                      704KB

                                                                                    • memory/4340-55-0x000002A5C4710000-0x000002A5C4730000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/4340-267-0x00007FFED3BA0000-0x00007FFED3BD6000-memory.dmp

                                                                                      Filesize

                                                                                      216KB

                                                                                    • memory/4340-268-0x000002A5C3720000-0x000002A5C3756000-memory.dmp

                                                                                      Filesize

                                                                                      216KB

                                                                                    • memory/4340-276-0x000002A5C38D0000-0x000002A5C38E4000-memory.dmp

                                                                                      Filesize

                                                                                      80KB

                                                                                    • memory/4340-277-0x00007FFED3BB0000-0x00007FFED3BD4000-memory.dmp

                                                                                      Filesize

                                                                                      144KB

                                                                                    • memory/4340-280-0x00007FFED3BB0000-0x00007FFED3BD7000-memory.dmp

                                                                                      Filesize

                                                                                      156KB

                                                                                    • memory/4340-289-0x00007FFECAA30000-0x00007FFECAA4C000-memory.dmp

                                                                                      Filesize

                                                                                      112KB

                                                                                    • memory/4340-291-0x00007FFEBE470000-0x00007FFEBE607000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/4340-293-0x00007FFECAA30000-0x00007FFECAA49000-memory.dmp

                                                                                      Filesize

                                                                                      100KB

                                                                                    • memory/4340-296-0x00007FFEC01A0000-0x00007FFEC01C2000-memory.dmp

                                                                                      Filesize

                                                                                      136KB

                                                                                    • memory/4340-303-0x00007FFECAA30000-0x00007FFECAA4A000-memory.dmp

                                                                                      Filesize

                                                                                      104KB

                                                                                    • memory/4340-305-0x00007FFEBE3C0000-0x00007FFEBE604000-memory.dmp

                                                                                      Filesize

                                                                                      2.3MB

                                                                                    • memory/4340-54-0x000002A5C4710000-0x000002A5C4722000-memory.dmp

                                                                                      Filesize

                                                                                      72KB

                                                                                    • memory/4340-53-0x000002A5C3910000-0x000002A5C391A000-memory.dmp

                                                                                      Filesize

                                                                                      40KB

                                                                                    • memory/4340-52-0x000002A5C4710000-0x000002A5C472A000-memory.dmp

                                                                                      Filesize

                                                                                      104KB

                                                                                    • memory/4340-51-0x000002A5C4810000-0x000002A5C4832000-memory.dmp

                                                                                      Filesize

                                                                                      136KB

                                                                                    • memory/4340-50-0x000002A5C3910000-0x000002A5C3918000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/4340-49-0x000002A5C3910000-0x000002A5C391E000-memory.dmp

                                                                                      Filesize

                                                                                      56KB

                                                                                    • memory/4340-57-0x000002A5C5660000-0x000002A5C57D6000-memory.dmp

                                                                                      Filesize

                                                                                      1.5MB

                                                                                    • memory/4340-47-0x000002A5C4AA0000-0x000002A5C4B3C000-memory.dmp

                                                                                      Filesize

                                                                                      624KB

                                                                                    • memory/4340-46-0x000002A5C4AA0000-0x000002A5C4B1C000-memory.dmp

                                                                                      Filesize

                                                                                      496KB

                                                                                    • memory/4340-45-0x000002A5C45C0000-0x000002A5C45DE000-memory.dmp

                                                                                      Filesize

                                                                                      120KB

                                                                                    • memory/4340-44-0x000002A5C4EC0000-0x000002A5C5289000-memory.dmp

                                                                                      Filesize

                                                                                      3.8MB

                                                                                    • memory/4340-43-0x000002A5C45A0000-0x000002A5C45C2000-memory.dmp

                                                                                      Filesize

                                                                                      136KB

                                                                                    • memory/4340-41-0x000002A5C4D40000-0x000002A5C4DFA000-memory.dmp

                                                                                      Filesize

                                                                                      744KB

                                                                                    • memory/4340-42-0x000002A5C4AA0000-0x000002A5C4B00000-memory.dmp

                                                                                      Filesize

                                                                                      384KB

                                                                                    • memory/4340-38-0x000002A5C4670000-0x000002A5C46B4000-memory.dmp

                                                                                      Filesize

                                                                                      272KB

                                                                                    • memory/4340-39-0x000002A5C3790000-0x000002A5C37A0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4340-37-0x000002A5C4A20000-0x000002A5C4B42000-memory.dmp

                                                                                      Filesize

                                                                                      1.1MB

                                                                                    • memory/4340-36-0x000002A5C45C0000-0x000002A5C45DA000-memory.dmp

                                                                                      Filesize

                                                                                      104KB

                                                                                    • memory/4340-25-0x000002A5A91D0000-0x000002A5A91DE000-memory.dmp

                                                                                      Filesize

                                                                                      56KB

                                                                                    • memory/4340-27-0x00007FFEC4570000-0x00007FFEC5031000-memory.dmp

                                                                                      Filesize

                                                                                      10.8MB

                                                                                    • memory/4340-28-0x000002A5C37A0000-0x000002A5C37B0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4340-29-0x000002A5A9660000-0x000002A5A966A000-memory.dmp

                                                                                      Filesize

                                                                                      40KB

                                                                                    • memory/4340-30-0x000002A5C38B0000-0x000002A5C38CC000-memory.dmp

                                                                                      Filesize

                                                                                      112KB

                                                                                    • memory/4340-31-0x000002A5C38B0000-0x000002A5C38C4000-memory.dmp

                                                                                      Filesize

                                                                                      80KB

                                                                                    • memory/4340-32-0x000002A5C3790000-0x000002A5C37A0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4340-33-0x000002A5C45C0000-0x000002A5C45D8000-memory.dmp

                                                                                      Filesize

                                                                                      96KB

                                                                                    • memory/4340-34-0x000002A5C4760000-0x000002A5C48BA000-memory.dmp

                                                                                      Filesize

                                                                                      1.4MB

                                                                                    • memory/4340-35-0x000002A5C46B0000-0x000002A5C4754000-memory.dmp

                                                                                      Filesize

                                                                                      656KB

                                                                                    • memory/4572-490-0x00007FFED4740000-0x00007FFED4759000-memory.dmp

                                                                                      Filesize

                                                                                      100KB

                                                                                    • memory/4572-494-0x00007FFED4730000-0x00007FFED4752000-memory.dmp

                                                                                      Filesize

                                                                                      136KB

                                                                                    • memory/4572-504-0x00007FFEBEC70000-0x00007FFEBEEB4000-memory.dmp

                                                                                      Filesize

                                                                                      2.3MB

                                                                                    • memory/4572-502-0x00007FFED4740000-0x00007FFED475A000-memory.dmp

                                                                                      Filesize

                                                                                      104KB

                                                                                    • memory/4572-470-0x000001A133C70000-0x000001A133C84000-memory.dmp

                                                                                      Filesize

                                                                                      80KB

                                                                                    • memory/4572-485-0x00007FFED4740000-0x00007FFED475C000-memory.dmp

                                                                                      Filesize

                                                                                      112KB

                                                                                    • memory/4572-487-0x00007FFEBED20000-0x00007FFEBEEB7000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/4572-505-0x00007FFED4710000-0x00007FFED472C000-memory.dmp

                                                                                      Filesize

                                                                                      112KB

                                                                                    • memory/4712-540-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                      Filesize

                                                                                      172KB

                                                                                    • memory/4712-536-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                      Filesize

                                                                                      172KB

                                                                                    • memory/4712-537-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                      Filesize

                                                                                      172KB

                                                                                    • memory/4712-542-0x00007FFEE1920000-0x00007FFEE19DE000-memory.dmp

                                                                                      Filesize

                                                                                      760KB

                                                                                    • memory/4712-541-0x00007FFEE27F0000-0x00007FFEE29E5000-memory.dmp

                                                                                      Filesize

                                                                                      2.0MB

                                                                                    • memory/4712-535-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                      Filesize

                                                                                      172KB

                                                                                    • memory/4712-538-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                      Filesize

                                                                                      172KB

                                                                                    • memory/4712-547-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                      Filesize

                                                                                      172KB

                                                                                    • memory/5048-456-0x0000000140000000-0x00000001402CA000-memory.dmp

                                                                                      Filesize

                                                                                      2.8MB

                                                                                    • memory/5048-458-0x0000000140000000-0x00000001402CA000-memory.dmp

                                                                                      Filesize

                                                                                      2.8MB