Resubmissions

30-07-2024 18:42

240730-xcrcxasgqr 10

30-07-2024 01:54

240730-cbp38ssbjp 10

Analysis

  • max time kernel
    4s
  • max time network
    27s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    30-07-2024 01:54

General

  • Target

    3d8a1274c158597b5f19a3a5e3585359.exe

  • Size

    30.1MB

  • MD5

    3d8a1274c158597b5f19a3a5e3585359

  • SHA1

    2e230262da6e67c3453f3a27d71f85368db28797

  • SHA256

    86b81bf7f83767c4934acaacdc5969d71c3ba8d897447993a4a6ebaaf23dfb6b

  • SHA512

    76031a816caa45a30d4cc14299b4d5b61a63f829212239db53e616e93503da62589c1fc4c62e16dec7e9d9ef4b7fb997ada6ea3d471585a5ee6ec57ad0ef9f29

  • SSDEEP

    786432:bCG6YUg4E4NakUtnEfz7vr85ienl0Zsgf68S1eQ/7:GG6YU1E4NNY5grS1eQ/7

Malware Config

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 3 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d8a1274c158597b5f19a3a5e3585359.exe
    "C:\Users\Admin\AppData\Local\Temp\3d8a1274c158597b5f19a3a5e3585359.exe"
    1⤵
      PID:1512
      • C:\Users\Admin\AppData\Local\Temp\2530.exe
        "C:\Users\Admin\AppData\Local\Temp\2530.exe"
        2⤵
          PID:2228
          • C:\Users\Admin\AppData\Local\Temp\2530.exe
            "C:\Users\Admin\AppData\Local\Temp\2530.exe"
            3⤵
              PID:2924
          • C:\Users\Admin\AppData\Local\Temp\2887140.exe
            "C:\Users\Admin\AppData\Local\Temp\2887140.exe"
            2⤵
              PID:2936
              • C:\Users\Admin\AppData\Local\Temp\2887140.exe
                "C:\Users\Admin\AppData\Local\Temp\2887140.exe"
                3⤵
                  PID:2168
              • C:\Users\Admin\AppData\Local\Temp\Download.exe
                "C:\Users\Admin\AppData\Local\Temp\Download.exe"
                2⤵
                  PID:2932
                • C:\Users\Admin\AppData\Local\Temp\Software.exe
                  "C:\Users\Admin\AppData\Local\Temp\Software.exe"
                  2⤵
                    PID:3040
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      3⤵
                        PID:2260
                    • C:\Users\Admin\AppData\Local\Temp\o.exe
                      "C:\Users\Admin\AppData\Local\Temp\o.exe"
                      2⤵
                        PID:2700
                      • C:\Users\Admin\AppData\Local\Temp\mo332.exe
                        "C:\Users\Admin\AppData\Local\Temp\mo332.exe"
                        2⤵
                          PID:2224
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c "C:\Windows\ndsxuamw\cvxzxnmhrn.exe"
                            3⤵
                              PID:1044
                              • C:\Windows\ndsxuamw\cvxzxnmhrn.exe
                                C:\Windows\ndsxuamw\cvxzxnmhrn.exe
                                4⤵
                                  PID:2472
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 732
                                    5⤵
                                    • Program crash
                                    PID:3068
                            • C:\Users\Admin\AppData\Local\Temp\FreeFortniteVbucks.exe
                              "C:\Users\Admin\AppData\Local\Temp\FreeFortniteVbucks.exe"
                              2⤵
                                PID:2232
                                • C:\Users\Admin\AppData\Local\Temp\sysm.exe
                                  "C:\Users\Admin\AppData\Local\Temp\sysm.exe"
                                  3⤵
                                    PID:2796
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 124
                                      4⤵
                                      • Program crash
                                      PID:2192
                                  • C:\Users\Admin\AppData\Local\Temp\stak.exe
                                    "C:\Users\Admin\AppData\Local\Temp\stak.exe"
                                    3⤵
                                      PID:1268
                                    • C:\Users\Admin\AppData\Local\Temp\rig.exe
                                      "C:\Users\Admin\AppData\Local\Temp\rig.exe"
                                      3⤵
                                        PID:112
                                      • C:\Users\Admin\AppData\Local\Temp\WannaCry.EXE
                                        "C:\Users\Admin\AppData\Local\Temp\WannaCry.EXE"
                                        3⤵
                                          PID:1504
                                          • C:\Windows\SysWOW64\attrib.exe
                                            attrib +h .
                                            4⤵
                                            • Views/modifies file attributes
                                            PID:2264
                                          • C:\Windows\SysWOW64\icacls.exe
                                            icacls . /grant Everyone:F /T /C /Q
                                            4⤵
                                            • Modifies file permissions
                                            PID:852
                                        • C:\Users\Admin\AppData\Local\Temp\Petya.exe
                                          "C:\Users\Admin\AppData\Local\Temp\Petya.exe"
                                          3⤵
                                            PID:2480
                                          • C:\Users\Admin\AppData\Local\Temp\Illuminati.exe
                                            "C:\Users\Admin\AppData\Local\Temp\Illuminati.exe"
                                            3⤵
                                              PID:2720
                                            • C:\Users\Admin\AppData\Local\Temp\Amadey.exe
                                              "C:\Users\Admin\AppData\Local\Temp\Amadey.exe"
                                              3⤵
                                                PID:2256
                                                • \??\c:\programdata\1be588a5b7\gdsun.exe
                                                  c:\programdata\1be588a5b7\gdsun.exe
                                                  4⤵
                                                    PID:2156
                                                    • C:\Windows\SysWOW64\REG.exe
                                                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\ProgramData\1be588a5b7
                                                      5⤵
                                                        PID:1100
                                                  • C:\Users\Admin\AppData\Local\Temp\youwin.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\youwin.exe"
                                                    3⤵
                                                      PID:1776
                                                • C:\Windows\SysWOW64\shimsdivider.exe
                                                  "C:\Windows\SysWOW64\shimsdivider.exe"
                                                  1⤵
                                                    PID:2576
                                                    • C:\Windows\SysWOW64\shimsdivider.exe
                                                      "C:\Windows\SysWOW64\shimsdivider.exe"
                                                      2⤵
                                                        PID:1220

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\ProgramData\0

                                                      MD5

                                                      d41d8cd98f00b204e9800998ecf8427e

                                                      SHA1

                                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                      SHA256

                                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                      SHA512

                                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                    • C:\Users\Admin\AppData\Local\TempMgtWS.bmp

                                                      Filesize

                                                      322KB

                                                      MD5

                                                      67d0ccbe9439616cfa416f33906874e7

                                                      SHA1

                                                      7a64de6020b77767a19ce5ba6a425076f1e84183

                                                      SHA256

                                                      00ca0571f9aea13daba403b1a514e87a250ed555e097002260bdc88a844212e3

                                                      SHA512

                                                      7b4fce8374b56f418957d396104ac59f0262820bc90defb86485c3a166ad4e5002405bb62d01c2934c1deab634f86414a26fd1fa634b3223389367a88514e8d3

                                                    • C:\Users\Admin\AppData\Local\Temp\2530.exe

                                                      Filesize

                                                      1.2MB

                                                      MD5

                                                      568d17d6da77a46e35c8094a7c414375

                                                      SHA1

                                                      500fa749471dad4ae40da6aa33fd6b2a53bcf200

                                                      SHA256

                                                      0da56126ffb57acb5bb1a3ffa1c4c0c2605d257988b2d2964344b8f23173f615

                                                      SHA512

                                                      7beb044f8bd366350b267c0fedc8466d2c5fd80b0f791f5697ce4577edced36b668401fd48df90b6c4ced05247d990c5e739e7232a2dcfc059dcc0c6a79d9427

                                                    • C:\Users\Admin\AppData\Local\Temp\2887140.exe

                                                      Filesize

                                                      144KB

                                                      MD5

                                                      fead887648bddd70a05cf7a7090411dd

                                                      SHA1

                                                      250c0de3dc100d265ae495f045a2c47dad3520e9

                                                      SHA256

                                                      dfaf75da62d0561d171217fe893bd818a72ebfccd9d7e7f4c046f5b3ca44794e

                                                      SHA512

                                                      e1f15de084a78bf27a1c62b5d0d31fabd10be13983dca05962c40ea1e8b3f7bb617e92f44a78048d3484d16f5d4b9e42bc8c5a4b02fda0e0f5eb69368149920a

                                                    • C:\Users\Admin\AppData\Local\Temp\Amadey.exe

                                                      Filesize

                                                      49KB

                                                      MD5

                                                      871294e398217876017702c96d0e7854

                                                      SHA1

                                                      35a22da1522bf86659576ed59235f8ed7029e79b

                                                      SHA256

                                                      7fd898dde3a7ed047657e3dc81c3de50ed381857edc53744664332fd98476c54

                                                      SHA512

                                                      047237e3a615839918fe32662524f2de5455734a01cbb2f66017c636f3d08207b3aead79cdff9a94729550ad7eddc2b5950d5e774fb25fba2d0d69e048ca7fe5

                                                    • C:\Users\Admin\AppData\Local\Temp\Config.ini

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      2db7a58f4892054c7077dab88fd68b86

                                                      SHA1

                                                      acf198a9160a872bc8633fc9185ad317e69bf2a4

                                                      SHA256

                                                      01701b302ab45f11729fac64ba33cd7b53abbc94963578d9813a1f5848e75618

                                                      SHA512

                                                      01926e211445f72f6637f7be04af33339f4acd78b3d2e8f4b6b4e0c28ea6c2662ea0aec976cc8a4f875ab1d12ca20eec7ebf59fe3704f76dc4adac3a0766511c

                                                    • C:\Users\Admin\AppData\Local\Temp\Download.exe

                                                      Filesize

                                                      247KB

                                                      MD5

                                                      6a97f4f16e7879967a5c02d143d0bd46

                                                      SHA1

                                                      0898ccf65770813f69bf339462a05a8c6e17be69

                                                      SHA256

                                                      de2274da8cf00dfc6e6e52db43f82210a1fb7fd30016ebdc81347fb2d1f248fa

                                                      SHA512

                                                      0bc14103518a2e234f4e3f4ddc46e91a1ed21c2885fd4eb27d3cf8cd088e4fa4fffcc221ddb404f52794c57d6693b2ce080e797bf33f2322490030e0fce0ac27

                                                    • C:\Users\Admin\AppData\Local\Temp\FreeFortniteVbucks.exe

                                                      Filesize

                                                      8.0MB

                                                      MD5

                                                      1dbf45f8421f347a4fdd0dd971857cb1

                                                      SHA1

                                                      17a69c442c093edb00027af2d08547e9ef28deb9

                                                      SHA256

                                                      acf179d9a61781580b62cd93ed02d88c811863cfb06e69997d3348f1df2ad38d

                                                      SHA512

                                                      92101b92de4338c926b627fb589f9a59a4bc4648a343350b9657a0c403f4addcf92b62b8ebf02b29256284913f9d56d30e5eae1941229d3dfc390739448c1c75

                                                    • C:\Users\Admin\AppData\Local\Temp\FreeFortniteVbucks.exe

                                                      Filesize

                                                      8.4MB

                                                      MD5

                                                      754bc2e822a7cb0951f99c264e8a0d85

                                                      SHA1

                                                      52727e7aad95f308ef2122189fce8c7967505d05

                                                      SHA256

                                                      e56b025d84c0b6c3c1bb1e72b918f56bb56cd05e2e552161bd6dd99d13762659

                                                      SHA512

                                                      ecff53a314d306d5c27f7f63cb93c996f9643b1e435b331770b5abf8a0ace41a934e51d9919c87a30fb384b3f423d4e22af9dac51f0a63d7320b1b8af5b8e76d

                                                    • C:\Users\Admin\AppData\Local\Temp\Illuminati.exe

                                                      Filesize

                                                      1.1MB

                                                      MD5

                                                      087b2505ac41831c753cf7d1e660c42c

                                                      SHA1

                                                      dcae226923e062291f48de4d3416d38387815c67

                                                      SHA256

                                                      f99e4c9a4dd14d402b16e36988b72f3fe7f34b42157f756dbd14b39c70059336

                                                      SHA512

                                                      10d5f6f7c9f1df66a7afd3dcd2e70288d89bb75a2f6fffa3621b4a4192c40b290eb7c76392b0b282d80925b81d2271c3d1e96a4f406d1f1c0d069a5f6f96c086

                                                    • C:\Users\Admin\AppData\Local\Temp\Petya.exe

                                                      Filesize

                                                      225KB

                                                      MD5

                                                      af2379cc4d607a45ac44d62135fb7015

                                                      SHA1

                                                      39b6d40906c7f7f080e6befa93324dddadcbd9fa

                                                      SHA256

                                                      26b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739

                                                      SHA512

                                                      69899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99

                                                    • C:\Users\Admin\AppData\Local\Temp\Software.exe

                                                      Filesize

                                                      1.6MB

                                                      MD5

                                                      db056b8fa628b67e11bd626192939d6b

                                                      SHA1

                                                      248ca50f39de6b6180265d19fb6eedc68bf25afc

                                                      SHA256

                                                      e7f04e85236f0caafe518bd96369313021969077dba1c4a6d42e694498dab04f

                                                      SHA512

                                                      bca1856b4bb8342c0f6d5ee19edcb420c70e6b272f087d3f8f73daa00842fa00037840a5eb5655e1445af8d578d304874323b2889f75b27136df9366df596336

                                                    • C:\Users\Admin\AppData\Local\Temp\WannaCry.EXE

                                                      Filesize

                                                      3.4MB

                                                      MD5

                                                      84c82835a5d21bbcf75a61706d8ab549

                                                      SHA1

                                                      5ff465afaabcbf0150d1a3ab2c2e74f3a4426467

                                                      SHA256

                                                      ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa

                                                      SHA512

                                                      90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

                                                    • C:\Users\Admin\AppData\Local\Temp\b.wnry

                                                      Filesize

                                                      1.4MB

                                                      MD5

                                                      c17170262312f3be7027bc2ca825bf0c

                                                      SHA1

                                                      f19eceda82973239a1fdc5826bce7691e5dcb4fb

                                                      SHA256

                                                      d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa

                                                      SHA512

                                                      c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c

                                                    • C:\Users\Admin\AppData\Local\Temp\c.wnry

                                                      Filesize

                                                      780B

                                                      MD5

                                                      383a85eab6ecda319bfddd82416fc6c2

                                                      SHA1

                                                      2a9324e1d02c3e41582bf5370043d8afeb02ba6f

                                                      SHA256

                                                      079ce1041cbffe18ff62a2b4a33711eda40f680d0b1d3b551db47e39a6390b21

                                                      SHA512

                                                      c661e0b3c175d31b365362e52d7b152267a15d59517a4bcc493329be20b23d0e4eb62d1ba80bb96447eeaf91a6901f4b34bf173b4ab6f90d4111ea97c87c1252

                                                    • C:\Users\Admin\AppData\Local\Temp\config.txt

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      960488a11206e218a7d5f8d3c6a922c7

                                                      SHA1

                                                      08157cb42445a0a2c26b53e3008bfd65d8587640

                                                      SHA256

                                                      c934145718a750bf309ac0761e829f5e75bab153750d11f101c0bce8f86825fb

                                                      SHA512

                                                      b64cb9abf154315c5a410fb6ac3d3a1a2657591153cd350cc715e7e94fa0b2639dffc9886bc560f2090ea1d55881e5403aed71e8fd68ade7db5dced94917ae02

                                                    • C:\Users\Admin\AppData\Local\Temp\mo332.exe

                                                      Filesize

                                                      10.2MB

                                                      MD5

                                                      561c5c50b3b8a1c8ed72df8965a7f8c0

                                                      SHA1

                                                      f5a5f0ff1557fca50b7b741a2ad2a7c65f6a3e40

                                                      SHA256

                                                      cecc692fd7464a579d8520e5e782ae87f765e87131a16c5ad5ae22855468eabc

                                                      SHA512

                                                      43aeb14aeee34bbdd3911b84ec1804b0ac39a9dff664da40ed1502bb050ca2e3696d94a2759addbcf123d291eb941289a3d4b853bb70484ef98b03529b309876

                                                    • C:\Users\Admin\AppData\Local\Temp\mo332.exe

                                                      Filesize

                                                      12.4MB

                                                      MD5

                                                      65fd83545e7493c883a32046add5239c

                                                      SHA1

                                                      39edaf63302e107fd7797cc917b402c47ed37b20

                                                      SHA256

                                                      94119d10ef811c478b93f34193473144331866e997922214f1d76d496c0ada2e

                                                      SHA512

                                                      fff45ddf7d383a7593c62a7c2f1cd9cf7774b49bed41b7042143278fb4808cb2f5f4d3ab008e37b0433e33c9d5c67cc0ba02806dca3d6e20cac57061c21f2788

                                                    • C:\Users\Admin\AppData\Local\Temp\mo332.exe

                                                      Filesize

                                                      7.4MB

                                                      MD5

                                                      0d100320be57df9764015026adb4d413

                                                      SHA1

                                                      df392aad36bc2eb9cca80bf33a5dbd92196a796f

                                                      SHA256

                                                      1579f47c066c909ba720c8b0b029b759903b60ba516cca2f5f28aef6cfa07fdc

                                                      SHA512

                                                      80a85452a777237212dbc42a56e9db80e80dcfbe1e87e2406295ba65c33c1376b5d9eae9014d86e9fa584726fc2bd4fd816e43589a63258ad89c337ee5023c60

                                                    • C:\Users\Admin\AppData\Local\Temp\msg\m_finnish.wnry

                                                      Filesize

                                                      37KB

                                                      MD5

                                                      35c2f97eea8819b1caebd23fee732d8f

                                                      SHA1

                                                      e354d1cc43d6a39d9732adea5d3b0f57284255d2

                                                      SHA256

                                                      1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e

                                                      SHA512

                                                      908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf

                                                    • C:\Users\Admin\AppData\Local\Temp\o.exe

                                                      Filesize

                                                      110KB

                                                      MD5

                                                      73f0230c31eaca0f8cb20c88b4bd6599

                                                      SHA1

                                                      79d4ceaa753437e14f4baae45c4675a302f4d383

                                                      SHA256

                                                      47b306c80cf27a773d252757397fe9ec0a9571666044276166ede5b5958489ff

                                                      SHA512

                                                      afb59f13e5485e6815ac38a82b68cdf93bc2a8b01f818e88570fd8a50a6debafa2dcdb61ca4812700a0a223b44f60466333114375075b2c76e7a59c73a72bf01

                                                    • C:\Users\Admin\AppData\Local\Temp\rig.exe

                                                      Filesize

                                                      2.4MB

                                                      MD5

                                                      570a9cc9fd20159e92707abe69676299

                                                      SHA1

                                                      864cb610c0c80cf8ff00fd4aaae9b05fa63fd990

                                                      SHA256

                                                      ba52bd426e17cf8902ae05eb8caea7e0510d668db97dedd2cabcd1dc5a06063f

                                                      SHA512

                                                      ba11d2e1888f736d1934e78db6397ae04ea49422beb7392575422ea51cd459ac9b0c8a274397ab828792728364d145c16fc2390242a17a56a8ad02fa4c580f92

                                                    • C:\Users\Admin\AppData\Local\Temp\sysm.exe

                                                      Filesize

                                                      234KB

                                                      MD5

                                                      11af285c2cc20603ef79889bbf6c6ac3

                                                      SHA1

                                                      35433420a2468a0b90fb36eae99c7e16865aabb3

                                                      SHA256

                                                      6cccd484309dec754cbed83d20747928b7e2e0b81afc2222135c4fc08bfc9709

                                                      SHA512

                                                      57d2cc77b8b742b9d0e490bd2433171c82fb86580145a7ec026051342bee8e2d291d5de83e6438e1479a4cc46136fcc6e6695c748f0653171b1d3dc3228c595d

                                                    • C:\Users\Admin\AppData\Local\Temp\youwin.exe

                                                      Filesize

                                                      379KB

                                                      MD5

                                                      c3f3773a596db65c6491b578db621c45

                                                      SHA1

                                                      ba5529fe2d6648ebfa93c17145f5570f448e1111

                                                      SHA256

                                                      dfe2c886d9a6e9b26cdddba621fda00832a59def9813177863723e33c8011b0c

                                                      SHA512

                                                      8d7fab47b741c2e64533c30400cc6b8c20750948f9a9ad4382463ea920021d875eb9dd4d424d182cf25ffdfa96ae2088e89ae8220dd10e161fd9cbb37e213061

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2212144002-1172735686-1556890956-1000\3310a4fa6cb9c60504498d7eea986fc2_5349ca0f-aec5-405f-83e0-aa034653cb76

                                                      Filesize

                                                      50B

                                                      MD5

                                                      45218adff3ea5bde8a8f61987f0f458b

                                                      SHA1

                                                      cf7fffa410795cc2f7703755f0acd17b51a44ad7

                                                      SHA256

                                                      f95361b82464704675f559b13c007c9567e5914984042f537122383e747194d4

                                                      SHA512

                                                      8442cac48931075ec5bd31ea82faffc4f64d7b6845d5c477d06fc3d7eefeac1fa366b6880a85709a520a343b5dd3771e69bc4b7482cde50e69e04215927a2018

                                                    • C:\Windows\ndsxuamw\cvxzxnmhrn.exe

                                                      Filesize

                                                      5.8MB

                                                      MD5

                                                      ba13bb81f8df1651cce62ffef0f554f9

                                                      SHA1

                                                      7e06937de3d61a434909cea21bc2be08921108af

                                                      SHA256

                                                      a7b2b241cd86735b09cdb15e6f3954844dc8e20acad1865e294b0c03aa6b4c70

                                                      SHA512

                                                      9179836a04c74304d9a9ac2a9401b8e111ef8c66972ea7d2873a59100423590ff9dee303c8dc8a103e4a22b8beee9948e798f029c693187e43b3270df46ac5a2

                                                    • C:\Windows\ndsxuamw\cvxzxnmhrn.exe

                                                      Filesize

                                                      4.3MB

                                                      MD5

                                                      b5c7080b89729334bcdc2805d3bece62

                                                      SHA1

                                                      10853ee466a1532c06911180d2ab3d12d96317a2

                                                      SHA256

                                                      da23048dcc322f941821699c6f56ad02c5af6442d927dca40ceff932a15a60f1

                                                      SHA512

                                                      62b23f8098af4beb5ffb319588765b6f231c1a2963b44e0879dd5a118f850424d62629fc6fd5f61198536ac01f26bae406c0f13527be41549ccb01cff84b6ada

                                                    • \Users\Admin\AppData\Local\Temp\stak.exe

                                                      Filesize

                                                      3.0MB

                                                      MD5

                                                      ffe2ce6ba8577fc06f29758bc97d7dd8

                                                      SHA1

                                                      cb763099d27d406507f114992f25a9249cb71e10

                                                      SHA256

                                                      c080a88916fe7cb7aac5ae0266b140fc286a1b3e77f0648bd2b211ce98fc1f15

                                                      SHA512

                                                      b9c2de363ad0965c59ca6004f73ebd1d99ca9a19d0e836822433c73db02f6fca139641910ee2fa637d29e57a6c1db2707b05db4387146c6774f36bdf524813ba

                                                    • \Windows\ndsxuamw\cvxzxnmhrn.exe

                                                      Filesize

                                                      4.9MB

                                                      MD5

                                                      f6fb077820fa17f2924abfaed6aaef10

                                                      SHA1

                                                      fc7a940c3dac2649d43b0d61e09467684a54ca38

                                                      SHA256

                                                      208ee348f8ccccfac9dc6a989efb54e7ba420697f26243efa7b12f8f60f841c6

                                                      SHA512

                                                      653fbf21f2eb598c1fa8df6e35c69094cdbbfdd580071cf7b4b2bd3172616bd507d85653acc3f6cbd2d1e2d3d35db7ae0a338c248c1b924344edb961250d1ef3

                                                    • \Windows\ndsxuamw\cvxzxnmhrn.exe

                                                      Filesize

                                                      5.0MB

                                                      MD5

                                                      ef937f19f911fdeb4c81774718232381

                                                      SHA1

                                                      a535367edf0b5e2c0f1096bf9ec23f0c1c2f9a3a

                                                      SHA256

                                                      80d089423980d1def48c24f8fe0ba2d1757e7f11cb9d7369674ca2220d8b92ce

                                                      SHA512

                                                      f0a075c4da053bfcce70ba7c8c65de57c4550ceee28872a1ace9b2c9af77682aa4e38faecc8eb67d3ee5a077f7e79f2ed208e249a9e3044d8094924d911fff52

                                                    • \Windows\ndsxuamw\cvxzxnmhrn.exe

                                                      Filesize

                                                      6.7MB

                                                      MD5

                                                      9f1facb9f7dd07342a07b0856c5b48f2

                                                      SHA1

                                                      44a23fe809534a90b31ac0c290aee432edc542c2

                                                      SHA256

                                                      afbfdbfdda5fd42a6b4ea7b37f7222651e5461d8138355b9b233eba26766fa58

                                                      SHA512

                                                      868371102c2f4559b5316d85ce6ce197ad60566c9ea81c47707e57b64c5c2c5a18615d9918fee1fc1250996b86ba0a375bfa896f0b3145e9d451de046256745f

                                                    • \Windows\ndsxuamw\cvxzxnmhrn.exe

                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      e9032928f5d8334a92b60296c299566d

                                                      SHA1

                                                      d339a80fa7e78d7a23faa71b869df85c92f8e089

                                                      SHA256

                                                      28f3ad1bf286e1b582cf4da22935dc71871a1f4635a0bba0c48a0b03ee9c2d1f

                                                      SHA512

                                                      4aceaee5b67bce7ec89f47685eee2bb2d2de9ffc22505ce8b731151cd7a7cdb5db965b500a92dfbd3e58eca473940f3bf0b5d550a6e68a619e6035f77b5518a6

                                                    • memory/112-146-0x00000000000F0000-0x00000000000F1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/112-142-0x00000000000F0000-0x00000000000F1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/112-147-0x0000000000C50000-0x000000000119D000-memory.dmp

                                                      Filesize

                                                      5.3MB

                                                    • memory/112-144-0x00000000000F0000-0x00000000000F1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1044-126-0x0000000002000000-0x00000000029B6000-memory.dmp

                                                      Filesize

                                                      9.7MB

                                                    • memory/1220-164-0x00000000003C0000-0x00000000003D9000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/1220-160-0x00000000003C0000-0x00000000003D9000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/1268-211-0x0000000077CC0000-0x0000000077CC2000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/1268-214-0x000000013F410000-0x000000013FA88000-memory.dmp

                                                      Filesize

                                                      6.5MB

                                                    • memory/1268-209-0x0000000077CC0000-0x0000000077CC2000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/1268-213-0x0000000077CC0000-0x0000000077CC2000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/1504-268-0x0000000010000000-0x0000000010010000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1512-1-0x0000000000C00000-0x0000000002A1A000-memory.dmp

                                                      Filesize

                                                      30.1MB

                                                    • memory/1512-0-0x000007FEF59B3000-0x000007FEF59B4000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2168-38-0x0000000000170000-0x0000000000189000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2168-34-0x0000000000170000-0x0000000000189000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2224-79-0x0000000000BC0000-0x0000000001C84000-memory.dmp

                                                      Filesize

                                                      16.8MB

                                                    • memory/2224-240-0x0000000000BC0000-0x0000000001C84000-memory.dmp

                                                      Filesize

                                                      16.8MB

                                                    • memory/2228-42-0x0000000000530000-0x0000000000549000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2228-46-0x0000000000530000-0x0000000000549000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2232-83-0x0000000001370000-0x0000000002056000-memory.dmp

                                                      Filesize

                                                      12.9MB

                                                    • memory/2256-290-0x0000000000400000-0x000000000041E000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/2472-135-0x0000000000B70000-0x0000000001526000-memory.dmp

                                                      Filesize

                                                      9.7MB

                                                    • memory/2576-157-0x00000000003B0000-0x00000000003C9000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2576-153-0x00000000003B0000-0x00000000003C9000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2720-244-0x00000000008C0000-0x0000000000C68000-memory.dmp

                                                      Filesize

                                                      3.7MB

                                                    • memory/2924-55-0x0000000000530000-0x0000000000549000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2924-59-0x0000000000530000-0x0000000000549000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2924-166-0x0000000000400000-0x000000000052A000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2936-25-0x00000000000F0000-0x0000000000109000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2936-31-0x0000000000110000-0x0000000000130000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/2936-28-0x0000000000090000-0x00000000000A9000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2936-21-0x00000000000F0000-0x0000000000109000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/3040-245-0x000000007DE70000-0x000000007DFF0000-memory.dmp

                                                      Filesize

                                                      1.5MB