Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 00:30

General

  • Target

    file.exe

  • Size

    326KB

  • MD5

    4ecc9d9d93e5ff84765dacbb1e54a4c9

  • SHA1

    f2f796276b0aa4adcc02f6b9d11aabf1d97f9a06

  • SHA256

    eba091f4887e9bc9e0308d4e7830b2ae7b50eddb7c53425bd78db0f959ed6524

  • SHA512

    dc093ad97b34a5afad3c324c24425c950f48d5601444c044a718a0e47355a8f125d54a07fd8969ab85a00cce2d3c148a7dc2dcb4628647ed2c8e1ba50955b8cd

  • SSDEEP

    6144:t8Dq7rJx+8v1/uqlAY1IyC2izMNaTPXECyd1uVhf11kNSEO:KDq6OlA2jjizMGXET4XfAkEO

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

vidar

Version

11

Botnet

3a15237aa92dcd8ccca447211fb5fc2a

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

lumma

C2

https://stogeneratmns.shop/api

Signatures

  • Detect Vidar Stealer 13 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 13 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 24 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 23 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 24 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:472
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminKJEGCFBGDH.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1368
        • C:\Users\AdminKJEGCFBGDH.exe
          "C:\Users\AdminKJEGCFBGDH.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3296
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • Checks computer location settings
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4440
            • C:\ProgramData\HIDAFHDHCB.exe
              "C:\ProgramData\HIDAFHDHCB.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3596
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 1060
                7⤵
                • Program crash
                PID:3232
            • C:\ProgramData\FCBAEHCAEG.exe
              "C:\ProgramData\FCBAEHCAEG.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4540
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:3408
            • C:\ProgramData\IJEHIDHDAK.exe
              "C:\ProgramData\IJEHIDHDAK.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1612
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                  PID:952
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • Checks computer location settings
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2484
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminFIECFBAAAF.exe"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:3032
                    • C:\Users\AdminFIECFBAAAF.exe
                      "C:\Users\AdminFIECFBAAAF.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      PID:2208
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        10⤵
                        • Checks computer location settings
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3324
                        • C:\ProgramData\IIEHJEHDBG.exe
                          "C:\ProgramData\IIEHJEHDBG.exe"
                          11⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:4932
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 1060
                            12⤵
                            • Program crash
                            PID:1384
                        • C:\ProgramData\JDBGDHIIDA.exe
                          "C:\ProgramData\JDBGDHIIDA.exe"
                          11⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:3112
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            12⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2600
                        • C:\ProgramData\EBAKKFHJDB.exe
                          "C:\ProgramData\EBAKKFHJDB.exe"
                          11⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:4224
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            12⤵
                            • Checks computer location settings
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Checks processor information in registry
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1080
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminFIECFBAAAF.exe"
                              13⤵
                              • System Location Discovery: System Language Discovery
                              PID:3488
                              • C:\Users\AdminFIECFBAAAF.exe
                                "C:\Users\AdminFIECFBAAAF.exe"
                                14⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:3768
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                  15⤵
                                  • Checks computer location settings
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Checks processor information in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3132
                                  • C:\ProgramData\BKFBAKFCBF.exe
                                    "C:\ProgramData\BKFBAKFCBF.exe"
                                    16⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:3468
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 1060
                                      17⤵
                                      • Program crash
                                      PID:4676
                                  • C:\ProgramData\JKKEBGCGHI.exe
                                    "C:\ProgramData\JKKEBGCGHI.exe"
                                    16⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    PID:640
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                      17⤵
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2784
                                  • C:\ProgramData\DGHIECGCBK.exe
                                    "C:\ProgramData\DGHIECGCBK.exe"
                                    16⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    PID:2208
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                      17⤵
                                        PID:3500
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                        17⤵
                                          PID:2416
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          17⤵
                                          • Checks computer location settings
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Checks processor information in registry
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2588
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminDAKEHIJJKE.exe"
                                            18⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:404
                                            • C:\Users\AdminDAKEHIJJKE.exe
                                              "C:\Users\AdminDAKEHIJJKE.exe"
                                              19⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              PID:4916
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                20⤵
                                                • Checks computer location settings
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                • Checks processor information in registry
                                                PID:1524
                                                • C:\ProgramData\JJDBFCAEBF.exe
                                                  "C:\ProgramData\JJDBFCAEBF.exe"
                                                  21⤵
                                                  • Executes dropped EXE
                                                  PID:2168
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 1060
                                                    22⤵
                                                    • Program crash
                                                    PID:4544
                                                • C:\ProgramData\GDBAKEGIDB.exe
                                                  "C:\ProgramData\GDBAKEGIDB.exe"
                                                  21⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:4556
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                    22⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2560
                                                • C:\ProgramData\DGDAEHCBGI.exe
                                                  "C:\ProgramData\DGDAEHCBGI.exe"
                                                  21⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3636
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                    22⤵
                                                    • Checks computer location settings
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • Checks processor information in registry
                                                    PID:2176
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminBFIIIDAFBF.exe"
                                                      23⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4136
                                                      • C:\Users\AdminBFIIIDAFBF.exe
                                                        "C:\Users\AdminBFIIIDAFBF.exe"
                                                        24⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3432
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                          25⤵
                                                          • Checks computer location settings
                                                          • Loads dropped DLL
                                                          • Checks processor information in registry
                                                          PID:3680
                                                          • C:\ProgramData\CBAFCAKEHD.exe
                                                            "C:\ProgramData\CBAFCAKEHD.exe"
                                                            26⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3780
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 1060
                                                              27⤵
                                                              • Program crash
                                                              PID:4968
                                                          • C:\ProgramData\KECFIDGCBF.exe
                                                            "C:\ProgramData\KECFIDGCBF.exe"
                                                            26⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4804
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                              27⤵
                                                                PID:2956
                                                            • C:\ProgramData\FCBAEHCAEG.exe
                                                              "C:\ProgramData\FCBAEHCAEG.exe"
                                                              26⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              PID:1728
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                27⤵
                                                                  PID:1256
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                  27⤵
                                                                  • Checks computer location settings
                                                                  • Loads dropped DLL
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Checks processor information in registry
                                                                  PID:4444
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminFBGIDHCAAK.exe"
                                                                    28⤵
                                                                      PID:1212
                                                                      • C:\Users\AdminFBGIDHCAAK.exe
                                                                        "C:\Users\AdminFBGIDHCAAK.exe"
                                                                        29⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetThreadContext
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3748
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                          30⤵
                                                                            PID:780
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                            30⤵
                                                                            • Checks computer location settings
                                                                            • Loads dropped DLL
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Checks processor information in registry
                                                                            PID:2168
                                                                            • C:\ProgramData\JDGIIJJDHD.exe
                                                                              "C:\ProgramData\JDGIIJJDHD.exe"
                                                                              31⤵
                                                                              • Checks computer location settings
                                                                              • Drops startup file
                                                                              • Executes dropped EXE
                                                                              • Adds Run key to start application
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:4168
                                                                              • C:\Users\Admin\AppData\Local\Temp\Malewmf\MFDBG.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\Malewmf\MFDBG.exe"
                                                                                32⤵
                                                                                • Executes dropped EXE
                                                                                PID:2936
                                                                                • C:\Users\Admin\AppData\Local\Temp\Malewmf\FDWDZ.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\Malewmf\FDWDZ.exe" --checker
                                                                                  33⤵
                                                                                    PID:3112
                                                                              • C:\ProgramData\JDGIIJJDHD.exe
                                                                                "C:\ProgramData\JDGIIJJDHD.exe"
                                                                                31⤵
                                                                                  PID:4272
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Malewmf\FDWDZ.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\Malewmf\FDWDZ.exe" --checker
                                                                                    32⤵
                                                                                      PID:4636
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminHDBKFHIJKJ.exe"
                                                                              28⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1752
                                                                              • C:\Users\AdminHDBKFHIJKJ.exe
                                                                                "C:\Users\AdminHDBKFHIJKJ.exe"
                                                                                29⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1400
                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                  30⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3004
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCFCBFBGDBK.exe"
                                                                              28⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:4404
                                                                              • C:\Users\AdminCFCBFBGDBK.exe
                                                                                "C:\Users\AdminCFCBFBGDBK.exe"
                                                                                29⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1584
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 1072
                                                                                  30⤵
                                                                                  • Program crash
                                                                                  PID:3152
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HDBKFHIJKJKE" & exit
                                                                          26⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2360
                                                                          • C:\Windows\SysWOW64\timeout.exe
                                                                            timeout /t 10
                                                                            27⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Delays execution with timeout.exe
                                                                            PID:3488
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminIJEHIDHDAK.exe"
                                                                    23⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4180
                                                                    • C:\Users\AdminIJEHIDHDAK.exe
                                                                      "C:\Users\AdminIJEHIDHDAK.exe"
                                                                      24⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetThreadContext
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1796
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                        25⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:4716
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminFIECFBAAAF.exe"
                                                                    23⤵
                                                                      PID:3160
                                                                      • C:\Users\AdminFIECFBAAAF.exe
                                                                        "C:\Users\AdminFIECFBAAAF.exe"
                                                                        24⤵
                                                                        • Executes dropped EXE
                                                                        PID:2632
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 1068
                                                                          25⤵
                                                                          • Program crash
                                                                          PID:1448
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BGHJJDGHCBGD" & exit
                                                                  21⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:556
                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                    timeout /t 10
                                                                    22⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Delays execution with timeout.exe
                                                                    PID:1868
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminDGDAEHCBGI.exe"
                                                            18⤵
                                                              PID:4344
                                                              • C:\Users\AdminDGDAEHCBGI.exe
                                                                "C:\Users\AdminDGDAEHCBGI.exe"
                                                                19⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                PID:2032
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                  20⤵
                                                                    PID:2832
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                    20⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4064
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminECBGCGCGIE.exe"
                                                                18⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:392
                                                                • C:\Users\AdminECBGCGCGIE.exe
                                                                  "C:\Users\AdminECBGCGCGIE.exe"
                                                                  19⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1132
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 1068
                                                                    20⤵
                                                                    • Program crash
                                                                    PID:2872
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\FIIEGDBAEBFI" & exit
                                                            16⤵
                                                              PID:472
                                                              • C:\Windows\SysWOW64\timeout.exe
                                                                timeout /t 10
                                                                17⤵
                                                                • Delays execution with timeout.exe
                                                                PID:2632
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminDAKFIDHDGI.exe"
                                                        13⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2900
                                                        • C:\Users\AdminDAKFIDHDGI.exe
                                                          "C:\Users\AdminDAKFIDHDGI.exe"
                                                          14⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          PID:1728
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                            15⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:4792
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminDGDAEHCBGI.exe"
                                                        13⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4084
                                                        • C:\Users\AdminDGDAEHCBGI.exe
                                                          "C:\Users\AdminDGDAEHCBGI.exe"
                                                          14⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3352
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 1072
                                                            15⤵
                                                            • Program crash
                                                            PID:4656
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\CFCBKKKJJJKK" & exit
                                                    11⤵
                                                      PID:1476
                                                      • C:\Windows\SysWOW64\timeout.exe
                                                        timeout /t 10
                                                        12⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Delays execution with timeout.exe
                                                        PID:3356
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminHDBKFHIJKJ.exe"
                                                8⤵
                                                  PID:708
                                                  • C:\Users\AdminHDBKFHIJKJ.exe
                                                    "C:\Users\AdminHDBKFHIJKJ.exe"
                                                    9⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4900
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                      10⤵
                                                        PID:1792
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                        10⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:4536
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminKJEGCFBGDH.exe"
                                                    8⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3292
                                                    • C:\Users\AdminKJEGCFBGDH.exe
                                                      "C:\Users\AdminKJEGCFBGDH.exe"
                                                      9⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1120
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 1076
                                                        10⤵
                                                        • Program crash
                                                        PID:2308
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BFIIIDAFBFBK" & exit
                                                6⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4852
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 10
                                                  7⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Delays execution with timeout.exe
                                                  PID:3780
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminECBGCGCGIE.exe"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of WriteProcessMemory
                                          PID:2848
                                          • C:\Users\AdminECBGCGCGIE.exe
                                            "C:\Users\AdminECBGCGCGIE.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of WriteProcessMemory
                                            PID:3784
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                              5⤵
                                                PID:4636
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2772
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminGIEBAECAKK.exe"
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of WriteProcessMemory
                                            PID:3796
                                            • C:\Users\AdminGIEBAECAKK.exe
                                              "C:\Users\AdminGIEBAECAKK.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              PID:3000
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 1080
                                                5⤵
                                                • Program crash
                                                PID:2412
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3000 -ip 3000
                                        1⤵
                                          PID:8
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3596 -ip 3596
                                          1⤵
                                            PID:3048
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1120 -ip 1120
                                            1⤵
                                              PID:3852
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4932 -ip 4932
                                              1⤵
                                                PID:2132
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3352 -ip 3352
                                                1⤵
                                                  PID:368
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3468 -ip 3468
                                                  1⤵
                                                    PID:1480
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1132 -ip 1132
                                                    1⤵
                                                      PID:1256
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2168 -ip 2168
                                                      1⤵
                                                        PID:640
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2632 -ip 2632
                                                        1⤵
                                                          PID:4552
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3780 -ip 3780
                                                          1⤵
                                                            PID:4468
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1584 -ip 1584
                                                            1⤵
                                                              PID:3204

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\ProgramData\BFCAAEHJDBKJJKFHJEBK

                                                              Filesize

                                                              48KB

                                                              MD5

                                                              349e6eb110e34a08924d92f6b334801d

                                                              SHA1

                                                              bdfb289daff51890cc71697b6322aa4b35ec9169

                                                              SHA256

                                                              c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                              SHA512

                                                              2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                            • C:\ProgramData\BFCAAEHJDBKJJKFHJEBKFBGDAA

                                                              Filesize

                                                              20KB

                                                              MD5

                                                              49693267e0adbcd119f9f5e02adf3a80

                                                              SHA1

                                                              3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                              SHA256

                                                              d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                              SHA512

                                                              b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                            • C:\ProgramData\BFIIIDAFBFBK\FCFBGI

                                                              Filesize

                                                              116KB

                                                              MD5

                                                              f70aa3fa04f0536280f872ad17973c3d

                                                              SHA1

                                                              50a7b889329a92de1b272d0ecf5fce87395d3123

                                                              SHA256

                                                              8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                              SHA512

                                                              30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                            • C:\ProgramData\BFIIIDAFBFBK\IEHIII

                                                              Filesize

                                                              114KB

                                                              MD5

                                                              3cfabadfcb05a77b204fe1a6b09a5c90

                                                              SHA1

                                                              f106b5ed22265e64bc61dc5cf1e2d33ed12ec18d

                                                              SHA256

                                                              693617c470d7472e751d872341061cfb663f22ee95bdb42f9db01f02cb90df9c

                                                              SHA512

                                                              d5502023a17213919e2e991f5ba2d0d2c08223fd489d876a47a37239b637d03ace9cb9b92deb71460ae4030194ca49ce9e9752e0bf2ccbcd297dc5afe62a4e7b

                                                            • C:\ProgramData\BFIIIDAFBFBK\JKEBFB

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              d0b97efc59f40d7da6fdc04aae2e21c7

                                                              SHA1

                                                              e1428a5d70457c7b0842294228923338383e54e4

                                                              SHA256

                                                              901c4b32b3def650947d955dc9f67bc2c2cbd534bb70cba6b5c8056c2dba8003

                                                              SHA512

                                                              db55f7757b0a9b2291dcf6d5acd80416114e50f609069344c46db339e509ab3361009bc03c90341b3586275fc059a819c6949db0279839d73093134d9c0298be

                                                            • C:\ProgramData\CBAFCAKEHDHDHIDHDGDHJEGHID

                                                              Filesize

                                                              20KB

                                                              MD5

                                                              a603e09d617fea7517059b4924b1df93

                                                              SHA1

                                                              31d66e1496e0229c6a312f8be05da3f813b3fa9e

                                                              SHA256

                                                              ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

                                                              SHA512

                                                              eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

                                                            • C:\ProgramData\CFCBKKKJJJKK\FBKEHJ

                                                              Filesize

                                                              124KB

                                                              MD5

                                                              9618e15b04a4ddb39ed6c496575f6f95

                                                              SHA1

                                                              1c28f8750e5555776b3c80b187c5d15a443a7412

                                                              SHA256

                                                              a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                                                              SHA512

                                                              f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                                                            • C:\ProgramData\CFCBKKKJJJKK\IJEHID

                                                              Filesize

                                                              160KB

                                                              MD5

                                                              f310cf1ff562ae14449e0167a3e1fe46

                                                              SHA1

                                                              85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                              SHA256

                                                              e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                              SHA512

                                                              1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                                            • C:\ProgramData\CFCBKKKJJJKK\KKJKEB

                                                              Filesize

                                                              96KB

                                                              MD5

                                                              40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                              SHA1

                                                              d6582ba879235049134fa9a351ca8f0f785d8835

                                                              SHA256

                                                              cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                              SHA512

                                                              cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                            • C:\ProgramData\CFCBKKKJJJKK\KKJKEB

                                                              Filesize

                                                              5.0MB

                                                              MD5

                                                              1e82b3787b23061611482cee72145da7

                                                              SHA1

                                                              83c11287d68a6f1e5cbb9b39755a85686257fd22

                                                              SHA256

                                                              e86af9a8d23096ac222c9d8416698c962074a9d367abb96680a1bf6c27b619ba

                                                              SHA512

                                                              729268b632b1ce38eb48bea4bd781e886ce04adda5e6ac2608de7023e1ab9e06e7fc304627f9b26e344c42fff603f49713758406002b600e7f844a0541659748

                                                            • C:\ProgramData\ECAEGHIJEHJDHIDHIDAE

                                                              Filesize

                                                              40KB

                                                              MD5

                                                              a182561a527f929489bf4b8f74f65cd7

                                                              SHA1

                                                              8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                              SHA256

                                                              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                              SHA512

                                                              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                            • C:\ProgramData\IJEHIDHDAK.exe

                                                              Filesize

                                                              326KB

                                                              MD5

                                                              4ecc9d9d93e5ff84765dacbb1e54a4c9

                                                              SHA1

                                                              f2f796276b0aa4adcc02f6b9d11aabf1d97f9a06

                                                              SHA256

                                                              eba091f4887e9bc9e0308d4e7830b2ae7b50eddb7c53425bd78db0f959ed6524

                                                              SHA512

                                                              dc093ad97b34a5afad3c324c24425c950f48d5601444c044a718a0e47355a8f125d54a07fd8969ab85a00cce2d3c148a7dc2dcb4628647ed2c8e1ba50955b8cd

                                                            • C:\ProgramData\JDGIIJJDHD.exe

                                                              Filesize

                                                              23KB

                                                              MD5

                                                              56d135563e4ea79d80bd9528aef278b2

                                                              SHA1

                                                              3814b2f307e7c2cd1b9502218d261ac80c477822

                                                              SHA256

                                                              c5bde9544e65b4036c78085a5f3ba08968e644c0ede610bb665d381a054ef977

                                                              SHA512

                                                              93afd764790fe9fe487bde0c2592abd2f34dc125655efffca0b680ef45f78f84abe32a00c08f149ac764857f12f10b68c71ec0d9dc491e799aebae57aa331c14

                                                            • C:\ProgramData\freebl3.dll

                                                              Filesize

                                                              669KB

                                                              MD5

                                                              550686c0ee48c386dfcb40199bd076ac

                                                              SHA1

                                                              ee5134da4d3efcb466081fb6197be5e12a5b22ab

                                                              SHA256

                                                              edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa

                                                              SHA512

                                                              0b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e

                                                            • C:\ProgramData\mozglue.dll

                                                              Filesize

                                                              593KB

                                                              MD5

                                                              c8fd9be83bc728cc04beffafc2907fe9

                                                              SHA1

                                                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                              SHA256

                                                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                              SHA512

                                                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                            • C:\ProgramData\msvcp140.dll

                                                              Filesize

                                                              439KB

                                                              MD5

                                                              5ff1fca37c466d6723ec67be93b51442

                                                              SHA1

                                                              34cc4e158092083b13d67d6d2bc9e57b798a303b

                                                              SHA256

                                                              5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

                                                              SHA512

                                                              4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

                                                            • C:\ProgramData\msvcp140.dll

                                                              Filesize

                                                              10KB

                                                              MD5

                                                              59435bcd0dee90cb48c62aad7f83a736

                                                              SHA1

                                                              f0ecf60b8ac0d8a33f8bb29cab2056ca0f3830c7

                                                              SHA256

                                                              ff05400ff49ba8b06416290ec8eca3df828ec5c22be34d3d4b803f7c97c91330

                                                              SHA512

                                                              df2f795a908b9aef7b3db513977cb844bf7227b97744cfa985e1b3ff77bf2d8a0110df557aaa9caf1fdb9a4428415beb549b8ca8a242e810e0c5aadc2b940b0b

                                                            • C:\ProgramData\nss3.dll

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              1cc453cdf74f31e4d913ff9c10acdde2

                                                              SHA1

                                                              6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                              SHA256

                                                              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                              SHA512

                                                              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                            • C:\ProgramData\softokn3.dll

                                                              Filesize

                                                              251KB

                                                              MD5

                                                              4e52d739c324db8225bd9ab2695f262f

                                                              SHA1

                                                              71c3da43dc5a0d2a1941e874a6d015a071783889

                                                              SHA256

                                                              74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a

                                                              SHA512

                                                              2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6

                                                            • C:\ProgramData\softokn3.dll

                                                              Filesize

                                                              1024B

                                                              MD5

                                                              85414e833687ab4cce762d248d6d5bd2

                                                              SHA1

                                                              67a548684b7f5940d1292f5b715469f2a537d20d

                                                              SHA256

                                                              adc79a4f50ed3557b42c04cb30a38c0b22fa268d5c087e22e23aa112a339bf30

                                                              SHA512

                                                              50a7fa45029c6ee46459a799ef19f381c48e8904bcd75865e5f9fcfef2e8b6006681ef03c37137a97e6afb00ea737d45fe7e573ee5c424b77de405491b99cdfd

                                                            • C:\ProgramData\vcruntime140.dll

                                                              Filesize

                                                              78KB

                                                              MD5

                                                              a37ee36b536409056a86f50e67777dd7

                                                              SHA1

                                                              1cafa159292aa736fc595fc04e16325b27cd6750

                                                              SHA256

                                                              8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

                                                              SHA512

                                                              3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

                                                            • C:\Users\AdminECBGCGCGIE.exe

                                                              Filesize

                                                              368KB

                                                              MD5

                                                              28f06ee2c727adcae5a328aaf02d95fe

                                                              SHA1

                                                              3c73c34aafb67d828341906877894670d2f113fc

                                                              SHA256

                                                              df52ba7d8ae16928e82e3554558d25b7582d3e67025a7dfbb71f6231ba9a7899

                                                              SHA512

                                                              d292b0b49f280ad1a955c1eeb720ef6bbb23339928e4f33326997a1a69f85ddf91fcf6f1e0ccec8f1b969a1c91d29c41b0dbacb249c40b3a83d50c9b9c37a806

                                                            • C:\Users\AdminGIEBAECAKK.exe

                                                              Filesize

                                                              23KB

                                                              MD5

                                                              5c6e3bc21c044f3eaafb78a95da59678

                                                              SHA1

                                                              87b7544b6e165ea9b4cd14a203c1e8369fc68d0c

                                                              SHA256

                                                              dcea5c016aee094deb47607c1fc6c5698ce915dc1e1d515e2ca5c3e0019b2d40

                                                              SHA512

                                                              fc761169783e9c431a9ca16c490c8ea0ad62997a914c4fdc25fa3d2789b6bbeed042117194a2aa4b18bbce3b0bff9862aa56fced64d2b4dbb5c9bab113fe2c37

                                                            • C:\Users\AdminKJEGCFBGDH.exe

                                                              Filesize

                                                              403KB

                                                              MD5

                                                              80729909b073a23f2caf883d9b9dce98

                                                              SHA1

                                                              cf621df3f09b1103e247e1292e6c9d4894e90d92

                                                              SHA256

                                                              b832829177dcfb2f224062fdf796ffdce054c66ac391d4a2efdec7e06aeb69ee

                                                              SHA512

                                                              e197b71e9b91aa83f6ff0ca454a8ea72c66043449901595613d4d6ad8ac0e007e7ed10c6b1a428692eb6d2a29fd114b0afcfe7a678b6fb11b475ea6fb5ce0b05

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                                                              Filesize

                                                              471B

                                                              MD5

                                                              2b36821f56b5af8c6696d071788bdcbf

                                                              SHA1

                                                              19bc0e2633ad82f28beb4e7e72cf3b208f3ba435

                                                              SHA256

                                                              6bd2e70bec06d9aaf7d4a4e43e05ec5cd6d86ba1ee462a4a43881c5fc7e1ab02

                                                              SHA512

                                                              eebf46211ad75641582459ae8fbbefc29a6d402fc03576738dd8d9f17c9675a2befdcfa1d84120202e39a47bcf721e341cdd8628c5b269ee489f6ac038268f1e

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                                                              Filesize

                                                              400B

                                                              MD5

                                                              dc3fe0552ca546245032eb8e26bd84e5

                                                              SHA1

                                                              24e0c2fa578d6778ab0bf17a5e3f83c6994c8472

                                                              SHA256

                                                              12242084dc6c212899e678758254401dcea7d29847e3f7b0e2be521984d4aa16

                                                              SHA512

                                                              1de4d1af9e163fac5462bfb6a6f27b187ec435e6af6f2cc8d988c49a19e3d59ef2751f0e73e01563a8e9e3b8cfda3c983ae19b6ce5a81a662a65700a9fe3f15a

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IJEHIDHDAK.exe.log

                                                              Filesize

                                                              425B

                                                              MD5

                                                              4eaca4566b22b01cd3bc115b9b0b2196

                                                              SHA1

                                                              e743e0792c19f71740416e7b3c061d9f1336bf94

                                                              SHA256

                                                              34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                                                              SHA512

                                                              bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6809OHQ0\76561199780418869[1].htm

                                                              Filesize

                                                              33KB

                                                              MD5

                                                              ec03bfee9a0a2574626632f838aabfbe

                                                              SHA1

                                                              90c0783843eca2d1bd4dea97417da9676895dfb2

                                                              SHA256

                                                              2d994d2e44f8d7690afa68d5f651359ff980736a396633a895a969350d2a598a

                                                              SHA512

                                                              225c45731716c1074f1ad6e57843b82d0ee00982e3a0d7f85ca9dc146acd2de8ce96f94e79fb69539358a7860bdba1f6964f789f4c0d0a0e335e5cac2024796f

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6809OHQ0\76561199780418869[1].htm

                                                              Filesize

                                                              33KB

                                                              MD5

                                                              2ab670c89c4bac30624982476468eae3

                                                              SHA1

                                                              a9a2f0a8f8aecc470c26362df8cd4932ac61743d

                                                              SHA256

                                                              cd064a4a5c1fec7e3d072ac813858f11e11d8c52cb64d7090e64e805ac9eebfb

                                                              SHA512

                                                              59b79923b1a380e528757636d5c72ca97b53873a543b0d81f1ea1c1bbf5420f51d019486d5eebb2554b82712add465f57bb60546c6487973f513852159978b14

                                                            • memory/472-8-0x0000000000400000-0x0000000000661000-memory.dmp

                                                              Filesize

                                                              2.4MB

                                                            • memory/472-105-0x0000000000400000-0x0000000000661000-memory.dmp

                                                              Filesize

                                                              2.4MB

                                                            • memory/472-9-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                              Filesize

                                                              972KB

                                                            • memory/472-3-0x0000000000400000-0x0000000000661000-memory.dmp

                                                              Filesize

                                                              2.4MB

                                                            • memory/472-6-0x0000000000400000-0x0000000000661000-memory.dmp

                                                              Filesize

                                                              2.4MB

                                                            • memory/2484-252-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                              Filesize

                                                              972KB

                                                            • memory/2772-115-0x0000000000400000-0x0000000000462000-memory.dmp

                                                              Filesize

                                                              392KB

                                                            • memory/2772-119-0x0000000000400000-0x0000000000462000-memory.dmp

                                                              Filesize

                                                              392KB

                                                            • memory/2772-117-0x0000000000400000-0x0000000000462000-memory.dmp

                                                              Filesize

                                                              392KB

                                                            • memory/2968-7-0x0000000074D00000-0x00000000754B0000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/2968-0-0x0000000074D0E000-0x0000000074D0F000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2968-1-0x0000000000530000-0x0000000000586000-memory.dmp

                                                              Filesize

                                                              344KB

                                                            • memory/3000-102-0x00000000002F0000-0x00000000002FC000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/3296-91-0x0000000072EAE000-0x0000000072EAF000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3296-90-0x0000000000C50000-0x0000000000CB8000-memory.dmp

                                                              Filesize

                                                              416KB

                                                            • memory/3784-101-0x00000000007F0000-0x0000000000850000-memory.dmp

                                                              Filesize

                                                              384KB

                                                            • memory/4168-1276-0x0000000000DB0000-0x0000000000DBC000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/4440-128-0x0000000022920000-0x0000000022B7F000-memory.dmp

                                                              Filesize

                                                              2.4MB

                                                            • memory/4440-107-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-143-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-142-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-199-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-127-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-126-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-159-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-109-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-111-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-160-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-190-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-191-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB

                                                            • memory/4440-198-0x0000000000400000-0x0000000000676000-memory.dmp

                                                              Filesize

                                                              2.5MB