Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    21-04-2021 17:37

General

  • Target

    b0fe18bb22689fb4fe51f4dc5122e31d.exe

  • Size

    350KB

  • MD5

    b0fe18bb22689fb4fe51f4dc5122e31d

  • SHA1

    9d6d249108d971a79a7f2b575ac33f6062db0d35

  • SHA256

    b33514e7b334b8aee694323114c7d2694f3cdb49c7614291ca8f064c23ff8542

  • SHA512

    9ed0ec74b0cff542f0a4c94e8bd895d73471b631d06338eddaaa6b10d62d38c02d7d951bf052d5fc7f86ee82bef625965a20933c3f64516b6d901e24b144e116

Malware Config

Extracted

Family

asyncrat

C2

:

Mutex

Attributes
  • aes_key

  • anti_detection

  • autorun

  • bdos

  • delay

  • host

  • hwid

    Write

  • install_file

  • install_folder

    9wtf8vJWrK9n5Pvmm3.PdjESA4ZeMeJJbLWA4

  • mutex

  • pastebin_config

  • port

  • version

aes.plain

Extracted

Family

smokeloader

Version

2020

C2

http://greenco2020.top/

http://greenco2021.top/

http://greenco2022.top/

rc4.i32
rc4.i32

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Async RAT payload 1 IoCs
  • XMRig Miner Payload 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0fe18bb22689fb4fe51f4dc5122e31d.exe
    "C:\Users\Admin\AppData\Local\Temp\b0fe18bb22689fb4fe51f4dc5122e31d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:788
    • C:\Users\Admin\AppData\Local\Temp\MSBuild.exe
      C:\Users\Admin\AppData\Local\Temp\MSBuild.exe
      2⤵
      • Executes dropped EXE
      PID:276
    • C:\Users\Admin\AppData\Local\Temp\MSBuild.exe
      C:\Users\Admin\AppData\Local\Temp\MSBuild.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:420
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\krgkux.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\krgkux.exe"'
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1584
          • C:\Users\Admin\AppData\Local\Temp\krgkux.exe
            "C:\Users\Admin\AppData\Local\Temp\krgkux.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1528
            • C:\Users\Admin\AppData\Local\Temp\krgkux.exe
              C:\Users\Admin\AppData\Local\Temp\krgkux.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: AddClipboardFormatListener
              PID:1260
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\vewcjo.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:296
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\vewcjo.exe"'
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Users\Admin\AppData\Local\Temp\vewcjo.exe
            "C:\Users\Admin\AppData\Local\Temp\vewcjo.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1572
            • C:\Users\Admin\AppData\Local\Temp\vewcjo.exe
              C:\Users\Admin\AppData\Local\Temp\vewcjo.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              PID:1172
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\issfpb.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1316
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\issfpb.exe"'
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:296
          • C:\Users\Admin\AppData\Local\Temp\issfpb.exe
            "C:\Users\Admin\AppData\Local\Temp\issfpb.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            PID:1756
            • C:\Users\Admin\AppData\Local\Temp\issfpb.exe
              C:\Users\Admin\AppData\Local\Temp\issfpb.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1316
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\zitumu.exe"' & exit
        3⤵
          PID:660
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\zitumu.exe"'
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2012
            • C:\Users\Admin\AppData\Local\Temp\zitumu.exe
              "C:\Users\Admin\AppData\Local\Temp\zitumu.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              PID:1028
              • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
                C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
                6⤵
                • Executes dropped EXE
                PID:916
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ispvtq.exe"' & exit
          3⤵
            PID:1500
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ispvtq.exe"'
              4⤵
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1980
              • C:\Users\Admin\AppData\Local\Temp\ispvtq.exe
                "C:\Users\Admin\AppData\Local\Temp\ispvtq.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:748
                • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
                  C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
                  6⤵
                  • Executes dropped EXE
                  PID:956

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Peripheral Device Discovery

      1
      T1120

      Collection

      Data from Local System

      2
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_1602f747-c1a3-4345-8dec-4dcb8b1f72e5
        MD5

        02ff38ac870de39782aeee04d7b48231

        SHA1

        0390d39fa216c9b0ecdb38238304e518fb2b5095

        SHA256

        fbd66a9baf753db31b8de23f2d51b67f8676687503653103080c45b16f1dc876

        SHA512

        24a1ff76ee42ff7a5ea42843928c4df07b06178f7781cd840e1e086e88735d81506eb67259ff1e6ce5aaa7c5baea03886da265eb7e025ff4dc4c4b5f8cd3e341

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2d686436-375c-4ee1-bd4a-9e44ccd248ba
        MD5

        75a8da7754349b38d64c87c938545b1b

        SHA1

        5c28c257d51f1c1587e29164cc03ea880c21b417

        SHA256

        bf08151c174b5d00c9dbc7907b2c6a01b4be76bfa3afce1e8bd98a04ad833c96

        SHA512

        798797bc74c56c874e9a5fdcb0157c04e37a1b3cce285ef064b01bceef8cec45f11a5198918c6c647220b62883606b5e12e3cca3ea369f3a66e69dea6e15f643

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4375eeb7-a65d-43f1-a616-02c5ad6c5370
        MD5

        be4d72095faf84233ac17b94744f7084

        SHA1

        cc78ce5b9c57573bd214a8f423ee622b00ebb1ec

        SHA256

        b0d72c5c22e57913476ac8fc686a4593f137c6667d5094522c0a0685dabd7adc

        SHA512

        43856e9b1032b8690ceea810c931bed3655e9190414bb220fb6afc136f31b8335e07604dffb28405d4006f266a54cff424c527d29924b1b732c9647a3252b097

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6fe5bd95-2cea-4aea-9c8c-dd67bac4295b
        MD5

        df44874327d79bd75e4264cb8dc01811

        SHA1

        1396b06debed65ea93c24998d244edebd3c0209d

        SHA256

        55de642c5c9e436ec01c57004dae797022442c3245daf7162d19a5585f221181

        SHA512

        95dc9298b8db059bbe746f67e6a7f8515781c7053cc60c01532e47623a996be7e1bd23d1bd8f5f2045adff27454f44930d503c15b695690088841cedbd2a06c3

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fa12b0a1-3d6a-4bab-a74a-253a75ca0598
        MD5

        5e3c7184a75d42dda1a83606a45001d8

        SHA1

        94ca15637721d88f30eb4b6220b805c5be0360ed

        SHA256

        8278033a65d1ff48be4d86e11f87930d187692f59f8bf2f0a9d170de285afb59

        SHA512

        fae99b6e9b106e0f1c30aa4082b25ae1ad643455c1295c2c16ad534e3e611b9b08492353ffe1af1cfdddc9b2b7c330747a64012c45e62b8f4a4982dcc214e05b

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fe80cd26-0cf7-4e38-9884-6dab53b04ca9
        MD5

        b6d38f250ccc9003dd70efd3b778117f

        SHA1

        d5a17c02cac698d4f0a4a9b7d71db2aa19e3f18a

        SHA256

        4de9d7b5ccab7b67ca8efc83084c7ee6e5e872b7216ed4683bc5da950bf41265

        SHA512

        67d8195836b7f280d3f9219fd0f58276342e55d5dfdd8a4c54355030d96685d73f1b2b6da0eb39322ec7c3a1d1c5ef06b52d22646cea30a96f822de1800d31e9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
        MD5

        84859b89a2e2cb9a4e8d2e10adeaad6f

        SHA1

        1a6ddfc0913f4c8f40be6fb74b69cbacf9bbb48c

        SHA256

        e30724949ddf01c6b63b5edf24415e2862935c54d5dff1214af02491b3a70660

        SHA512

        811e50eac12ba87284fdfa97e3f9ed8f7956a21bb95a3c8918d543b405f292dcdbcba85536ed4e14828a46f30e63ed124b0d5093579736f631fdd9c53a9560a6

      • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
        MD5

        819e74edb55fc837f0ae6422473910f7

        SHA1

        97bd0ede064e9137de96e1d709cda83c3670f718

        SHA256

        f34609e99e5629d8b8661aad4bd8ce66eb2378bc06ffabe5be5f73f4a9de60d1

        SHA512

        9610b453d6c1afd5758518217b48c46e50c8864c8dd3f4e61c453a3186b07f459c8e8d352f6aa8022df428fad6f80f586272f5dbdc1b40c20415568ac4507caa

      • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
        MD5

        819e74edb55fc837f0ae6422473910f7

        SHA1

        97bd0ede064e9137de96e1d709cda83c3670f718

        SHA256

        f34609e99e5629d8b8661aad4bd8ce66eb2378bc06ffabe5be5f73f4a9de60d1

        SHA512

        9610b453d6c1afd5758518217b48c46e50c8864c8dd3f4e61c453a3186b07f459c8e8d352f6aa8022df428fad6f80f586272f5dbdc1b40c20415568ac4507caa

      • C:\Users\Admin\AppData\Local\Temp\MSBuild.exe
        MD5

        9af17c8393f0970ee5136bd3ffa27001

        SHA1

        4b285b72c1a11285a25f31f2597e090da6bbc049

        SHA256

        71d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019

        SHA512

        b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3

      • C:\Users\Admin\AppData\Local\Temp\MSBuild.exe
        MD5

        9af17c8393f0970ee5136bd3ffa27001

        SHA1

        4b285b72c1a11285a25f31f2597e090da6bbc049

        SHA256

        71d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019

        SHA512

        b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3

      • C:\Users\Admin\AppData\Local\Temp\MSBuild.exe
        MD5

        9af17c8393f0970ee5136bd3ffa27001

        SHA1

        4b285b72c1a11285a25f31f2597e090da6bbc049

        SHA256

        71d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019

        SHA512

        b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3

      • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
        MD5

        a2284af079c78111b9b72e231b88508f

        SHA1

        aaa8804fd8577c468c912dd81047582d1ab6e3e0

        SHA256

        825de4ab6e824963a85f79ed1cd576a93a76d3ac78f2ac975895fe981b7d479a

        SHA512

        69f791e2f56bf3cb66f31848bb5ede20cab704b9822dca081d818a41d3cdd4a89d3f397c86b5bc2cb2219493b9e2a6e12f62321d66afd42d87ded4079c0ca8ca

      • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
        MD5

        a2284af079c78111b9b72e231b88508f

        SHA1

        aaa8804fd8577c468c912dd81047582d1ab6e3e0

        SHA256

        825de4ab6e824963a85f79ed1cd576a93a76d3ac78f2ac975895fe981b7d479a

        SHA512

        69f791e2f56bf3cb66f31848bb5ede20cab704b9822dca081d818a41d3cdd4a89d3f397c86b5bc2cb2219493b9e2a6e12f62321d66afd42d87ded4079c0ca8ca

      • C:\Users\Admin\AppData\Local\Temp\ispvtq.exe
        MD5

        3dee6f40000f5f71b7fdf0f300745e96

        SHA1

        b1230a6f046083d3f8ef7228e74947ff025aa88d

        SHA256

        1eb25b76316078fb1d5e752c4bfab10000317d3740c3ac851711a15311770519

        SHA512

        db064a619ffef67992851c2f3acb0a2b70e0c51536f0fabc99c6fd84f0605d3a49d8ea579e92b3d235352a42639352fca037ac691bd965c37c8f03ddb5c9e5aa

      • C:\Users\Admin\AppData\Local\Temp\ispvtq.exe
        MD5

        3dee6f40000f5f71b7fdf0f300745e96

        SHA1

        b1230a6f046083d3f8ef7228e74947ff025aa88d

        SHA256

        1eb25b76316078fb1d5e752c4bfab10000317d3740c3ac851711a15311770519

        SHA512

        db064a619ffef67992851c2f3acb0a2b70e0c51536f0fabc99c6fd84f0605d3a49d8ea579e92b3d235352a42639352fca037ac691bd965c37c8f03ddb5c9e5aa

      • C:\Users\Admin\AppData\Local\Temp\issfpb.exe
        MD5

        2bce38d33f011a0ddb0a3eb16e8fe70f

        SHA1

        3cc8ee90f56fdc97f039e19117913686d189b5a5

        SHA256

        f87949da8b6124aa4cd5987fa13d1a77bee82ef3e16599319286bb60c7707877

        SHA512

        45c90d76bec3e7bc3b6ecabeea4a39db365a1a4f90aecec96a0c73bf167a691b887fedd522b8f593828d1ee975fb58b9b0139cf818eb3145e960865d1d60a690

      • C:\Users\Admin\AppData\Local\Temp\issfpb.exe
        MD5

        2bce38d33f011a0ddb0a3eb16e8fe70f

        SHA1

        3cc8ee90f56fdc97f039e19117913686d189b5a5

        SHA256

        f87949da8b6124aa4cd5987fa13d1a77bee82ef3e16599319286bb60c7707877

        SHA512

        45c90d76bec3e7bc3b6ecabeea4a39db365a1a4f90aecec96a0c73bf167a691b887fedd522b8f593828d1ee975fb58b9b0139cf818eb3145e960865d1d60a690

      • C:\Users\Admin\AppData\Local\Temp\issfpb.exe
        MD5

        2bce38d33f011a0ddb0a3eb16e8fe70f

        SHA1

        3cc8ee90f56fdc97f039e19117913686d189b5a5

        SHA256

        f87949da8b6124aa4cd5987fa13d1a77bee82ef3e16599319286bb60c7707877

        SHA512

        45c90d76bec3e7bc3b6ecabeea4a39db365a1a4f90aecec96a0c73bf167a691b887fedd522b8f593828d1ee975fb58b9b0139cf818eb3145e960865d1d60a690

      • C:\Users\Admin\AppData\Local\Temp\krgkux.exe
        MD5

        698b9de29b62cddef701d4f48820ea7e

        SHA1

        1d46d408f75c7baee6c2c6ad80328ebaf6c0e526

        SHA256

        9b8adf65c0f9ddad6580e909ad40ed1ff98f42b0c39447a8fdde9ccb056c782b

        SHA512

        b14a5ce543c642b34a051104ccd3b6f4b6218a3449ddaa21224e547eb558858aeb234b529041e122d697411e77f2f71848e428bf83b11b7c1c075c32b929f594

      • C:\Users\Admin\AppData\Local\Temp\krgkux.exe
        MD5

        698b9de29b62cddef701d4f48820ea7e

        SHA1

        1d46d408f75c7baee6c2c6ad80328ebaf6c0e526

        SHA256

        9b8adf65c0f9ddad6580e909ad40ed1ff98f42b0c39447a8fdde9ccb056c782b

        SHA512

        b14a5ce543c642b34a051104ccd3b6f4b6218a3449ddaa21224e547eb558858aeb234b529041e122d697411e77f2f71848e428bf83b11b7c1c075c32b929f594

      • C:\Users\Admin\AppData\Local\Temp\krgkux.exe
        MD5

        698b9de29b62cddef701d4f48820ea7e

        SHA1

        1d46d408f75c7baee6c2c6ad80328ebaf6c0e526

        SHA256

        9b8adf65c0f9ddad6580e909ad40ed1ff98f42b0c39447a8fdde9ccb056c782b

        SHA512

        b14a5ce543c642b34a051104ccd3b6f4b6218a3449ddaa21224e547eb558858aeb234b529041e122d697411e77f2f71848e428bf83b11b7c1c075c32b929f594

      • C:\Users\Admin\AppData\Local\Temp\vewcjo.exe
        MD5

        6e81f9d38a57eac714b6800f4d446ab0

        SHA1

        a2ecf73f14e2da90139596e95f337bdb2f86bb9b

        SHA256

        07c42b1007915b66f6be13c60dadf347faac57082712edd8eec39ad2ee3ecc71

        SHA512

        8eaab36958e004713180de9aecbd58d83f8213aa7ec389aafbfacd05960f4bbc6bdab032964fa02506d1accf16393727f86d8875bbb6094df0b807c1c091d05f

      • C:\Users\Admin\AppData\Local\Temp\vewcjo.exe
        MD5

        6e81f9d38a57eac714b6800f4d446ab0

        SHA1

        a2ecf73f14e2da90139596e95f337bdb2f86bb9b

        SHA256

        07c42b1007915b66f6be13c60dadf347faac57082712edd8eec39ad2ee3ecc71

        SHA512

        8eaab36958e004713180de9aecbd58d83f8213aa7ec389aafbfacd05960f4bbc6bdab032964fa02506d1accf16393727f86d8875bbb6094df0b807c1c091d05f

      • C:\Users\Admin\AppData\Local\Temp\vewcjo.exe
        MD5

        6e81f9d38a57eac714b6800f4d446ab0

        SHA1

        a2ecf73f14e2da90139596e95f337bdb2f86bb9b

        SHA256

        07c42b1007915b66f6be13c60dadf347faac57082712edd8eec39ad2ee3ecc71

        SHA512

        8eaab36958e004713180de9aecbd58d83f8213aa7ec389aafbfacd05960f4bbc6bdab032964fa02506d1accf16393727f86d8875bbb6094df0b807c1c091d05f

      • C:\Users\Admin\AppData\Local\Temp\zitumu.exe
        MD5

        b31be28cd8781d9c3f55fe7ace196ef4

        SHA1

        0d09083828565a20e875afdec56e2fb2f2212b37

        SHA256

        3946beb6edab2208f1483c340b34a544adb178182eba9edddcda2d13eabe54ef

        SHA512

        ad212773e783e0b69251087451af09aa9a9268a1185d09502a5dd4f45e3d62dcacd63f8a27a356226f265fdca0e800b9c4df81ddb9bf07628e75845bcb6e7f61

      • C:\Users\Admin\AppData\Local\Temp\zitumu.exe
        MD5

        b31be28cd8781d9c3f55fe7ace196ef4

        SHA1

        0d09083828565a20e875afdec56e2fb2f2212b37

        SHA256

        3946beb6edab2208f1483c340b34a544adb178182eba9edddcda2d13eabe54ef

        SHA512

        ad212773e783e0b69251087451af09aa9a9268a1185d09502a5dd4f45e3d62dcacd63f8a27a356226f265fdca0e800b9c4df81ddb9bf07628e75845bcb6e7f61

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        MD5

        55fe52520250dd1fbd536122228899e3

        SHA1

        809f2fe94540870ff2036ed0bf2cb7bb349b922e

        SHA256

        dae3fa63a6317f01228a80bd4dee462d22e301121fa436811199f115c63bec24

        SHA512

        f33699b3e0fa9df0c943abcc09c533a05682c84e01a3f1d2ea7beebaaf529ba93b8a5640e253695b65b6e925e503464fdfa546d18a6814551787ea350df6dd3d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        MD5

        55fe52520250dd1fbd536122228899e3

        SHA1

        809f2fe94540870ff2036ed0bf2cb7bb349b922e

        SHA256

        dae3fa63a6317f01228a80bd4dee462d22e301121fa436811199f115c63bec24

        SHA512

        f33699b3e0fa9df0c943abcc09c533a05682c84e01a3f1d2ea7beebaaf529ba93b8a5640e253695b65b6e925e503464fdfa546d18a6814551787ea350df6dd3d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        MD5

        55fe52520250dd1fbd536122228899e3

        SHA1

        809f2fe94540870ff2036ed0bf2cb7bb349b922e

        SHA256

        dae3fa63a6317f01228a80bd4dee462d22e301121fa436811199f115c63bec24

        SHA512

        f33699b3e0fa9df0c943abcc09c533a05682c84e01a3f1d2ea7beebaaf529ba93b8a5640e253695b65b6e925e503464fdfa546d18a6814551787ea350df6dd3d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        MD5

        62c1fec8420ba48d609fed0ad8d5e2fc

        SHA1

        f7c428d2943ad6b5707da5cd6bfd2e9189db298a

        SHA256

        3d65bdbda7e8fd4655a8ee0ee871b421d7a656f2b4ae62d375843dcb1f80eef0

        SHA512

        bcfc8641c77d4532a2585339b7efc37572342ff8b8e2c652df876f93555d68586fc6435bb176f3d40537e1ee78b11c5340b4104891bb4101798158016193fa11

      • \Users\Admin\AppData\Local\Temp\D8E6.tmp
        MD5

        d124f55b9393c976963407dff51ffa79

        SHA1

        2c7bbedd79791bfb866898c85b504186db610b5d

        SHA256

        ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

        SHA512

        278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

      • \Users\Admin\AppData\Local\Temp\InstallUtil.exe
        MD5

        819e74edb55fc837f0ae6422473910f7

        SHA1

        97bd0ede064e9137de96e1d709cda83c3670f718

        SHA256

        f34609e99e5629d8b8661aad4bd8ce66eb2378bc06ffabe5be5f73f4a9de60d1

        SHA512

        9610b453d6c1afd5758518217b48c46e50c8864c8dd3f4e61c453a3186b07f459c8e8d352f6aa8022df428fad6f80f586272f5dbdc1b40c20415568ac4507caa

      • \Users\Admin\AppData\Local\Temp\MSBuild.exe
        MD5

        9af17c8393f0970ee5136bd3ffa27001

        SHA1

        4b285b72c1a11285a25f31f2597e090da6bbc049

        SHA256

        71d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019

        SHA512

        b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3

      • \Users\Admin\AppData\Local\Temp\MSBuild.exe
        MD5

        9af17c8393f0970ee5136bd3ffa27001

        SHA1

        4b285b72c1a11285a25f31f2597e090da6bbc049

        SHA256

        71d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019

        SHA512

        b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3

      • \Users\Admin\AppData\Local\Temp\RegAsm.exe
        MD5

        a2284af079c78111b9b72e231b88508f

        SHA1

        aaa8804fd8577c468c912dd81047582d1ab6e3e0

        SHA256

        825de4ab6e824963a85f79ed1cd576a93a76d3ac78f2ac975895fe981b7d479a

        SHA512

        69f791e2f56bf3cb66f31848bb5ede20cab704b9822dca081d818a41d3cdd4a89d3f397c86b5bc2cb2219493b9e2a6e12f62321d66afd42d87ded4079c0ca8ca

      • \Users\Admin\AppData\Local\Temp\ispvtq.exe
        MD5

        3dee6f40000f5f71b7fdf0f300745e96

        SHA1

        b1230a6f046083d3f8ef7228e74947ff025aa88d

        SHA256

        1eb25b76316078fb1d5e752c4bfab10000317d3740c3ac851711a15311770519

        SHA512

        db064a619ffef67992851c2f3acb0a2b70e0c51536f0fabc99c6fd84f0605d3a49d8ea579e92b3d235352a42639352fca037ac691bd965c37c8f03ddb5c9e5aa

      • \Users\Admin\AppData\Local\Temp\issfpb.exe
        MD5

        2bce38d33f011a0ddb0a3eb16e8fe70f

        SHA1

        3cc8ee90f56fdc97f039e19117913686d189b5a5

        SHA256

        f87949da8b6124aa4cd5987fa13d1a77bee82ef3e16599319286bb60c7707877

        SHA512

        45c90d76bec3e7bc3b6ecabeea4a39db365a1a4f90aecec96a0c73bf167a691b887fedd522b8f593828d1ee975fb58b9b0139cf818eb3145e960865d1d60a690

      • \Users\Admin\AppData\Local\Temp\issfpb.exe
        MD5

        2bce38d33f011a0ddb0a3eb16e8fe70f

        SHA1

        3cc8ee90f56fdc97f039e19117913686d189b5a5

        SHA256

        f87949da8b6124aa4cd5987fa13d1a77bee82ef3e16599319286bb60c7707877

        SHA512

        45c90d76bec3e7bc3b6ecabeea4a39db365a1a4f90aecec96a0c73bf167a691b887fedd522b8f593828d1ee975fb58b9b0139cf818eb3145e960865d1d60a690

      • \Users\Admin\AppData\Local\Temp\krgkux.exe
        MD5

        698b9de29b62cddef701d4f48820ea7e

        SHA1

        1d46d408f75c7baee6c2c6ad80328ebaf6c0e526

        SHA256

        9b8adf65c0f9ddad6580e909ad40ed1ff98f42b0c39447a8fdde9ccb056c782b

        SHA512

        b14a5ce543c642b34a051104ccd3b6f4b6218a3449ddaa21224e547eb558858aeb234b529041e122d697411e77f2f71848e428bf83b11b7c1c075c32b929f594

      • \Users\Admin\AppData\Local\Temp\krgkux.exe
        MD5

        698b9de29b62cddef701d4f48820ea7e

        SHA1

        1d46d408f75c7baee6c2c6ad80328ebaf6c0e526

        SHA256

        9b8adf65c0f9ddad6580e909ad40ed1ff98f42b0c39447a8fdde9ccb056c782b

        SHA512

        b14a5ce543c642b34a051104ccd3b6f4b6218a3449ddaa21224e547eb558858aeb234b529041e122d697411e77f2f71848e428bf83b11b7c1c075c32b929f594

      • \Users\Admin\AppData\Local\Temp\vewcjo.exe
        MD5

        6e81f9d38a57eac714b6800f4d446ab0

        SHA1

        a2ecf73f14e2da90139596e95f337bdb2f86bb9b

        SHA256

        07c42b1007915b66f6be13c60dadf347faac57082712edd8eec39ad2ee3ecc71

        SHA512

        8eaab36958e004713180de9aecbd58d83f8213aa7ec389aafbfacd05960f4bbc6bdab032964fa02506d1accf16393727f86d8875bbb6094df0b807c1c091d05f

      • \Users\Admin\AppData\Local\Temp\vewcjo.exe
        MD5

        6e81f9d38a57eac714b6800f4d446ab0

        SHA1

        a2ecf73f14e2da90139596e95f337bdb2f86bb9b

        SHA256

        07c42b1007915b66f6be13c60dadf347faac57082712edd8eec39ad2ee3ecc71

        SHA512

        8eaab36958e004713180de9aecbd58d83f8213aa7ec389aafbfacd05960f4bbc6bdab032964fa02506d1accf16393727f86d8875bbb6094df0b807c1c091d05f

      • \Users\Admin\AppData\Local\Temp\zitumu.exe
        MD5

        b31be28cd8781d9c3f55fe7ace196ef4

        SHA1

        0d09083828565a20e875afdec56e2fb2f2212b37

        SHA256

        3946beb6edab2208f1483c340b34a544adb178182eba9edddcda2d13eabe54ef

        SHA512

        ad212773e783e0b69251087451af09aa9a9268a1185d09502a5dd4f45e3d62dcacd63f8a27a356226f265fdca0e800b9c4df81ddb9bf07628e75845bcb6e7f61

      • memory/296-155-0x0000000004782000-0x0000000004783000-memory.dmp
        Filesize

        4KB

      • memory/296-111-0x0000000000000000-mapping.dmp
      • memory/296-147-0x0000000000000000-mapping.dmp
      • memory/296-153-0x0000000005300000-0x0000000005301000-memory.dmp
        Filesize

        4KB

      • memory/296-154-0x0000000004780000-0x0000000004781000-memory.dmp
        Filesize

        4KB

      • memory/296-152-0x00000000046C0000-0x00000000046C1000-memory.dmp
        Filesize

        4KB

      • memory/296-151-0x00000000047C0000-0x00000000047C1000-memory.dmp
        Filesize

        4KB

      • memory/296-150-0x0000000000FF0000-0x0000000000FF1000-memory.dmp
        Filesize

        4KB

      • memory/296-156-0x0000000005690000-0x0000000005691000-memory.dmp
        Filesize

        4KB

      • memory/420-72-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/420-69-0x000000000042571E-mapping.dmp
      • memory/420-74-0x0000000002030000-0x0000000002031000-memory.dmp
        Filesize

        4KB

      • memory/420-68-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/420-75-0x0000000002010000-0x000000000202B000-memory.dmp
        Filesize

        108KB

      • memory/660-175-0x0000000000000000-mapping.dmp
      • memory/748-200-0x0000000000000000-mapping.dmp
      • memory/748-202-0x000000001BC30000-0x000000001BC32000-memory.dmp
        Filesize

        8KB

      • memory/788-60-0x0000000000B40000-0x0000000000B41000-memory.dmp
        Filesize

        4KB

      • memory/788-64-0x0000000000680000-0x00000000006C6000-memory.dmp
        Filesize

        280KB

      • memory/788-63-0x0000000000390000-0x0000000000392000-memory.dmp
        Filesize

        8KB

      • memory/788-62-0x0000000004AE0000-0x0000000004AE1000-memory.dmp
        Filesize

        4KB

      • memory/916-204-0x0000000140000000-mapping.dmp
      • memory/956-208-0x0000000140000000-mapping.dmp
      • memory/1028-192-0x000000001C090000-0x000000001C092000-memory.dmp
        Filesize

        8KB

      • memory/1028-189-0x0000000000000000-mapping.dmp
      • memory/1172-168-0x0000000000402D4A-mapping.dmp
      • memory/1172-167-0x0000000000400000-0x000000000040A000-memory.dmp
        Filesize

        40KB

      • memory/1260-140-0x0000000000403E2A-mapping.dmp
      • memory/1260-144-0x0000000004BB0000-0x0000000004BB1000-memory.dmp
        Filesize

        4KB

      • memory/1260-142-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/1260-139-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/1264-173-0x0000000002AB0000-0x0000000002AC5000-memory.dmp
        Filesize

        84KB

      • memory/1316-186-0x0000000000416226-mapping.dmp
      • memory/1316-191-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
        Filesize

        4KB

      • memory/1316-146-0x0000000000000000-mapping.dmp
      • memory/1500-193-0x0000000000000000-mapping.dmp
      • memory/1528-108-0x0000000000420000-0x0000000000424000-memory.dmp
        Filesize

        16KB

      • memory/1528-109-0x0000000004830000-0x0000000004831000-memory.dmp
        Filesize

        4KB

      • memory/1528-106-0x0000000000F90000-0x0000000000F91000-memory.dmp
        Filesize

        4KB

      • memory/1528-137-0x0000000000AF0000-0x0000000000B34000-memory.dmp
        Filesize

        272KB

      • memory/1528-104-0x0000000000000000-mapping.dmp
      • memory/1572-136-0x0000000001FB0000-0x0000000001FB1000-memory.dmp
        Filesize

        4KB

      • memory/1572-165-0x0000000001E60000-0x0000000001E95000-memory.dmp
        Filesize

        212KB

      • memory/1572-133-0x00000000009D0000-0x00000000009D1000-memory.dmp
        Filesize

        4KB

      • memory/1572-131-0x0000000000000000-mapping.dmp
      • memory/1584-82-0x0000000005270000-0x0000000005271000-memory.dmp
        Filesize

        4KB

      • memory/1584-87-0x0000000006030000-0x0000000006031000-memory.dmp
        Filesize

        4KB

      • memory/1584-92-0x0000000006100000-0x0000000006101000-memory.dmp
        Filesize

        4KB

      • memory/1584-93-0x000000007EF30000-0x000000007EF31000-memory.dmp
        Filesize

        4KB

      • memory/1584-94-0x0000000006160000-0x0000000006161000-memory.dmp
        Filesize

        4KB

      • memory/1584-101-0x0000000006280000-0x0000000006281000-memory.dmp
        Filesize

        4KB

      • memory/1584-84-0x0000000004962000-0x0000000004963000-memory.dmp
        Filesize

        4KB

      • memory/1584-83-0x0000000004960000-0x0000000004961000-memory.dmp
        Filesize

        4KB

      • memory/1584-81-0x0000000002630000-0x0000000002631000-memory.dmp
        Filesize

        4KB

      • memory/1584-80-0x00000000049A0000-0x00000000049A1000-memory.dmp
        Filesize

        4KB

      • memory/1584-79-0x0000000000980000-0x0000000000981000-memory.dmp
        Filesize

        4KB

      • memory/1584-78-0x0000000075551000-0x0000000075553000-memory.dmp
        Filesize

        8KB

      • memory/1584-77-0x0000000000000000-mapping.dmp
      • memory/1644-115-0x0000000002130000-0x0000000002131000-memory.dmp
        Filesize

        4KB

      • memory/1644-128-0x00000000056D0000-0x00000000056D1000-memory.dmp
        Filesize

        4KB

      • memory/1644-116-0x0000000004860000-0x0000000004861000-memory.dmp
        Filesize

        4KB

      • memory/1644-112-0x0000000000000000-mapping.dmp
      • memory/1644-120-0x0000000005300000-0x0000000005301000-memory.dmp
        Filesize

        4KB

      • memory/1644-119-0x0000000002680000-0x0000000002681000-memory.dmp
        Filesize

        4KB

      • memory/1644-118-0x0000000004822000-0x0000000004823000-memory.dmp
        Filesize

        4KB

      • memory/1644-117-0x0000000004820000-0x0000000004821000-memory.dmp
        Filesize

        4KB

      • memory/1756-164-0x0000000004770000-0x0000000004771000-memory.dmp
        Filesize

        4KB

      • memory/1756-159-0x0000000000000000-mapping.dmp
      • memory/1756-161-0x0000000000B00000-0x0000000000B01000-memory.dmp
        Filesize

        4KB

      • memory/1916-76-0x0000000000000000-mapping.dmp
      • memory/1980-197-0x0000000004852000-0x0000000004853000-memory.dmp
        Filesize

        4KB

      • memory/1980-196-0x0000000004850000-0x0000000004851000-memory.dmp
        Filesize

        4KB

      • memory/1980-194-0x0000000000000000-mapping.dmp
      • memory/2012-183-0x0000000001012000-0x0000000001013000-memory.dmp
        Filesize

        4KB

      • memory/2012-182-0x0000000001010000-0x0000000001011000-memory.dmp
        Filesize

        4KB

      • memory/2012-176-0x0000000000000000-mapping.dmp
      • memory/2012-181-0x0000000005200000-0x0000000005201000-memory.dmp
        Filesize

        4KB

      • memory/2012-179-0x0000000000D40000-0x0000000000D41000-memory.dmp
        Filesize

        4KB

      • memory/2012-180-0x0000000004820000-0x0000000004821000-memory.dmp
        Filesize

        4KB