Analysis

  • max time kernel
    151s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    20-08-2021 11:41

General

  • Target

    b817002c69c6315e116f14d6fe64151577999eb773842.exe

  • Size

    150KB

  • MD5

    e77188581c0cb93c5821999d39d979e2

  • SHA1

    a11e5624e493ef524fffad14ec2488b00ff601c9

  • SHA256

    b817002c69c6315e116f14d6fe64151577999eb773842f052fb17d9a7413a53c

  • SHA512

    41ae5252a62ed2cc0f108059e6d6b496f6e9451bb3398137310b5d9907128aedbcf8c3c656522c52f68e392cfac641e7b42fc61c82506a6ba6b6d654b71de1c8

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

777

C2

51.254.68.139:8067

Extracted

Family

redline

Botnet

#MIX 19.08

C2

gophamanapr.site:80

Extracted

Family

raccoon

Botnet

fe582536ec580228180f270f7cb80a867860e010

Attributes
  • url4cnc

    https://telete.in/xylichanjk

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

    suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

  • suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

    suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

  • suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

    suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 14 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 24 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b817002c69c6315e116f14d6fe64151577999eb773842.exe
    "C:\Users\Admin\AppData\Local\Temp\b817002c69c6315e116f14d6fe64151577999eb773842.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\b817002c69c6315e116f14d6fe64151577999eb773842.exe
      "C:\Users\Admin\AppData\Local\Temp\b817002c69c6315e116f14d6fe64151577999eb773842.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1400
  • C:\Users\Admin\AppData\Local\Temp\8141.exe
    C:\Users\Admin\AppData\Local\Temp\8141.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:320
  • C:\Users\Admin\AppData\Local\Temp\8769.exe
    C:\Users\Admin\AppData\Local\Temp\8769.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Users\Admin\AppData\Local\Temp\8769.exe
      C:\Users\Admin\AppData\Local\Temp\8769.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Users\Admin\AppData\Local\Temp\AudioDriver.exe
        "C:\Users\Admin\AppData\Local\Temp\AudioDriver.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Loads dropped DLL
        • Modifies system certificate store
        PID:1580
        • C:\ProgramData\Systemd\note3dll.exe
          NULL
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2528
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:2732
  • C:\Users\Admin\AppData\Local\Temp\9159.exe
    C:\Users\Admin\AppData\Local\Temp\9159.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:480
    • C:\Users\Admin\AppData\Local\Temp\11.exe
      "C:\Users\Admin\AppData\Local\Temp\11.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:2156
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 1520
        3⤵
        • Loads dropped DLL
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2380
  • C:\Users\Admin\AppData\Local\Temp\95FC.exe
    C:\Users\Admin\AppData\Local\Temp\95FC.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1520
  • C:\Users\Admin\AppData\Local\Temp\99D3.exe
    C:\Users\Admin\AppData\Local\Temp\99D3.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies system certificate store
    PID:952
  • C:\Users\Admin\AppData\Local\Temp\9BA8.exe
    C:\Users\Admin\AppData\Local\Temp\9BA8.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1980
  • C:\Users\Admin\AppData\Local\Temp\A20F.exe
    C:\Users\Admin\AppData\Local\Temp\A20F.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1964
  • C:\Users\Admin\AppData\Local\Temp\AD56.exe
    C:\Users\Admin\AppData\Local\Temp\AD56.exe
    1⤵
    • Executes dropped EXE
    PID:1684
  • C:\Users\Admin\AppData\Local\Temp\AFF6.exe
    C:\Users\Admin\AppData\Local\Temp\AFF6.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    PID:1460
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\AFF6.exe" & exit
      2⤵
        PID:2556
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 5
          3⤵
          • Delays execution with timeout.exe
          PID:2604

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    Query Registry

    5
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    5
    T1082

    Peripheral Device Discovery

    1
    T1120

    Collection

    Data from Local System

    3
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Data\AudioCodec.exe
      MD5

      e246a85d5b30c95f1354b6db87c2c47f

      SHA1

      1c34b17ab338f222c6275634c984b6530a5e7909

      SHA256

      c16daecbdcc64e821bdbdba89183ba9b49858bf488e85b58147694a7e26302ba

      SHA512

      d93555c498483f9a2ed5849bd4445be28af87265ed57959c25d1e45543c2b72483e248276ce80cda50d94b85d9b449bb1ac6c28f6c008812b89b126aa020aba5

    • C:\ProgramData\Data\AudioCodec.exe
      MD5

      605985e2707e0cce4105d608d92af0e0

      SHA1

      54106faeacf4c869cfe72693eea7c301a7c9a1a8

      SHA256

      71aa524a253f9f88320a39bbdb7e8588869b3c3b2381581e1cc4ec19db5cd43f

      SHA512

      4878568303b55d8555c03dd99e154000efcc03d40a3010fc4d2368f8eba4d7c95f4eaf3957d90512d08c863f3bb28d0937420633ac3096405ee86399824f2907

    • C:\ProgramData\Systemd\config.json
      MD5

      fa1d69a92278c02bde09e56f53f17e7c

      SHA1

      18bf7aeb76a9dab8dfbc54fd6c44c9c31ab96c6a

      SHA256

      b7530d98b7fbfaf91eaf37c184adf3d2f0d7fe0be0161f94cf01a66a8b8334c2

      SHA512

      86260deb08d8e17cab9aa84c156988343ac567b45a9b437a67443983d5143e5979ee775ba01a33cdad57d87ab6fd4dca56489df4da2b9a529202dad5a26c93e2

    • C:\ProgramData\Systemd\note3dll.exe
      MD5

      0b85eae86038116041ecc8d24ba2fadb

      SHA1

      bcfeff8a7b42e8836b7dea9f6d594e14f6b25cec

      SHA256

      cd0dcc3d3aab1dc613cd5b1ea4d3a066ab20768c60babb1a4e79df9da9144218

      SHA512

      ef0b17ae8d533c209491358f09826ea7b0cb5e5d7a435b80f574916624070036d5fcf30eb35c0d5c33b49c134f471734efdaef5154de51b1ce600b4fe51b9744

    • C:\Users\Admin\AppData\Local\Temp\11.exe
      MD5

      be4ede5e88f7c98f1c00147019da42ac

      SHA1

      46621b653521b697f125b9beec4dd4afbaa3eef5

      SHA256

      f5c0f868f65d7cb5787eda39a880e5be884458f4d4ef560e6a119bf0640274c4

      SHA512

      6a9965ca9cd8fc739dd7519e9de27a0c5205532fdf3de48c41043d5ec7c99edbf087ba5392092bcd74c94ae6578706f7fb596ce58e59946ca7a87eb5ffe4bcb2

    • C:\Users\Admin\AppData\Local\Temp\11.exe
      MD5

      be4ede5e88f7c98f1c00147019da42ac

      SHA1

      46621b653521b697f125b9beec4dd4afbaa3eef5

      SHA256

      f5c0f868f65d7cb5787eda39a880e5be884458f4d4ef560e6a119bf0640274c4

      SHA512

      6a9965ca9cd8fc739dd7519e9de27a0c5205532fdf3de48c41043d5ec7c99edbf087ba5392092bcd74c94ae6578706f7fb596ce58e59946ca7a87eb5ffe4bcb2

    • C:\Users\Admin\AppData\Local\Temp\8141.exe
      MD5

      a69e12607d01237460808fa1709e5e86

      SHA1

      4a12f82aee1c90e70cdf6be863ce1a749c8ae411

      SHA256

      188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

      SHA512

      7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

    • C:\Users\Admin\AppData\Local\Temp\8769.exe
      MD5

      2846ad734c304a80d4200a86533ccf00

      SHA1

      6faa75e815c17245e574dd914966d5f531427dad

      SHA256

      770da1ece99e04a602eb75b9dd90e58b4880d42acb4c1b189421720d446b02a1

      SHA512

      7b9dffd65a941b3587d568d2714a72041a7ac62bfe919a079b99f8dd659289b7bb1e6e1c2b9873c7b8b09c24ba4eef66d126313576f7f4f487269c14228ae80c

    • C:\Users\Admin\AppData\Local\Temp\8769.exe
      MD5

      2846ad734c304a80d4200a86533ccf00

      SHA1

      6faa75e815c17245e574dd914966d5f531427dad

      SHA256

      770da1ece99e04a602eb75b9dd90e58b4880d42acb4c1b189421720d446b02a1

      SHA512

      7b9dffd65a941b3587d568d2714a72041a7ac62bfe919a079b99f8dd659289b7bb1e6e1c2b9873c7b8b09c24ba4eef66d126313576f7f4f487269c14228ae80c

    • C:\Users\Admin\AppData\Local\Temp\8769.exe
      MD5

      2846ad734c304a80d4200a86533ccf00

      SHA1

      6faa75e815c17245e574dd914966d5f531427dad

      SHA256

      770da1ece99e04a602eb75b9dd90e58b4880d42acb4c1b189421720d446b02a1

      SHA512

      7b9dffd65a941b3587d568d2714a72041a7ac62bfe919a079b99f8dd659289b7bb1e6e1c2b9873c7b8b09c24ba4eef66d126313576f7f4f487269c14228ae80c

    • C:\Users\Admin\AppData\Local\Temp\9159.exe
      MD5

      cc078e133d1c8a2a07dbb784463a5390

      SHA1

      5eccaa99757c4201d90d7904f546952039e747d6

      SHA256

      1fa26edc32e7af8d9de8ecbe2e68f8307a3d936dabe730af6976e73a2528c388

      SHA512

      cd9edd7b858a81a4a46b8831c94a7abcaa74754c5a5a52689843b44fca4455d74767cf4f85c45f4ef2f2011fd17282c51f5110fefa60ea94c95e836c72283b85

    • C:\Users\Admin\AppData\Local\Temp\95FC.exe
      MD5

      07fd20f2ef24f16c0d0ce1bea427ff02

      SHA1

      212f5d0cb59ed1626c1c687ccef54b88d11aab22

      SHA256

      f5d0012b834951cde77890781dcb8e3787377f7682777eb4fb29185682e8d92c

      SHA512

      6307f379adde919841336a98c034efd9cba9caec791a9d2b0d8ec531a39d818b35a9a107650029e580c54efd9a1a799d3c56dfab721a8b068238901ee9ada909

    • C:\Users\Admin\AppData\Local\Temp\99D3.exe
      MD5

      8f5840ed3d0afcd582700adbb02ac00e

      SHA1

      0ce0b3e5e61fd328e37cebf47029f36f29582a32

      SHA256

      ec75f6425faec59679a112ddf3cfa69acdd45afeb46806067ebc52b4acc6332e

      SHA512

      700fe17a8bec9a34c2582c7abbbeda2750cda87f9cb3f6913b61b8f42d4c4b520fd52ea95c0a98d0072fa682f7823e03fc2a00854827d22ffba582d1b723ac27

    • C:\Users\Admin\AppData\Local\Temp\9BA8.exe
      MD5

      d89443e3bc2fc8605e467ec0597b635f

      SHA1

      741bbced5cca825914c68f93be93ce927b61ef4f

      SHA256

      5d745fa3e32482728c1f2ad6e28263d9061345a6a05a9cf290098ad4864990d2

      SHA512

      b5cc6076488af3f07666ef2fbb3c868948c3620e301a098749210cdc7dbc80e640061aa024c181c60f98f503b96195238183aff75d4020ce83b962132f793f6c

    • C:\Users\Admin\AppData\Local\Temp\A20F.exe
      MD5

      44dc3130f089718a02b53aceeb7b8980

      SHA1

      66fe679d4960f1f6a395a40e1a2e64025cafbddb

      SHA256

      b71e691b4023157ca65c44f764ffc4c2ba1263ad634b4a4acc17b1c249b1d5f9

      SHA512

      5a4413be7b9e3e232084e6429594610dbb7a8b3b97071da714b24ff9445e41a26c0ba4392e437d8a09894d27707dcb9bf1c2a65f27561a644d3ff44507da97d4

    • C:\Users\Admin\AppData\Local\Temp\AD56.exe
      MD5

      7cf2af3a5b5f6df3e2b5aee02504022b

      SHA1

      19d4481ead548df3982e7e2d17265724af8b92e6

      SHA256

      010ec844c209e11b7eec52cebdc39b6464952079eee052e3e2241ad0009ff44a

      SHA512

      3e13f85c2af5026833e7b46399773125da0a81e2a72f61ec6e7e498224357aeec58dc17f438edcf91173dc9264dd180d733df5abd6589b386560e4255667b0d8

    • C:\Users\Admin\AppData\Local\Temp\AD56.exe
      MD5

      7cf2af3a5b5f6df3e2b5aee02504022b

      SHA1

      19d4481ead548df3982e7e2d17265724af8b92e6

      SHA256

      010ec844c209e11b7eec52cebdc39b6464952079eee052e3e2241ad0009ff44a

      SHA512

      3e13f85c2af5026833e7b46399773125da0a81e2a72f61ec6e7e498224357aeec58dc17f438edcf91173dc9264dd180d733df5abd6589b386560e4255667b0d8

    • C:\Users\Admin\AppData\Local\Temp\AFF6.exe
      MD5

      6cac46f77a08178ac8ba3186cc83051a

      SHA1

      43db8ad4f6334e7309ad6947d5b8d6b44f86efb1

      SHA256

      5b447482fcc1ef9939b7144b1ded517067afe56f0ea984ae132086dade2dae30

      SHA512

      42c8bed4d7104104431bf517490b8fa2ac67cf9d9e9e1ba14d5a06b8d2cd97891fba3af64e39872360ec0ecaf804f93b64b1b28733ae939402b0e9e37875a42f

    • C:\Users\Admin\AppData\Local\Temp\AudioDriver.exe
      MD5

      5ddf0a162b4926bf3b3f6a36f0f0b340

      SHA1

      9810a28fbcd8a8cdd4f7ae4ea7ad1c888f02ba95

      SHA256

      dafce32f7db8c54d2f424b33885d87012f454aeb6fb9ed95502884544b7ccda3

      SHA512

      f91ccccc91733291ee712f66e42520f7742cce0e5ea097d816fe2e5b372a698256c256f0bf8daf6f6f4a1e8cc438dae561e9a288d2d66709de844645dbf5e7cb

    • C:\Users\Admin\AppData\Local\Temp\AudioDriver.exe
      MD5

      5ddf0a162b4926bf3b3f6a36f0f0b340

      SHA1

      9810a28fbcd8a8cdd4f7ae4ea7ad1c888f02ba95

      SHA256

      dafce32f7db8c54d2f424b33885d87012f454aeb6fb9ed95502884544b7ccda3

      SHA512

      f91ccccc91733291ee712f66e42520f7742cce0e5ea097d816fe2e5b372a698256c256f0bf8daf6f6f4a1e8cc438dae561e9a288d2d66709de844645dbf5e7cb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\exe.lnk
      MD5

      9204c4067037570fbbd3db1398b08d29

      SHA1

      56a86082143a7c94bec42dbb5e6e9b3fdc0d2218

      SHA256

      1e5bfa5bdc7c9a4fc286f2aa1eaaa52452741f4fe940845428376370ab080370

      SHA512

      a83575bf4563665b4cec3a6986da8b6daed247ae9340bd4a442ccb3f9927d780d6b9f1a39a0dd6a5978435e2f095e2b7d6fcf2b34f71248c495a39ffb01a39e5

    • \ProgramData\Data\AudioCodec.exe
      MD5

      f623d077698e11fda151d97a77929409

      SHA1

      992c8995692ed3fb6c9373b3169c1d5607561509

      SHA256

      4d2a36cb915644cc62328096ddfafbf226bb556785212539ed5a4ca6118bac68

      SHA512

      09bdf1220176084555ab7b49aed7080c3af0535318023c2328f74e7f33e1cd7d4fb7bbd7756884fe5e68181e3ad5c668e976ae7c747e99edb55a74c20d2c408f

    • \ProgramData\Microsoft Network\System.exe
      MD5

      5ddf0a162b4926bf3b3f6a36f0f0b340

      SHA1

      9810a28fbcd8a8cdd4f7ae4ea7ad1c888f02ba95

      SHA256

      dafce32f7db8c54d2f424b33885d87012f454aeb6fb9ed95502884544b7ccda3

      SHA512

      f91ccccc91733291ee712f66e42520f7742cce0e5ea097d816fe2e5b372a698256c256f0bf8daf6f6f4a1e8cc438dae561e9a288d2d66709de844645dbf5e7cb

    • \ProgramData\Systemd\note3dll.exe
      MD5

      0b85eae86038116041ecc8d24ba2fadb

      SHA1

      bcfeff8a7b42e8836b7dea9f6d594e14f6b25cec

      SHA256

      cd0dcc3d3aab1dc613cd5b1ea4d3a066ab20768c60babb1a4e79df9da9144218

      SHA512

      ef0b17ae8d533c209491358f09826ea7b0cb5e5d7a435b80f574916624070036d5fcf30eb35c0d5c33b49c134f471734efdaef5154de51b1ce600b4fe51b9744

    • \ProgramData\mozglue.dll
      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • \ProgramData\msvcp140.dll
      MD5

      109f0f02fd37c84bfc7508d4227d7ed5

      SHA1

      ef7420141bb15ac334d3964082361a460bfdb975

      SHA256

      334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

      SHA512

      46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

    • \ProgramData\nss3.dll
      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • \ProgramData\sqlite3.dll
      MD5

      e477a96c8f2b18d6b5c27bde49c990bf

      SHA1

      e980c9bf41330d1e5bd04556db4646a0210f7409

      SHA256

      16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

      SHA512

      335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

    • \ProgramData\vcruntime140.dll
      MD5

      7587bf9cb4147022cd5681b015183046

      SHA1

      f2106306a8f6f0da5afb7fc765cfa0757ad5a628

      SHA256

      c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

      SHA512

      0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

    • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\freebl3.dll
      MD5

      60acd24430204ad2dc7f148b8cfe9bdc

      SHA1

      989f377b9117d7cb21cbe92a4117f88f9c7693d9

      SHA256

      9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

      SHA512

      626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

    • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\mozglue.dll
      MD5

      eae9273f8cdcf9321c6c37c244773139

      SHA1

      8378e2a2f3635574c106eea8419b5eb00b8489b0

      SHA256

      a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

      SHA512

      06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

    • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\msvcp140.dll
      MD5

      109f0f02fd37c84bfc7508d4227d7ed5

      SHA1

      ef7420141bb15ac334d3964082361a460bfdb975

      SHA256

      334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

      SHA512

      46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

    • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\nss3.dll
      MD5

      02cc7b8ee30056d5912de54f1bdfc219

      SHA1

      a6923da95705fb81e368ae48f93d28522ef552fb

      SHA256

      1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

      SHA512

      0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

    • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\softokn3.dll
      MD5

      4e8df049f3459fa94ab6ad387f3561ac

      SHA1

      06ed392bc29ad9d5fc05ee254c2625fd65925114

      SHA256

      25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

      SHA512

      3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

    • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\vcruntime140.dll
      MD5

      7587bf9cb4147022cd5681b015183046

      SHA1

      f2106306a8f6f0da5afb7fc765cfa0757ad5a628

      SHA256

      c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

      SHA512

      0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

    • \Users\Admin\AppData\LocalLow\sqlite3.dll
      MD5

      f964811b68f9f1487c2b41e1aef576ce

      SHA1

      b423959793f14b1416bc3b7051bed58a1034025f

      SHA256

      83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

      SHA512

      565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

    • \Users\Admin\AppData\Local\Temp\11.exe
      MD5

      be4ede5e88f7c98f1c00147019da42ac

      SHA1

      46621b653521b697f125b9beec4dd4afbaa3eef5

      SHA256

      f5c0f868f65d7cb5787eda39a880e5be884458f4d4ef560e6a119bf0640274c4

      SHA512

      6a9965ca9cd8fc739dd7519e9de27a0c5205532fdf3de48c41043d5ec7c99edbf087ba5392092bcd74c94ae6578706f7fb596ce58e59946ca7a87eb5ffe4bcb2

    • \Users\Admin\AppData\Local\Temp\11.exe
      MD5

      be4ede5e88f7c98f1c00147019da42ac

      SHA1

      46621b653521b697f125b9beec4dd4afbaa3eef5

      SHA256

      f5c0f868f65d7cb5787eda39a880e5be884458f4d4ef560e6a119bf0640274c4

      SHA512

      6a9965ca9cd8fc739dd7519e9de27a0c5205532fdf3de48c41043d5ec7c99edbf087ba5392092bcd74c94ae6578706f7fb596ce58e59946ca7a87eb5ffe4bcb2

    • \Users\Admin\AppData\Local\Temp\11.exe
      MD5

      be4ede5e88f7c98f1c00147019da42ac

      SHA1

      46621b653521b697f125b9beec4dd4afbaa3eef5

      SHA256

      f5c0f868f65d7cb5787eda39a880e5be884458f4d4ef560e6a119bf0640274c4

      SHA512

      6a9965ca9cd8fc739dd7519e9de27a0c5205532fdf3de48c41043d5ec7c99edbf087ba5392092bcd74c94ae6578706f7fb596ce58e59946ca7a87eb5ffe4bcb2

    • \Users\Admin\AppData\Local\Temp\11.exe
      MD5

      be4ede5e88f7c98f1c00147019da42ac

      SHA1

      46621b653521b697f125b9beec4dd4afbaa3eef5

      SHA256

      f5c0f868f65d7cb5787eda39a880e5be884458f4d4ef560e6a119bf0640274c4

      SHA512

      6a9965ca9cd8fc739dd7519e9de27a0c5205532fdf3de48c41043d5ec7c99edbf087ba5392092bcd74c94ae6578706f7fb596ce58e59946ca7a87eb5ffe4bcb2

    • \Users\Admin\AppData\Local\Temp\11.exe
      MD5

      be4ede5e88f7c98f1c00147019da42ac

      SHA1

      46621b653521b697f125b9beec4dd4afbaa3eef5

      SHA256

      f5c0f868f65d7cb5787eda39a880e5be884458f4d4ef560e6a119bf0640274c4

      SHA512

      6a9965ca9cd8fc739dd7519e9de27a0c5205532fdf3de48c41043d5ec7c99edbf087ba5392092bcd74c94ae6578706f7fb596ce58e59946ca7a87eb5ffe4bcb2

    • \Users\Admin\AppData\Local\Temp\11.exe
      MD5

      be4ede5e88f7c98f1c00147019da42ac

      SHA1

      46621b653521b697f125b9beec4dd4afbaa3eef5

      SHA256

      f5c0f868f65d7cb5787eda39a880e5be884458f4d4ef560e6a119bf0640274c4

      SHA512

      6a9965ca9cd8fc739dd7519e9de27a0c5205532fdf3de48c41043d5ec7c99edbf087ba5392092bcd74c94ae6578706f7fb596ce58e59946ca7a87eb5ffe4bcb2

    • \Users\Admin\AppData\Local\Temp\8769.exe
      MD5

      2846ad734c304a80d4200a86533ccf00

      SHA1

      6faa75e815c17245e574dd914966d5f531427dad

      SHA256

      770da1ece99e04a602eb75b9dd90e58b4880d42acb4c1b189421720d446b02a1

      SHA512

      7b9dffd65a941b3587d568d2714a72041a7ac62bfe919a079b99f8dd659289b7bb1e6e1c2b9873c7b8b09c24ba4eef66d126313576f7f4f487269c14228ae80c

    • \Users\Admin\AppData\Local\Temp\AudioDriver.exe
      MD5

      5ddf0a162b4926bf3b3f6a36f0f0b340

      SHA1

      9810a28fbcd8a8cdd4f7ae4ea7ad1c888f02ba95

      SHA256

      dafce32f7db8c54d2f424b33885d87012f454aeb6fb9ed95502884544b7ccda3

      SHA512

      f91ccccc91733291ee712f66e42520f7742cce0e5ea097d816fe2e5b372a698256c256f0bf8daf6f6f4a1e8cc438dae561e9a288d2d66709de844645dbf5e7cb

    • \Users\Admin\AppData\Local\Temp\AudioDriver.exe
      MD5

      5ddf0a162b4926bf3b3f6a36f0f0b340

      SHA1

      9810a28fbcd8a8cdd4f7ae4ea7ad1c888f02ba95

      SHA256

      dafce32f7db8c54d2f424b33885d87012f454aeb6fb9ed95502884544b7ccda3

      SHA512

      f91ccccc91733291ee712f66e42520f7742cce0e5ea097d816fe2e5b372a698256c256f0bf8daf6f6f4a1e8cc438dae561e9a288d2d66709de844645dbf5e7cb

    • memory/320-65-0x0000000000000000-mapping.dmp
    • memory/480-80-0x00000000003B0000-0x00000000003B1000-memory.dmp
      Filesize

      4KB

    • memory/480-76-0x0000000000000000-mapping.dmp
    • memory/480-84-0x00000000002E0000-0x00000000002E1000-memory.dmp
      Filesize

      4KB

    • memory/640-75-0x0000000004330000-0x0000000004331000-memory.dmp
      Filesize

      4KB

    • memory/640-72-0x0000000000DD0000-0x0000000000DD1000-memory.dmp
      Filesize

      4KB

    • memory/640-69-0x0000000000000000-mapping.dmp
    • memory/952-93-0x0000000000000000-mapping.dmp
    • memory/952-98-0x0000000000230000-0x00000000002BF000-memory.dmp
      Filesize

      572KB

    • memory/952-103-0x0000000000400000-0x0000000002CFA000-memory.dmp
      Filesize

      41.0MB

    • memory/1248-64-0x0000000002B90000-0x0000000002BA6000-memory.dmp
      Filesize

      88KB

    • memory/1400-61-0x0000000000402FAB-mapping.dmp
    • memory/1400-60-0x0000000000400000-0x0000000000409000-memory.dmp
      Filesize

      36KB

    • memory/1400-62-0x0000000075281000-0x0000000075283000-memory.dmp
      Filesize

      8KB

    • memory/1460-127-0x0000000000400000-0x0000000002CB9000-memory.dmp
      Filesize

      40.7MB

    • memory/1460-124-0x0000000000000000-mapping.dmp
    • memory/1460-126-0x0000000000230000-0x0000000000249000-memory.dmp
      Filesize

      100KB

    • memory/1520-91-0x0000000000A10000-0x0000000000A11000-memory.dmp
      Filesize

      4KB

    • memory/1520-97-0x00000000051D0000-0x00000000051D1000-memory.dmp
      Filesize

      4KB

    • memory/1520-82-0x0000000000000000-mapping.dmp
    • memory/1580-133-0x0000000000000000-mapping.dmp
    • memory/1668-63-0x0000000000220000-0x000000000022A000-memory.dmp
      Filesize

      40KB

    • memory/1684-117-0x0000000000000000-mapping.dmp
    • memory/1684-120-0x0000000001300000-0x0000000001301000-memory.dmp
      Filesize

      4KB

    • memory/1684-122-0x0000000000410000-0x0000000000421000-memory.dmp
      Filesize

      68KB

    • memory/1684-123-0x00000000012A0000-0x00000000012A1000-memory.dmp
      Filesize

      4KB

    • memory/1932-87-0x0000000000418F6E-mapping.dmp
    • memory/1932-86-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/1932-89-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/1932-96-0x0000000004BE0000-0x0000000004BE1000-memory.dmp
      Filesize

      4KB

    • memory/1964-110-0x0000000000000000-mapping.dmp
    • memory/1964-114-0x00000000010D0000-0x00000000010D1000-memory.dmp
      Filesize

      4KB

    • memory/1964-116-0x00000000004B0000-0x00000000004B1000-memory.dmp
      Filesize

      4KB

    • memory/1980-107-0x0000000004C62000-0x0000000004C63000-memory.dmp
      Filesize

      4KB

    • memory/1980-99-0x0000000000000000-mapping.dmp
    • memory/1980-109-0x0000000004C64000-0x0000000004C66000-memory.dmp
      Filesize

      8KB

    • memory/1980-101-0x0000000004700000-0x000000000471C000-memory.dmp
      Filesize

      112KB

    • memory/1980-102-0x0000000004790000-0x00000000047AA000-memory.dmp
      Filesize

      104KB

    • memory/1980-108-0x0000000004C63000-0x0000000004C64000-memory.dmp
      Filesize

      4KB

    • memory/1980-104-0x00000000003B0000-0x00000000003DF000-memory.dmp
      Filesize

      188KB

    • memory/1980-106-0x0000000004C61000-0x0000000004C62000-memory.dmp
      Filesize

      4KB

    • memory/1980-105-0x0000000000400000-0x0000000002CCD000-memory.dmp
      Filesize

      40.8MB

    • memory/2156-144-0x0000000000AF0000-0x0000000000AF1000-memory.dmp
      Filesize

      4KB

    • memory/2156-149-0x0000000000790000-0x0000000000791000-memory.dmp
      Filesize

      4KB

    • memory/2156-141-0x0000000000000000-mapping.dmp
    • memory/2380-151-0x0000000000000000-mapping.dmp
    • memory/2380-157-0x0000000001DB0000-0x0000000001DB1000-memory.dmp
      Filesize

      4KB

    • memory/2528-167-0x0000000000070000-0x0000000000090000-memory.dmp
      Filesize

      128KB

    • memory/2528-165-0x0000000000000000-mapping.dmp
    • memory/2528-175-0x0000000000240000-0x0000000000260000-memory.dmp
      Filesize

      128KB

    • memory/2528-176-0x0000000000270000-0x0000000000290000-memory.dmp
      Filesize

      128KB

    • memory/2556-168-0x0000000000000000-mapping.dmp
    • memory/2604-170-0x0000000000000000-mapping.dmp
    • memory/2732-172-0x0000000000000000-mapping.dmp
    • memory/2732-177-0x0000000076FE0000-0x0000000076FE2000-memory.dmp
      Filesize

      8KB