Analysis

  • max time kernel
    128s
  • max time network
    165s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    20-08-2021 11:41

General

  • Target

    b817002c69c6315e116f14d6fe64151577999eb773842.exe

  • Size

    150KB

  • MD5

    e77188581c0cb93c5821999d39d979e2

  • SHA1

    a11e5624e493ef524fffad14ec2488b00ff601c9

  • SHA256

    b817002c69c6315e116f14d6fe64151577999eb773842f052fb17d9a7413a53c

  • SHA512

    41ae5252a62ed2cc0f108059e6d6b496f6e9451bb3398137310b5d9907128aedbcf8c3c656522c52f68e392cfac641e7b42fc61c82506a6ba6b6d654b71de1c8

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

777

C2

51.254.68.139:8067

Extracted

Family

raccoon

Botnet

fe582536ec580228180f270f7cb80a867860e010

Attributes
  • url4cnc

    https://telete.in/xylichanjk

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 8 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 21 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 12 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 27 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b817002c69c6315e116f14d6fe64151577999eb773842.exe
    "C:\Users\Admin\AppData\Local\Temp\b817002c69c6315e116f14d6fe64151577999eb773842.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Users\Admin\AppData\Local\Temp\b817002c69c6315e116f14d6fe64151577999eb773842.exe
      "C:\Users\Admin\AppData\Local\Temp\b817002c69c6315e116f14d6fe64151577999eb773842.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4256
  • C:\Users\Admin\AppData\Local\Temp\531.exe
    C:\Users\Admin\AppData\Local\Temp\531.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:3264
  • C:\Users\Admin\AppData\Local\Temp\106D.exe
    C:\Users\Admin\AppData\Local\Temp\106D.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:4172
  • C:\Users\Admin\AppData\Local\Temp\156F.exe
    C:\Users\Admin\AppData\Local\Temp\156F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:508
    • C:\Users\Admin\AppData\Local\Temp\156F.exe
      C:\Users\Admin\AppData\Local\Temp\156F.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Users\Admin\AppData\Local\Temp\AudioDriver.exe
        "C:\Users\Admin\AppData\Local\Temp\AudioDriver.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:3228
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:4372
        • C:\ProgramData\Systemd\note3dll.exe
          NULL
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4392
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:4596
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:196
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:936
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:4012
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:4568
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:1544
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:2136
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:1120
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:3168
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:1728
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:3040
        • C:\ProgramData\Data\AudioCodec.exe
          -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
          4⤵
            PID:4880
          • C:\ProgramData\Data\AudioCodec.exe
            -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
            4⤵
              PID:4760
            • C:\ProgramData\Data\AudioCodec.exe
              -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
              4⤵
                PID:1612
              • C:\ProgramData\Data\AudioCodec.exe
                -a kawpow -o rvn.2miners.com:6060 -u RL6KtheBvGYZGNxMmF8ZF1ZdH8VVvSXgmM.rig -p x
                4⤵
                  PID:4948
          • C:\Users\Admin\AppData\Local\Temp\534F.exe
            C:\Users\Admin\AppData\Local\Temp\534F.exe
            1⤵
            • Executes dropped EXE
            • Checks BIOS information in registry
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of AdjustPrivilegeToken
            PID:4576
          • C:\Users\Admin\AppData\Local\Temp\6CE3.exe
            C:\Users\Admin\AppData\Local\Temp\6CE3.exe
            1⤵
            • Executes dropped EXE
            • Checks BIOS information in registry
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of AdjustPrivilegeToken
            PID:5048
          • C:\Users\Admin\AppData\Local\Temp\7437.exe
            C:\Users\Admin\AppData\Local\Temp\7437.exe
            1⤵
            • Executes dropped EXE
            PID:684
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 732
              2⤵
              • Program crash
              PID:648
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 744
              2⤵
              • Program crash
              PID:2624
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 768
              2⤵
              • Program crash
              PID:1012
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 880
              2⤵
              • Program crash
              PID:2008
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 1176
              2⤵
              • Program crash
              PID:4932
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 668
              2⤵
              • Program crash
              PID:4472
          • C:\Users\Admin\AppData\Local\Temp\7C18.exe
            C:\Users\Admin\AppData\Local\Temp\7C18.exe
            1⤵
              PID:4220
            • C:\Users\Admin\AppData\Local\Temp\A6E2.exe
              C:\Users\Admin\AppData\Local\Temp\A6E2.exe
              1⤵
                PID:488
              • C:\Users\Admin\AppData\Local\Temp\BF2D.exe
                C:\Users\Admin\AppData\Local\Temp\BF2D.exe
                1⤵
                  PID:1752
                • C:\Users\Admin\AppData\Local\Temp\CA4A.exe
                  C:\Users\Admin\AppData\Local\Temp\CA4A.exe
                  1⤵
                    PID:4436

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Defense Evasion

                  Virtualization/Sandbox Evasion

                  1
                  T1497

                  Install Root Certificate

                  1
                  T1130

                  Modify Registry

                  1
                  T1112

                  Credential Access

                  Credentials in Files

                  2
                  T1081

                  Discovery

                  Query Registry

                  4
                  T1012

                  Virtualization/Sandbox Evasion

                  1
                  T1497

                  System Information Discovery

                  4
                  T1082

                  Peripheral Device Discovery

                  1
                  T1120

                  Collection

                  Data from Local System

                  2
                  T1005

                  Command and Control

                  Web Service

                  1
                  T1102

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    cc15615c33ebbf04c03eb860ce04d674

                    SHA1

                    8e646a0932b4c15a32520bb5290fca89f34eeb3f

                    SHA256

                    b9b87ff09a0eaf5335682a40f9392eb2468edaf65d8feb561f258a291d784f43

                    SHA512

                    ccb138a1100809e80452aa75bc9b4719c596d33f26f0e56bb33879fd541be6435348b82a7f89261381e544746f56ffd11e8277f407ad78ae110e87cfa19a2ee1

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    cc15615c33ebbf04c03eb860ce04d674

                    SHA1

                    8e646a0932b4c15a32520bb5290fca89f34eeb3f

                    SHA256

                    b9b87ff09a0eaf5335682a40f9392eb2468edaf65d8feb561f258a291d784f43

                    SHA512

                    ccb138a1100809e80452aa75bc9b4719c596d33f26f0e56bb33879fd541be6435348b82a7f89261381e544746f56ffd11e8277f407ad78ae110e87cfa19a2ee1

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    cc15615c33ebbf04c03eb860ce04d674

                    SHA1

                    8e646a0932b4c15a32520bb5290fca89f34eeb3f

                    SHA256

                    b9b87ff09a0eaf5335682a40f9392eb2468edaf65d8feb561f258a291d784f43

                    SHA512

                    ccb138a1100809e80452aa75bc9b4719c596d33f26f0e56bb33879fd541be6435348b82a7f89261381e544746f56ffd11e8277f407ad78ae110e87cfa19a2ee1

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    cc15615c33ebbf04c03eb860ce04d674

                    SHA1

                    8e646a0932b4c15a32520bb5290fca89f34eeb3f

                    SHA256

                    b9b87ff09a0eaf5335682a40f9392eb2468edaf65d8feb561f258a291d784f43

                    SHA512

                    ccb138a1100809e80452aa75bc9b4719c596d33f26f0e56bb33879fd541be6435348b82a7f89261381e544746f56ffd11e8277f407ad78ae110e87cfa19a2ee1

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    cc15615c33ebbf04c03eb860ce04d674

                    SHA1

                    8e646a0932b4c15a32520bb5290fca89f34eeb3f

                    SHA256

                    b9b87ff09a0eaf5335682a40f9392eb2468edaf65d8feb561f258a291d784f43

                    SHA512

                    ccb138a1100809e80452aa75bc9b4719c596d33f26f0e56bb33879fd541be6435348b82a7f89261381e544746f56ffd11e8277f407ad78ae110e87cfa19a2ee1

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    cc15615c33ebbf04c03eb860ce04d674

                    SHA1

                    8e646a0932b4c15a32520bb5290fca89f34eeb3f

                    SHA256

                    b9b87ff09a0eaf5335682a40f9392eb2468edaf65d8feb561f258a291d784f43

                    SHA512

                    ccb138a1100809e80452aa75bc9b4719c596d33f26f0e56bb33879fd541be6435348b82a7f89261381e544746f56ffd11e8277f407ad78ae110e87cfa19a2ee1

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    cc15615c33ebbf04c03eb860ce04d674

                    SHA1

                    8e646a0932b4c15a32520bb5290fca89f34eeb3f

                    SHA256

                    b9b87ff09a0eaf5335682a40f9392eb2468edaf65d8feb561f258a291d784f43

                    SHA512

                    ccb138a1100809e80452aa75bc9b4719c596d33f26f0e56bb33879fd541be6435348b82a7f89261381e544746f56ffd11e8277f407ad78ae110e87cfa19a2ee1

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    cc15615c33ebbf04c03eb860ce04d674

                    SHA1

                    8e646a0932b4c15a32520bb5290fca89f34eeb3f

                    SHA256

                    b9b87ff09a0eaf5335682a40f9392eb2468edaf65d8feb561f258a291d784f43

                    SHA512

                    ccb138a1100809e80452aa75bc9b4719c596d33f26f0e56bb33879fd541be6435348b82a7f89261381e544746f56ffd11e8277f407ad78ae110e87cfa19a2ee1

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    cc15615c33ebbf04c03eb860ce04d674

                    SHA1

                    8e646a0932b4c15a32520bb5290fca89f34eeb3f

                    SHA256

                    b9b87ff09a0eaf5335682a40f9392eb2468edaf65d8feb561f258a291d784f43

                    SHA512

                    ccb138a1100809e80452aa75bc9b4719c596d33f26f0e56bb33879fd541be6435348b82a7f89261381e544746f56ffd11e8277f407ad78ae110e87cfa19a2ee1

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    cc15615c33ebbf04c03eb860ce04d674

                    SHA1

                    8e646a0932b4c15a32520bb5290fca89f34eeb3f

                    SHA256

                    b9b87ff09a0eaf5335682a40f9392eb2468edaf65d8feb561f258a291d784f43

                    SHA512

                    ccb138a1100809e80452aa75bc9b4719c596d33f26f0e56bb33879fd541be6435348b82a7f89261381e544746f56ffd11e8277f407ad78ae110e87cfa19a2ee1

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    cc15615c33ebbf04c03eb860ce04d674

                    SHA1

                    8e646a0932b4c15a32520bb5290fca89f34eeb3f

                    SHA256

                    b9b87ff09a0eaf5335682a40f9392eb2468edaf65d8feb561f258a291d784f43

                    SHA512

                    ccb138a1100809e80452aa75bc9b4719c596d33f26f0e56bb33879fd541be6435348b82a7f89261381e544746f56ffd11e8277f407ad78ae110e87cfa19a2ee1

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    85f25980b7b418d26e4ad0adb8c1a21d

                    SHA1

                    04372b59e85593d43e2381bea97f39f681777dd7

                    SHA256

                    06c85dad7b973a147068f5083839cab6ba771d79242aae9b5f06896b86c275d3

                    SHA512

                    775204c8368f1c9dad82ccd9cfae28eb8660218ba8aaafb648d798c74879719cc9d43619271a72a46995394dd8ee7c33c7cafad354e111b12b2e4350573b085c

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    a23617c04a4ed88688fb8ef75cd49fab

                    SHA1

                    4b7b2c6e75aa6e6a9341b4212c35a1ca7b26ed56

                    SHA256

                    fbf9583b42d6b946eecabd102224fe0db0b7fedba1972a8537bf07fdf04e8199

                    SHA512

                    a1d158e7f11b7d9a400653286c9b532a3d231dc13f77646622be6c9dfee339a299b90fde87ca56fb01eceb9611340efe79280f91fdd33048e75048eb98fb0217

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    3c043880aec4c623923f1a9be64c9996

                    SHA1

                    b42966d902e07ecd2f613f3617f75bb31430189a

                    SHA256

                    e29a36031bb0e45886b753a42958f514b295469b4227e6ce6e3f4b80a00470b6

                    SHA512

                    4b6472aecafd43653063ac44d8c2a983c1623e2b5154fd7f804434a2a33ea7226ff018b8ceba231814bad6850514896645496aea673b9b57fdd79d41ac6f2881

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    07e2dddac12e28d898fc85b5a5e77dd0

                    SHA1

                    53fbe8c8820db71c20ea047eb6219390202dc8b5

                    SHA256

                    955a105eaadddd8de045b5dedefb820faa432e147d64eb7f7ea3b4c427b174b8

                    SHA512

                    2b3d22ffa547636f332ff9f4ed10abe491ad58e22991b837bba2d4e1285d628c892c5b6031ca4b85aaaf750534b8afafe084aa9f5d229c44c69050f22b5a7158

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    ad393d1d169da3840422d29d81a14ae8

                    SHA1

                    e541360faf12b5d503a5fe048ade2c2da9c4a135

                    SHA256

                    48368258e5f3662eaf97c58ba55f9efe3ef5c3149ef28c21c6cd365e17dc4ebe

                    SHA512

                    8af13026b5d932095858f08369866014cbf9554c412cccfc0feacaac4ff89bf8c9d0be0ec834c94def6978724afd5bdc471c5144c9fb08a1e31f2cd84544fc0c

                  • C:\ProgramData\Data\AudioCodec.exe
                    MD5

                    3668d0f8a4830acf73f05df88790dae6

                    SHA1

                    29dadd17025dc1e35870c0d958149cbf4a0c7ee3

                    SHA256

                    d8073a6334eac5fc155b7c3082a95310dacabaab6932211db7cea34a86c8ad5a

                    SHA512

                    565b55a9a4981a6f7bd683d81ebc2066b4ba1a85029c7546ac2a177c08cb64b9423ec885d1604a6100cbb9b75a443fbb73a3daa811f468556c1b3e3e58b7111a

                  • C:\ProgramData\Systemd\config.json
                    MD5

                    fa1d69a92278c02bde09e56f53f17e7c

                    SHA1

                    18bf7aeb76a9dab8dfbc54fd6c44c9c31ab96c6a

                    SHA256

                    b7530d98b7fbfaf91eaf37c184adf3d2f0d7fe0be0161f94cf01a66a8b8334c2

                    SHA512

                    86260deb08d8e17cab9aa84c156988343ac567b45a9b437a67443983d5143e5979ee775ba01a33cdad57d87ab6fd4dca56489df4da2b9a529202dad5a26c93e2

                  • C:\ProgramData\Systemd\note3dll.exe
                    MD5

                    0b85eae86038116041ecc8d24ba2fadb

                    SHA1

                    bcfeff8a7b42e8836b7dea9f6d594e14f6b25cec

                    SHA256

                    cd0dcc3d3aab1dc613cd5b1ea4d3a066ab20768c60babb1a4e79df9da9144218

                    SHA512

                    ef0b17ae8d533c209491358f09826ea7b0cb5e5d7a435b80f574916624070036d5fcf30eb35c0d5c33b49c134f471734efdaef5154de51b1ce600b4fe51b9744

                  • C:\ProgramData\Systemd\note3dll.exe
                    MD5

                    0b85eae86038116041ecc8d24ba2fadb

                    SHA1

                    bcfeff8a7b42e8836b7dea9f6d594e14f6b25cec

                    SHA256

                    cd0dcc3d3aab1dc613cd5b1ea4d3a066ab20768c60babb1a4e79df9da9144218

                    SHA512

                    ef0b17ae8d533c209491358f09826ea7b0cb5e5d7a435b80f574916624070036d5fcf30eb35c0d5c33b49c134f471734efdaef5154de51b1ce600b4fe51b9744

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\156F.exe.log
                    MD5

                    41fbed686f5700fc29aaccf83e8ba7fd

                    SHA1

                    5271bc29538f11e42a3b600c8dc727186e912456

                    SHA256

                    df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

                    SHA512

                    234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

                  • C:\Users\Admin\AppData\Local\Temp\106D.exe
                    MD5

                    8c69181e218d120c2222c285f73f3434

                    SHA1

                    f6d61590fcc225b16dae79d689bb2d73c27f49f5

                    SHA256

                    646492cdcf4be74a0bae1711eb6902d8d2cc887519fe26c6bd7a84f3387d4a9d

                    SHA512

                    a67a2af0b9760c214baa78e307d2c3b786c210d7d02525840d2e7e673b456b312e016a22e3428304045d4ad99d51228c283eddeaf8b726502ee84431c98ed7ea

                  • C:\Users\Admin\AppData\Local\Temp\106D.exe
                    MD5

                    8c69181e218d120c2222c285f73f3434

                    SHA1

                    f6d61590fcc225b16dae79d689bb2d73c27f49f5

                    SHA256

                    646492cdcf4be74a0bae1711eb6902d8d2cc887519fe26c6bd7a84f3387d4a9d

                    SHA512

                    a67a2af0b9760c214baa78e307d2c3b786c210d7d02525840d2e7e673b456b312e016a22e3428304045d4ad99d51228c283eddeaf8b726502ee84431c98ed7ea

                  • C:\Users\Admin\AppData\Local\Temp\156F.exe
                    MD5

                    2846ad734c304a80d4200a86533ccf00

                    SHA1

                    6faa75e815c17245e574dd914966d5f531427dad

                    SHA256

                    770da1ece99e04a602eb75b9dd90e58b4880d42acb4c1b189421720d446b02a1

                    SHA512

                    7b9dffd65a941b3587d568d2714a72041a7ac62bfe919a079b99f8dd659289b7bb1e6e1c2b9873c7b8b09c24ba4eef66d126313576f7f4f487269c14228ae80c

                  • C:\Users\Admin\AppData\Local\Temp\156F.exe
                    MD5

                    2846ad734c304a80d4200a86533ccf00

                    SHA1

                    6faa75e815c17245e574dd914966d5f531427dad

                    SHA256

                    770da1ece99e04a602eb75b9dd90e58b4880d42acb4c1b189421720d446b02a1

                    SHA512

                    7b9dffd65a941b3587d568d2714a72041a7ac62bfe919a079b99f8dd659289b7bb1e6e1c2b9873c7b8b09c24ba4eef66d126313576f7f4f487269c14228ae80c

                  • C:\Users\Admin\AppData\Local\Temp\156F.exe
                    MD5

                    2846ad734c304a80d4200a86533ccf00

                    SHA1

                    6faa75e815c17245e574dd914966d5f531427dad

                    SHA256

                    770da1ece99e04a602eb75b9dd90e58b4880d42acb4c1b189421720d446b02a1

                    SHA512

                    7b9dffd65a941b3587d568d2714a72041a7ac62bfe919a079b99f8dd659289b7bb1e6e1c2b9873c7b8b09c24ba4eef66d126313576f7f4f487269c14228ae80c

                  • C:\Users\Admin\AppData\Local\Temp\531.exe
                    MD5

                    a69e12607d01237460808fa1709e5e86

                    SHA1

                    4a12f82aee1c90e70cdf6be863ce1a749c8ae411

                    SHA256

                    188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

                    SHA512

                    7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

                  • C:\Users\Admin\AppData\Local\Temp\531.exe
                    MD5

                    a69e12607d01237460808fa1709e5e86

                    SHA1

                    4a12f82aee1c90e70cdf6be863ce1a749c8ae411

                    SHA256

                    188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

                    SHA512

                    7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

                  • C:\Users\Admin\AppData\Local\Temp\534F.exe
                    MD5

                    cc078e133d1c8a2a07dbb784463a5390

                    SHA1

                    5eccaa99757c4201d90d7904f546952039e747d6

                    SHA256

                    1fa26edc32e7af8d9de8ecbe2e68f8307a3d936dabe730af6976e73a2528c388

                    SHA512

                    cd9edd7b858a81a4a46b8831c94a7abcaa74754c5a5a52689843b44fca4455d74767cf4f85c45f4ef2f2011fd17282c51f5110fefa60ea94c95e836c72283b85

                  • C:\Users\Admin\AppData\Local\Temp\534F.exe
                    MD5

                    cc078e133d1c8a2a07dbb784463a5390

                    SHA1

                    5eccaa99757c4201d90d7904f546952039e747d6

                    SHA256

                    1fa26edc32e7af8d9de8ecbe2e68f8307a3d936dabe730af6976e73a2528c388

                    SHA512

                    cd9edd7b858a81a4a46b8831c94a7abcaa74754c5a5a52689843b44fca4455d74767cf4f85c45f4ef2f2011fd17282c51f5110fefa60ea94c95e836c72283b85

                  • C:\Users\Admin\AppData\Local\Temp\6CE3.exe
                    MD5

                    07fd20f2ef24f16c0d0ce1bea427ff02

                    SHA1

                    212f5d0cb59ed1626c1c687ccef54b88d11aab22

                    SHA256

                    f5d0012b834951cde77890781dcb8e3787377f7682777eb4fb29185682e8d92c

                    SHA512

                    6307f379adde919841336a98c034efd9cba9caec791a9d2b0d8ec531a39d818b35a9a107650029e580c54efd9a1a799d3c56dfab721a8b068238901ee9ada909

                  • C:\Users\Admin\AppData\Local\Temp\6CE3.exe
                    MD5

                    07fd20f2ef24f16c0d0ce1bea427ff02

                    SHA1

                    212f5d0cb59ed1626c1c687ccef54b88d11aab22

                    SHA256

                    f5d0012b834951cde77890781dcb8e3787377f7682777eb4fb29185682e8d92c

                    SHA512

                    6307f379adde919841336a98c034efd9cba9caec791a9d2b0d8ec531a39d818b35a9a107650029e580c54efd9a1a799d3c56dfab721a8b068238901ee9ada909

                  • C:\Users\Admin\AppData\Local\Temp\7437.exe
                    MD5

                    8f5840ed3d0afcd582700adbb02ac00e

                    SHA1

                    0ce0b3e5e61fd328e37cebf47029f36f29582a32

                    SHA256

                    ec75f6425faec59679a112ddf3cfa69acdd45afeb46806067ebc52b4acc6332e

                    SHA512

                    700fe17a8bec9a34c2582c7abbbeda2750cda87f9cb3f6913b61b8f42d4c4b520fd52ea95c0a98d0072fa682f7823e03fc2a00854827d22ffba582d1b723ac27

                  • C:\Users\Admin\AppData\Local\Temp\7437.exe
                    MD5

                    8f5840ed3d0afcd582700adbb02ac00e

                    SHA1

                    0ce0b3e5e61fd328e37cebf47029f36f29582a32

                    SHA256

                    ec75f6425faec59679a112ddf3cfa69acdd45afeb46806067ebc52b4acc6332e

                    SHA512

                    700fe17a8bec9a34c2582c7abbbeda2750cda87f9cb3f6913b61b8f42d4c4b520fd52ea95c0a98d0072fa682f7823e03fc2a00854827d22ffba582d1b723ac27

                  • C:\Users\Admin\AppData\Local\Temp\7C18.exe
                    MD5

                    d89443e3bc2fc8605e467ec0597b635f

                    SHA1

                    741bbced5cca825914c68f93be93ce927b61ef4f

                    SHA256

                    5d745fa3e32482728c1f2ad6e28263d9061345a6a05a9cf290098ad4864990d2

                    SHA512

                    b5cc6076488af3f07666ef2fbb3c868948c3620e301a098749210cdc7dbc80e640061aa024c181c60f98f503b96195238183aff75d4020ce83b962132f793f6c

                  • C:\Users\Admin\AppData\Local\Temp\7C18.exe
                    MD5

                    d89443e3bc2fc8605e467ec0597b635f

                    SHA1

                    741bbced5cca825914c68f93be93ce927b61ef4f

                    SHA256

                    5d745fa3e32482728c1f2ad6e28263d9061345a6a05a9cf290098ad4864990d2

                    SHA512

                    b5cc6076488af3f07666ef2fbb3c868948c3620e301a098749210cdc7dbc80e640061aa024c181c60f98f503b96195238183aff75d4020ce83b962132f793f6c

                  • C:\Users\Admin\AppData\Local\Temp\A6E2.exe
                    MD5

                    44dc3130f089718a02b53aceeb7b8980

                    SHA1

                    66fe679d4960f1f6a395a40e1a2e64025cafbddb

                    SHA256

                    b71e691b4023157ca65c44f764ffc4c2ba1263ad634b4a4acc17b1c249b1d5f9

                    SHA512

                    5a4413be7b9e3e232084e6429594610dbb7a8b3b97071da714b24ff9445e41a26c0ba4392e437d8a09894d27707dcb9bf1c2a65f27561a644d3ff44507da97d4

                  • C:\Users\Admin\AppData\Local\Temp\A6E2.exe
                    MD5

                    ce0aadaef4b77999ac2f475361841770

                    SHA1

                    4fa10fc93ae72aa2832f6c8f9160f481219f009d

                    SHA256

                    a013ca0dd7deeb71fe7e6f388aca8293989ba44f5b44ddc011ec038510c9cc0d

                    SHA512

                    7217eebd248e651c0571de32790c9f7cef706bf579507ade81ce9031c77aa75b6c9f569e169deab277819b687566e1bdb18a0a3f093412eb99e4ff703be52258

                  • C:\Users\Admin\AppData\Local\Temp\AudioDriver.exe
                    MD5

                    5ddf0a162b4926bf3b3f6a36f0f0b340

                    SHA1

                    9810a28fbcd8a8cdd4f7ae4ea7ad1c888f02ba95

                    SHA256

                    dafce32f7db8c54d2f424b33885d87012f454aeb6fb9ed95502884544b7ccda3

                    SHA512

                    f91ccccc91733291ee712f66e42520f7742cce0e5ea097d816fe2e5b372a698256c256f0bf8daf6f6f4a1e8cc438dae561e9a288d2d66709de844645dbf5e7cb

                  • C:\Users\Admin\AppData\Local\Temp\AudioDriver.exe
                    MD5

                    5ddf0a162b4926bf3b3f6a36f0f0b340

                    SHA1

                    9810a28fbcd8a8cdd4f7ae4ea7ad1c888f02ba95

                    SHA256

                    dafce32f7db8c54d2f424b33885d87012f454aeb6fb9ed95502884544b7ccda3

                    SHA512

                    f91ccccc91733291ee712f66e42520f7742cce0e5ea097d816fe2e5b372a698256c256f0bf8daf6f6f4a1e8cc438dae561e9a288d2d66709de844645dbf5e7cb

                  • C:\Users\Admin\AppData\Local\Temp\BF2D.exe
                    MD5

                    7cf2af3a5b5f6df3e2b5aee02504022b

                    SHA1

                    19d4481ead548df3982e7e2d17265724af8b92e6

                    SHA256

                    010ec844c209e11b7eec52cebdc39b6464952079eee052e3e2241ad0009ff44a

                    SHA512

                    3e13f85c2af5026833e7b46399773125da0a81e2a72f61ec6e7e498224357aeec58dc17f438edcf91173dc9264dd180d733df5abd6589b386560e4255667b0d8

                  • C:\Users\Admin\AppData\Local\Temp\BF2D.exe
                    MD5

                    7cf2af3a5b5f6df3e2b5aee02504022b

                    SHA1

                    19d4481ead548df3982e7e2d17265724af8b92e6

                    SHA256

                    010ec844c209e11b7eec52cebdc39b6464952079eee052e3e2241ad0009ff44a

                    SHA512

                    3e13f85c2af5026833e7b46399773125da0a81e2a72f61ec6e7e498224357aeec58dc17f438edcf91173dc9264dd180d733df5abd6589b386560e4255667b0d8

                  • C:\Users\Admin\AppData\Local\Temp\CA4A.exe
                    MD5

                    6cac46f77a08178ac8ba3186cc83051a

                    SHA1

                    43db8ad4f6334e7309ad6947d5b8d6b44f86efb1

                    SHA256

                    5b447482fcc1ef9939b7144b1ded517067afe56f0ea984ae132086dade2dae30

                    SHA512

                    42c8bed4d7104104431bf517490b8fa2ac67cf9d9e9e1ba14d5a06b8d2cd97891fba3af64e39872360ec0ecaf804f93b64b1b28733ae939402b0e9e37875a42f

                  • C:\Users\Admin\AppData\Local\Temp\CA4A.exe
                    MD5

                    6cac46f77a08178ac8ba3186cc83051a

                    SHA1

                    43db8ad4f6334e7309ad6947d5b8d6b44f86efb1

                    SHA256

                    5b447482fcc1ef9939b7144b1ded517067afe56f0ea984ae132086dade2dae30

                    SHA512

                    42c8bed4d7104104431bf517490b8fa2ac67cf9d9e9e1ba14d5a06b8d2cd97891fba3af64e39872360ec0ecaf804f93b64b1b28733ae939402b0e9e37875a42f

                  • memory/196-184-0x0000000000000000-mapping.dmp
                  • memory/488-245-0x0000000000000000-mapping.dmp
                  • memory/488-271-0x0000000005C30000-0x0000000005C31000-memory.dmp
                    Filesize

                    4KB

                  • memory/488-259-0x0000000077580000-0x000000007770E000-memory.dmp
                    Filesize

                    1.6MB

                  • memory/488-256-0x0000000000B40000-0x0000000000B41000-memory.dmp
                    Filesize

                    4KB

                  • memory/508-127-0x0000000000000000-mapping.dmp
                  • memory/508-133-0x0000000004B80000-0x0000000004B81000-memory.dmp
                    Filesize

                    4KB

                  • memory/508-137-0x0000000004B30000-0x0000000004B31000-memory.dmp
                    Filesize

                    4KB

                  • memory/508-139-0x00000000052A0000-0x00000000052A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/508-130-0x0000000000330000-0x0000000000331000-memory.dmp
                    Filesize

                    4KB

                  • memory/508-138-0x0000000004D90000-0x0000000004D91000-memory.dmp
                    Filesize

                    4KB

                  • memory/684-222-0x0000000000000000-mapping.dmp
                  • memory/684-247-0x0000000000400000-0x0000000002CFA000-memory.dmp
                    Filesize

                    41.0MB

                  • memory/684-244-0x0000000004930000-0x00000000049BF000-memory.dmp
                    Filesize

                    572KB

                  • memory/936-186-0x0000000000000000-mapping.dmp
                  • memory/1108-143-0x0000000000400000-0x000000000041E000-memory.dmp
                    Filesize

                    120KB

                  • memory/1108-144-0x0000000000418F6E-mapping.dmp
                  • memory/1108-154-0x0000000005560000-0x0000000005B66000-memory.dmp
                    Filesize

                    6.0MB

                  • memory/1108-164-0x0000000006F30000-0x0000000006F31000-memory.dmp
                    Filesize

                    4KB

                  • memory/1120-197-0x0000000000000000-mapping.dmp
                  • memory/1544-192-0x0000000000000000-mapping.dmp
                  • memory/1612-252-0x0000000000000000-mapping.dmp
                  • memory/1728-214-0x0000000000000000-mapping.dmp
                  • memory/1752-276-0x0000000000000000-mapping.dmp
                  • memory/1752-291-0x0000000004D90000-0x000000000528E000-memory.dmp
                    Filesize

                    5.0MB

                  • memory/2136-194-0x0000000000000000-mapping.dmp
                  • memory/3040-217-0x0000000000000000-mapping.dmp
                  • memory/3048-117-0x0000000000AC0000-0x0000000000AD6000-memory.dmp
                    Filesize

                    88KB

                  • memory/3168-200-0x0000000000000000-mapping.dmp
                  • memory/3228-169-0x0000000000000000-mapping.dmp
                  • memory/3264-118-0x0000000000000000-mapping.dmp
                  • memory/4012-188-0x0000000000000000-mapping.dmp
                  • memory/4172-142-0x0000000005490000-0x0000000005491000-memory.dmp
                    Filesize

                    4KB

                  • memory/4172-155-0x0000000006700000-0x0000000006701000-memory.dmp
                    Filesize

                    4KB

                  • memory/4172-130-0x0000000000010000-0x0000000000011000-memory.dmp
                    Filesize

                    4KB

                  • memory/4172-135-0x0000000005230000-0x0000000005231000-memory.dmp
                    Filesize

                    4KB

                  • memory/4172-136-0x00000000052D0000-0x00000000052D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4172-156-0x0000000006E00000-0x0000000006E01000-memory.dmp
                    Filesize

                    4KB

                  • memory/4172-158-0x0000000006980000-0x0000000006981000-memory.dmp
                    Filesize

                    4KB

                  • memory/4172-141-0x00000000052C0000-0x00000000052C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4172-140-0x0000000005260000-0x0000000005261000-memory.dmp
                    Filesize

                    4KB

                  • memory/4172-126-0x0000000077580000-0x000000007770E000-memory.dmp
                    Filesize

                    1.6MB

                  • memory/4172-123-0x0000000000000000-mapping.dmp
                  • memory/4172-134-0x00000000058E0000-0x00000000058E1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4220-264-0x0000000004B30000-0x0000000004B4C000-memory.dmp
                    Filesize

                    112KB

                  • memory/4220-234-0x0000000000000000-mapping.dmp
                  • memory/4220-284-0x0000000007434000-0x0000000007436000-memory.dmp
                    Filesize

                    8KB

                  • memory/4220-273-0x0000000007432000-0x0000000007433000-memory.dmp
                    Filesize

                    4KB

                  • memory/4220-274-0x0000000007433000-0x0000000007434000-memory.dmp
                    Filesize

                    4KB

                  • memory/4220-268-0x0000000007430000-0x0000000007431000-memory.dmp
                    Filesize

                    4KB

                  • memory/4220-263-0x0000000000400000-0x0000000002CCD000-memory.dmp
                    Filesize

                    40.8MB

                  • memory/4220-261-0x0000000002D40000-0x0000000002E8A000-memory.dmp
                    Filesize

                    1.3MB

                  • memory/4256-116-0x0000000000402FAB-mapping.dmp
                  • memory/4256-115-0x0000000000400000-0x0000000000409000-memory.dmp
                    Filesize

                    36KB

                  • memory/4372-172-0x0000000000000000-mapping.dmp
                  • memory/4372-180-0x00007FFA78650000-0x00007FFA78652000-memory.dmp
                    Filesize

                    8KB

                  • memory/4392-198-0x000002D7D3040000-0x000002D7D3060000-memory.dmp
                    Filesize

                    128KB

                  • memory/4392-196-0x000002D7D3020000-0x000002D7D3040000-memory.dmp
                    Filesize

                    128KB

                  • memory/4392-182-0x000002D7D2EB0000-0x000002D7D2ED0000-memory.dmp
                    Filesize

                    128KB

                  • memory/4392-175-0x0000000000000000-mapping.dmp
                  • memory/4392-178-0x000002D7D2E80000-0x000002D7D2EA0000-memory.dmp
                    Filesize

                    128KB

                  • memory/4436-293-0x0000000000000000-mapping.dmp
                  • memory/4568-190-0x0000000000000000-mapping.dmp
                  • memory/4576-213-0x0000000005550000-0x0000000005551000-memory.dmp
                    Filesize

                    4KB

                  • memory/4576-211-0x0000000077580000-0x000000007770E000-memory.dmp
                    Filesize

                    1.6MB

                  • memory/4576-206-0x0000000000DF0000-0x0000000000DF1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4576-202-0x0000000000000000-mapping.dmp
                  • memory/4576-212-0x0000000000630000-0x0000000000631000-memory.dmp
                    Filesize

                    4KB

                  • memory/4596-181-0x0000000000000000-mapping.dmp
                  • memory/4648-114-0x0000000002DA0000-0x0000000002DAA000-memory.dmp
                    Filesize

                    40KB

                  • memory/4760-242-0x0000000000000000-mapping.dmp
                  • memory/4880-236-0x0000000000000000-mapping.dmp
                  • memory/4948-289-0x0000000000000000-mapping.dmp
                  • memory/5048-232-0x00000000030C0000-0x00000000030C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/5048-219-0x0000000000000000-mapping.dmp
                  • memory/5048-224-0x0000000077580000-0x000000007770E000-memory.dmp
                    Filesize

                    1.6MB

                  • memory/5048-223-0x0000000000FB0000-0x0000000000FB1000-memory.dmp
                    Filesize

                    4KB