Analysis

  • max time kernel
    155s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    30-11-2021 06:26

General

  • Target

    da7a20c1ead40488f40365282b0ec467.exe

  • Size

    160KB

  • MD5

    da7a20c1ead40488f40365282b0ec467

  • SHA1

    f9f7a2ab0303b4463e149dbef0eef90c9381f276

  • SHA256

    ae3084e766df9b42b8a94bba956999482db15b246e20ed785e9c814eb6f7530d

  • SHA512

    645ed76c9189a957fbad00639cf4de0d3b54aaf8b383283b497ebb9cb8f1b1333c111240dc1c7e27e9eecaadad8d9cf9ea65424770c845250b33b699d936788e

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

92.255.76.197:38637

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Extracted

Family

redline

Botnet

NoName

C2

185.215.113.29:26828

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 10 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

    suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Arkei Stealer Payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 1 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da7a20c1ead40488f40365282b0ec467.exe
    "C:\Users\Admin\AppData\Local\Temp\da7a20c1ead40488f40365282b0ec467.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:584
    • C:\Users\Admin\AppData\Local\Temp\da7a20c1ead40488f40365282b0ec467.exe
      "C:\Users\Admin\AppData\Local\Temp\da7a20c1ead40488f40365282b0ec467.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:320
  • C:\Users\Admin\AppData\Local\Temp\600B.exe
    C:\Users\Admin\AppData\Local\Temp\600B.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\600B.exe
      C:\Users\Admin\AppData\Local\Temp\600B.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1412
  • C:\Users\Admin\AppData\Local\Temp\6385.exe
    C:\Users\Admin\AppData\Local\Temp\6385.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\aldsrwys\
      2⤵
        PID:2004
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hmwmaf.exe" C:\Windows\SysWOW64\aldsrwys\
        2⤵
          PID:1676
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create aldsrwys binPath= "C:\Windows\SysWOW64\aldsrwys\hmwmaf.exe /d\"C:\Users\Admin\AppData\Local\Temp\6385.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:2044
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description aldsrwys "wifi internet conection"
            2⤵
              PID:1576
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start aldsrwys
              2⤵
                PID:692
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:556
              • C:\Users\Admin\AppData\Local\Temp\670F.exe
                C:\Users\Admin\AppData\Local\Temp\670F.exe
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1796
                • C:\Users\Admin\AppData\Local\Temp\670F.exe
                  C:\Users\Admin\AppData\Local\Temp\670F.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1564
                  • C:\Users\Admin\AppData\Local\Temp\rrghost.exe
                    "C:\Users\Admin\AppData\Local\Temp\rrghost.exe"
                    3⤵
                      PID:1008
                    • C:\Users\Admin\AppData\Local\Temp\Usa_v1.exe
                      "C:\Users\Admin\AppData\Local\Temp\Usa_v1.exe"
                      3⤵
                        PID:2036
                      • C:\Users\Admin\AppData\Local\Temp\Underdosed.exe
                        "C:\Users\Admin\AppData\Local\Temp\Underdosed.exe"
                        3⤵
                          PID:2148
                    • C:\Users\Admin\AppData\Local\Temp\6F3A.exe
                      C:\Users\Admin\AppData\Local\Temp\6F3A.exe
                      1⤵
                      • Executes dropped EXE
                      PID:1168
                    • C:\Users\Admin\AppData\Local\Temp\75C0.exe
                      C:\Users\Admin\AppData\Local\Temp\75C0.exe
                      1⤵
                      • Executes dropped EXE
                      PID:1708
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\75C0.exe" & exit
                        2⤵
                          PID:2364
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout /t 5
                            3⤵
                            • Delays execution with timeout.exe
                            PID:2400
                      • C:\Users\Admin\AppData\Local\Temp\8E31.exe
                        C:\Users\Admin\AppData\Local\Temp\8E31.exe
                        1⤵
                        • Executes dropped EXE
                        • Checks BIOS information in registry
                        • Checks whether UAC is enabled
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Checks processor information in registry
                        PID:1852
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\pbYmeNoYQU & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\8E31.exe"
                          2⤵
                            PID:844
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout 4
                              3⤵
                              • Delays execution with timeout.exe
                              PID:1764
                        • C:\Windows\SysWOW64\aldsrwys\hmwmaf.exe
                          C:\Windows\SysWOW64\aldsrwys\hmwmaf.exe /d"C:\Users\Admin\AppData\Local\Temp\6385.exe"
                          1⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:836
                          • C:\Windows\SysWOW64\svchost.exe
                            svchost.exe
                            2⤵
                              PID:848
                              • C:\Windows\SysWOW64\svchost.exe
                                svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                                3⤵
                                  PID:556
                            • C:\Windows\system32\regsvr32.exe
                              regsvr32 /s C:\Users\Admin\AppData\Local\Temp\9E19.dll
                              1⤵
                              • Loads dropped DLL
                              PID:1108
                            • C:\Users\Admin\AppData\Local\Temp\AA6A.exe
                              C:\Users\Admin\AppData\Local\Temp\AA6A.exe
                              1⤵
                              • Executes dropped EXE
                              PID:1512
                            • C:\Users\Admin\AppData\Local\Temp\B092.exe
                              C:\Users\Admin\AppData\Local\Temp\B092.exe
                              1⤵
                              • Executes dropped EXE
                              PID:1528
                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                2⤵
                                  PID:2416
                                • C:\Users\Admin\AppData\Local\Temp\filename.exe
                                  "C:\Users\Admin\AppData\Local\Temp\filename.exe"
                                  2⤵
                                    PID:2444

                                Network

                                MITRE ATT&CK Matrix ATT&CK v6

                                Persistence

                                New Service

                                1
                                T1050

                                Modify Existing Service

                                1
                                T1031

                                Registry Run Keys / Startup Folder

                                1
                                T1060

                                Privilege Escalation

                                New Service

                                1
                                T1050

                                Defense Evasion

                                Virtualization/Sandbox Evasion

                                1
                                T1497

                                Modify Registry

                                1
                                T1112

                                Credential Access

                                Credentials in Files

                                1
                                T1081

                                Discovery

                                Query Registry

                                5
                                T1012

                                Virtualization/Sandbox Evasion

                                1
                                T1497

                                System Information Discovery

                                5
                                T1082

                                Peripheral Device Discovery

                                1
                                T1120

                                Collection

                                Data from Local System

                                1
                                T1005

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\600B.exe
                                  MD5

                                  8a49f5098d1f19c96e198c7202420608

                                  SHA1

                                  82b7d6acfb951540d489ce7e655f7fab120b149f

                                  SHA256

                                  fb69a6710c475aaa46b2ae802a4f4985ef09025e383e73dc45c45203da554b68

                                  SHA512

                                  33a70d18a37f53ac1caa3f881dd418bda5365811c1545018ab321c32e6a59c6c1f138b95a0b7e54eece97e624eb84089973c6b4dde7a707c5f9aac3a9e8be51c

                                • C:\Users\Admin\AppData\Local\Temp\600B.exe
                                  MD5

                                  8a49f5098d1f19c96e198c7202420608

                                  SHA1

                                  82b7d6acfb951540d489ce7e655f7fab120b149f

                                  SHA256

                                  fb69a6710c475aaa46b2ae802a4f4985ef09025e383e73dc45c45203da554b68

                                  SHA512

                                  33a70d18a37f53ac1caa3f881dd418bda5365811c1545018ab321c32e6a59c6c1f138b95a0b7e54eece97e624eb84089973c6b4dde7a707c5f9aac3a9e8be51c

                                • C:\Users\Admin\AppData\Local\Temp\600B.exe
                                  MD5

                                  8a49f5098d1f19c96e198c7202420608

                                  SHA1

                                  82b7d6acfb951540d489ce7e655f7fab120b149f

                                  SHA256

                                  fb69a6710c475aaa46b2ae802a4f4985ef09025e383e73dc45c45203da554b68

                                  SHA512

                                  33a70d18a37f53ac1caa3f881dd418bda5365811c1545018ab321c32e6a59c6c1f138b95a0b7e54eece97e624eb84089973c6b4dde7a707c5f9aac3a9e8be51c

                                • C:\Users\Admin\AppData\Local\Temp\6385.exe
                                  MD5

                                  e7f606299a819430be235ed185050de1

                                  SHA1

                                  73a88c1712d1c91731f7557c4a023b1599c5ac6c

                                  SHA256

                                  4f140797fa904582e8422edd3bc1c661b72a1a1ee23a329173017e20901e25ca

                                  SHA512

                                  cc78cd7711c2eaa7ed3ba52f77fdb02096bca1c35dbfff3576aa72d7273dfb7fa388b51c605188c7c66fa2cdc7d4d48b6d1652bc390de5e91ec2a97455e95c12

                                • C:\Users\Admin\AppData\Local\Temp\6385.exe
                                  MD5

                                  e7f606299a819430be235ed185050de1

                                  SHA1

                                  73a88c1712d1c91731f7557c4a023b1599c5ac6c

                                  SHA256

                                  4f140797fa904582e8422edd3bc1c661b72a1a1ee23a329173017e20901e25ca

                                  SHA512

                                  cc78cd7711c2eaa7ed3ba52f77fdb02096bca1c35dbfff3576aa72d7273dfb7fa388b51c605188c7c66fa2cdc7d4d48b6d1652bc390de5e91ec2a97455e95c12

                                • C:\Users\Admin\AppData\Local\Temp\670F.exe
                                  MD5

                                  5115e5dab211559a85cd0154e8100f53

                                  SHA1

                                  347800b72ac53ec6e2c87e433763b20282a2c06d

                                  SHA256

                                  ef156fb3a203fe197d89d63e2ea7805a1b9af505dfff5a58532dbfe34e7aabaa

                                  SHA512

                                  d03e58376be1e299a6da57a28ed5db176999baded713aa54ddb59cf8c82b97e8c0b028ce07bddb6989c7c77e518e151e112dde2f1d5244ac2572e4371fa68c12

                                • C:\Users\Admin\AppData\Local\Temp\670F.exe
                                  MD5

                                  5115e5dab211559a85cd0154e8100f53

                                  SHA1

                                  347800b72ac53ec6e2c87e433763b20282a2c06d

                                  SHA256

                                  ef156fb3a203fe197d89d63e2ea7805a1b9af505dfff5a58532dbfe34e7aabaa

                                  SHA512

                                  d03e58376be1e299a6da57a28ed5db176999baded713aa54ddb59cf8c82b97e8c0b028ce07bddb6989c7c77e518e151e112dde2f1d5244ac2572e4371fa68c12

                                • C:\Users\Admin\AppData\Local\Temp\670F.exe
                                  MD5

                                  5115e5dab211559a85cd0154e8100f53

                                  SHA1

                                  347800b72ac53ec6e2c87e433763b20282a2c06d

                                  SHA256

                                  ef156fb3a203fe197d89d63e2ea7805a1b9af505dfff5a58532dbfe34e7aabaa

                                  SHA512

                                  d03e58376be1e299a6da57a28ed5db176999baded713aa54ddb59cf8c82b97e8c0b028ce07bddb6989c7c77e518e151e112dde2f1d5244ac2572e4371fa68c12

                                • C:\Users\Admin\AppData\Local\Temp\6F3A.exe
                                  MD5

                                  646cc8edbe849bf17c1694d936f7ae6b

                                  SHA1

                                  68b8e56cd63da79a8ace5c70f22cd0a6b3672497

                                  SHA256

                                  836e9de6ff5057a4964402ed5a9695e270a7db9e0d8b756a99203befa70fc4b7

                                  SHA512

                                  92df2e2fcfc8c0c2789222966f09b1c295e2b4d2f5d86a10d513dd05749507792d3df78b5f1d605517bba86cbc48c7ba6c9b54d8aba246a1b2cc0a75f626d9d1

                                • C:\Users\Admin\AppData\Local\Temp\75C0.exe
                                  MD5

                                  67593d2711cec7c58fe2fbf5a887ffe9

                                  SHA1

                                  8765dcc79d6db6f92b86745d5e46227884c85fb3

                                  SHA256

                                  12ec6a02fd34a7537ed464480f17251d06393558abae04e606c50edbecbea2af

                                  SHA512

                                  c3ac506a071c335adc2da90470359602ab76fd95ed9c36b15b22e8c81522a2da03ce1d6949c7d8d4b2acc74be2a30968634146f5b1ff1ec0df757879291903c0

                                • C:\Users\Admin\AppData\Local\Temp\8E31.exe
                                  MD5

                                  ca16ca4aa9cf9777274447c9f4ba222e

                                  SHA1

                                  1025ed93e5f44d51b96f1a788764cc4487ee477e

                                  SHA256

                                  0016755526279c5c404b670ecb2d81af46066d879c389924a6574ab9864b5c04

                                  SHA512

                                  72d8d2a729b8ce2940235d3a317ee3eb0eb8d1411e847d6d11e36484f520bb88b3cabd03716b3c2988b0a053426be14aace154f13d306883788f952cd03cf712

                                • C:\Users\Admin\AppData\Local\Temp\8E31.exe
                                  MD5

                                  ca16ca4aa9cf9777274447c9f4ba222e

                                  SHA1

                                  1025ed93e5f44d51b96f1a788764cc4487ee477e

                                  SHA256

                                  0016755526279c5c404b670ecb2d81af46066d879c389924a6574ab9864b5c04

                                  SHA512

                                  72d8d2a729b8ce2940235d3a317ee3eb0eb8d1411e847d6d11e36484f520bb88b3cabd03716b3c2988b0a053426be14aace154f13d306883788f952cd03cf712

                                • C:\Users\Admin\AppData\Local\Temp\9E19.dll
                                  MD5

                                  2ee33ef3b24574c9fb54fd75e29fdf6e

                                  SHA1

                                  158a048f5f5feac85eb5791fbb25ba6aaf262712

                                  SHA256

                                  46e20b3931c4550ade3e4abd395a289621ea3f42f6aa44c90083ebb7f7be2704

                                  SHA512

                                  0655a316b91070c8275afba7ab8437da66cd8b00e4ddcc58c86fa28444deb66700d19e76e93329910c7e44ef28ec488556e2026221980b6aacaa804745a56c5e

                                • C:\Users\Admin\AppData\Local\Temp\AA6A.exe
                                  MD5

                                  32b496f61f59cc3588f6f9ed050b3934

                                  SHA1

                                  4b70f756021549d5875b0e6afd906020a2a4ba31

                                  SHA256

                                  7ed162e5b7bf9de3dcadb4dd2d6eb7a40dda43647ddff3966d44851c61c14570

                                  SHA512

                                  f7a13365c0cda6aa600471f352528b5dad4920bc460a7fc0c8e1e3194859d503b9f70cf8473d0bfd02b0255f119153533b8585857c42a9e22f5720416622dd15

                                • C:\Users\Admin\AppData\Local\Temp\AA6A.exe
                                  MD5

                                  32b496f61f59cc3588f6f9ed050b3934

                                  SHA1

                                  4b70f756021549d5875b0e6afd906020a2a4ba31

                                  SHA256

                                  7ed162e5b7bf9de3dcadb4dd2d6eb7a40dda43647ddff3966d44851c61c14570

                                  SHA512

                                  f7a13365c0cda6aa600471f352528b5dad4920bc460a7fc0c8e1e3194859d503b9f70cf8473d0bfd02b0255f119153533b8585857c42a9e22f5720416622dd15

                                • C:\Users\Admin\AppData\Local\Temp\B092.exe
                                  MD5

                                  0a3c7ef159f8cec686f9ebc1c89b52d5

                                  SHA1

                                  9d39cfdf92b389868a076287d957fd68595f83f2

                                  SHA256

                                  a769f0af8b00ee992d88b250eedae5a1d1a23d4532aa7e69574869fb3cafa565

                                  SHA512

                                  7a0990d834eeef5668a40f47aba43d00f9e890ad4a1b4fbc915b373598bddbae83f088ee3a75e84d22ff09384c3c3ca8ccbcdb2eb85d713d7ecc1f61ca681aeb

                                • C:\Users\Admin\AppData\Local\Temp\B092.exe
                                  MD5

                                  0a3c7ef159f8cec686f9ebc1c89b52d5

                                  SHA1

                                  9d39cfdf92b389868a076287d957fd68595f83f2

                                  SHA256

                                  a769f0af8b00ee992d88b250eedae5a1d1a23d4532aa7e69574869fb3cafa565

                                  SHA512

                                  7a0990d834eeef5668a40f47aba43d00f9e890ad4a1b4fbc915b373598bddbae83f088ee3a75e84d22ff09384c3c3ca8ccbcdb2eb85d713d7ecc1f61ca681aeb

                                • C:\Users\Admin\AppData\Local\Temp\Underdosed.exe
                                  MD5

                                  a8b80e8e3832274bb25102006efcd679

                                  SHA1

                                  18a886a47d9fad731695f0a65c1c7b57bd4e7554

                                  SHA256

                                  e50a5a67a26eed17319b06db4eabbf2bc7fb1222acd62682814f423729bd7031

                                  SHA512

                                  3dce9239ff6aba2f76ed24f780e5a91229b9e4c5bc1a07b43df42dfcb222bcd000f8b8498731e62a13acac8fa8971640ff793c322de9ca8fc8ff968c941f69fe

                                • C:\Users\Admin\AppData\Local\Temp\Underdosed.exe
                                  MD5

                                  a8b80e8e3832274bb25102006efcd679

                                  SHA1

                                  18a886a47d9fad731695f0a65c1c7b57bd4e7554

                                  SHA256

                                  e50a5a67a26eed17319b06db4eabbf2bc7fb1222acd62682814f423729bd7031

                                  SHA512

                                  3dce9239ff6aba2f76ed24f780e5a91229b9e4c5bc1a07b43df42dfcb222bcd000f8b8498731e62a13acac8fa8971640ff793c322de9ca8fc8ff968c941f69fe

                                • C:\Users\Admin\AppData\Local\Temp\Usa_v1.exe
                                  MD5

                                  23bcb2299b0a14e3267c02e2c84253a2

                                  SHA1

                                  cf5cd5e0586d4755f141a6a9046c218b62978234

                                  SHA256

                                  24e4b4bb55c41ac54d224c39af50869077e38112910bc5ae11cbfbb306ef7fab

                                  SHA512

                                  29c8cff4c262e2ddd2d834e42d229c3ad4aef4f5e4f02cfa814883cd77bdf1978d8d9ae9a0c28b9285c29213f3656c48579f5195d06da94c2ed9787d95ad70f8

                                • C:\Users\Admin\AppData\Local\Temp\Usa_v1.exe
                                  MD5

                                  461cfe774c606b4f1bbacaa26e8f2321

                                  SHA1

                                  2efc38674cc46117686a2d8db314ceccd8e015ca

                                  SHA256

                                  60665ea88066817b2508c01d07e5dc49ebbc0e9916923836b3095ba919f13449

                                  SHA512

                                  8e81979fff10ff9d41c9bea29b7bad3c358884a8d46b5ae99f3967508d1b2bf27d8a0123eb619e37b238ba3c02c993e741c20e50d1b82fa2545ac910ace6f662

                                • C:\Users\Admin\AppData\Local\Temp\filename.exe
                                  MD5

                                  244ed3b254a65caad6e1a54ce44996ef

                                  SHA1

                                  0536c2a662bc72921758a826d4fe5729814b2b09

                                  SHA256

                                  5e132934eed0bf145dfbe07d297dd866a95b1dac1eb0927f50184ea6d5d87d27

                                  SHA512

                                  147d01ec699ad7d97b1368fa1c100eb915464e95138b70b16a6f9259d993ea8ed46d5dc1155f19187d8778b412dbf1b1e4df31af8ef161d24557aa48b8d092b8

                                • C:\Users\Admin\AppData\Local\Temp\hmwmaf.exe
                                  MD5

                                  62069426e2ca5182d1f59619176cd604

                                  SHA1

                                  a1bb55ca3e42cb69de880ed47452bb8c1b3c0b8f

                                  SHA256

                                  62d75e3c005dd4a5e4f67b384f80737e25fc3ad20eeb400f8c9830dee0aeb70b

                                  SHA512

                                  0e536076041a21a1f84565f6bdf9f1136e54542b17e40c3c5aff834beb70436ab960defbf1ba8fd2f507a58099d2f8b99b1701590ecd0e2e34b7836212379aef

                                • C:\Users\Admin\AppData\Local\Temp\rrghost.exe
                                  MD5

                                  48f410350b587f183acfea1b7bce1618

                                  SHA1

                                  47d8cf5d2139be76f65847a4482646ab51bae19e

                                  SHA256

                                  8f3d6f07f2294c1467ef4ba44bdd267a8f8e18f5242dc4d92acb8083d6d800a4

                                  SHA512

                                  0482ee6f0e74782400f83af2320449916fef995ddbf5e3741faa2eb09e0687c6c28d1ae80956f0674a9131c30a57f7e6fb1dfa432c510023968b42d7f635ce06

                                • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                  MD5

                                  bc8feac7998bd46acae42474573f8979

                                  SHA1

                                  4771d64a9d69366faf81e0d666c288ee30b0dee7

                                  SHA256

                                  4849248ee94827e56426f4cf3a8435ded4c978d4257deb029e44627e4eb2d7e6

                                  SHA512

                                  a8b1d4a743c4e5e62be327730c3fe7b8a04ad3ffc2e646fa0e4b24410e86b2f24691e32c73b6d4a1ea49e0955a884ed7042c7a7c5ae3f8817c6c8444dd3e7324

                                • C:\Windows\SysWOW64\aldsrwys\hmwmaf.exe
                                  MD5

                                  62069426e2ca5182d1f59619176cd604

                                  SHA1

                                  a1bb55ca3e42cb69de880ed47452bb8c1b3c0b8f

                                  SHA256

                                  62d75e3c005dd4a5e4f67b384f80737e25fc3ad20eeb400f8c9830dee0aeb70b

                                  SHA512

                                  0e536076041a21a1f84565f6bdf9f1136e54542b17e40c3c5aff834beb70436ab960defbf1ba8fd2f507a58099d2f8b99b1701590ecd0e2e34b7836212379aef

                                • \ProgramData\mozglue.dll
                                  MD5

                                  8f73c08a9660691143661bf7332c3c27

                                  SHA1

                                  37fa65dd737c50fda710fdbde89e51374d0c204a

                                  SHA256

                                  3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                                  SHA512

                                  0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                                • \ProgramData\msvcp140.dll
                                  MD5

                                  109f0f02fd37c84bfc7508d4227d7ed5

                                  SHA1

                                  ef7420141bb15ac334d3964082361a460bfdb975

                                  SHA256

                                  334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                                  SHA512

                                  46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                                • \ProgramData\nss3.dll
                                  MD5

                                  bfac4e3c5908856ba17d41edcd455a51

                                  SHA1

                                  8eec7e888767aa9e4cca8ff246eb2aacb9170428

                                  SHA256

                                  e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                                  SHA512

                                  2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                                • \ProgramData\sqlite3.dll
                                  MD5

                                  e477a96c8f2b18d6b5c27bde49c990bf

                                  SHA1

                                  e980c9bf41330d1e5bd04556db4646a0210f7409

                                  SHA256

                                  16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                                  SHA512

                                  335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                                • \ProgramData\vcruntime140.dll
                                  MD5

                                  7587bf9cb4147022cd5681b015183046

                                  SHA1

                                  f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                                  SHA256

                                  c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                                  SHA512

                                  0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                                • \Users\Admin\AppData\Local\Temp\600B.exe
                                  MD5

                                  8a49f5098d1f19c96e198c7202420608

                                  SHA1

                                  82b7d6acfb951540d489ce7e655f7fab120b149f

                                  SHA256

                                  fb69a6710c475aaa46b2ae802a4f4985ef09025e383e73dc45c45203da554b68

                                  SHA512

                                  33a70d18a37f53ac1caa3f881dd418bda5365811c1545018ab321c32e6a59c6c1f138b95a0b7e54eece97e624eb84089973c6b4dde7a707c5f9aac3a9e8be51c

                                • \Users\Admin\AppData\Local\Temp\670F.exe
                                  MD5

                                  5115e5dab211559a85cd0154e8100f53

                                  SHA1

                                  347800b72ac53ec6e2c87e433763b20282a2c06d

                                  SHA256

                                  ef156fb3a203fe197d89d63e2ea7805a1b9af505dfff5a58532dbfe34e7aabaa

                                  SHA512

                                  d03e58376be1e299a6da57a28ed5db176999baded713aa54ddb59cf8c82b97e8c0b028ce07bddb6989c7c77e518e151e112dde2f1d5244ac2572e4371fa68c12

                                • \Users\Admin\AppData\Local\Temp\9E19.dll
                                  MD5

                                  2ee33ef3b24574c9fb54fd75e29fdf6e

                                  SHA1

                                  158a048f5f5feac85eb5791fbb25ba6aaf262712

                                  SHA256

                                  46e20b3931c4550ade3e4abd395a289621ea3f42f6aa44c90083ebb7f7be2704

                                  SHA512

                                  0655a316b91070c8275afba7ab8437da66cd8b00e4ddcc58c86fa28444deb66700d19e76e93329910c7e44ef28ec488556e2026221980b6aacaa804745a56c5e

                                • \Users\Admin\AppData\Local\Temp\Underdosed.exe
                                  MD5

                                  a8b80e8e3832274bb25102006efcd679

                                  SHA1

                                  18a886a47d9fad731695f0a65c1c7b57bd4e7554

                                  SHA256

                                  e50a5a67a26eed17319b06db4eabbf2bc7fb1222acd62682814f423729bd7031

                                  SHA512

                                  3dce9239ff6aba2f76ed24f780e5a91229b9e4c5bc1a07b43df42dfcb222bcd000f8b8498731e62a13acac8fa8971640ff793c322de9ca8fc8ff968c941f69fe

                                • \Users\Admin\AppData\Local\Temp\Underdosed.exe
                                  MD5

                                  a8b80e8e3832274bb25102006efcd679

                                  SHA1

                                  18a886a47d9fad731695f0a65c1c7b57bd4e7554

                                  SHA256

                                  e50a5a67a26eed17319b06db4eabbf2bc7fb1222acd62682814f423729bd7031

                                  SHA512

                                  3dce9239ff6aba2f76ed24f780e5a91229b9e4c5bc1a07b43df42dfcb222bcd000f8b8498731e62a13acac8fa8971640ff793c322de9ca8fc8ff968c941f69fe

                                • \Users\Admin\AppData\Local\Temp\Usa_v1.exe
                                  MD5

                                  8d0bc64455da6c6599c87623caf51959

                                  SHA1

                                  6e169efbb10bcf0a3044ecf9088db7ad8ee4fb27

                                  SHA256

                                  30737b205b47cd49a49499a05352b6770ef5dae941e3465107b57045056966c1

                                  SHA512

                                  149d33a5631d829ee07579fc747e04229561cac00c2aee66ba56d0670d1807cc651cf636c122e4052b3ab06b3e328bef96fd5365673b613a2f19e4153c68c012

                                • \Users\Admin\AppData\Local\Temp\filename.exe
                                  MD5

                                  da1317992c7fad96b3a79d376e20e8bf

                                  SHA1

                                  25f8f01df1b4e700b30d2011abaa926ccf5a324a

                                  SHA256

                                  8977607ba4cf38479ea159ab57835a0b24e4500bab2eae87bf0ebd66b56c6669

                                  SHA512

                                  25915d647fb833b3bebe62540d12d469a01f251f629f555db099c9c2a2823760cc534ec65441f6eed98729b52775a5917a46bb8a30c8310df1450d18a640d7fd

                                • \Users\Admin\AppData\Local\Temp\filename.exe
                                  MD5

                                  6eea88be1acb6578b1d01b0063670a95

                                  SHA1

                                  396d4e585154483187d341608ef3c1d7230f8a58

                                  SHA256

                                  62b4a9ec9d0c84093cf98e31ab0f7c08f66da2e5ee732bb832b6463ccc4a4382

                                  SHA512

                                  87cd84e1af27828f37ead8e6b483ac0241427ad183f6c5e83cd0c89084291ef3ef171ef0c0027f48c869da65425dd836c6fca5c33dc9431fbf556132b17460ce

                                • \Users\Admin\AppData\Local\Temp\rrghost.exe
                                  MD5

                                  48f410350b587f183acfea1b7bce1618

                                  SHA1

                                  47d8cf5d2139be76f65847a4482646ab51bae19e

                                  SHA256

                                  8f3d6f07f2294c1467ef4ba44bdd267a8f8e18f5242dc4d92acb8083d6d800a4

                                  SHA512

                                  0482ee6f0e74782400f83af2320449916fef995ddbf5e3741faa2eb09e0687c6c28d1ae80956f0674a9131c30a57f7e6fb1dfa432c510023968b42d7f635ce06

                                • \Users\Admin\AppData\Local\Temp\rrghost.exe
                                  MD5

                                  48f410350b587f183acfea1b7bce1618

                                  SHA1

                                  47d8cf5d2139be76f65847a4482646ab51bae19e

                                  SHA256

                                  8f3d6f07f2294c1467ef4ba44bdd267a8f8e18f5242dc4d92acb8083d6d800a4

                                  SHA512

                                  0482ee6f0e74782400f83af2320449916fef995ddbf5e3741faa2eb09e0687c6c28d1ae80956f0674a9131c30a57f7e6fb1dfa432c510023968b42d7f635ce06

                                • \Users\Admin\AppData\Local\Temp\svchost.exe
                                  MD5

                                  8b7b35893dd33f9c7f1371be77c4b63c

                                  SHA1

                                  d9e77a6911eaaff41d85b2d2f0f420d42590accf

                                  SHA256

                                  1581113aeea6cd48c3b293494e85d158fb3ef8f92d4f0df0e3514313b0be6a76

                                  SHA512

                                  d660a0e6188258e09e71d8901404761f51146778de0bb0383ecc001c3162d996b809c7c44f26a9901c192c67c6522f3fdfa469170ebc7c9c21f16debbb7ecb30

                                • memory/320-55-0x0000000000400000-0x0000000000409000-memory.dmp
                                  Filesize

                                  36KB

                                • memory/320-57-0x0000000075AB1000-0x0000000075AB3000-memory.dmp
                                  Filesize

                                  8KB

                                • memory/320-56-0x0000000000402F47-mapping.dmp
                                • memory/432-96-0x0000000000400000-0x000000000322A000-memory.dmp
                                  Filesize

                                  46.2MB

                                • memory/432-88-0x000000000331B000-0x000000000332C000-memory.dmp
                                  Filesize

                                  68KB

                                • memory/432-103-0x0000000000220000-0x0000000000233000-memory.dmp
                                  Filesize

                                  76KB

                                • memory/432-69-0x0000000000000000-mapping.dmp
                                • memory/556-169-0x000000000020259C-mapping.dmp
                                • memory/556-113-0x0000000000000000-mapping.dmp
                                • memory/556-165-0x0000000000170000-0x0000000000261000-memory.dmp
                                  Filesize

                                  964KB

                                • memory/556-163-0x0000000000170000-0x0000000000261000-memory.dmp
                                  Filesize

                                  964KB

                                • memory/584-59-0x00000000002B0000-0x00000000002B9000-memory.dmp
                                  Filesize

                                  36KB

                                • memory/584-58-0x00000000002A0000-0x00000000002A9000-memory.dmp
                                  Filesize

                                  36KB

                                • memory/692-112-0x0000000000000000-mapping.dmp
                                • memory/836-129-0x000000000337B000-0x000000000338C000-memory.dmp
                                  Filesize

                                  68KB

                                • memory/836-138-0x0000000000400000-0x000000000322A000-memory.dmp
                                  Filesize

                                  46.2MB

                                • memory/844-123-0x0000000000000000-mapping.dmp
                                • memory/848-140-0x00000000000C9A6B-mapping.dmp
                                • memory/848-139-0x00000000000C0000-0x00000000000D5000-memory.dmp
                                  Filesize

                                  84KB

                                • memory/848-137-0x00000000000C0000-0x00000000000D5000-memory.dmp
                                  Filesize

                                  84KB

                                • memory/1008-182-0x0000000006E12000-0x0000000006E13000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1008-181-0x0000000006E11000-0x0000000006E12000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1008-177-0x0000000000400000-0x0000000002B85000-memory.dmp
                                  Filesize

                                  39.5MB

                                • memory/1008-170-0x0000000004650000-0x000000000467E000-memory.dmp
                                  Filesize

                                  184KB

                                • memory/1008-183-0x0000000006E13000-0x0000000006E14000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1008-172-0x0000000006D30000-0x0000000006D5C000-memory.dmp
                                  Filesize

                                  176KB

                                • memory/1008-188-0x0000000006E14000-0x0000000006E16000-memory.dmp
                                  Filesize

                                  8KB

                                • memory/1008-156-0x0000000000000000-mapping.dmp
                                • memory/1008-159-0x0000000000230000-0x000000000025B000-memory.dmp
                                  Filesize

                                  172KB

                                • memory/1008-160-0x0000000000260000-0x0000000000299000-memory.dmp
                                  Filesize

                                  228KB

                                • memory/1108-126-0x000007FEFC5C1000-0x000007FEFC5C3000-memory.dmp
                                  Filesize

                                  8KB

                                • memory/1108-125-0x0000000000000000-mapping.dmp
                                • memory/1168-83-0x0000000000230000-0x0000000000239000-memory.dmp
                                  Filesize

                                  36KB

                                • memory/1168-82-0x0000000000220000-0x0000000000229000-memory.dmp
                                  Filesize

                                  36KB

                                • memory/1168-79-0x0000000000000000-mapping.dmp
                                • memory/1168-84-0x0000000000400000-0x000000000042C000-memory.dmp
                                  Filesize

                                  176KB

                                • memory/1256-61-0x0000000000000000-mapping.dmp
                                • memory/1256-71-0x0000000000220000-0x0000000000229000-memory.dmp
                                  Filesize

                                  36KB

                                • memory/1392-60-0x0000000002730000-0x0000000002746000-memory.dmp
                                  Filesize

                                  88KB

                                • memory/1392-93-0x00000000040F0000-0x0000000004106000-memory.dmp
                                  Filesize

                                  88KB

                                • memory/1412-66-0x0000000000402F47-mapping.dmp
                                • memory/1512-147-0x0000000000500000-0x0000000000501000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1512-152-0x0000000000560000-0x0000000000565000-memory.dmp
                                  Filesize

                                  20KB

                                • memory/1512-135-0x0000000000010000-0x0000000000011000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1512-131-0x0000000000000000-mapping.dmp
                                • memory/1528-151-0x0000000000260000-0x0000000000261000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1528-143-0x0000000000000000-mapping.dmp
                                • memory/1528-146-0x0000000000820000-0x0000000000821000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1528-149-0x00000000020A0000-0x00000000020A1000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1564-102-0x0000000000400000-0x0000000000420000-memory.dmp
                                  Filesize

                                  128KB

                                • memory/1564-99-0x0000000000418EE6-mapping.dmp
                                • memory/1564-90-0x0000000000400000-0x0000000000420000-memory.dmp
                                  Filesize

                                  128KB

                                • memory/1564-91-0x0000000000400000-0x0000000000420000-memory.dmp
                                  Filesize

                                  128KB

                                • memory/1564-92-0x0000000000400000-0x0000000000420000-memory.dmp
                                  Filesize

                                  128KB

                                • memory/1564-95-0x0000000000400000-0x0000000000420000-memory.dmp
                                  Filesize

                                  128KB

                                • memory/1564-97-0x0000000000400000-0x0000000000420000-memory.dmp
                                  Filesize

                                  128KB

                                • memory/1564-108-0x00000000006D0000-0x00000000006D1000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1576-111-0x0000000000000000-mapping.dmp
                                • memory/1676-107-0x0000000000000000-mapping.dmp
                                • memory/1708-85-0x0000000000000000-mapping.dmp
                                • memory/1708-105-0x0000000000400000-0x0000000002B6E000-memory.dmp
                                  Filesize

                                  39.4MB

                                • memory/1708-98-0x0000000000220000-0x0000000000234000-memory.dmp
                                  Filesize

                                  80KB

                                • memory/1708-101-0x0000000000240000-0x0000000000261000-memory.dmp
                                  Filesize

                                  132KB

                                • memory/1764-124-0x0000000000000000-mapping.dmp
                                • memory/1796-77-0x0000000000200000-0x0000000000201000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1796-75-0x0000000000EF0000-0x0000000000EF1000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1796-72-0x0000000000000000-mapping.dmp
                                • memory/1852-114-0x0000000000000000-mapping.dmp
                                • memory/1852-120-0x0000000000D20000-0x0000000001402000-memory.dmp
                                  Filesize

                                  6.9MB

                                • memory/1852-118-0x0000000000D20000-0x0000000001402000-memory.dmp
                                  Filesize

                                  6.9MB

                                • memory/1852-119-0x0000000000D20000-0x0000000001402000-memory.dmp
                                  Filesize

                                  6.9MB

                                • memory/1852-121-0x0000000000D20000-0x0000000001402000-memory.dmp
                                  Filesize

                                  6.9MB

                                • memory/2004-106-0x0000000000000000-mapping.dmp
                                • memory/2036-180-0x0000000000810000-0x0000000000851000-memory.dmp
                                  Filesize

                                  260KB

                                • memory/2036-205-0x00000000003B0000-0x00000000003B1000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2036-174-0x0000000000000000-mapping.dmp
                                • memory/2036-191-0x0000000075A50000-0x0000000075AA7000-memory.dmp
                                  Filesize

                                  348KB

                                • memory/2036-189-0x0000000000090000-0x0000000000091000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2036-190-0x00000000770F0000-0x0000000077137000-memory.dmp
                                  Filesize

                                  284KB

                                • memory/2036-199-0x0000000000FE0000-0x0000000000FE1000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2036-198-0x0000000076EB0000-0x000000007700C000-memory.dmp
                                  Filesize

                                  1.4MB

                                • memory/2036-201-0x0000000077060000-0x00000000770EF000-memory.dmp
                                  Filesize

                                  572KB

                                • memory/2036-202-0x0000000074BB0000-0x0000000074C30000-memory.dmp
                                  Filesize

                                  512KB

                                • memory/2036-204-0x0000000002540000-0x0000000002541000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2036-187-0x00000000769D0000-0x0000000076A7C000-memory.dmp
                                  Filesize

                                  688KB

                                • memory/2036-184-0x0000000000FE0000-0x00000000010E0000-memory.dmp
                                  Filesize

                                  1024KB

                                • memory/2036-185-0x0000000000080000-0x0000000000081000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2036-179-0x0000000075520000-0x000000007556A000-memory.dmp
                                  Filesize

                                  296KB

                                • memory/2044-110-0x0000000000000000-mapping.dmp
                                • memory/2148-206-0x00000000001F0000-0x00000000001F1000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2148-194-0x0000000000000000-mapping.dmp
                                • memory/2364-208-0x0000000000000000-mapping.dmp
                                • memory/2400-209-0x0000000000000000-mapping.dmp
                                • memory/2416-211-0x0000000000000000-mapping.dmp
                                • memory/2416-218-0x0000000000400000-0x0000000000986000-memory.dmp
                                  Filesize

                                  5.5MB

                                • memory/2416-219-0x00000000002A0000-0x0000000000300000-memory.dmp
                                  Filesize

                                  384KB

                                • memory/2444-216-0x0000000000000000-mapping.dmp