Analysis

  • max time kernel
    37s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/09/2023, 08:54

General

  • Target

    48ead2b4d96a165f01d602f2537913dee3bb7c5e218021f3fe5b63025f6fed69.exe

  • Size

    247KB

  • MD5

    a5c1e80c3bfd8d4360a1e043b15516c3

  • SHA1

    3c58954d1f3d609ea221371d46c3594656d5def5

  • SHA256

    48ead2b4d96a165f01d602f2537913dee3bb7c5e218021f3fe5b63025f6fed69

  • SHA512

    cdec91d011be2bf2da5ab766a9deffb1e58f312d234dd5cb99d6cb3ef3b19f09029f925834f455c1830cd0d4d771b9deb76dfadb9c9185aec2fe5f19d619ec2e

  • SSDEEP

    3072:dL0y/yar0fvAiIwmpmvcAQZu3nK8lYBCR61+:Byar0nLzH3blWk6

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://potunulit.org/

http://hutnilior.net/

http://bulimu55t.net/

http://soryytlic4.net/

http://novanosa5org.org/

http://nuljjjnuli.org/

http://tolilolihul.net/

http://somatoka51hub.net/

http://hujukui3.net/

http://bukubuka1.net/

http://golilopaster.org/

http://newzelannd66.org/

http://otriluyttn.org/

http://gudintas.at/tmp/

http://pik96.ru/tmp/

http://rosatiauto.com/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Extracted

Family

redline

C2

38.181.25.43:3325

Attributes
  • auth_value

    082cde17c5630749ecb0376734fe99c9

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.38.95.107:42494

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Extracted

Family

djvu

C2

http://zexeq.com/raud/get.php

http://zexeq.com/lancer/get.php

Attributes
  • extension

    .wwza

  • offline_id

    LtYnlJvK0hICyOCeum6Tv4pbia9jcIGHVgA3Xht1

  • payload_url

    http://colisumy.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-xoUXGr6cqT Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0789JOsie

rsa_pubkey.plain

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • Detect Fabookie payload 2 IoCs
  • Detected Djvu ransomware 13 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\48ead2b4d96a165f01d602f2537913dee3bb7c5e218021f3fe5b63025f6fed69.exe
    "C:\Users\Admin\AppData\Local\Temp\48ead2b4d96a165f01d602f2537913dee3bb7c5e218021f3fe5b63025f6fed69.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:164
  • C:\Users\Admin\AppData\Local\Temp\41A8.exe
    C:\Users\Admin\AppData\Local\Temp\41A8.exe
    1⤵
    • Executes dropped EXE
    PID:5032
    • C:\Users\Admin\AppData\Local\Temp\41A8.exe
      C:\Users\Admin\AppData\Local\Temp\41A8.exe
      2⤵
        PID:1904
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\eb1304ed-3534-45ec-96f7-7556ff45bfad" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          3⤵
          • Modifies file permissions
          PID:2600
        • C:\Users\Admin\AppData\Local\Temp\41A8.exe
          "C:\Users\Admin\AppData\Local\Temp\41A8.exe" --Admin IsNotAutoStart IsNotTask
          3⤵
            PID:2420
      • C:\Users\Admin\AppData\Local\Temp\42A3.exe
        C:\Users\Admin\AppData\Local\Temp\42A3.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3600
      • C:\Users\Admin\AppData\Local\Temp\43CC.exe
        C:\Users\Admin\AppData\Local\Temp\43CC.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:380
      • C:\Users\Admin\AppData\Local\Temp\45F0.exe
        C:\Users\Admin\AppData\Local\Temp\45F0.exe
        1⤵
        • Executes dropped EXE
        PID:3836
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          2⤵
            PID:4120
        • C:\Users\Admin\AppData\Local\Temp\49CA.exe
          C:\Users\Admin\AppData\Local\Temp\49CA.exe
          1⤵
          • Executes dropped EXE
          PID:2148
          • C:\Users\Admin\AppData\Local\Temp\49CA.exe
            C:\Users\Admin\AppData\Local\Temp\49CA.exe
            2⤵
              PID:4156
              • C:\Users\Admin\AppData\Local\Temp\49CA.exe
                "C:\Users\Admin\AppData\Local\Temp\49CA.exe" --Admin IsNotAutoStart IsNotTask
                3⤵
                  PID:5004
            • C:\Windows\system32\regsvr32.exe
              regsvr32 /s C:\Users\Admin\AppData\Local\Temp\5247.dll
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:2616
              • C:\Windows\SysWOW64\regsvr32.exe
                /s C:\Users\Admin\AppData\Local\Temp\5247.dll
                2⤵
                • Loads dropped DLL
                PID:4100
            • C:\Users\Admin\AppData\Local\Temp\5C89.exe
              C:\Users\Admin\AppData\Local\Temp\5C89.exe
              1⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              PID:4932
            • C:\Users\Admin\AppData\Local\Temp\7774.exe
              C:\Users\Admin\AppData\Local\Temp\7774.exe
              1⤵
              • Executes dropped EXE
              PID:3536
              • C:\Users\Admin\AppData\Local\Temp\aafg31.exe
                "C:\Users\Admin\AppData\Local\Temp\aafg31.exe"
                2⤵
                  PID:4916
                • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                  "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                  2⤵
                    PID:576
                    • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                      "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                      3⤵
                        PID:1584
                    • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                      "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
                      2⤵
                        PID:3544
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          3⤵
                            PID:4540

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                              Filesize

                              2KB

                              MD5

                              9b667ecf8c64e80b6ba550371dc3149c

                              SHA1

                              dd7dd3675307f72562b20d01e86baf619798accf

                              SHA256

                              01376f194051bd65ab162ec35c24d005c179d01d28657eb1f339bb2ededfb886

                              SHA512

                              60daf11cfac79900c5e7c988606570a45a9b170b500acc203c0a12c0683914b745442a177017acc3a4a7df3fd99847768a264e2f0fd4aec76c92b5ecd870fc0c

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                              Filesize

                              1KB

                              MD5

                              5318d6a902beaba43fd3af656c2e3cb0

                              SHA1

                              0202ac2d3e3ad69f1456c6de198b462cdba0edda

                              SHA256

                              bad155252d58babc8824eb5e5bc5efd49ba946a2d7f2aaf27dae16d157c7646e

                              SHA512

                              14b17ce0850c83ade52982c2c3d3d65bc621c2c09dae2f84cd44890a560811d5c25627e582c7dfa544f2a05665562f48f3b2cc4941bac688242eb13ff0944cb7

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                              Filesize

                              488B

                              MD5

                              775055c253ea86be4081d868b91f5127

                              SHA1

                              a9df06ef8532d5165c1030980ec6b5bd5f92309d

                              SHA256

                              ed7bf7a0d49a0124762f554a7c6bf4daa280b69a4fdf8e9c46d5185dd06453dc

                              SHA512

                              743d52b42ab1b092af437d6aee856e5816506baac9e3797d31a23d75c78fb6ecf1afd39b6ac0bfe2297c21c48a7a7d55da858cd1cdf075f9e70b13f07b1de802

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                              Filesize

                              482B

                              MD5

                              a2078602e42b3fcc9e2f053508f4ba51

                              SHA1

                              03f42a516d6fe45b665893c0c6ec81c44d376e3e

                              SHA256

                              41993d343ae0fb8d3ca3cfa976f5976d3f9bf18d818206774f5da104a0b7f283

                              SHA512

                              8e907e6c3ce6444a30a3acb6ae7a8e3ccbc255e42f9b07709cbe93a42a5712cfeba2145f0267c1318869f309dd2de5ea1bf8675cd8da4e4eeb98a89e579a041b

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                              Filesize

                              2KB

                              MD5

                              e49363be96a39de62876e4b1adcc0087

                              SHA1

                              298c43845f3ede76589c47495e2e7a2918ccc684

                              SHA256

                              ec17de230ef7dd522a828d76352ac9d2b98d9fb01122c0b19386e0ebd2e2459f

                              SHA512

                              869ad2034367c3bd7d096a1163950d29acd68a76769e56d5aaf4113005335e034d1cf1db3f27c75f960559629df58833104921a3afb885c92ce684e14af90b92

                            • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                              Filesize

                              4.1MB

                              MD5

                              f654415fe64592f8492a16ee3dd73926

                              SHA1

                              92427b475e01762cd5004c73d520473cf32b514e

                              SHA256

                              29e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292

                              SHA512

                              fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1

                            • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                              Filesize

                              4.1MB

                              MD5

                              f654415fe64592f8492a16ee3dd73926

                              SHA1

                              92427b475e01762cd5004c73d520473cf32b514e

                              SHA256

                              29e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292

                              SHA512

                              fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1

                            • C:\Users\Admin\AppData\Local\Temp\41A8.exe

                              Filesize

                              706KB

                              MD5

                              d5a6096de9c752b863b3dca30f7e45bb

                              SHA1

                              ce44a164d2d9c53db84be578fe16f1a3502feb98

                              SHA256

                              d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795

                              SHA512

                              2ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc

                            • C:\Users\Admin\AppData\Local\Temp\41A8.exe

                              Filesize

                              706KB

                              MD5

                              d5a6096de9c752b863b3dca30f7e45bb

                              SHA1

                              ce44a164d2d9c53db84be578fe16f1a3502feb98

                              SHA256

                              d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795

                              SHA512

                              2ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc

                            • C:\Users\Admin\AppData\Local\Temp\41A8.exe

                              Filesize

                              706KB

                              MD5

                              d5a6096de9c752b863b3dca30f7e45bb

                              SHA1

                              ce44a164d2d9c53db84be578fe16f1a3502feb98

                              SHA256

                              d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795

                              SHA512

                              2ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc

                            • C:\Users\Admin\AppData\Local\Temp\41A8.exe

                              Filesize

                              706KB

                              MD5

                              d5a6096de9c752b863b3dca30f7e45bb

                              SHA1

                              ce44a164d2d9c53db84be578fe16f1a3502feb98

                              SHA256

                              d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795

                              SHA512

                              2ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc

                            • C:\Users\Admin\AppData\Local\Temp\42A3.exe

                              Filesize

                              249KB

                              MD5

                              3f63565f2340a7378449971906111843

                              SHA1

                              01bc7e7e6f7d0414ccfda087213f137862052363

                              SHA256

                              60268b3bb9ddc3353219eef23bce63f73bf2b4e398a1357d15c93ad63c21289a

                              SHA512

                              9bb94b205a219e3b82c2f163d73abddda4e20c0bd0b247bc8558b7d8b7eb597e08e0f881902b1850a7bf06b448285984dd96873ae024ee4ce9adc2f9f633c7a2

                            • C:\Users\Admin\AppData\Local\Temp\42A3.exe

                              Filesize

                              249KB

                              MD5

                              3f63565f2340a7378449971906111843

                              SHA1

                              01bc7e7e6f7d0414ccfda087213f137862052363

                              SHA256

                              60268b3bb9ddc3353219eef23bce63f73bf2b4e398a1357d15c93ad63c21289a

                              SHA512

                              9bb94b205a219e3b82c2f163d73abddda4e20c0bd0b247bc8558b7d8b7eb597e08e0f881902b1850a7bf06b448285984dd96873ae024ee4ce9adc2f9f633c7a2

                            • C:\Users\Admin\AppData\Local\Temp\43CC.exe

                              Filesize

                              261KB

                              MD5

                              aaa35a5dd28fb6dcd151ccb0b9ed270d

                              SHA1

                              08a9dbe8c26691836f34eab89f1c500085b6efc5

                              SHA256

                              902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557

                              SHA512

                              155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed

                            • C:\Users\Admin\AppData\Local\Temp\43CC.exe

                              Filesize

                              261KB

                              MD5

                              aaa35a5dd28fb6dcd151ccb0b9ed270d

                              SHA1

                              08a9dbe8c26691836f34eab89f1c500085b6efc5

                              SHA256

                              902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557

                              SHA512

                              155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed

                            • C:\Users\Admin\AppData\Local\Temp\45F0.exe

                              Filesize

                              399KB

                              MD5

                              7f6e5e08d9fb67128f7fccc77e294011

                              SHA1

                              ba918aa4180417de13f9fba10eef72b87bf8c21f

                              SHA256

                              37333c4e8cab40f04954ed9dcd231f8eeea9eadc6d86e4f90aed014f21ac2528

                              SHA512

                              4164b2bfc311b09e588f9d6ec58e31a39e1e4eb0c9337e25951ec70844ae15d8da8d8c76801cfef82eccd4074831f71b6cdef22a2658236e1618b726a1895afc

                            • C:\Users\Admin\AppData\Local\Temp\45F0.exe

                              Filesize

                              399KB

                              MD5

                              7f6e5e08d9fb67128f7fccc77e294011

                              SHA1

                              ba918aa4180417de13f9fba10eef72b87bf8c21f

                              SHA256

                              37333c4e8cab40f04954ed9dcd231f8eeea9eadc6d86e4f90aed014f21ac2528

                              SHA512

                              4164b2bfc311b09e588f9d6ec58e31a39e1e4eb0c9337e25951ec70844ae15d8da8d8c76801cfef82eccd4074831f71b6cdef22a2658236e1618b726a1895afc

                            • C:\Users\Admin\AppData\Local\Temp\49CA.exe

                              Filesize

                              714KB

                              MD5

                              ef6b6fbf4169dfef91fd2651b7fd2b4f

                              SHA1

                              564dcbad847b304c784a72aa871bea983dab1d53

                              SHA256

                              e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5

                              SHA512

                              263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc

                            • C:\Users\Admin\AppData\Local\Temp\49CA.exe

                              Filesize

                              714KB

                              MD5

                              ef6b6fbf4169dfef91fd2651b7fd2b4f

                              SHA1

                              564dcbad847b304c784a72aa871bea983dab1d53

                              SHA256

                              e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5

                              SHA512

                              263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc

                            • C:\Users\Admin\AppData\Local\Temp\49CA.exe

                              Filesize

                              714KB

                              MD5

                              ef6b6fbf4169dfef91fd2651b7fd2b4f

                              SHA1

                              564dcbad847b304c784a72aa871bea983dab1d53

                              SHA256

                              e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5

                              SHA512

                              263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc

                            • C:\Users\Admin\AppData\Local\Temp\49CA.exe

                              Filesize

                              714KB

                              MD5

                              ef6b6fbf4169dfef91fd2651b7fd2b4f

                              SHA1

                              564dcbad847b304c784a72aa871bea983dab1d53

                              SHA256

                              e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5

                              SHA512

                              263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc

                            • C:\Users\Admin\AppData\Local\Temp\5247.dll

                              Filesize

                              1.4MB

                              MD5

                              9b1d9a3ce645a872a66dd45fc1e8bc46

                              SHA1

                              a0268f9c1d3e66112e1ac9d857b7b12764a2901d

                              SHA256

                              6ccd11a1236b38e19e975b070f64ed0ebbb8325e9367e93e863e8600e4e473bb

                              SHA512

                              0d81a0d3de19bfae1a879f01383e7bfb89d97cbc1ae57e8cd0ad57fa0a614624ecaca07c549554ace8a5c8573ace1ddc9f3db7611825e2ceec3d5b1449d2cb40

                            • C:\Users\Admin\AppData\Local\Temp\5C89.exe

                              Filesize

                              247KB

                              MD5

                              05f27d8d2e782012e4abc7b62b19bce7

                              SHA1

                              8fa15a05f0916b8d6396b634a5d5768c6c60e4c2

                              SHA256

                              aa38ec70b85a9e070536db5b73e65f116023b1d414bbc517c06aae7d6a3aa942

                              SHA512

                              83582e5f1c032fcedc8c734541b5d6e8abcf4651e01146f18d932226754519040718d5ba781286c2b1b00ba1d439db635cae17bc1fc9535a138d2a079172eba8

                            • C:\Users\Admin\AppData\Local\Temp\5C89.exe

                              Filesize

                              247KB

                              MD5

                              05f27d8d2e782012e4abc7b62b19bce7

                              SHA1

                              8fa15a05f0916b8d6396b634a5d5768c6c60e4c2

                              SHA256

                              aa38ec70b85a9e070536db5b73e65f116023b1d414bbc517c06aae7d6a3aa942

                              SHA512

                              83582e5f1c032fcedc8c734541b5d6e8abcf4651e01146f18d932226754519040718d5ba781286c2b1b00ba1d439db635cae17bc1fc9535a138d2a079172eba8

                            • C:\Users\Admin\AppData\Local\Temp\7774.exe

                              Filesize

                              4.6MB

                              MD5

                              f22632a300878ae7ab5bc865e8b4b804

                              SHA1

                              572a142b5ef1533555dfe31ee88d86b38a3235fb

                              SHA256

                              ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830

                              SHA512

                              6f7dfb4d746f91743f2ba40b9d0eaefe3fa7d16748206cbce502e137b844044456d69335d69c0e1057a9920eb71308435be24b87fa7df4912c3ebe1168550aa5

                            • C:\Users\Admin\AppData\Local\Temp\7774.exe

                              Filesize

                              4.6MB

                              MD5

                              f22632a300878ae7ab5bc865e8b4b804

                              SHA1

                              572a142b5ef1533555dfe31ee88d86b38a3235fb

                              SHA256

                              ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830

                              SHA512

                              6f7dfb4d746f91743f2ba40b9d0eaefe3fa7d16748206cbce502e137b844044456d69335d69c0e1057a9920eb71308435be24b87fa7df4912c3ebe1168550aa5

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pfsn24tm.ila.ps1

                              Filesize

                              1B

                              MD5

                              c4ca4238a0b923820dcc509a6f75849b

                              SHA1

                              356a192b7913b04c54574d18c28d46e6395428ab

                              SHA256

                              6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                              SHA512

                              4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                            • C:\Users\Admin\AppData\Local\Temp\aafg31.exe

                              Filesize

                              298KB

                              MD5

                              4d36c3880e96044315eac23e193da49a

                              SHA1

                              690a95f9f8ac355b293455ebd781ac7eec6e64bc

                              SHA256

                              8d698b8f19561e7c1389b912ca81c86e4062de51ce58bf3b379dc35718ffd3b7

                              SHA512

                              41d48a11a73fbcd360a0bcf68bdd847d64682ef2660bd5122ebc8b64fe8a69b7b2e6428f74a05f2f21841b036376ebaecd871be64baa104d51d38fb0a2571544

                            • C:\Users\Admin\AppData\Local\Temp\aafg31.exe

                              Filesize

                              298KB

                              MD5

                              4d36c3880e96044315eac23e193da49a

                              SHA1

                              690a95f9f8ac355b293455ebd781ac7eec6e64bc

                              SHA256

                              8d698b8f19561e7c1389b912ca81c86e4062de51ce58bf3b379dc35718ffd3b7

                              SHA512

                              41d48a11a73fbcd360a0bcf68bdd847d64682ef2660bd5122ebc8b64fe8a69b7b2e6428f74a05f2f21841b036376ebaecd871be64baa104d51d38fb0a2571544

                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                              Filesize

                              215KB

                              MD5

                              aeaba9864af82dba52386aa480b035db

                              SHA1

                              39525b8cbe1eb7888bcc8a7c89178e2a331ca8d1

                              SHA256

                              29bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0

                              SHA512

                              d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626

                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                              Filesize

                              215KB

                              MD5

                              aeaba9864af82dba52386aa480b035db

                              SHA1

                              39525b8cbe1eb7888bcc8a7c89178e2a331ca8d1

                              SHA256

                              29bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0

                              SHA512

                              d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626

                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                              Filesize

                              215KB

                              MD5

                              aeaba9864af82dba52386aa480b035db

                              SHA1

                              39525b8cbe1eb7888bcc8a7c89178e2a331ca8d1

                              SHA256

                              29bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0

                              SHA512

                              d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626

                            • C:\Users\Admin\AppData\Local\eb1304ed-3534-45ec-96f7-7556ff45bfad\41A8.exe

                              Filesize

                              706KB

                              MD5

                              d5a6096de9c752b863b3dca30f7e45bb

                              SHA1

                              ce44a164d2d9c53db84be578fe16f1a3502feb98

                              SHA256

                              d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795

                              SHA512

                              2ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc

                            • C:\Users\Admin\AppData\Roaming\aviwuvr

                              Filesize

                              247KB

                              MD5

                              05f27d8d2e782012e4abc7b62b19bce7

                              SHA1

                              8fa15a05f0916b8d6396b634a5d5768c6c60e4c2

                              SHA256

                              aa38ec70b85a9e070536db5b73e65f116023b1d414bbc517c06aae7d6a3aa942

                              SHA512

                              83582e5f1c032fcedc8c734541b5d6e8abcf4651e01146f18d932226754519040718d5ba781286c2b1b00ba1d439db635cae17bc1fc9535a138d2a079172eba8

                            • C:\Users\Admin\AppData\Roaming\reiwuvr

                              Filesize

                              215KB

                              MD5

                              aeaba9864af82dba52386aa480b035db

                              SHA1

                              39525b8cbe1eb7888bcc8a7c89178e2a331ca8d1

                              SHA256

                              29bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0

                              SHA512

                              d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626

                            • \Users\Admin\AppData\Local\Temp\5247.dll

                              Filesize

                              1.4MB

                              MD5

                              9b1d9a3ce645a872a66dd45fc1e8bc46

                              SHA1

                              a0268f9c1d3e66112e1ac9d857b7b12764a2901d

                              SHA256

                              6ccd11a1236b38e19e975b070f64ed0ebbb8325e9367e93e863e8600e4e473bb

                              SHA512

                              0d81a0d3de19bfae1a879f01383e7bfb89d97cbc1ae57e8cd0ad57fa0a614624ecaca07c549554ace8a5c8573ace1ddc9f3db7611825e2ceec3d5b1449d2cb40

                            • memory/164-1-0x0000000000830000-0x0000000000930000-memory.dmp

                              Filesize

                              1024KB

                            • memory/164-2-0x0000000000400000-0x000000000070C000-memory.dmp

                              Filesize

                              3.0MB

                            • memory/164-5-0x0000000000400000-0x000000000070C000-memory.dmp

                              Filesize

                              3.0MB

                            • memory/164-3-0x0000000000810000-0x0000000000819000-memory.dmp

                              Filesize

                              36KB

                            • memory/380-52-0x000000000A5D0000-0x000000000A61B000-memory.dmp

                              Filesize

                              300KB

                            • memory/380-34-0x0000000000400000-0x0000000000445000-memory.dmp

                              Filesize

                              276KB

                            • memory/380-41-0x0000000002200000-0x0000000002206000-memory.dmp

                              Filesize

                              24KB

                            • memory/380-76-0x0000000073B60000-0x000000007424E000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/380-51-0x0000000004C30000-0x0000000004C40000-memory.dmp

                              Filesize

                              64KB

                            • memory/380-35-0x00000000008D0000-0x0000000000900000-memory.dmp

                              Filesize

                              192KB

                            • memory/380-186-0x0000000073B60000-0x000000007424E000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/380-40-0x0000000073B60000-0x000000007424E000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/380-80-0x0000000004C30000-0x0000000004C40000-memory.dmp

                              Filesize

                              64KB

                            • memory/576-555-0x0000000000690000-0x00000000006A5000-memory.dmp

                              Filesize

                              84KB

                            • memory/576-556-0x00000000001C0000-0x00000000001C9000-memory.dmp

                              Filesize

                              36KB

                            • memory/1584-560-0x0000000000400000-0x0000000000409000-memory.dmp

                              Filesize

                              36KB

                            • memory/1584-557-0x0000000000400000-0x0000000000409000-memory.dmp

                              Filesize

                              36KB

                            • memory/1584-567-0x0000000000400000-0x0000000000409000-memory.dmp

                              Filesize

                              36KB

                            • memory/1904-545-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/1904-518-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/1904-515-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/1904-512-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/1904-509-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2148-538-0x0000000000610000-0x000000000072B000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/2148-537-0x0000000002050000-0x00000000020E1000-memory.dmp

                              Filesize

                              580KB

                            • memory/3260-4-0x0000000000820000-0x0000000000836000-memory.dmp

                              Filesize

                              88KB

                            • memory/3260-89-0x0000000002860000-0x0000000002876000-memory.dmp

                              Filesize

                              88KB

                            • memory/3260-566-0x0000000004170000-0x0000000004186000-memory.dmp

                              Filesize

                              88KB

                            • memory/3544-651-0x0000000000400000-0x0000000000D1B000-memory.dmp

                              Filesize

                              9.1MB

                            • memory/3544-553-0x0000000002C20000-0x000000000350B000-memory.dmp

                              Filesize

                              8.9MB

                            • memory/3544-564-0x0000000002820000-0x0000000002C18000-memory.dmp

                              Filesize

                              4.0MB

                            • memory/3544-565-0x0000000002C20000-0x000000000350B000-memory.dmp

                              Filesize

                              8.9MB

                            • memory/3544-572-0x0000000000400000-0x0000000000D1B000-memory.dmp

                              Filesize

                              9.1MB

                            • memory/3544-571-0x0000000000400000-0x0000000000D1B000-memory.dmp

                              Filesize

                              9.1MB

                            • memory/3544-552-0x0000000002820000-0x0000000002C18000-memory.dmp

                              Filesize

                              4.0MB

                            • memory/3544-554-0x0000000000400000-0x0000000000D1B000-memory.dmp

                              Filesize

                              9.1MB

                            • memory/3600-47-0x0000000005230000-0x000000000533A000-memory.dmp

                              Filesize

                              1.0MB

                            • memory/3600-74-0x0000000005440000-0x00000000054D2000-memory.dmp

                              Filesize

                              584KB

                            • memory/3600-50-0x00000000049A0000-0x00000000049DE000-memory.dmp

                              Filesize

                              248KB

                            • memory/3600-49-0x0000000004A00000-0x0000000004A10000-memory.dmp

                              Filesize

                              64KB

                            • memory/3600-48-0x00000000024B0000-0x00000000024C2000-memory.dmp

                              Filesize

                              72KB

                            • memory/3600-126-0x0000000073B60000-0x000000007424E000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/3600-44-0x0000000004B10000-0x0000000005116000-memory.dmp

                              Filesize

                              6.0MB

                            • memory/3600-33-0x00000000022D0000-0x00000000022D6000-memory.dmp

                              Filesize

                              24KB

                            • memory/3600-72-0x00000000053C0000-0x0000000005436000-memory.dmp

                              Filesize

                              472KB

                            • memory/3600-82-0x00000000061B0000-0x0000000006372000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/3600-32-0x0000000073B60000-0x000000007424E000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/3600-77-0x00000000054E0000-0x00000000059DE000-memory.dmp

                              Filesize

                              5.0MB

                            • memory/3600-78-0x0000000005A20000-0x0000000005A86000-memory.dmp

                              Filesize

                              408KB

                            • memory/3600-24-0x00000000005A0000-0x00000000005D0000-memory.dmp

                              Filesize

                              192KB

                            • memory/3600-69-0x0000000073B60000-0x000000007424E000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/3600-79-0x0000000004A00000-0x0000000004A10000-memory.dmp

                              Filesize

                              64KB

                            • memory/3600-23-0x0000000000400000-0x0000000000441000-memory.dmp

                              Filesize

                              260KB

                            • memory/3600-81-0x00000000060E0000-0x0000000006130000-memory.dmp

                              Filesize

                              320KB

                            • memory/3600-83-0x0000000007E90000-0x00000000083BC000-memory.dmp

                              Filesize

                              5.2MB

                            • memory/4100-56-0x0000000002680000-0x0000000002686000-memory.dmp

                              Filesize

                              24KB

                            • memory/4100-68-0x00000000043B0000-0x0000000004490000-memory.dmp

                              Filesize

                              896KB

                            • memory/4100-57-0x0000000010000000-0x0000000010164000-memory.dmp

                              Filesize

                              1.4MB

                            • memory/4100-63-0x00000000042B0000-0x00000000043A9000-memory.dmp

                              Filesize

                              996KB

                            • memory/4100-64-0x00000000043B0000-0x0000000004490000-memory.dmp

                              Filesize

                              896KB

                            • memory/4100-67-0x00000000043B0000-0x0000000004490000-memory.dmp

                              Filesize

                              896KB

                            • memory/4120-139-0x0000000005930000-0x0000000005940000-memory.dmp

                              Filesize

                              64KB

                            • memory/4120-529-0x0000000073B60000-0x000000007424E000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/4120-108-0x0000000000400000-0x0000000000430000-memory.dmp

                              Filesize

                              192KB

                            • memory/4120-112-0x0000000073B60000-0x000000007424E000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/4120-136-0x0000000073B60000-0x000000007424E000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/4120-113-0x00000000057F0000-0x00000000057F6000-memory.dmp

                              Filesize

                              24KB

                            • memory/4120-116-0x0000000005930000-0x0000000005940000-memory.dmp

                              Filesize

                              64KB

                            • memory/4156-540-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4156-542-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4156-559-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4156-543-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4156-547-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4156-562-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4540-577-0x00000000069A0000-0x00000000069B0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4540-579-0x0000000006FE0000-0x0000000007608000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/4540-578-0x00000000069A0000-0x00000000069B0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4540-576-0x0000000000FD0000-0x0000000001006000-memory.dmp

                              Filesize

                              216KB

                            • memory/4540-574-0x0000000073630000-0x0000000073D1E000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/4916-132-0x00000000032D0000-0x0000000003441000-memory.dmp

                              Filesize

                              1.4MB

                            • memory/4916-103-0x00007FF7FF9C0000-0x00007FF7FFA0E000-memory.dmp

                              Filesize

                              312KB

                            • memory/4916-149-0x0000000003450000-0x0000000003581000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4916-133-0x0000000003450000-0x0000000003581000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4932-73-0x0000000000770000-0x0000000000779000-memory.dmp

                              Filesize

                              36KB

                            • memory/4932-71-0x00000000007D0000-0x00000000008D0000-memory.dmp

                              Filesize

                              1024KB

                            • memory/4932-92-0x0000000000400000-0x000000000070C000-memory.dmp

                              Filesize

                              3.0MB

                            • memory/4932-75-0x0000000000400000-0x000000000070C000-memory.dmp

                              Filesize

                              3.0MB

                            • memory/5032-504-0x0000000002260000-0x000000000237B000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/5032-503-0x00000000007E0000-0x0000000000872000-memory.dmp

                              Filesize

                              584KB