Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    167s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/10/2023, 09:35

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    91fcc906d24350286fc38d756bdacbfc

  • SHA1

    b96e73c04be4d15ed18e2e7811b951554cf57e7b

  • SHA256

    12a5b844e946f8c8b4b4bb3301664f7a662a1341ea9171359d1c4fc25bc11b6a

  • SHA512

    b6cbca675648d967620e4d133345445a070896d2adebd44f58d9ad7f012db5bac0223d2304e86818bc9096e6c72087241c3917efed273d44809a7a1276787b3e

  • SSDEEP

    196608:tH/rieS1u4+zl+k7GJWhlTC7BUQ4qye9tkvQ2y3w3W9uWD:tDiFk4+zhLOBB4qT9tk6EW9

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 5 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3292
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
        "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
          "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:1284
      • C:\Users\Admin\AppData\Local\Temp\kos2.exe
        "C:\Users\Admin\AppData\Local\Temp\kos2.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Users\Admin\AppData\Local\Temp\set16.exe
          "C:\Users\Admin\AppData\Local\Temp\set16.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4964
          • C:\Users\Admin\AppData\Local\Temp\is-NVUO6.tmp\is-5FJTQ.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-NVUO6.tmp\is-5FJTQ.tmp" /SL4 $90052 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1281875 52224
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:2844
            • C:\Windows\SysWOW64\net.exe
              "C:\Windows\system32\net.exe" helpmsg 20
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1816
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 helpmsg 20
                7⤵
                  PID:1544
              • C:\Program Files (x86)\MyBurn\MyBurn.exe
                "C:\Program Files (x86)\MyBurn\MyBurn.exe" -i
                6⤵
                • Executes dropped EXE
                PID:3500
              • C:\Program Files (x86)\MyBurn\MyBurn.exe
                "C:\Program Files (x86)\MyBurn\MyBurn.exe" -s
                6⤵
                • Executes dropped EXE
                PID:5020
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\system32\schtasks.exe" /Query
                6⤵
                  PID:2816
            • C:\Users\Admin\AppData\Local\Temp\K.exe
              "C:\Users\Admin\AppData\Local\Temp\K.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1532
          • C:\Users\Admin\AppData\Local\Temp\latestX.exe
            "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
            3⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Drops file in Program Files directory
            PID:4396
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2764
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4348
          • C:\Windows\System32\sc.exe
            sc stop UsoSvc
            3⤵
            • Launches sc.exe
            PID:1756
          • C:\Windows\System32\sc.exe
            sc stop WaaSMedicSvc
            3⤵
            • Launches sc.exe
            PID:4980
          • C:\Windows\System32\sc.exe
            sc stop wuauserv
            3⤵
            • Launches sc.exe
            PID:4500
          • C:\Windows\System32\sc.exe
            sc stop bits
            3⤵
            • Launches sc.exe
            PID:3624
          • C:\Windows\System32\sc.exe
            sc stop dosvc
            3⤵
            • Launches sc.exe
            PID:2432
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2068
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-ac 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4244
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-dc 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1588
          • C:\Windows\System32\powercfg.exe
            powercfg /x -standby-timeout-ac 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:692
          • C:\Windows\System32\powercfg.exe
            powercfg /x -standby-timeout-dc 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1988
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4404
        • C:\Windows\System32\schtasks.exe
          C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
          2⤵
            PID:392
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
            2⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            PID:1032
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3540
            • C:\Windows\System32\sc.exe
              sc stop UsoSvc
              3⤵
              • Launches sc.exe
              PID:1992
            • C:\Windows\System32\sc.exe
              sc stop WaaSMedicSvc
              3⤵
              • Launches sc.exe
              PID:936
            • C:\Windows\System32\sc.exe
              sc stop wuauserv
              3⤵
              • Launches sc.exe
              PID:4744
            • C:\Windows\System32\sc.exe
              sc stop bits
              3⤵
              • Launches sc.exe
              PID:3832
            • C:\Windows\System32\sc.exe
              sc stop dosvc
              3⤵
              • Launches sc.exe
              PID:5052
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
            2⤵
              PID:3504
              • C:\Windows\System32\powercfg.exe
                powercfg /x -hibernate-timeout-ac 0
                3⤵
                  PID:5092
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -hibernate-timeout-dc 0
                  3⤵
                    PID:4344
                  • C:\Windows\System32\powercfg.exe
                    powercfg /x -standby-timeout-ac 0
                    3⤵
                      PID:4868
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -standby-timeout-dc 0
                      3⤵
                        PID:4080
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                      2⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      PID:1772
                    • C:\Windows\System32\conhost.exe
                      C:\Windows\System32\conhost.exe
                      2⤵
                        PID:5088
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        2⤵
                        • Modifies data under HKEY_USERS
                        PID:2432
                    • C:\Program Files\Google\Chrome\updater.exe
                      "C:\Program Files\Google\Chrome\updater.exe"
                      1⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Drops file in Drivers directory
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Program Files directory
                      PID:1160

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Program Files (x86)\MyBurn\MyBurn.exe

                      Filesize

                      2.1MB

                      MD5

                      f0fd986799e64ba888a8031782181dc7

                      SHA1

                      df5a8420ebdcb1d036867fbc9c3f9ca143cf587c

                      SHA256

                      a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f

                      SHA512

                      09d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233

                    • C:\Program Files (x86)\MyBurn\MyBurn.exe

                      Filesize

                      2.1MB

                      MD5

                      f0fd986799e64ba888a8031782181dc7

                      SHA1

                      df5a8420ebdcb1d036867fbc9c3f9ca143cf587c

                      SHA256

                      a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f

                      SHA512

                      09d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233

                    • C:\Program Files (x86)\MyBurn\MyBurn.exe

                      Filesize

                      2.1MB

                      MD5

                      f0fd986799e64ba888a8031782181dc7

                      SHA1

                      df5a8420ebdcb1d036867fbc9c3f9ca143cf587c

                      SHA256

                      a85af12749a97eeae8f64b767e63780978c859f389139cd153bedb432d1bfb4f

                      SHA512

                      09d8b0a6e39139c1853b5f05b1f87bbed5f38b51562cd3da8eb87be1125e8b28c2a3409d4977359cf8551a76c045de39c0419ddcef6459d9f87e10a945545233

                    • C:\Program Files\Google\Chrome\updater.exe

                      Filesize

                      5.6MB

                      MD5

                      bae29e49e8190bfbbf0d77ffab8de59d

                      SHA1

                      4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                      SHA256

                      f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                      SHA512

                      9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                    • C:\Program Files\Google\Chrome\updater.exe

                      Filesize

                      5.6MB

                      MD5

                      bae29e49e8190bfbbf0d77ffab8de59d

                      SHA1

                      4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                      SHA256

                      f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                      SHA512

                      9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                      Filesize

                      2KB

                      MD5

                      d85ba6ff808d9e5444a4b369f5bc2730

                      SHA1

                      31aa9d96590fff6981b315e0b391b575e4c0804a

                      SHA256

                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                      SHA512

                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      944B

                      MD5

                      94409dd2ab7f23ae5d316b33f6cc006c

                      SHA1

                      325beaccd83b117a63f92cc37c39a89cf47fc6d3

                      SHA256

                      8642e9d711f9c25fb55cf2ff7a32d84f04b1261f8d7991d5fde9ea78797c3b72

                      SHA512

                      ef386b0c8a4164c9fc97eb3f8b2f41e8283793ce0b3999931b3590d62442f022a041f070ce76e382ef7c72d458ab47d24473ab157061c9055052aac52ff4992a

                    • C:\Users\Admin\AppData\Local\Temp\K.exe

                      Filesize

                      8KB

                      MD5

                      ac65407254780025e8a71da7b925c4f3

                      SHA1

                      5c7ae625586c1c00ec9d35caa4f71b020425a6ba

                      SHA256

                      26cd9cc9a0dd688411a4f0e2fa099b694b88cab6e9ed10827a175f7b5486e42e

                      SHA512

                      27d87730230d9f594908f904bf298a28e255dced8d515eb0d97e1701078c4405f9f428513c2574d349a7517bd23a3558fb09599a01499ea54590945b981b17ab

                    • C:\Users\Admin\AppData\Local\Temp\K.exe

                      Filesize

                      8KB

                      MD5

                      ac65407254780025e8a71da7b925c4f3

                      SHA1

                      5c7ae625586c1c00ec9d35caa4f71b020425a6ba

                      SHA256

                      26cd9cc9a0dd688411a4f0e2fa099b694b88cab6e9ed10827a175f7b5486e42e

                      SHA512

                      27d87730230d9f594908f904bf298a28e255dced8d515eb0d97e1701078c4405f9f428513c2574d349a7517bd23a3558fb09599a01499ea54590945b981b17ab

                    • C:\Users\Admin\AppData\Local\Temp\K.exe

                      Filesize

                      8KB

                      MD5

                      ac65407254780025e8a71da7b925c4f3

                      SHA1

                      5c7ae625586c1c00ec9d35caa4f71b020425a6ba

                      SHA256

                      26cd9cc9a0dd688411a4f0e2fa099b694b88cab6e9ed10827a175f7b5486e42e

                      SHA512

                      27d87730230d9f594908f904bf298a28e255dced8d515eb0d97e1701078c4405f9f428513c2574d349a7517bd23a3558fb09599a01499ea54590945b981b17ab

                    • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe

                      Filesize

                      116B

                      MD5

                      ec6aae2bb7d8781226ea61adca8f0586

                      SHA1

                      d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3

                      SHA256

                      b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599

                      SHA512

                      aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1epofat5.z4x.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Local\Temp\is-N4BGR.tmp\_iscrypt.dll

                      Filesize

                      2KB

                      MD5

                      a69559718ab506675e907fe49deb71e9

                      SHA1

                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                      SHA256

                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                      SHA512

                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                    • C:\Users\Admin\AppData\Local\Temp\is-N4BGR.tmp\_isdecmp.dll

                      Filesize

                      12KB

                      MD5

                      7cee19d7e00e9a35fc5e7884fd9d1ad8

                      SHA1

                      2c5e8de13bdb6ddc290a9596113f77129ecd26bc

                      SHA256

                      58ee49d4b4f6def91c6561fc5a1b73bc86d8a01b23ce0c8ddbf0ed11f13d5ace

                      SHA512

                      a6955f5aff467f199236ed8a57f4d97af915a3ae81711ff8292e66e66c9f7ee307d7d7aafce09a1bd33c8f7983694cb207fc980d6c3323b475de6278d37bdde8

                    • C:\Users\Admin\AppData\Local\Temp\is-N4BGR.tmp\_isdecmp.dll

                      Filesize

                      12KB

                      MD5

                      7cee19d7e00e9a35fc5e7884fd9d1ad8

                      SHA1

                      2c5e8de13bdb6ddc290a9596113f77129ecd26bc

                      SHA256

                      58ee49d4b4f6def91c6561fc5a1b73bc86d8a01b23ce0c8ddbf0ed11f13d5ace

                      SHA512

                      a6955f5aff467f199236ed8a57f4d97af915a3ae81711ff8292e66e66c9f7ee307d7d7aafce09a1bd33c8f7983694cb207fc980d6c3323b475de6278d37bdde8

                    • C:\Users\Admin\AppData\Local\Temp\is-NVUO6.tmp\is-5FJTQ.tmp

                      Filesize

                      642KB

                      MD5

                      e57693101a63b1f934f462bc7a2ef093

                      SHA1

                      2748ea8c66b980f14c9ce36c1c3061e690cf3ce7

                      SHA256

                      71267ff94c9fc72cbffaeed3bc2f33cef1eeb1887c29c574d7f26595d1a6235f

                      SHA512

                      3dcda686a85b19a9c7b4c96d132e90ed43c7df13ce9456beb2b88c278d8068cc3abcbfe25b1607c7b8281d276efb24809730f352927b326254f3208cbdf54a3e

                    • C:\Users\Admin\AppData\Local\Temp\is-NVUO6.tmp\is-5FJTQ.tmp

                      Filesize

                      642KB

                      MD5

                      e57693101a63b1f934f462bc7a2ef093

                      SHA1

                      2748ea8c66b980f14c9ce36c1c3061e690cf3ce7

                      SHA256

                      71267ff94c9fc72cbffaeed3bc2f33cef1eeb1887c29c574d7f26595d1a6235f

                      SHA512

                      3dcda686a85b19a9c7b4c96d132e90ed43c7df13ce9456beb2b88c278d8068cc3abcbfe25b1607c7b8281d276efb24809730f352927b326254f3208cbdf54a3e

                    • C:\Users\Admin\AppData\Local\Temp\kos2.exe

                      Filesize

                      1.5MB

                      MD5

                      665db9794d6e6e7052e7c469f48de771

                      SHA1

                      ed9a3f9262f675a03a9f1f70856e3532b095c89f

                      SHA256

                      c1b31186d170a2a5755f15682860b3cdc60eac7f97a2db9462dee7ca6fcbc196

                      SHA512

                      69585560e8ac4a2472621dd4da4bf0e636688fc5d710521b0177461f773fcf2a4c7ddb86bc812ecb316985729013212ccfa4992cd1c98f166a4a510e17fcae74

                    • C:\Users\Admin\AppData\Local\Temp\kos2.exe

                      Filesize

                      1.5MB

                      MD5

                      665db9794d6e6e7052e7c469f48de771

                      SHA1

                      ed9a3f9262f675a03a9f1f70856e3532b095c89f

                      SHA256

                      c1b31186d170a2a5755f15682860b3cdc60eac7f97a2db9462dee7ca6fcbc196

                      SHA512

                      69585560e8ac4a2472621dd4da4bf0e636688fc5d710521b0177461f773fcf2a4c7ddb86bc812ecb316985729013212ccfa4992cd1c98f166a4a510e17fcae74

                    • C:\Users\Admin\AppData\Local\Temp\kos2.exe

                      Filesize

                      1.5MB

                      MD5

                      665db9794d6e6e7052e7c469f48de771

                      SHA1

                      ed9a3f9262f675a03a9f1f70856e3532b095c89f

                      SHA256

                      c1b31186d170a2a5755f15682860b3cdc60eac7f97a2db9462dee7ca6fcbc196

                      SHA512

                      69585560e8ac4a2472621dd4da4bf0e636688fc5d710521b0177461f773fcf2a4c7ddb86bc812ecb316985729013212ccfa4992cd1c98f166a4a510e17fcae74

                    • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                      Filesize

                      5.6MB

                      MD5

                      bae29e49e8190bfbbf0d77ffab8de59d

                      SHA1

                      4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                      SHA256

                      f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                      SHA512

                      9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                    • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                      Filesize

                      5.6MB

                      MD5

                      bae29e49e8190bfbbf0d77ffab8de59d

                      SHA1

                      4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                      SHA256

                      f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                      SHA512

                      9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                    • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                      Filesize

                      5.6MB

                      MD5

                      bae29e49e8190bfbbf0d77ffab8de59d

                      SHA1

                      4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                      SHA256

                      f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                      SHA512

                      9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                    • C:\Users\Admin\AppData\Local\Temp\set16.exe

                      Filesize

                      1.5MB

                      MD5

                      b224196c88f09b615527b2df0e860e49

                      SHA1

                      f9ae161836a34264458d8c0b2a083c98093f1dec

                      SHA256

                      2a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8

                      SHA512

                      d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d

                    • C:\Users\Admin\AppData\Local\Temp\set16.exe

                      Filesize

                      1.5MB

                      MD5

                      b224196c88f09b615527b2df0e860e49

                      SHA1

                      f9ae161836a34264458d8c0b2a083c98093f1dec

                      SHA256

                      2a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8

                      SHA512

                      d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d

                    • C:\Users\Admin\AppData\Local\Temp\set16.exe

                      Filesize

                      1.5MB

                      MD5

                      b224196c88f09b615527b2df0e860e49

                      SHA1

                      f9ae161836a34264458d8c0b2a083c98093f1dec

                      SHA256

                      2a11969fcc1df03533ad694a68d56f0e3a67ce359663c3cf228040ab5baa5ed8

                      SHA512

                      d74376c5bd3ba19b8454a17f2f38ab64ad1005b6372c7e162230c822c38f6f8c7d87aef47ef04cb6dceedc731046c30efa6720098cc39b15addd17c809b8296d

                    • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                      Filesize

                      260KB

                      MD5

                      f39a0110a564f4a1c6b96c03982906ec

                      SHA1

                      08e66c93b575c9ac0a18f06741dabcabc88a358b

                      SHA256

                      f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481

                      SHA512

                      c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00

                    • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                      Filesize

                      260KB

                      MD5

                      f39a0110a564f4a1c6b96c03982906ec

                      SHA1

                      08e66c93b575c9ac0a18f06741dabcabc88a358b

                      SHA256

                      f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481

                      SHA512

                      c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00

                    • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                      Filesize

                      260KB

                      MD5

                      f39a0110a564f4a1c6b96c03982906ec

                      SHA1

                      08e66c93b575c9ac0a18f06741dabcabc88a358b

                      SHA256

                      f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481

                      SHA512

                      c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00

                    • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                      Filesize

                      260KB

                      MD5

                      f39a0110a564f4a1c6b96c03982906ec

                      SHA1

                      08e66c93b575c9ac0a18f06741dabcabc88a358b

                      SHA256

                      f794a557ad952ff155b4bfe5665b3f448453c3a50c766478d070368cab69f481

                      SHA512

                      c6659f926f95a8bed1ff779c8445470c3089823abe8c1199f591c313ecee0bd793478cdaab95905c0e8ae2a2b18737daabe887263b7cde1eaaa9ee6976ff7d00

                    • C:\Windows\System32\drivers\etc\hosts

                      Filesize

                      3KB

                      MD5

                      00930b40cba79465b7a38ed0449d1449

                      SHA1

                      4b25a89ee28b20ba162f23772ddaf017669092a5

                      SHA256

                      eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                      SHA512

                      cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                      Filesize

                      4KB

                      MD5

                      bdb25c22d14ec917e30faf353826c5de

                      SHA1

                      6c2feb9cea9237bc28842ebf2fea68b3bd7ad190

                      SHA256

                      e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495

                      SHA512

                      b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c

                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      1KB

                      MD5

                      b42c70c1dbf0d1d477ec86902db9e986

                      SHA1

                      1d1c0a670748b3d10bee8272e5d67a4fabefd31f

                      SHA256

                      8ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a

                      SHA512

                      57fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5

                    • memory/1032-233-0x00000195E4E70000-0x00000195E4E76000-memory.dmp

                      Filesize

                      24KB

                    • memory/1032-224-0x00000195E4C20000-0x00000195E4CD5000-memory.dmp

                      Filesize

                      724KB

                    • memory/1032-231-0x00000195E4E40000-0x00000195E4E48000-memory.dmp

                      Filesize

                      32KB

                    • memory/1032-201-0x00007FFFFCD60000-0x00007FFFFD821000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1032-202-0x00000195E4790000-0x00000195E47A0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1032-212-0x00000195E4790000-0x00000195E47A0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1032-229-0x00000195E4E30000-0x00000195E4E3A000-memory.dmp

                      Filesize

                      40KB

                    • memory/1032-234-0x00000195E4E80000-0x00000195E4E8A000-memory.dmp

                      Filesize

                      40KB

                    • memory/1032-235-0x00000195E4790000-0x00000195E47A0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1032-226-0x00000195E4E50000-0x00000195E4E6C000-memory.dmp

                      Filesize

                      112KB

                    • memory/1032-225-0x00000195E4CE0000-0x00000195E4CEA000-memory.dmp

                      Filesize

                      40KB

                    • memory/1032-230-0x00000195E4E90000-0x00000195E4EAA000-memory.dmp

                      Filesize

                      104KB

                    • memory/1032-238-0x00007FFFFCD60000-0x00007FFFFD821000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1032-223-0x00000195E4C00000-0x00000195E4C1C000-memory.dmp

                      Filesize

                      112KB

                    • memory/1032-213-0x00007FF47A440000-0x00007FF47A450000-memory.dmp

                      Filesize

                      64KB

                    • memory/1160-192-0x00007FF6EE140000-0x00007FF6EE6E1000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/1160-265-0x00007FF6EE140000-0x00007FF6EE6E1000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/1160-275-0x00007FF6EE140000-0x00007FF6EE6E1000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/1284-69-0x0000000000400000-0x0000000000409000-memory.dmp

                      Filesize

                      36KB

                    • memory/1284-73-0x0000000000400000-0x0000000000409000-memory.dmp

                      Filesize

                      36KB

                    • memory/1284-132-0x0000000000400000-0x0000000000409000-memory.dmp

                      Filesize

                      36KB

                    • memory/1508-0-0x0000000074CC0000-0x0000000075470000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/1508-39-0x0000000074CC0000-0x0000000075470000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/1508-1-0x0000000000DF0000-0x000000000154C000-memory.dmp

                      Filesize

                      7.4MB

                    • memory/1532-72-0x00007FFFFC840000-0x00007FFFFD301000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1532-79-0x0000000000E80000-0x0000000000E90000-memory.dmp

                      Filesize

                      64KB

                    • memory/1532-137-0x00007FFFFC840000-0x00007FFFFD301000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1532-60-0x0000000000630000-0x0000000000638000-memory.dmp

                      Filesize

                      32KB

                    • memory/1532-65-0x0000000000E80000-0x0000000000E90000-memory.dmp

                      Filesize

                      64KB

                    • memory/1532-64-0x00007FFFFC840000-0x00007FFFFD301000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1772-243-0x0000020D6CA50000-0x0000020D6CA60000-memory.dmp

                      Filesize

                      64KB

                    • memory/1772-242-0x00007FFFFCD60000-0x00007FFFFD821000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1772-254-0x0000020D6CA50000-0x0000020D6CA60000-memory.dmp

                      Filesize

                      64KB

                    • memory/1772-255-0x00007FF4ADD10000-0x00007FF4ADD20000-memory.dmp

                      Filesize

                      64KB

                    • memory/1772-266-0x0000020D6CA50000-0x0000020D6CA60000-memory.dmp

                      Filesize

                      64KB

                    • memory/1772-267-0x0000020D6CA50000-0x0000020D6CA60000-memory.dmp

                      Filesize

                      64KB

                    • memory/1772-269-0x00007FFFFCD60000-0x00007FFFFD821000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2000-67-0x0000000000B40000-0x0000000000C40000-memory.dmp

                      Filesize

                      1024KB

                    • memory/2000-68-0x0000000000920000-0x0000000000929000-memory.dmp

                      Filesize

                      36KB

                    • memory/2432-274-0x00000000005F0000-0x0000000000610000-memory.dmp

                      Filesize

                      128KB

                    • memory/2432-302-0x00007FF60C040000-0x00007FF60C82F000-memory.dmp

                      Filesize

                      7.9MB

                    • memory/2432-278-0x0000000011C00000-0x0000000011C40000-memory.dmp

                      Filesize

                      256KB

                    • memory/2432-300-0x0000000000D90000-0x0000000000DB0000-memory.dmp

                      Filesize

                      128KB

                    • memory/2432-284-0x00007FF60C040000-0x00007FF60C82F000-memory.dmp

                      Filesize

                      7.9MB

                    • memory/2432-290-0x00007FF60C040000-0x00007FF60C82F000-memory.dmp

                      Filesize

                      7.9MB

                    • memory/2432-294-0x0000000000D90000-0x0000000000DB0000-memory.dmp

                      Filesize

                      128KB

                    • memory/2432-296-0x00007FF60C040000-0x00007FF60C82F000-memory.dmp

                      Filesize

                      7.9MB

                    • memory/2764-159-0x00007FFFFCD60000-0x00007FFFFD821000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2764-154-0x00000212CE5E0000-0x00000212CE602000-memory.dmp

                      Filesize

                      136KB

                    • memory/2764-161-0x00000212CE350000-0x00000212CE360000-memory.dmp

                      Filesize

                      64KB

                    • memory/2764-160-0x00000212CE350000-0x00000212CE360000-memory.dmp

                      Filesize

                      64KB

                    • memory/2764-165-0x00007FFFFCD60000-0x00007FFFFD821000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2764-162-0x00000212CE350000-0x00000212CE360000-memory.dmp

                      Filesize

                      64KB

                    • memory/2804-21-0x0000000000BC0000-0x0000000000D3E000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/2804-57-0x0000000074CC0000-0x0000000075470000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/2804-22-0x0000000074CC0000-0x0000000075470000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/2844-70-0x0000000002110000-0x0000000002111000-memory.dmp

                      Filesize

                      4KB

                    • memory/2844-128-0x0000000002110000-0x0000000002111000-memory.dmp

                      Filesize

                      4KB

                    • memory/2844-130-0x0000000000400000-0x00000000004CF000-memory.dmp

                      Filesize

                      828KB

                    • memory/3292-131-0x0000000003300000-0x0000000003316000-memory.dmp

                      Filesize

                      88KB

                    • memory/3500-118-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/3500-120-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/3500-123-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/3500-122-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/4396-187-0x00007FF6ADA50000-0x00007FF6ADFF1000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/4396-127-0x00007FF6ADA50000-0x00007FF6ADFF1000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/4404-184-0x00007FFFFCD60000-0x00007FFFFD821000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4404-168-0x00007FFFFCD60000-0x00007FFFFD821000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4404-170-0x00000215335E0000-0x00000215335F0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4404-169-0x00000215335E0000-0x00000215335F0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4404-181-0x00000215335E0000-0x00000215335F0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4404-182-0x00000215335E0000-0x00000215335F0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4964-74-0x0000000000400000-0x0000000000413000-memory.dmp

                      Filesize

                      76KB

                    • memory/4964-52-0x0000000000400000-0x0000000000413000-memory.dmp

                      Filesize

                      76KB

                    • memory/5020-291-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/5020-276-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/5020-280-0x0000000000780000-0x00000000007C9000-memory.dmp

                      Filesize

                      292KB

                    • memory/5020-303-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/5020-227-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/5020-285-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/5020-288-0x0000000000780000-0x00000000007C9000-memory.dmp

                      Filesize

                      292KB

                    • memory/5020-281-0x0000000000780000-0x00000000007C9000-memory.dmp

                      Filesize

                      292KB

                    • memory/5020-145-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/5020-189-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/5020-126-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/5020-297-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/5020-193-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/5020-197-0x0000000000400000-0x0000000000627000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/5088-283-0x00007FF71EAC0000-0x00007FF71EAEA000-memory.dmp

                      Filesize

                      168KB