Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2024 05:04

General

  • Target

    6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe

  • Size

    7.1MB

  • MD5

    460ad51c283bf0d1fdf8f49ff13e104b

  • SHA1

    a525d26607b13a0eeed7ce027ad3f7bf920111d2

  • SHA256

    6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba

  • SHA512

    425c993170885e496120e177285a13ac76d2e982f987ebf91cc8b91bc614d76f1624935e61cd1913723dab6ad652cf23609d2b8c5dc6cebc63981de61918c004

  • SSDEEP

    196608:GmWgOGj3+UtqxMrp+2f4f3D1K+tHG7wv7ew:PsGj3kMrp+2f4PpKsHGs7

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

fabookie

C2

http://app.alie3ksgaa.com/check/safe

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 13 IoCs
  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • NSIS installer 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe
    "C:\Users\Admin\AppData\Local\Temp\6ecc88149dfdad0b296e7aee3c554fc191b1371d09c51ee2e47ac0e145ee38ba.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
        C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
        3⤵
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of SetWindowsHookEx
        PID:4980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 996
        3⤵
        • Program crash
        PID:3012
    • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
      "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 368
        3⤵
        • Program crash
        PID:2516
    • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe
      "C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
      • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe
        "C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks for VirtualBox DLLs, possible anti-VM trick
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:4004
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
            PID:1356
          • C:\Windows\system32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            4⤵
              PID:3128
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:516
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
                PID:1804
              • C:\Windows\rss\csrss.exe
                C:\Windows\rss\csrss.exe
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Manipulates WinMonFS driver.
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4368
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1036
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2676
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /delete /tn ScheduledUpdate /f
                  5⤵
                    PID:2348
                  • C:\Windows\SYSTEM32\schtasks.exe
                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                    5⤵
                    • Creates scheduled task(s)
                    PID:3192
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4092
                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                    C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                    5⤵
                    • Executes dropped EXE
                    PID:3392
                  • C:\Windows\SYSTEM32\schtasks.exe
                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                    5⤵
                    • Creates scheduled task(s)
                    PID:2164
                  • C:\Windows\windefender.exe
                    "C:\Windows\windefender.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3196
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      6⤵
                        PID:1348
                        • C:\Windows\SysWOW64\sc.exe
                          sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          7⤵
                          • Launches sc.exe
                          PID:3420
              • C:\Users\Admin\AppData\Local\Temp\rty27.exe
                "C:\Users\Admin\AppData\Local\Temp\rty27.exe"
                2⤵
                • Executes dropped EXE
                PID:3976
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4436 -ip 4436
              1⤵
                PID:944
              • C:\Windows\system32\netsh.exe
                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                1⤵
                • Modifies Windows Firewall
                PID:3544
              • C:\Users\Admin\AppData\Local\Temp\CC0A.exe
                C:\Users\Admin\AppData\Local\Temp\CC0A.exe
                1⤵
                • Sets file execution options in registry
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Checks processor information in registry
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3008
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  2⤵
                  • Modifies firewall policy service
                  • Sets file execution options in registry
                  • Checks BIOS information in registry
                  • Adds Run key to start application
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  • Modifies Internet Explorer Protected Mode
                  • Modifies Internet Explorer Protected Mode Banner
                  • Modifies Internet Explorer settings
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3992
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 1140
                    3⤵
                    • Drops file in System32 directory
                    • Program crash
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1356
              • C:\Users\Admin\AppData\Local\Temp\D226.exe
                C:\Users\Admin\AppData\Local\Temp\D226.exe
                1⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3128
                • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
                  "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:4440
              • C:\Windows\System32\Conhost.exe
                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                1⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:1804
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3992 -ip 3992
                1⤵
                  PID:4728
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2136 -ip 2136
                  1⤵
                    PID:2404
                  • C:\Windows\windefender.exe
                    C:\Windows\windefender.exe
                    1⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    PID:948

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe

                    Filesize

                    1.5MB

                    MD5

                    4853ce8fa77df18c3837d267c5837ad9

                    SHA1

                    4e3eb52fbec90b7cf8333b91d3eeb57f037976e6

                    SHA256

                    10d5f9a5aa56a54fa3130e9b552f9a542b3b6ee0ea97b3a048586f0b49ce7f3d

                    SHA512

                    a7713108691880c31a47069746fbf4b3dd2ec082ef0342c593cbcd6ab4f4a2d12511660b26f0dc600f2f7b6c592a6e526980eea5fe4a855ac81331f37e348d5b

                  • C:\Users\Admin\AppData\Local\Temp\CC0A.exe

                    Filesize

                    360KB

                    MD5

                    80c413180b6bd0dd664adc4e0665b494

                    SHA1

                    e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

                    SHA256

                    6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

                    SHA512

                    347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

                  • C:\Users\Admin\AppData\Local\Temp\CC0A.exe

                    Filesize

                    308KB

                    MD5

                    932f4abc925c12b3bf7fa08b572843dd

                    SHA1

                    7c2d00e89400165cfacca49a97fbaea325fc7cf1

                    SHA256

                    4f0d0ecf7453074ebbc28616b46d260d7d8e5289efd315c1e99c4dd8f78e812f

                    SHA512

                    b05fa071890785c8bd8c0520d93f1e6898c43f411a7b640bdd45ecbde15fedb9146a92f1b0fd196a393332e444ef5a38a1d654db1a7132994702e3d051a8cc0b

                  • C:\Users\Admin\AppData\Local\Temp\D226.exe

                    Filesize

                    640KB

                    MD5

                    0194aee551eb7639e9ee6ecd65e636d2

                    SHA1

                    aa37cee9d77bf5309d04fbda0222ca15e51cff9f

                    SHA256

                    01e37dad98d63d1ec416e45073cca2c4aeb3708b30c9a01df7366b09c34cd96a

                    SHA512

                    ad5b64923bb5d7bc9f349017659e1240d5d3d644d412784fd8e7c8ef8174d5e659fe22de58a01a7dc9e27957f941db6b5bc8d352e4d788f3cfabdd64ff36e0e9

                  • C:\Users\Admin\AppData\Local\Temp\D226.exe

                    Filesize

                    688KB

                    MD5

                    9684e84aa9f8eba529d21c0ac3433729

                    SHA1

                    de1692b3c5948a80a6cf4b8e258b1b6db6093738

                    SHA256

                    6c4a96b3d6dfc8ab4516735b613e0f8f7a74f1e79f35b5123d87c3be3cbe54be

                    SHA512

                    832243ce8062b6e30a426978ade5262d499a458a890952a6f0375c9a37cba6be7fc6d1428b43864e9cf81f762d04481fe6199e685e327325f75375e797b697b5

                  • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

                    Filesize

                    807KB

                    MD5

                    b66d31ecb40036049a45a1c499b41ebc

                    SHA1

                    80394e860c3b1c13a5ea469f6d520d1df833132d

                    SHA256

                    16d12170e84513b0a50aa400d9bed39181d414ce46d5b1dcb9a8910b55d9ed6c

                    SHA512

                    2c514ed8888c2d1abc787ef38b7f6f62aa501c0953d88f442fcc508c53ff88fa73de3d01ac7456f6dca4f67c6d8a527ebae233dc0f6bcf40e2762b425e24f209

                  • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

                    Filesize

                    625KB

                    MD5

                    e836913e0d6c9ba06a8330e07500a8ed

                    SHA1

                    cfc9da368739debcc9c8d6589d1e0311a0186d24

                    SHA256

                    345ba36b3594151c953b98109af4d8b86e42bb6ce40a67e68e47ad5e244706b4

                    SHA512

                    901b10b005ae121e1c056480df71ca9a782eb9f48f98ef76d89d5af6d218b9a263d807b103953e895212b7ca89cb25e313546a6eba39805ed444db1f8275dbb3

                  • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

                    Filesize

                    2.4MB

                    MD5

                    1b7371528055d2f89c782f621c60d2e6

                    SHA1

                    96f7d347c4aadd5bbe131ab91ae4ae9c86dee8bc

                    SHA256

                    0198998df660ee268a694a15874d5f4d19c3ed7d3446c482d8665657693bdc9d

                    SHA512

                    a5105da332ad6be005f7a5fba829d18f05f1d0d6089ec49535212d0c00342b2129bd041c78a1f2155135856387f4d77e221d407268799d0a256bf945ce148869

                  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

                    Filesize

                    765KB

                    MD5

                    90927c43fcd0d1476522032741beccf2

                    SHA1

                    6f7e01393ce13b9b54aa27d3f21ba434039f3a26

                    SHA256

                    8fa0589c022011714f9e652eccaf20b0cb0ff96e2f6af44cf02175a83445425b

                    SHA512

                    45d1ce1c5858dbff6815781bb21d9bd6545a7ec7e611a10f38087c7c809f733635a79317689c7124f9fed8160fbb12eb0c0cbd29381e0983c38069225112dcfb

                  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

                    Filesize

                    795KB

                    MD5

                    b304edce7dd10b9cd716d9f6e77e47f7

                    SHA1

                    852d4a783302c63fed3262638265752ba0062609

                    SHA256

                    7250f5fdc047ef82865a28c6c520ee5a69d7625d98557452d4f3cce7badf3acb

                    SHA512

                    ffa126d02c9c577e9c79a7cf9db7fb6d19043a136a2760fa415ca1bc405f8bf4eee2b479f77bfd71b9ed17170497622a6842cbbcda34ff6d31c101a40b7cb770

                  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

                    Filesize

                    1022KB

                    MD5

                    e7f839ad70c27f5073b7cd4f15f6ef7d

                    SHA1

                    f3fc6d89d5bf617344c906da61927fed32582ca6

                    SHA256

                    3513ac95e04ab70def7a97e8bee6c65614b7bc8d57eacb8c2c0e5b7c0cb0c18c

                    SHA512

                    1008b40516a72ffe19854e4c913a4b285b60825fcb3c24752b024cc1ea57ddb492b1b350ea92072a7d92edebbc84e07ba2cd13e2de8c37d0a3641b07ad83ded7

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gakh0ccy.pns.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                    Filesize

                    281KB

                    MD5

                    d98e33b66343e7c96158444127a117f6

                    SHA1

                    bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                    SHA256

                    5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                    SHA512

                    705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                  • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe

                    Filesize

                    262KB

                    MD5

                    cb9228d67f9b79f043b468b9ef64998a

                    SHA1

                    4cee4320b8600433701a69bef11bb9ed70ab2b62

                    SHA256

                    cb44dfd47b05dc066676e9fa021e515d887714c608e518cbe01dd6a1e0f5238e

                    SHA512

                    a0060c6e706d247d40949a84afcbf0740bddc36f70aa7f10e8dc2c55160b917af12553f6ee443aedfc0c4acd12fa48d87be43e290f0cc883f56c1668170c0202

                  • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe

                    Filesize

                    1.3MB

                    MD5

                    c18dc246a84031d71d090520e88af5e5

                    SHA1

                    8fdb1c2d148462a07fe699d2bc0d12d145b52602

                    SHA256

                    2bae59bd4f4c99114294acf5fafa03b9b4175e9df983b15b64852b5bf40a995d

                    SHA512

                    f195312b75f2ab85b02b91224065cc8cee746889bc999500090fb6d67f87fd2057502cd5aebac28d70e83301fa8f433bd155530b315ef6b5190419483f9165f1

                  • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe

                    Filesize

                    2.4MB

                    MD5

                    31d6e063a59465bd757fe8f70236742d

                    SHA1

                    fe4a796b244931bed1a54a9252eb8293dfe25e24

                    SHA256

                    5c5c8e97c3bbdc84ed3877dc71b86c742e36c829be04e8df1568c34669de81ff

                    SHA512

                    9a8779a56ffe95acc93bf9b01e5434189a071934794666e66a8bbd87f087f9ecca280d22b9e89d856bc4060affc76c623cb54029804b51aa417fb3bf79127828

                  • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe

                    Filesize

                    1.6MB

                    MD5

                    c89d6cb36e6ee9959989199bbcb66409

                    SHA1

                    2a74c05d4ca810866fbccf8dc7e530f84978f9b7

                    SHA256

                    344356e84c6436192450864c9264cd3d9d74e6c1aa191e1829ec2ca06e871494

                    SHA512

                    1e11455803232bfe22d8c8c957b63a21f26e671fe8d32125806f92692b928339b6e50321baaf62ea8d0b901636b611d1e94b934f597440b4eff23073d75967fd

                  • C:\Users\Admin\AppData\Local\Temp\lib.dll

                    Filesize

                    1.1MB

                    MD5

                    8c59970692ed4f8f72093350b2eac7eb

                    SHA1

                    5b6285c9c76afd7945b9d1631c3f4c68291c3e6b

                    SHA256

                    ea32cf3cc598380ec97e5d399b059459c8b048e7a63a02f3d89be4f4d6214393

                    SHA512

                    a6e76ba5e0db261ef2a31838e4b6f67022f41ab8e56db860793a6af4e0632dc6c801b155bf1c1e6452a92dac4561e1b32598787f924c0978bf8a9828b814fc91

                  • C:\Users\Admin\AppData\Local\Temp\nss4C8C.tmp\INetC.dll

                    Filesize

                    25KB

                    MD5

                    40d7eca32b2f4d29db98715dd45bfac5

                    SHA1

                    124df3f617f562e46095776454e1c0c7bb791cc7

                    SHA256

                    85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

                    SHA512

                    5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

                  • C:\Users\Admin\AppData\Local\Temp\nsvD36E.tmp\System.dll

                    Filesize

                    12KB

                    MD5

                    dd87a973e01c5d9f8e0fcc81a0af7c7a

                    SHA1

                    c9206ced48d1e5bc648b1d0f54cccc18bf643a14

                    SHA256

                    7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

                    SHA512

                    4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

                  • C:\Users\Admin\AppData\Local\Temp\rty27.exe

                    Filesize

                    420KB

                    MD5

                    afee6eeb6863a20a615d24406e563b6c

                    SHA1

                    8175c07e6c4154734e0512718dc6898437f4001c

                    SHA256

                    0bcbd70a1b5dbec77ffbb14aaba62202b9736fb1f77c5e48a064afc5e2ffe01a

                    SHA512

                    e1ec83688bbf4916bcd7a185a0a7e03278a426bce355c14ba886d2ac20322bc073c257ba599e01af0645d1a4535ec062021f58c44bd74593cee5cf8d937b47a4

                  • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                    Filesize

                    201KB

                    MD5

                    6aa6732f8a7ffe321b4e43d5702800e9

                    SHA1

                    1582c0f3d8c2f589d27d7f5c19f682bfd04e75d1

                    SHA256

                    5e325be4bc51d83b75cb6e3182a8820a5f841a89b5d3e00969ce2a5f831ba5dc

                    SHA512

                    456f31eac21a5435f9fbc35ddc88a8026094ad3b46a72e3f28835bf7004993b7625b56ef036456a2319cb83dfa190c087bec6dd5cb23512effe064104863c459

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                    Filesize

                    2KB

                    MD5

                    3d086a433708053f9bf9523e1d87a4e8

                    SHA1

                    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                    SHA256

                    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                    SHA512

                    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    ab8774c96e60709beced96238f2b7310

                    SHA1

                    9ac61185991124b6538f8c419675ea285b4afafd

                    SHA256

                    0d7183c92e4b5a3abcd281d6b8b12d62a6e6d48ccab73e0d67074f0599adf09f

                    SHA512

                    8069acc98089e6c660679ec4df2792d216a92ab01f49078ea4bf001e32ce7def957bbe5c85cec2c229090dbdbad3a477463b1ab04d97c9f26224c586fb4408fd

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    16KB

                    MD5

                    513f78c60eb1720dfc3e33dfcc672b96

                    SHA1

                    3c4db6827f808fb0e94c37cc25384012bf28fd04

                    SHA256

                    4d36a148055e5c68a17a8e13075a6b1bc8af4ca494a55c960d90af5e0cbdd698

                    SHA512

                    9ebeebc7817402c402df579632ff57859108521af483e5e46365897d142cfda799cd67b143fe71c265b2f5590940499fecc61fb9ae8d97be95115f6815728b8b

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    d7641d19688a1fe30482fb08827c76a7

                    SHA1

                    f31392f56ea94ede123ca10963e7e54fe097e069

                    SHA256

                    4dfb2affb40719f202f29e57f162e8b9af0947349540891115799473b78909d3

                    SHA512

                    abd25fa77c6f588e0cf9e0d49aad3562a494294baecde9a3331bfe98e94cdc6781fb94e141d948b7620c4ac7f3ff16c480c57d1447bea20c7f61d1a23a91524c

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    8b3506557967f55beee338a491c516f3

                    SHA1

                    52fecea63340d3b3a93201844dfdc59a9374bbbd

                    SHA256

                    56e03b52aef0f1b45f25acf91e69c4d1b603de7972d3ba8ea7a03a78de1ea062

                    SHA512

                    a10af248a792265b7394e7f0e13245de315dbb2b5119bddaea99c4314783f0b9af23093945310eeaacc9f331b9f55c3f63c721d67717e6fb95c9b69c1b9d64f2

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    8d8ffefee3670988c80d96e751cef79f

                    SHA1

                    c38647ac3277fd9704624b919f6a78d00bdbb565

                    SHA256

                    f8f41b311c82a6cfef5a0796a86835ffad49bd0fd03e7431c88a6a8f9fc4ecc1

                    SHA512

                    d10151bb01a4f71e507ec62fdd0f965e905753a639ad2f444d1b57af8c049f9196db9ef80a4272cccefd45a565223195ec7e3aca627711bb36a19293e39bd8dc

                  • C:\Windows\rss\csrss.exe

                    Filesize

                    457KB

                    MD5

                    387744aa26642faa35b37fd117279d5e

                    SHA1

                    34d6909aabcf18cf93861b022b5e51b1df058cc7

                    SHA256

                    13d774351a08b48ba3fe14ea6e6ee4a186c1734fcbd53084036f6435d4a452cd

                    SHA512

                    e4787939f7b76a60134313877f3ef7497efa1b8a15130f54d28265a7371ba7f5effe157c8e40e31f00ffc797208882a2bdd63df532b8d7e494957bdc0e50928d

                  • C:\Windows\rss\csrss.exe

                    Filesize

                    610KB

                    MD5

                    449af9a6a563dd1bdeded51f1934b7d7

                    SHA1

                    a5be16120952e215d1966107e01da48bf152b8f7

                    SHA256

                    e3c90a28d58f8528160bb3a071dcb328a08707c50025471e3f41907528ad1ba7

                    SHA512

                    a386689094f31f965ed5745818a20e0a486401a437beb8d3c76cbc84f173968449ed69a3341f18f6b7a94bd2b3cabb86dec1b512226eb14efc9dc0f065eff804

                  • C:\Windows\windefender.exe

                    Filesize

                    2.0MB

                    MD5

                    8e67f58837092385dcf01e8a2b4f5783

                    SHA1

                    012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                    SHA256

                    166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                    SHA512

                    40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                  • memory/516-184-0x000000007F3C0000-0x000000007F3D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/516-182-0x00000000053A0000-0x00000000053B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/516-181-0x00000000053A0000-0x00000000053B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/516-180-0x00000000737B0000-0x0000000073F60000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/516-186-0x0000000070CD0000-0x0000000071024000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/516-196-0x00000000053A0000-0x00000000053B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/516-185-0x0000000071F60000-0x0000000071FAC000-memory.dmp

                    Filesize

                    304KB

                  • memory/516-198-0x00000000737B0000-0x0000000073F60000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/948-413-0x0000000000400000-0x00000000008DF000-memory.dmp

                    Filesize

                    4.9MB

                  • memory/948-428-0x0000000000400000-0x00000000008DF000-memory.dmp

                    Filesize

                    4.9MB

                  • memory/1356-164-0x00000000052F0000-0x0000000005300000-memory.dmp

                    Filesize

                    64KB

                  • memory/1356-167-0x00000000737B0000-0x0000000073F60000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1356-152-0x000000007FCD0000-0x000000007FCE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1356-138-0x00000000052F0000-0x0000000005300000-memory.dmp

                    Filesize

                    64KB

                  • memory/1356-153-0x0000000071F60000-0x0000000071FAC000-memory.dmp

                    Filesize

                    304KB

                  • memory/1356-145-0x00000000737B0000-0x0000000073F60000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1356-137-0x00000000052F0000-0x0000000005300000-memory.dmp

                    Filesize

                    64KB

                  • memory/1356-154-0x0000000070CD0000-0x0000000071024000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/1880-319-0x000000002C700000-0x000000002C7C4000-memory.dmp

                    Filesize

                    784KB

                  • memory/1880-68-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/1880-132-0x0000000002880000-0x0000000002C81000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/1880-67-0x0000000002D90000-0x000000000367B000-memory.dmp

                    Filesize

                    8.9MB

                  • memory/1880-66-0x0000000002880000-0x0000000002C81000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/1880-133-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/2100-45-0x00000000746D0000-0x0000000074E80000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2100-0-0x00000000746D0000-0x0000000074E80000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2100-1-0x0000000000180000-0x0000000000896000-memory.dmp

                    Filesize

                    7.1MB

                  • memory/2128-86-0x00000000057E0000-0x0000000005B34000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/2128-114-0x0000000007350000-0x000000000735A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2128-76-0x0000000005510000-0x0000000005576000-memory.dmp

                    Filesize

                    408KB

                  • memory/2128-74-0x0000000004CB0000-0x0000000004CD2000-memory.dmp

                    Filesize

                    136KB

                  • memory/2128-70-0x00000000737B0000-0x0000000073F60000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2128-125-0x00000000737B0000-0x0000000073F60000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2128-119-0x0000000007410000-0x000000000742A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2128-122-0x0000000007400000-0x0000000007408000-memory.dmp

                    Filesize

                    32KB

                  • memory/2128-118-0x00000000073C0000-0x00000000073D4000-memory.dmp

                    Filesize

                    80KB

                  • memory/2128-117-0x00000000073A0000-0x00000000073AE000-memory.dmp

                    Filesize

                    56KB

                  • memory/2128-97-0x000000007FB40000-0x000000007FB50000-memory.dmp

                    Filesize

                    64KB

                  • memory/2128-98-0x0000000007200000-0x0000000007232000-memory.dmp

                    Filesize

                    200KB

                  • memory/2128-100-0x0000000070CD0000-0x0000000071024000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/2128-110-0x0000000007240000-0x000000000725E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2128-87-0x0000000005CA0000-0x0000000005CBE000-memory.dmp

                    Filesize

                    120KB

                  • memory/2128-71-0x0000000002350000-0x0000000002360000-memory.dmp

                    Filesize

                    64KB

                  • memory/2128-116-0x0000000007360000-0x0000000007371000-memory.dmp

                    Filesize

                    68KB

                  • memory/2128-115-0x0000000007460000-0x00000000074F6000-memory.dmp

                    Filesize

                    600KB

                  • memory/2128-69-0x0000000004710000-0x0000000004746000-memory.dmp

                    Filesize

                    216KB

                  • memory/2128-75-0x00000000053B0000-0x0000000005416000-memory.dmp

                    Filesize

                    408KB

                  • memory/2128-113-0x0000000002350000-0x0000000002360000-memory.dmp

                    Filesize

                    64KB

                  • memory/2128-112-0x0000000007260000-0x0000000007303000-memory.dmp

                    Filesize

                    652KB

                  • memory/2128-99-0x0000000071F60000-0x0000000071FAC000-memory.dmp

                    Filesize

                    304KB

                  • memory/2128-95-0x0000000007690000-0x0000000007D0A000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2128-96-0x0000000007040000-0x000000000705A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2128-73-0x0000000004D80000-0x00000000053A8000-memory.dmp

                    Filesize

                    6.2MB

                  • memory/2128-72-0x0000000002350000-0x0000000002360000-memory.dmp

                    Filesize

                    64KB

                  • memory/2128-92-0x0000000006F90000-0x0000000007006000-memory.dmp

                    Filesize

                    472KB

                  • memory/2128-89-0x00000000061C0000-0x0000000006204000-memory.dmp

                    Filesize

                    272KB

                  • memory/2128-88-0x0000000005CC0000-0x0000000005D0C000-memory.dmp

                    Filesize

                    304KB

                  • memory/2136-318-0x0000000002DF0000-0x0000000002EB4000-memory.dmp

                    Filesize

                    784KB

                  • memory/2136-391-0x0000000002DF0000-0x0000000002EB4000-memory.dmp

                    Filesize

                    784KB

                  • memory/3008-242-0x0000000000010000-0x000000000006D000-memory.dmp

                    Filesize

                    372KB

                  • memory/3008-246-0x00000000021D0000-0x0000000002236000-memory.dmp

                    Filesize

                    408KB

                  • memory/3196-405-0x0000000000400000-0x00000000008DF000-memory.dmp

                    Filesize

                    4.9MB

                  • memory/3440-128-0x0000000003EA0000-0x0000000003EB6000-memory.dmp

                    Filesize

                    88KB

                  • memory/3976-94-0x0000000002F60000-0x0000000003090000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3976-93-0x0000000002D20000-0x0000000002E2C000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/3976-170-0x0000000002F60000-0x0000000003090000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3976-22-0x00007FF7FB060000-0x00007FF7FB0CF000-memory.dmp

                    Filesize

                    444KB

                  • memory/3992-254-0x00000000007A0000-0x0000000000BD4000-memory.dmp

                    Filesize

                    4.2MB

                  • memory/3992-384-0x00000000007A0000-0x0000000000BD3000-memory.dmp

                    Filesize

                    4.2MB

                  • memory/3992-252-0x00000000007A0000-0x0000000000BD4000-memory.dmp

                    Filesize

                    4.2MB

                  • memory/3992-257-0x00000000006A0000-0x0000000000764000-memory.dmp

                    Filesize

                    784KB

                  • memory/4004-255-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/4004-135-0x0000000002A50000-0x0000000002E52000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/4004-136-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/4004-169-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/4368-397-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/4368-430-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/4368-435-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/4368-420-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/4368-303-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/4368-409-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/4368-425-0x0000000000400000-0x0000000000D1C000-memory.dmp

                    Filesize

                    9.1MB

                  • memory/4436-63-0x0000000000400000-0x0000000000854000-memory.dmp

                    Filesize

                    4.3MB

                  • memory/4436-62-0x00000000008E0000-0x00000000008E9000-memory.dmp

                    Filesize

                    36KB

                  • memory/4436-61-0x00000000009B0000-0x0000000000AB0000-memory.dmp

                    Filesize

                    1024KB

                  • memory/4436-131-0x0000000000400000-0x0000000000854000-memory.dmp

                    Filesize

                    4.3MB

                  • memory/4980-111-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/4980-416-0x0000000004590000-0x0000000004654000-memory.dmp

                    Filesize

                    784KB

                  • memory/4980-46-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/4980-410-0x0000000004590000-0x0000000004654000-memory.dmp

                    Filesize

                    784KB

                  • memory/4980-65-0x0000000000400000-0x0000000000965000-memory.dmp

                    Filesize

                    5.4MB

                  • memory/4980-320-0x0000000004590000-0x0000000004654000-memory.dmp

                    Filesize

                    784KB