Analysis

  • max time kernel
    141s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2024 17:00

General

  • Target

    6fd43f137db0c8472dc0d64be1190bc6.exe

  • Size

    6.0MB

  • MD5

    6fd43f137db0c8472dc0d64be1190bc6

  • SHA1

    d1feb73da26dcc12198088dacc6dd9caf6417a36

  • SHA256

    232c76d65ab1d36fd73d1c8977bbd63a415a98fc2a7a65648003810584d05ecb

  • SHA512

    f2abf2c3996cd78d35a495ba1b8b951067e9f679ffafb994c53e6cdec8a49034313f4158f6596fd8178ada20b569fa671109381a69b3a4e43c447271152b68ef

  • SSDEEP

    98304:tT1v0Sc5LEgwytj2KJHZpz+v2zU0XWbbr5vMjl2iQu9ntFEPZ8YGpnN6p:l18S6ZyKJz+ezUHQtBEp

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/871356915303710720/aJQeq8OY3wwqIiXWkN97pUlIjJQhxawbR5zbwOuO96jrzWKG4INekUUjRxLOjy9VbIsi

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fd43f137db0c8472dc0d64be1190bc6.exe
    "C:\Users\Admin\AppData\Local\Temp\6fd43f137db0c8472dc0d64be1190bc6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\Fatality Loader.exe
      "C:\Users\Admin\AppData\Local\Temp\Fatality Loader.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2656
    • C:\Users\Admin\AppData\Local\Temp\CFG.exe
      "C:\Users\Admin\AppData\Local\Temp\CFG.exe"
      2⤵
      • Executes dropped EXE
      PID:2768
    • C:\Users\Admin\AppData\Local\Temp\Fatality.win.exe
      "C:\Users\Admin\AppData\Local\Temp\Fatality.win.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://java.com/download
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1976

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
    Filesize

    252B

    MD5

    ded738a027bc2990473c6c31ae47b60b

    SHA1

    9ab25657a839180e4545e0183d8d60176e7f2897

    SHA256

    2598a4b05ed38fc0bb63e7dfa994c39239c3fca8667138ec0cf6db11d7ef91b7

    SHA512

    37ee95d14cb002f2bfcd952069828131d0ca9d977af39a3560df60bbccb521645e63e22c311673dbecc4f262c0fbf3db075ddd49f01dcab7705d9e3a69629ac6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    506e6ad9fcd42e0f4577acfd390db71e

    SHA1

    5f833329ac015ba6d5b0d90c34da2e28d6d53aef

    SHA256

    0e981939c0f5d821703b34bd2200104caaeac52933b8203266782ba4fc3c1e55

    SHA512

    4008591d533dc45ad3fb12df6639823d07184388634361b9a470dfb9847ac5fabeb8573d5b7f60232558b67004d6e0af8f2dd0caa4391b62dbaac3115fb9d4cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b917671f76da949d59ab0734090f6ace

    SHA1

    8f7b2f7e0516824f0c848c35156a703deb792dfb

    SHA256

    35d09a43a775899c21e5e862f28fd052f2d9a23292f52ce5ba91921a75042497

    SHA512

    101d236c6bfdeb590518f11317646b8ad5c222e0eee409ae70a282c1bf4d260cef75d357ddcf4853cfa7790defa7f1592af8fa32bdc3098208bcc345a852e289

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8c5b760690d6ba55f6f67545e2653163

    SHA1

    1e2ee1a898da96dddef4185726778eefe27a6fb5

    SHA256

    8607cc07b9b92c4eb3e03d2cb87d0cb545e0afa6abe67017142781b435fee615

    SHA512

    aef5cc3a77a09479bfbc34329751725d21c9fea43427c949da8cb224a377f7444f447ad57c1a0f4a6cb8ecf51f9222b9676d60bf46ad37ae4ef766b16c1cbf02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3b0c4b3c4ce3ea83c7c02c5f53e9ff0e

    SHA1

    c29ca3372860d8f3b741be9795e86b04f1e34461

    SHA256

    43db53aecb0aa01c230c77dfc91a7c4f0cc99c5728c490ebe9fc132199cbab90

    SHA512

    2ac3391b30d05c74d595302bdb144ffa2075739fc0744c3f9ef58355d70bed7eb25db9e317fb8df7ff94afe4dd16d12361501a6394f7f12c376c7970d4b1aca0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e8e2fe24a6e207626b64c94aacc3c4f4

    SHA1

    14d4899fa2724b191689da2ab297d27cfac4d730

    SHA256

    79a8155bfe815a77002664292addba7985288e7ea4316d86538d3fe489b08238

    SHA512

    0f75821a824b3f3b1d5978189adb97aed5e11c2e2fa9aedd5b396fd9d20264a00028d02d275d7701ffcc88717c659874e09161dcb650b7e93771c843dc8ab7ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    55a69fd67b863b1bd410e6eabc92d690

    SHA1

    b8cd1e390f939e410b7633b61314e3eb4079ba3a

    SHA256

    b121092c83d62397fe6076da16db7e7ea205461028b09774bbbd6f774cc69641

    SHA512

    e7663eadeea7170fce613de4a82ed1013b66abc233aeb94dbba483b3bd3d3f464645c42f8623553abde3f3187a16204b8ba7d910f30468e351444f0dec2b6b5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6924e6486201ac4154d9d5895423ca25

    SHA1

    be7e52dd973b1307c7afaf36650ab0fcb7639f14

    SHA256

    49c8d599ee0acfe2312b0cf8fe17c0235df29971313f7c1982f370149bbc7534

    SHA512

    1908e187a2afde862dec65fad17142edb09591d63dda63c33d332e3b7ab87994de76d9865cf819d51bd1b9bf9daf456330705e375e708a54a1c44ec532270931

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1d18b790aaffae5cabeefee0b85d0fdb

    SHA1

    bc966d8ae3873ef74c2eb1bb3fde552dcb22e3d2

    SHA256

    99fbb4332f6b65f1fc40e3baabf647a7de2ceac71f049b807cb116f901a14d44

    SHA512

    13018edc69499ca77cee9784dc4b645a390d15efa94d7d8c79fa2590c910b853583b6327e1326e5d26c2bac1c75d22040363deee93061689067329499664ebf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    203fca3c5167128ae68794c2611a44dd

    SHA1

    c32a029272eda06c7e6b75f828dc231dc31c2b0a

    SHA256

    f5be5373be2697d84a3734f669eaf2f6af1bc65c9c3e4519275637d7587b6ecf

    SHA512

    a708fc7e5decd21ef58bb6740078c07cdb070623ad59bbdb5bf1858310137d11b5d7f47b5b2e377d3b7987239c4fba92553da4f8fd2f412ec1964cb19946ceec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8cfa426a432cc671ce7068103c5d9b1e

    SHA1

    9c475cd43ba0c1ccc1fe087d6936a639a7083dc1

    SHA256

    0f4f77e949f4063def91c60bb4bbd71bbdf2a95378dfb65188ba5153f0327791

    SHA512

    e49bf08955bd890e96f35e92b479631d261b15588dab70e01d979d207cd44e8ea541739e5d41fbb04059485a57682d26f5dd04a7ebfc466b485a7f1abca447af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b57d5af5138864c5cc6079655cb2eefc

    SHA1

    70a56e6713c6818e1341e5b7aed7c1563fb34ac7

    SHA256

    86c5220f6e2c90900e0906445fca7991639352d81f42214d81983500e432ddec

    SHA512

    a6eaec42160691424c8b15d1cb5cce17b940cbf51acb44ffa5500672837d473f67e1e3759953aa27ee4da4add18c758797f8705bde9dbb14ac966d17ab062f2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    90276fd194b062b0beea029bb80d2ba4

    SHA1

    e6d802b5430152a50187926f12849bdb84f1e2ee

    SHA256

    619ad0421157c0aca5367880eb93ca3c7579b8fd217e5ad24f3e025f821c28cd

    SHA512

    39ea6f7da447325ee9e40161bcdd147f0f2c19d376fdcf7a7df5ca2fce4363d9fbfe16d3bca78bf1c88fbe6f4aac822d29b42de8be839bc5e41c3f0ca53458aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4fef5b636b03f4a3cf7a8fad8d5b8aa4

    SHA1

    a48195eda745d3afc3abb32b568edc8a3f46b922

    SHA256

    8762fd7e40749572397e152a2018d37fac8bda5080521e254307150fd1b4daeb

    SHA512

    20977d2f093b64a4ae091cea95ea2f39060a6553db45d4c291302fcdf49db67e732036874c75d9198398d5e8f8e14fa54cfe079a8f991eafe5d6115acbd6f153

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2831ea06f2c72e96d0dc2e824e14f9f4

    SHA1

    0f55c14f60351aff3a5aaaffb77273f3bf12d023

    SHA256

    c588a680eedbb593bc9edf00ec807df5fe59364ebc4ab3a2d2aec10251aee9bc

    SHA512

    5be8dbbe3db27e82b0ea92ae353c760f208f613354ea419d4f395b6be2347518e4ca99204733ff1223cf8f9d9b1cfc397c77e8da2b3bf2b7c3e4a4090e51b2f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    dbc82d518acdc73e015b414277c416bf

    SHA1

    26de602083b84dd7760eace3c2dc16d07208be3a

    SHA256

    59f144ed398bc002003c2236eac6076cff5b47d5732cdf4d96b1f3462dd3f1d9

    SHA512

    ff45112e0d07d8b5ac5767ed28c76888989f650c162bf13d19bbf5bef1b9d1dfd5bf948a6e27bfb6ead552829194193900de135f6c13baf373009508b0ac327e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    cb28f5c27388bce11479b0ed435f0709

    SHA1

    303de7d3859cf0318e3077d20124223eb545bfd4

    SHA256

    f041a576d95b7d44d5f8cdaf17f621856470ecc8523d926b620116d702bbf07d

    SHA512

    d7a8dd162d22eb56faf30da0340e8a9deb0c05b98c1fce05fc41aae1bd21ff1cd6204ce492d005ef612f17de1e2ad769ce3eca38535e58b09317a5af152c3e36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3d63605822815a61ff535460063c4cfc

    SHA1

    e034350d96b693a60f7104bb32e0f83fe6f36fb6

    SHA256

    05c610b1c100cd6d6306427648b888b53f3aa996bb538f0416b91375134d61b1

    SHA512

    1781e937fc2ecba0bbdac4692d5ef293678ada7d7988065214187c9ca136e3f41dd42fb20350f76df7242cad98b5174012071b8a7f3cabd6162e48723bb388f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    58587d08773679a5ad652db3a59a1513

    SHA1

    7b1bf2e3bb764a6e795e2803a5b61c69de623178

    SHA256

    18a2b63ed37bf5207e5880e52ad37e3764641c6bce6c4522c10f19ef146e2d35

    SHA512

    e53d5dae63d23898723eeafd10024eb9b177f4584a7d992d9862d9734ccd14a6c161409171ca7f4103d673fecf74551459951d75f32a3ad8f5d96d2a4426b0f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1461b8fed83cdb4639cb84253e37c2a7

    SHA1

    cc75daac2614a5909ac3de89863acc00e134051c

    SHA256

    0363c51b489a165999be401303dc423e69a95278fe2772d04f0f697fc473b371

    SHA512

    22f607395699d6aa1709b889d5a87e68509ec69d9c09b3911fbec6b037ada7ca445bbe3a7f0b9e54a686e663f30e58db9fa8252ae95e1a610843969621805c98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    604d0b48a65c1050e835f61b30e8d87a

    SHA1

    53ae221a8afeb28977e23660b117eb78e9df6d66

    SHA256

    e565138fc21cb0ad743fef797df9aa07057590c16f4227a010eda73d288df2de

    SHA512

    e1c701a1090cb0faea2cde2458090caebb2c890a58fbd3d2c65772169c6c0c66b7dfe80dfc5e1ba1cf4847ab0e1b3230e29d07adb03a70196385e82123151e5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    1ed6714ba5c1612aa7341d073a310f9e

    SHA1

    70fb1f2a5a014a966fa4de9ba2b99d263a3c35c9

    SHA256

    8e79c182ceb91ebdce7a0e7275b59be6f9975800b5c89ec680fb08039f588c66

    SHA512

    13059a98eaf69d1439812cf19f8ac5f4b1ad4d2ef7f154ce70528c12505754dbbb3e4ac9b5cec0e23e95684a8a5f17c2af19f9469028ae9863e30017afe0c5b0

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\XHMIOTZT\www.java[1].xml
    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\XHMIOTZT\www.java[1].xml
    Filesize

    323B

    MD5

    7e031125ef4f6d211379ecc0c8697688

    SHA1

    45b62bc636ba9ddb667344539696458cca5d15c2

    SHA256

    61d3a7f588b94dbf3c8b42eca3ea78d32403eaf15df5bd5e3b9e761a77634da4

    SHA512

    791a46b14c3968730f9db6b895ddd53b85e26fd6a868156f4372d85cf13eea03d3589564a73ed35b8259002512bfa012e7c3e894c28c1541fa0048df3a347dc8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\02cy2i9\imagestore.dat
    Filesize

    1KB

    MD5

    bcd4d92b65e5303f60fbecdc2349d5ca

    SHA1

    6d14e2bfa76badd57a62d0f7b0fa7e560b417704

    SHA256

    f20ede76ed7aba269d5d68d4ed0ace14f31a42f6a531ce87631848e4234ed921

    SHA512

    16ed95238a3475de00a900b81cda502a2c923e078a97360428ebaea63cbfef00fad53eeb52be967791445143d907f26c4b1e41f8e228a8fd8c640520571aff47

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JIH1AB02\favicon[1].ico
    Filesize

    1KB

    MD5

    8e39f067cc4f41898ef342843171d58a

    SHA1

    ab19e81ce8ccb35b81bf2600d85c659e78e5c880

    SHA256

    872bad18b566b0833d6b496477daab46763cf8bdec342d34ac310c3ac045cefd

    SHA512

    47cd7f4ce8fcf0fc56b6ffe50450c8c5f71e3c379ecfcfd488d904d85ed90b4a8dafa335d0e9ca92e85b02b7111c9d75205d12073253eed681868e2a46c64890

  • C:\Users\Admin\AppData\Local\Temp\CFG.exe
    Filesize

    296KB

    MD5

    6249238b5d6ce6217998b97d544a2d60

    SHA1

    2c68d31bd2084cc722a34ee64fa4a5b638d524f5

    SHA256

    8fc1c3bbcf19c0b4f789967fa495ca817c3b1d3918cc572cd2c9405c556404e9

    SHA512

    ac6c35472cb0234d64bd5eb8b025e169f617c2ce81cb2efc2f2ce8a6ac84ee2198f3c0ed126284abf387bf47d0ebaac2a96722a5122dd6ee69c1a46cc8a83ac7

  • C:\Users\Admin\AppData\Local\Temp\Cab4E8E.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Fatality Loader.exe
    Filesize

    299KB

    MD5

    c62e8659a538d545f07e0c9f9d4e7473

    SHA1

    feaa24f501803d8f179732d4920561deb8b4c08f

    SHA256

    5895294f317b1cf6c4598d293501249917f8177adea6c0f4241517ee2596365e

    SHA512

    d0c46943279825cebf4de80d50b53fea409d2ecfae9922af97c93f199b62fdf572a278bdee04fe2a13cf7be8a2ac1fa92a081a8b614a0a89348d894600b1d5ed

  • C:\Users\Admin\AppData\Local\Temp\Fatality.win.exe
    Filesize

    2.9MB

    MD5

    be92b783b98a4403eda4a89e915cce34

    SHA1

    87468b75560820470e9f802683c31c7442b27642

    SHA256

    898904ad04418e49f44e3f54856503ca38ad1eac99be696b644b628b5bbf0283

    SHA512

    9085363d9932726ed08fbd04aa427c0c22050b4c8f902f55b4b19f2964ec27f0877d4f882a560501eec6352e746d545c5c3ec8703558409efbab236dc6ddbb5c

  • C:\Users\Admin\AppData\Local\Temp\Fatality.win.exe
    Filesize

    1.9MB

    MD5

    1080a7ee77f5d2e1b3e5d38bbd761e28

    SHA1

    d78916d0c6d06620adf236666fb13a4673adbe27

    SHA256

    befc2746985afcc978ce910e50181aa4da8bc4aae2e3e185102f4678d3dcea51

    SHA512

    fde8a1dbf41fc2bfe11f4482e6afc3675395c5c1fde8bdb20197e2e510aa75b92e77cbd35f728c60db32098e535ec84af99bbce3cbd4354d979b8769feb0d23f

  • C:\Users\Admin\AppData\Local\Temp\Tar4EB0.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Roaming\44\Process.txt
    Filesize

    415B

    MD5

    541980384ddb5352ddd16c811e4b75c5

    SHA1

    81e2fcaa0e975651b24861c89e48be9eb852fb13

    SHA256

    7303ef29632a88211b02727d3f63cf338bdb82a46ff9a4b8a91eb2ce3db85d63

    SHA512

    34f7087ae1b1e38efa48d51f7af79d29c3a98eece41b0675d06b9a44874e9ef9036ad40ca10b0dedacf637fb5222699e4257ca4ca1bdbdf5cea86dbcb1b7096e

  • memory/2108-44-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp
    Filesize

    9.9MB

  • memory/2108-0-0x0000000001300000-0x0000000001904000-memory.dmp
    Filesize

    6.0MB

  • memory/2108-2-0x000000001B660000-0x000000001B6E0000-memory.dmp
    Filesize

    512KB

  • memory/2108-1-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp
    Filesize

    9.9MB

  • memory/2584-76-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/2656-17-0x000000001B4D0000-0x000000001B550000-memory.dmp
    Filesize

    512KB

  • memory/2656-16-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp
    Filesize

    9.9MB

  • memory/2656-75-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp
    Filesize

    9.9MB

  • memory/2656-11-0x00000000000E0000-0x0000000000130000-memory.dmp
    Filesize

    320KB