Resubmissions

13-08-2024 22:21

240813-19156ayhrg 10

13-03-2022 10:00

220313-l15dwsffgj 10

Analysis

  • max time kernel
    18s
  • max time network
    21s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-08-2024 22:21

General

  • Target

    f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe

  • Size

    3.2MB

  • MD5

    0ad600b00aa2381172fefcadfd558f94

  • SHA1

    d761bd0ea41910dd981919c2e520b04b3e23b443

  • SHA256

    f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215

  • SHA512

    92d4561b6793b20293de88bedd36ad4d3c74492b5926efd61588e83f8be8c863a9309596b63ca0591829929f45196f08f14e718163ed1c00e93b04ef844c6ea6

  • SSDEEP

    49152:xcBJt41mYRxKLjlq7iIofckmr0MSPaCn4LcBAjFoj+EwJ84vLRaBtIl9mTQr4:xqomYRyJq5lMPaCmcajmCvLUBsKf

Malware Config

Extracted

Family

nullmixer

C2

http://wxkeww.xyz/

Extracted

Family

redline

Botnet

Cana

C2

176.111.174.254:56328

Extracted

Family

redline

Botnet

DomAni2

C2

flestriche.xyz:80

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Detected Nirsoft tools 2 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 8 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:512
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k SystemNetworkService
      2⤵
      • Modifies registry class
      PID:3536
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
    1⤵
      PID:1128
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
      1⤵
        PID:1172
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
        1⤵
          PID:1368
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
          1⤵
            PID:1588
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
            1⤵
              PID:1716
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
              1⤵
                PID:1536
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1744
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                1⤵
                  PID:2632
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                  1⤵
                    PID:2808
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                    1⤵
                    • Enumerates connected drives
                    PID:2824
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                    1⤵
                      PID:2892
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                      1⤵
                      • Modifies data under HKEY_USERS
                      PID:4920
                    • C:\Users\Admin\AppData\Local\Temp\f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe
                      "C:\Users\Admin\AppData\Local\Temp\f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe"
                      1⤵
                      • Checks computer location settings
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:2676
                      • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\setup_install.exe
                        "C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\setup_install.exe"
                        2⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:2844
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c jobiea_1.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:800
                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_1.exe
                            jobiea_1.exe
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Modifies system certificate store
                            PID:4720
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 1812
                              5⤵
                              • Program crash
                              PID:4744
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c jobiea_2.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:1248
                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_2.exe
                            jobiea_2.exe
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Checks SCSI registry key(s)
                            PID:1480
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 380
                              5⤵
                              • Program crash
                              PID:2124
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c jobiea_3.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:2612
                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_3.exe
                            jobiea_3.exe
                            4⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:2928
                            • C:\Windows\SysWOW64\rUNdlL32.eXe
                              "C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",getmft
                              5⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2420
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c jobiea_4.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:4568
                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_4.exe
                            jobiea_4.exe
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:1512
                            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                              5⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:4548
                            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                              5⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2972
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c jobiea_5.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:4460
                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_5.exe
                            jobiea_5.exe
                            4⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4940
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c jobiea_6.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:216
                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_6.exe
                            jobiea_6.exe
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1876
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c jobiea_7.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:4972
                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_7.exe
                            jobiea_7.exe
                            4⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:3424
                            • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_7.exe
                              C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_7.exe
                              5⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3060
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c jobiea_8.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:1352
                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_8.exe
                            jobiea_8.exe
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2648
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 548
                          3⤵
                          • Program crash
                          PID:2404
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2844 -ip 2844
                      1⤵
                        PID:1608
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1480 -ip 1480
                        1⤵
                          PID:4724
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4720 -ip 4720
                          1⤵
                            PID:1812

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jobiea_7.exe.log

                            Filesize

                            605B

                            MD5

                            3654bd2c6957761095206ffdf92b0cb9

                            SHA1

                            6f10f7b5867877de7629afcff644c265e79b4ad3

                            SHA256

                            c2a4be94cf4ed33d698d9838f4ffb47047da796e733ec11562463a1621212ab4

                            SHA512

                            e2a81248cca7732ce098088d5237897493fd3629e28d66bc13e5f9191f72cd52893f4a53905906af12d5c6de475738b6c7f6b718a32869e9ee0deb3a54672f79

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_1.txt

                            Filesize

                            598KB

                            MD5

                            dd5f6d433f6e89c232d56c88a61392bd

                            SHA1

                            2582fc1d123384bd7e2a07638bb37fcd3d79ca9a

                            SHA256

                            0db8aeda5003da3a7a88699ece04556f0f6b1d1400514d4cb374c88ddb8ec63d

                            SHA512

                            a513f488566540091a031db709d3cfbefdb3668ed5b849ec45dbc9371d45aa25f9489c0990dd25c1f14b92cfcd25dd06b1126aef5ba4051f3f1a0c49b8af2d0a

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_2.exe

                            Filesize

                            231KB

                            MD5

                            0d8ebc2a16581f7b514a1699550ed552

                            SHA1

                            72f226e8efc041d998384a120f8e45d22c0f4218

                            SHA256

                            c638b1a56525b01c7a73366fc7c8d0c2b29353a31c4fcf3a7b7037e52caf4f28

                            SHA512

                            2e95e4df0a97bc9ea341b93383b3ea4b68db4259ac53da9a29ec80bc00894c5c82a32d4cbb7927ae1808103e6b7491e0a18f406b02363a47a45a0de463b51f72

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_3.exe

                            Filesize

                            675KB

                            MD5

                            6e487aa1b2d2b9ef05073c11572925f2

                            SHA1

                            b2b58a554b75029cd8bdf5ffd012611b1bfe430b

                            SHA256

                            77eec57eba8ad26c2fd97cc4240a13732f301c775e751ee72079f656296d9597

                            SHA512

                            b7512fcf5dcfbe1c1807d85dfff39bd0cac57adf2696b7129a8c9d70ea7f8249c301a97ecba0f190eb622a216530215585ce6d8d8ce9b112e5728792ecace739

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_4.exe

                            Filesize

                            972KB

                            MD5

                            5668cb771643274ba2c375ec6403c266

                            SHA1

                            dd78b03428b99368906fe62fc46aaaf1db07a8b9

                            SHA256

                            d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

                            SHA512

                            135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_5.txt

                            Filesize

                            175KB

                            MD5

                            a2a580db98baafe88982912d06befa64

                            SHA1

                            dce4f7af68efca42ac7732870b05f5055846f0f3

                            SHA256

                            18310737141e60462bb77bc7e1cd3024fa3308c96f0e2dd37a71b995c72f3a09

                            SHA512

                            c4a4887659212674112c4eb40baf2bf227a4b04a9b2c140ea142cc2a47a1cd73c4a0fe6c7cf285f521dd912ef635ae2925ac11bfa9eddbf014493d71e029756b

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_6.txt

                            Filesize

                            804KB

                            MD5

                            9065c4e9a648b1be7c03db9b25bfcf2a

                            SHA1

                            6ee58f69e199bbc1c7653a4e8621dd583ec6ac61

                            SHA256

                            8bd28ed722c7ce293f0a9ce3644e595965e448354ec231cfca25f887605c6f47

                            SHA512

                            ad09b354bb85f7534102da2e35ebd4dd5b5c35809e8726968f96170726abd997927e5aa8bc1390571152552361fa139fe04c7a9830b94e627541cc1fd51a329d

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_7.exe

                            Filesize

                            378KB

                            MD5

                            4668a7d4b9f6b8f672fc9292dd4744c1

                            SHA1

                            0de41192524e78fd816256fd166845b7ca0b0a92

                            SHA256

                            f855237cba5b06f971f92764edb011d5949efed129d14056130069b1e12bd3db

                            SHA512

                            f8219e0d5753d9348e22949d90080a43e273733244ef9fab4925cc9f62299bf0c1b25ed9f96d6c17167c3474c4d7e977f8658ac1bf46de1e9691c2f43dccf5ff

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\jobiea_8.txt

                            Filesize

                            330KB

                            MD5

                            69fc838583e8b440224db92056131e86

                            SHA1

                            a9939288bff48a284b8a6639a3cf99d3ffe65bf2

                            SHA256

                            f3b6310267708b944d216b6076b68f97111b5230db97a37d84fe759c441295f6

                            SHA512

                            b4ee74a25607eaac2910eda1953bef56d010ea4bda5d17e8d61f4d34c3ca0301ab2465f41a9644c03fdf7183910953dbbf8da51c7f02f6da5463ff7355080a32

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\libcurl.dll

                            Filesize

                            218KB

                            MD5

                            d09be1f47fd6b827c81a4812b4f7296f

                            SHA1

                            028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                            SHA256

                            0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                            SHA512

                            857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\libcurlpp.dll

                            Filesize

                            54KB

                            MD5

                            e6e578373c2e416289a8da55f1dc5e8e

                            SHA1

                            b601a229b66ec3d19c2369b36216c6f6eb1c063e

                            SHA256

                            43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                            SHA512

                            9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\libgcc_s_dw2-1.dll

                            Filesize

                            113KB

                            MD5

                            9aec524b616618b0d3d00b27b6f51da1

                            SHA1

                            64264300801a353db324d11738ffed876550e1d3

                            SHA256

                            59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                            SHA512

                            0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\libstdc++-6.dll

                            Filesize

                            647KB

                            MD5

                            5e279950775baae5fea04d2cc4526bcc

                            SHA1

                            8aef1e10031c3629512c43dd8b0b5d9060878453

                            SHA256

                            97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                            SHA512

                            666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\libwinpthread-1.dll

                            Filesize

                            69KB

                            MD5

                            1e0d62c34ff2e649ebc5c372065732ee

                            SHA1

                            fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                            SHA256

                            509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                            SHA512

                            3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                          • C:\Users\Admin\AppData\Local\Temp\7zS47AA5DB7\setup_install.exe

                            Filesize

                            287KB

                            MD5

                            55ab593b5eb8ec1e1fd06be8730df3d7

                            SHA1

                            dc15bde4ba775b9839472735c0ec13577aa2bf79

                            SHA256

                            020463cd59e09900861e72453b1b1516ea628532b7441192c07272f8356d1179

                            SHA512

                            bec85c4f9f201785d13faf6dbe6267c0a685e4c1272046d5aa231304b6ed7b80ce25e6e6d7f807ede53880bce311a0902e06518c897605b6dc4a27b77a39749f

                          • C:\Users\Admin\AppData\Local\Temp\CC4F.tmp

                            Filesize

                            1.6MB

                            MD5

                            4f3387277ccbd6d1f21ac5c07fe4ca68

                            SHA1

                            e16506f662dc92023bf82def1d621497c8ab5890

                            SHA256

                            767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                            SHA512

                            9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

                          • C:\Users\Admin\AppData\Local\Temp\axhub.dat

                            Filesize

                            551KB

                            MD5

                            13abe7637d904829fbb37ecda44a1670

                            SHA1

                            de26b60d2c0b1660220caf3f4a11dfabaa0e7b9f

                            SHA256

                            7a20b34c0f9b516007d40a570eafb782028c5613138e8b9697ca398b0b3420d6

                            SHA512

                            6e02ca1282f3d1bbbb684046eb5dcef412366a0ed2276c1f22d2f16b978647c0e35a8d728a0349f022295b0aba30139b2b8bb75b92aa5fdcc18aae9dcf357d77

                          • C:\Users\Admin\AppData\Local\Temp\axhub.dll

                            Filesize

                            44KB

                            MD5

                            7b61795697b50fb19d1f20bd8a234b67

                            SHA1

                            5134692d456da79579e9183c50db135485e95201

                            SHA256

                            d37e99805cee2a2a4d59542b88d1dfc23c7b166186666feef51f8751e940b174

                            SHA512

                            903f0e4a5d676be49abf5464e12a58b3908406a159ceb1b41534dc9b0a29854e6fa0b9bb471b68d802a1a1d773523490381ef5cebdd9f27aeb26947bc4970a35

                          • C:\Users\Admin\AppData\Local\Temp\axhub.dll.lnk

                            Filesize

                            796B

                            MD5

                            57521163edf7f88f644a904ffa9c877b

                            SHA1

                            f29fcfa68706b69bbded5b26079e11e1199c6eb2

                            SHA256

                            7ae3364d8dd65f9f716a65a12e81c7f84c6aeeaff8266b40e0953b737b7ebccf

                            SHA512

                            0f4dcf8a23297ca92f816ab2bbe2c6aa58e4815c45d2e9fd8057facd6fc5b1c37442816fa69a825bef05666fdea96d8959e6ee98304377b31ef8fe78bd476928

                          • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

                            Filesize

                            31B

                            MD5

                            b7161c0845a64ff6d7345b67ff97f3b0

                            SHA1

                            d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                            SHA256

                            fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                            SHA512

                            98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                          • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

                            Filesize

                            1KB

                            MD5

                            8856116a0da57f922640a4f9f781dfa5

                            SHA1

                            23f44fc5518ef620200de73581cc529a3be6b7d7

                            SHA256

                            c93b4de0a5560fcabb04eb34837fea992e3e096daa358e90e4f878da3f2626b2

                            SHA512

                            4ada499e60f050f3f78d6e9200bab64070853fc83323febedb818af056a4902cadaf966c134abe6c5b477cf10ca3bdd07d6a5109833b4222ad10ea13606f5d60

                          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

                            Filesize

                            184KB

                            MD5

                            7fee8223d6e4f82d6cd115a28f0b6d58

                            SHA1

                            1b89c25f25253df23426bd9ff6c9208f1202f58b

                            SHA256

                            a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                            SHA512

                            3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

                            Filesize

                            61KB

                            MD5

                            a6279ec92ff948760ce53bba817d6a77

                            SHA1

                            5345505e12f9e4c6d569a226d50e71b5a572dce2

                            SHA256

                            8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                            SHA512

                            213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                          • memory/512-148-0x000001CA615B0000-0x000001CA615FC000-memory.dmp

                            Filesize

                            304KB

                          • memory/512-146-0x000001CA61CD0000-0x000001CA61D41000-memory.dmp

                            Filesize

                            452KB

                          • memory/512-145-0x000001CA615B0000-0x000001CA615FC000-memory.dmp

                            Filesize

                            304KB

                          • memory/1128-165-0x0000027351940000-0x00000273519B1000-memory.dmp

                            Filesize

                            452KB

                          • memory/1172-161-0x0000024FBCE10000-0x0000024FBCE81000-memory.dmp

                            Filesize

                            452KB

                          • memory/1368-185-0x0000026E2A400000-0x0000026E2A471000-memory.dmp

                            Filesize

                            452KB

                          • memory/1480-127-0x0000000000400000-0x00000000043C8000-memory.dmp

                            Filesize

                            63.8MB

                          • memory/1536-173-0x00000285FC320000-0x00000285FC391000-memory.dmp

                            Filesize

                            452KB

                          • memory/1588-177-0x0000020E757B0000-0x0000020E75821000-memory.dmp

                            Filesize

                            452KB

                          • memory/1716-169-0x0000029904740000-0x00000299047B1000-memory.dmp

                            Filesize

                            452KB

                          • memory/2632-150-0x000001C78BCD0000-0x000001C78BD41000-memory.dmp

                            Filesize

                            452KB

                          • memory/2648-101-0x0000000006640000-0x000000000665E000-memory.dmp

                            Filesize

                            120KB

                          • memory/2648-116-0x0000000008F90000-0x00000000095A8000-memory.dmp

                            Filesize

                            6.1MB

                          • memory/2648-117-0x0000000009620000-0x0000000009632000-memory.dmp

                            Filesize

                            72KB

                          • memory/2648-128-0x0000000009820000-0x000000000992A000-memory.dmp

                            Filesize

                            1.0MB

                          • memory/2648-123-0x0000000009690000-0x00000000096DC000-memory.dmp

                            Filesize

                            304KB

                          • memory/2648-98-0x00000000062F0000-0x0000000006310000-memory.dmp

                            Filesize

                            128KB

                          • memory/2648-100-0x00000000089E0000-0x0000000008F84000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/2648-118-0x0000000009640000-0x000000000967C000-memory.dmp

                            Filesize

                            240KB

                          • memory/2808-181-0x0000016C39990000-0x0000016C39A01000-memory.dmp

                            Filesize

                            452KB

                          • memory/2824-157-0x0000017C1C8D0000-0x0000017C1C941000-memory.dmp

                            Filesize

                            452KB

                          • memory/2844-49-0x000000006B440000-0x000000006B4CF000-memory.dmp

                            Filesize

                            572KB

                          • memory/2844-56-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/2844-64-0x0000000000400000-0x000000000051E000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2844-55-0x0000000064940000-0x0000000064959000-memory.dmp

                            Filesize

                            100KB

                          • memory/2844-62-0x0000000000400000-0x000000000051E000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2844-66-0x0000000000400000-0x000000000051E000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2844-52-0x0000000000EB0000-0x0000000000F3F000-memory.dmp

                            Filesize

                            572KB

                          • memory/2844-65-0x0000000000400000-0x000000000051E000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2844-61-0x000000006B280000-0x000000006B2A6000-memory.dmp

                            Filesize

                            152KB

                          • memory/2844-138-0x000000006B440000-0x000000006B4CF000-memory.dmp

                            Filesize

                            572KB

                          • memory/2844-134-0x000000006EB40000-0x000000006EB63000-memory.dmp

                            Filesize

                            140KB

                          • memory/2844-34-0x0000000000400000-0x000000000051E000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2844-140-0x0000000064940000-0x0000000064959000-memory.dmp

                            Filesize

                            100KB

                          • memory/2844-139-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/2844-54-0x0000000064941000-0x000000006494F000-memory.dmp

                            Filesize

                            56KB

                          • memory/2844-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/2844-137-0x000000006B280000-0x000000006B2A6000-memory.dmp

                            Filesize

                            152KB

                          • memory/2844-67-0x0000000000400000-0x000000000051E000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2844-57-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/2844-136-0x0000000000400000-0x000000000051E000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2844-47-0x000000006B440000-0x000000006B4CF000-memory.dmp

                            Filesize

                            572KB

                          • memory/2844-48-0x000000006B440000-0x000000006B4CF000-memory.dmp

                            Filesize

                            572KB

                          • memory/2844-53-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/2844-63-0x0000000000400000-0x000000000051E000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2844-50-0x000000006B280000-0x000000006B2A6000-memory.dmp

                            Filesize

                            152KB

                          • memory/2844-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/2844-60-0x000000006B280000-0x000000006B2A6000-memory.dmp

                            Filesize

                            152KB

                          • memory/2844-51-0x000000006B440000-0x000000006B4CF000-memory.dmp

                            Filesize

                            572KB

                          • memory/2972-231-0x0000000000400000-0x0000000000422000-memory.dmp

                            Filesize

                            136KB

                          • memory/2972-224-0x0000000000400000-0x0000000000422000-memory.dmp

                            Filesize

                            136KB

                          • memory/3060-220-0x0000000000400000-0x000000000041E000-memory.dmp

                            Filesize

                            120KB

                          • memory/3424-89-0x0000000005290000-0x0000000005306000-memory.dmp

                            Filesize

                            472KB

                          • memory/3424-88-0x0000000000A20000-0x0000000000A84000-memory.dmp

                            Filesize

                            400KB

                          • memory/3424-96-0x0000000002C70000-0x0000000002C8E000-memory.dmp

                            Filesize

                            120KB

                          • memory/3536-153-0x000001DF94800000-0x000001DF94871000-memory.dmp

                            Filesize

                            452KB

                          • memory/4548-126-0x0000000000400000-0x000000000045B000-memory.dmp

                            Filesize

                            364KB

                          • memory/4940-115-0x0000000001530000-0x0000000001536000-memory.dmp

                            Filesize

                            24KB

                          • memory/4940-105-0x0000000001510000-0x0000000001536000-memory.dmp

                            Filesize

                            152KB

                          • memory/4940-99-0x0000000001500000-0x0000000001506000-memory.dmp

                            Filesize

                            24KB

                          • memory/4940-97-0x0000000000D30000-0x0000000000D66000-memory.dmp

                            Filesize

                            216KB