Analysis

  • max time kernel
    53s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    03-08-2021 10:02

General

  • Target

    cf474d186c9d81aa7d9ba7837754cca0.exe

  • Size

    100KB

  • MD5

    cf474d186c9d81aa7d9ba7837754cca0

  • SHA1

    caa5640f4085238c0c84a191a38d85aaaa6e42fe

  • SHA256

    3cc3678682dc887a9f5e168717967fc266e266a5fd5dfe10e210d26b7246e5c4

  • SHA512

    c2e1dba69d89ca28ac5306d57922f2ac2e90cdb0b15846bc963a472b9bf87874c0fb9ec5435091ad59fe4b6d7deec6719369bea12af3267011fcd02f0948f960

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf474d186c9d81aa7d9ba7837754cca0.exe
    "C:\Users\Admin\AppData\Local\Temp\cf474d186c9d81aa7d9ba7837754cca0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Users\Admin\AppData\Local\Temp\fl.exe
      "C:\Users\Admin\AppData\Local\Temp\fl.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Windows\system32\cmd.exe
        "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:516
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1000
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:764
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:872
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:792
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\fl.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1592
        • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
          C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\fl.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1316
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1620
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'
              6⤵
              • Creates scheduled task(s)
              PID:1932
          • C:\Windows\system32\services32.exe
            "C:\Windows\system32\services32.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1196
            • C:\Windows\system32\cmd.exe
              "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1924
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
                7⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:484
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
                7⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1488
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
                7⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:632
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
                7⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:956
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1592
              • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
                C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1384
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit
                  8⤵
                    PID:1952
                    • C:\Windows\system32\schtasks.exe
                      schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'
                      9⤵
                      • Creates scheduled task(s)
                      PID:436
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"
                    8⤵
                      PID:1660
                      • C:\Windows\system32\choice.exe
                        choice /C Y /N /D Y /T 3
                        9⤵
                          PID:640
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1760
                  • C:\Windows\system32\choice.exe
                    choice /C Y /N /D Y /T 3
                    6⤵
                      PID:1992

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Scheduled Task

          1
          T1053

          Credential Access

          Credentials in Files

          2
          T1081

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          1
          T1082

          Collection

          Data from Local System

          2
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_18f8e445-9f4e-4156-8d9f-baa2eedd8742
            MD5

            2d5cd190b5db0620cd62e3cd6ba1dcd3

            SHA1

            ff4f229f4fbacccdf11d98c04ba756bda80aac7a

            SHA256

            ab9aee31b3411bcc5a5fb51e9375777cca79cfb3a532d93ddd98a5673c60571d

            SHA512

            edb2a46f3ee33b48f8fe0b548c1e7940978d0e4ac90d5090807d8b5c8b1320217e5d66990b1d0a85546acbbaf9b601590d35de87de234da8eafd60d12fdce610

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_27752968-d288-494e-a164-9da5905f4a63
            MD5

            faa37917b36371249ac9fcf93317bf97

            SHA1

            a0f0d84d58ee518d33a69f5f1c343aa921c8ffd4

            SHA256

            b92f1a891dbe4152a1f834774cc83378d8b4cffb7e344a813219d74ec4084132

            SHA512

            614d3692e5be7554a72a38af408458254af271eaf6855f322ae07aaa647b1478c7ad13027285c8d9999db3739d65ac85ecfdf3e56acca8484083aa0e31de2198

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_37464c41-8266-48b0-8fe3-6ffdd23e6215
            MD5

            6f0d509e28be1af95ba237d4f43adab4

            SHA1

            c665febe79e435843553bee86a6cea731ce6c5e4

            SHA256

            f545be30e70cd6e1b70e98239219735f6b61c25712720bb1e1738f02be900e7e

            SHA512

            8dbadc140fd18eb16e2a282e3a0a895299b124850e7b9454a3f24e1cc1c090c5bebfbff5062e8807369e84ed7359e0854722cfd45b9a63681f9fea8c97fab797

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6bf78b6e-c6eb-4039-9c39-9d89c7ff61ae
            MD5

            a70ee38af4bb2b5ed3eeb7cbd1a12fa3

            SHA1

            81dbaeae4b0f9e1adc0a1e3d6d76a12396498ba9

            SHA256

            dd2f41f92f19c3fe031bdf5da68ab06768e26762d0077b290cd0094df1d5d58d

            SHA512

            8c69a5300c7545c5c4b25a0594e6813b6b7a85b5f3ae7fc5464b4074fe6f50b2f49d31cacf19bc20a02bb8e237656f1b9b2a3f6a3953e3a8478ca2adc154e0e3

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_799de6a4-7600-4644-9437-9dacee1bbdb5
            MD5

            d89968acfbd0cd60b51df04860d99896

            SHA1

            b3c29916ccb81ce98f95bbf3aa8a73de16298b29

            SHA256

            1020cc7c929cd5a4e68ccb40353ca76f427df363f0d95e456eb79db039bdb2b9

            SHA512

            b0e886cce598371b59131fed1535e220c798691bad93ef9474ba440066f5a6bd77a60966604b7a5ff6298b2e200c9dd0c8f9f04aff208b2af423480ead4e8842

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9ea83eea-978a-417d-97bb-32172e4b08a4
            MD5

            7f79b990cb5ed648f9e583fe35527aa7

            SHA1

            71b177b48c8bd745ef02c2affad79ca222da7c33

            SHA256

            080ec69d3f2abac629a0bdc314f150ad42a9a1b0a031b1d5c7b5b80051c48683

            SHA512

            20926edf7f0b990da4bd8d7ba91bd8bf7b952b75080f687afa7197a91777604688303d38b4a0a7240b558c23f2e0cd927d3590765109f8be0551f5eb050eafda

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c7fdf2eb-e3c5-447a-8b97-3af8c84ac7a6
            MD5

            e5b3ba61c3cf07deda462c9b27eb4166

            SHA1

            b324dad73048be6e27467315f82b7a5c1438a1f9

            SHA256

            b84fae85b6203a0c8c9db3ba3c050c97d6700e5c9ae27dd31c103ec1bbb02925

            SHA512

            a5936a098db2e8c0d0231fd97d73cc996ad99897fd64f0e5c6761c44b8eb2db2bff477843d326503e6027c1113da0e8e35f4227195a3cf505c5a374ebe0f67fc

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            708174c0b223ac3d8c29f7bc9ca26f57

            SHA1

            bae56160f78dd82b7af1020fcaa6169218a56879

            SHA256

            f00c66e13fec1cb3966f277d7c2d9943714cfbeb2782ba2bddb48e9aee0a7b2b

            SHA512

            fc0c31bcca88a077e6df14390d0e2d82824c70d073f548eaee8f880963dfe1083441189517c78f390b9bf4ad769c2563cc7d64d2026eb8f610b6f51dce2f9133

          • C:\Users\Admin\AppData\Local\Temp\fl.exe
            MD5

            1aaac4ca212b568d9aa332979c25e2fa

            SHA1

            906e80efdc5f5dbb7c6bb74ffc387d507d81991a

            SHA256

            73a353b47b07ab046af0164afa457af80c36b6899ae3c54f80052f1026538971

            SHA512

            5d15aa0215abdb73fb370c27a3e9d0ae9ed8d89ee50f5455545af991ade44a6ca6b14a86b7dc32bf88b8613c5242d2eb68bfd2656ef14ddd146142fd0fe32dd8

          • C:\Users\Admin\AppData\Local\Temp\fl.exe
            MD5

            1aaac4ca212b568d9aa332979c25e2fa

            SHA1

            906e80efdc5f5dbb7c6bb74ffc387d507d81991a

            SHA256

            73a353b47b07ab046af0164afa457af80c36b6899ae3c54f80052f1026538971

            SHA512

            5d15aa0215abdb73fb370c27a3e9d0ae9ed8d89ee50f5455545af991ade44a6ca6b14a86b7dc32bf88b8613c5242d2eb68bfd2656ef14ddd146142fd0fe32dd8

          • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
            MD5

            8dd9e89ffad7e22cd222dac53e0cd20e

            SHA1

            f9088319537f1e70a7574ce275708f84fb205916

            SHA256

            f5ccf4834701f27c83a51b9ff56605afe3619dc2aa78ae868ed1609d27eb3dca

            SHA512

            694210cfc7a4f551cef9228e8ca277e88627f65d17950675e83854f1c1588a171a6f1f59ae1666a403797ad4393c736b5e18cd71f1b90d14e34ebc49e7414fb6

          • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
            MD5

            8dd9e89ffad7e22cd222dac53e0cd20e

            SHA1

            f9088319537f1e70a7574ce275708f84fb205916

            SHA256

            f5ccf4834701f27c83a51b9ff56605afe3619dc2aa78ae868ed1609d27eb3dca

            SHA512

            694210cfc7a4f551cef9228e8ca277e88627f65d17950675e83854f1c1588a171a6f1f59ae1666a403797ad4393c736b5e18cd71f1b90d14e34ebc49e7414fb6

          • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
            MD5

            8dd9e89ffad7e22cd222dac53e0cd20e

            SHA1

            f9088319537f1e70a7574ce275708f84fb205916

            SHA256

            f5ccf4834701f27c83a51b9ff56605afe3619dc2aa78ae868ed1609d27eb3dca

            SHA512

            694210cfc7a4f551cef9228e8ca277e88627f65d17950675e83854f1c1588a171a6f1f59ae1666a403797ad4393c736b5e18cd71f1b90d14e34ebc49e7414fb6

          • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
            MD5

            8dd9e89ffad7e22cd222dac53e0cd20e

            SHA1

            f9088319537f1e70a7574ce275708f84fb205916

            SHA256

            f5ccf4834701f27c83a51b9ff56605afe3619dc2aa78ae868ed1609d27eb3dca

            SHA512

            694210cfc7a4f551cef9228e8ca277e88627f65d17950675e83854f1c1588a171a6f1f59ae1666a403797ad4393c736b5e18cd71f1b90d14e34ebc49e7414fb6

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
            MD5

            7966f6b861fe800396f4c93e5e5699d3

            SHA1

            8dbed38ea765d0187a0ef0ecca14ef31bc77dee2

            SHA256

            d1988f8ebffefe7c1a5ce996113a08c89fbbe2ae299e24aee91d02d4f5eb3397

            SHA512

            4e93773ef7a8c6c8ff89a900bde8df092cdf7018e3eb9d4bf52743927456155a2ee8f14ad7183112262c778bf759ec4a00c55e46a22b451675d6b0176b5ec5e6

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
            MD5

            7966f6b861fe800396f4c93e5e5699d3

            SHA1

            8dbed38ea765d0187a0ef0ecca14ef31bc77dee2

            SHA256

            d1988f8ebffefe7c1a5ce996113a08c89fbbe2ae299e24aee91d02d4f5eb3397

            SHA512

            4e93773ef7a8c6c8ff89a900bde8df092cdf7018e3eb9d4bf52743927456155a2ee8f14ad7183112262c778bf759ec4a00c55e46a22b451675d6b0176b5ec5e6

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
            MD5

            b55da23e60a50bd4965999dbec5359c0

            SHA1

            fdee69bb051eeabf2da7f3752722a7a2a057914e

            SHA256

            5a4465125421edf5697a4d3e2127576233694ea0c222538d5ce65a066b6cf0ac

            SHA512

            9dbd3549afe655c7609a33ada8ca5ca24fb531e8c104659f5ddbd4ec0a2fed82f9053c85d0efd0ff85ab8b25e86e38a6f96938f3dbcaa4c9c7f5c6621d86bf03

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
            MD5

            7966f6b861fe800396f4c93e5e5699d3

            SHA1

            8dbed38ea765d0187a0ef0ecca14ef31bc77dee2

            SHA256

            d1988f8ebffefe7c1a5ce996113a08c89fbbe2ae299e24aee91d02d4f5eb3397

            SHA512

            4e93773ef7a8c6c8ff89a900bde8df092cdf7018e3eb9d4bf52743927456155a2ee8f14ad7183112262c778bf759ec4a00c55e46a22b451675d6b0176b5ec5e6

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
            MD5

            7966f6b861fe800396f4c93e5e5699d3

            SHA1

            8dbed38ea765d0187a0ef0ecca14ef31bc77dee2

            SHA256

            d1988f8ebffefe7c1a5ce996113a08c89fbbe2ae299e24aee91d02d4f5eb3397

            SHA512

            4e93773ef7a8c6c8ff89a900bde8df092cdf7018e3eb9d4bf52743927456155a2ee8f14ad7183112262c778bf759ec4a00c55e46a22b451675d6b0176b5ec5e6

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
            MD5

            b55da23e60a50bd4965999dbec5359c0

            SHA1

            fdee69bb051eeabf2da7f3752722a7a2a057914e

            SHA256

            5a4465125421edf5697a4d3e2127576233694ea0c222538d5ce65a066b6cf0ac

            SHA512

            9dbd3549afe655c7609a33ada8ca5ca24fb531e8c104659f5ddbd4ec0a2fed82f9053c85d0efd0ff85ab8b25e86e38a6f96938f3dbcaa4c9c7f5c6621d86bf03

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
            MD5

            b55da23e60a50bd4965999dbec5359c0

            SHA1

            fdee69bb051eeabf2da7f3752722a7a2a057914e

            SHA256

            5a4465125421edf5697a4d3e2127576233694ea0c222538d5ce65a066b6cf0ac

            SHA512

            9dbd3549afe655c7609a33ada8ca5ca24fb531e8c104659f5ddbd4ec0a2fed82f9053c85d0efd0ff85ab8b25e86e38a6f96938f3dbcaa4c9c7f5c6621d86bf03

          • C:\Windows\System32\services32.exe
            MD5

            1aaac4ca212b568d9aa332979c25e2fa

            SHA1

            906e80efdc5f5dbb7c6bb74ffc387d507d81991a

            SHA256

            73a353b47b07ab046af0164afa457af80c36b6899ae3c54f80052f1026538971

            SHA512

            5d15aa0215abdb73fb370c27a3e9d0ae9ed8d89ee50f5455545af991ade44a6ca6b14a86b7dc32bf88b8613c5242d2eb68bfd2656ef14ddd146142fd0fe32dd8

          • C:\Windows\system32\services32.exe
            MD5

            1aaac4ca212b568d9aa332979c25e2fa

            SHA1

            906e80efdc5f5dbb7c6bb74ffc387d507d81991a

            SHA256

            73a353b47b07ab046af0164afa457af80c36b6899ae3c54f80052f1026538971

            SHA512

            5d15aa0215abdb73fb370c27a3e9d0ae9ed8d89ee50f5455545af991ade44a6ca6b14a86b7dc32bf88b8613c5242d2eb68bfd2656ef14ddd146142fd0fe32dd8

          • \??\PIPE\srvsvc
            MD5

            d41d8cd98f00b204e9800998ecf8427e

            SHA1

            da39a3ee5e6b4b0d3255bfef95601890afd80709

            SHA256

            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

            SHA512

            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

          • \??\PIPE\srvsvc
            MD5

            d41d8cd98f00b204e9800998ecf8427e

            SHA1

            da39a3ee5e6b4b0d3255bfef95601890afd80709

            SHA256

            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

            SHA512

            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

          • \Users\Admin\AppData\Local\Temp\fl.exe
            MD5

            1aaac4ca212b568d9aa332979c25e2fa

            SHA1

            906e80efdc5f5dbb7c6bb74ffc387d507d81991a

            SHA256

            73a353b47b07ab046af0164afa457af80c36b6899ae3c54f80052f1026538971

            SHA512

            5d15aa0215abdb73fb370c27a3e9d0ae9ed8d89ee50f5455545af991ade44a6ca6b14a86b7dc32bf88b8613c5242d2eb68bfd2656ef14ddd146142fd0fe32dd8

          • \Users\Admin\AppData\Local\Temp\svchost32.exe
            MD5

            8dd9e89ffad7e22cd222dac53e0cd20e

            SHA1

            f9088319537f1e70a7574ce275708f84fb205916

            SHA256

            f5ccf4834701f27c83a51b9ff56605afe3619dc2aa78ae868ed1609d27eb3dca

            SHA512

            694210cfc7a4f551cef9228e8ca277e88627f65d17950675e83854f1c1588a171a6f1f59ae1666a403797ad4393c736b5e18cd71f1b90d14e34ebc49e7414fb6

          • \Users\Admin\AppData\Local\Temp\svchost32.exe
            MD5

            8dd9e89ffad7e22cd222dac53e0cd20e

            SHA1

            f9088319537f1e70a7574ce275708f84fb205916

            SHA256

            f5ccf4834701f27c83a51b9ff56605afe3619dc2aa78ae868ed1609d27eb3dca

            SHA512

            694210cfc7a4f551cef9228e8ca277e88627f65d17950675e83854f1c1588a171a6f1f59ae1666a403797ad4393c736b5e18cd71f1b90d14e34ebc49e7414fb6

          • \Windows\System32\services32.exe
            MD5

            1aaac4ca212b568d9aa332979c25e2fa

            SHA1

            906e80efdc5f5dbb7c6bb74ffc387d507d81991a

            SHA256

            73a353b47b07ab046af0164afa457af80c36b6899ae3c54f80052f1026538971

            SHA512

            5d15aa0215abdb73fb370c27a3e9d0ae9ed8d89ee50f5455545af991ade44a6ca6b14a86b7dc32bf88b8613c5242d2eb68bfd2656ef14ddd146142fd0fe32dd8

          • memory/308-60-0x0000000000FC0000-0x0000000000FC1000-memory.dmp
            Filesize

            4KB

          • memory/308-62-0x00000000003F0000-0x00000000003F1000-memory.dmp
            Filesize

            4KB

          • memory/436-198-0x0000000000000000-mapping.dmp
          • memory/484-151-0x0000000000000000-mapping.dmp
          • memory/484-160-0x000000001AB64000-0x000000001AB66000-memory.dmp
            Filesize

            8KB

          • memory/484-159-0x000000001AB60000-0x000000001AB62000-memory.dmp
            Filesize

            8KB

          • memory/516-69-0x0000000000000000-mapping.dmp
          • memory/632-179-0x000000001ABA4000-0x000000001ABA6000-memory.dmp
            Filesize

            8KB

          • memory/632-178-0x000000001ABA0000-0x000000001ABA2000-memory.dmp
            Filesize

            8KB

          • memory/632-171-0x0000000000000000-mapping.dmp
          • memory/640-200-0x0000000000000000-mapping.dmp
          • memory/764-96-0x0000000000000000-mapping.dmp
          • memory/764-104-0x000000001AA90000-0x000000001AA91000-memory.dmp
            Filesize

            4KB

          • memory/764-101-0x000000001AB60000-0x000000001AB62000-memory.dmp
            Filesize

            8KB

          • memory/764-99-0x0000000001D50000-0x0000000001D51000-memory.dmp
            Filesize

            4KB

          • memory/764-102-0x000000001AB64000-0x000000001AB66000-memory.dmp
            Filesize

            8KB

          • memory/764-100-0x000000001ABE0000-0x000000001ABE1000-memory.dmp
            Filesize

            4KB

          • memory/764-103-0x000000001AA60000-0x000000001AA61000-memory.dmp
            Filesize

            4KB

          • memory/792-129-0x000000001ACD0000-0x000000001ACD2000-memory.dmp
            Filesize

            8KB

          • memory/792-130-0x000000001ACD4000-0x000000001ACD6000-memory.dmp
            Filesize

            8KB

          • memory/792-123-0x0000000000000000-mapping.dmp
          • memory/872-113-0x0000000000000000-mapping.dmp
          • memory/872-120-0x000000001AC44000-0x000000001AC46000-memory.dmp
            Filesize

            8KB

          • memory/872-119-0x000000001AC40000-0x000000001AC42000-memory.dmp
            Filesize

            8KB

          • memory/956-187-0x000000001AC80000-0x000000001AC82000-memory.dmp
            Filesize

            8KB

          • memory/956-188-0x000000001AC84000-0x000000001AC86000-memory.dmp
            Filesize

            8KB

          • memory/956-180-0x0000000000000000-mapping.dmp
          • memory/1000-73-0x00000000023D0000-0x00000000023D1000-memory.dmp
            Filesize

            4KB

          • memory/1000-79-0x000000001A950000-0x000000001A951000-memory.dmp
            Filesize

            4KB

          • memory/1000-70-0x0000000000000000-mapping.dmp
          • memory/1000-71-0x000007FEFC661000-0x000007FEFC663000-memory.dmp
            Filesize

            8KB

          • memory/1000-74-0x000000001AB00000-0x000000001AB01000-memory.dmp
            Filesize

            4KB

          • memory/1000-75-0x00000000025A0000-0x00000000025A1000-memory.dmp
            Filesize

            4KB

          • memory/1000-76-0x000000001AA80000-0x000000001AA82000-memory.dmp
            Filesize

            8KB

          • memory/1000-77-0x000000001AA84000-0x000000001AA86000-memory.dmp
            Filesize

            8KB

          • memory/1000-95-0x000000001AA70000-0x000000001AA71000-memory.dmp
            Filesize

            4KB

          • memory/1000-78-0x0000000002780000-0x0000000002781000-memory.dmp
            Filesize

            4KB

          • memory/1000-94-0x000000001A9A0000-0x000000001A9A1000-memory.dmp
            Filesize

            4KB

          • memory/1000-82-0x000000001AA30000-0x000000001AA31000-memory.dmp
            Filesize

            4KB

          • memory/1196-153-0x0000000002530000-0x0000000002532000-memory.dmp
            Filesize

            8KB

          • memory/1196-147-0x000000013F440000-0x000000013F441000-memory.dmp
            Filesize

            4KB

          • memory/1196-143-0x0000000000000000-mapping.dmp
          • memory/1316-134-0x0000000000000000-mapping.dmp
          • memory/1316-137-0x000000013FBE0000-0x000000013FBE1000-memory.dmp
            Filesize

            4KB

          • memory/1316-140-0x000000001ABC0000-0x000000001ABC2000-memory.dmp
            Filesize

            8KB

          • memory/1384-197-0x000000001BD60000-0x000000001BD62000-memory.dmp
            Filesize

            8KB

          • memory/1384-191-0x0000000000000000-mapping.dmp
          • memory/1488-169-0x000000001AC14000-0x000000001AC16000-memory.dmp
            Filesize

            8KB

          • memory/1488-168-0x000000001AC10000-0x000000001AC12000-memory.dmp
            Filesize

            8KB

          • memory/1488-162-0x0000000000000000-mapping.dmp
          • memory/1592-132-0x0000000000000000-mapping.dmp
          • memory/1592-189-0x0000000000000000-mapping.dmp
          • memory/1620-139-0x0000000000000000-mapping.dmp
          • memory/1660-199-0x0000000000000000-mapping.dmp
          • memory/1760-145-0x0000000000000000-mapping.dmp
          • memory/1764-72-0x000000001BE00000-0x000000001BE02000-memory.dmp
            Filesize

            8KB

          • memory/1764-67-0x000000013F160000-0x000000013F161000-memory.dmp
            Filesize

            4KB

          • memory/1764-64-0x0000000000000000-mapping.dmp
          • memory/1924-149-0x0000000000000000-mapping.dmp
          • memory/1932-141-0x0000000000000000-mapping.dmp
          • memory/1952-196-0x0000000000000000-mapping.dmp
          • memory/1992-150-0x0000000000000000-mapping.dmp