Analysis

  • max time kernel
    144s
  • max time network
    159s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    09-08-2021 02:41

General

  • Target

    0337E24C1287C195321A477CB6B71AB3.exe

  • Size

    15KB

  • MD5

    0337e24c1287c195321a477cb6b71ab3

  • SHA1

    145823c8665a1761c41b7b1c699b242badf553d5

  • SHA256

    26e94627a3abe752072319b8eca4f68029a27090f89de5b92d4f700fc0f4f0b2

  • SHA512

    97303432aaec89988991d8489868e92ad6153e7a2a9addac3af275e01671562fc71931d65d805ec17ef3379d72c56e313cea3fbf58b40b71d6a18e14ed3a5459

Malware Config

Extracted

Family

redline

Botnet

UPD

C2

193.56.146.78:54955

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 2 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

    suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

  • suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)

    suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)

  • suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)

    suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)

  • suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

    suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

  • Nirsoft 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 16 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 16 IoCs
  • Modifies registry class 16 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s SENS
    1⤵
      PID:1396
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2728
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s WpnService
      1⤵
        PID:2720
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s Browser
        1⤵
          PID:2712
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
          1⤵
            PID:2420
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
            1⤵
              PID:2400
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
              1⤵
                PID:1868
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                1⤵
                  PID:1408
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s Themes
                  1⤵
                    PID:1176
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                    1⤵
                      PID:1100
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                      1⤵
                        PID:1036
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
                        1⤵
                          PID:296
                        • C:\Users\Admin\AppData\Local\Temp\0337E24C1287C195321A477CB6B71AB3.exe
                          "C:\Users\Admin\AppData\Local\Temp\0337E24C1287C195321A477CB6B71AB3.exe"
                          1⤵
                          • Windows security modification
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:992
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "powershell" Get-MpPreference -verbose
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1016
                          • C:\Users\Admin\Documents\LY4G3P8QFC9SOI2UK282ZI4VC.exe
                            "C:\Users\Admin\Documents\LY4G3P8QFC9SOI2UK282ZI4VC.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:1152
                            • C:\Users\Admin\AppData\Roaming\4837905.exe
                              "C:\Users\Admin\AppData\Roaming\4837905.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1236
                              • C:\Windows\system32\WerFault.exe
                                C:\Windows\system32\WerFault.exe -u -p 1236 -s 1680
                                4⤵
                                • Program crash
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4780
                            • C:\Users\Admin\AppData\Roaming\7429413.exe
                              "C:\Users\Admin\AppData\Roaming\7429413.exe"
                              3⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Suspicious use of WriteProcessMemory
                              PID:2344
                              • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                                4⤵
                                • Executes dropped EXE
                                PID:4268
                            • C:\Users\Admin\AppData\Roaming\7124066.exe
                              "C:\Users\Admin\AppData\Roaming\7124066.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3188
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 3188 -s 1848
                                4⤵
                                • Drops file in Windows directory
                                • Program crash
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4852
                            • C:\Users\Admin\AppData\Roaming\2971079.exe
                              "C:\Users\Admin\AppData\Roaming\2971079.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2648
                          • C:\Users\Admin\Documents\9GB24453D4GRXS12Z7CMUIOUZ.exe
                            "C:\Users\Admin\Documents\9GB24453D4GRXS12Z7CMUIOUZ.exe"
                            2⤵
                            • Executes dropped EXE
                            • Modifies system certificate store
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:3708
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /c taskkill /f /im chrome.exe
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4200
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /f /im chrome.exe
                                4⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4644
                          • C:\Users\Admin\Documents\LJEFGL2INURGH4106A8P8QNFG.exe
                            "C:\Users\Admin\Documents\LJEFGL2INURGH4106A8P8QNFG.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3548
                          • C:\Users\Admin\Documents\XXOMQC4JER28RXHDTPNFWII4J.exe
                            "C:\Users\Admin\Documents\XXOMQC4JER28RXHDTPNFWII4J.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:3852
                            • C:\Users\Admin\AppData\Local\Temp\11111.exe
                              C:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                              3⤵
                              • Executes dropped EXE
                              PID:1440
                            • C:\Users\Admin\AppData\Local\Temp\11111.exe
                              C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                              3⤵
                              • Executes dropped EXE
                              PID:2736
                            • C:\Users\Admin\AppData\Local\Temp\11111.exe
                              C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                              3⤵
                              • Executes dropped EXE
                              PID:3860
                            • C:\Users\Admin\AppData\Local\Temp\11111.exe
                              C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                              3⤵
                              • Executes dropped EXE
                              PID:4944
                            • C:\Windows\system32\WerFault.exe
                              C:\Windows\system32\WerFault.exe -u -p 3852 -s 1620
                              3⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              • Program crash
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4492
                          • C:\Users\Admin\Documents\Q2N3M0VHY7K6OHYD9F78HUI8Z.exe
                            "C:\Users\Admin\Documents\Q2N3M0VHY7K6OHYD9F78HUI8Z.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:2884
                            • C:\Users\Admin\Documents\Q2N3M0VHY7K6OHYD9F78HUI8Z.exe
                              "C:\Users\Admin\Documents\Q2N3M0VHY7K6OHYD9F78HUI8Z.exe" -q
                              3⤵
                              • Executes dropped EXE
                              PID:3192
                          • C:\Users\Admin\Documents\I9HOYOA4HBOQPC1QW7PD2NH9B.exe
                            "C:\Users\Admin\Documents\I9HOYOA4HBOQPC1QW7PD2NH9B.exe"
                            2⤵
                            • Executes dropped EXE
                            • Checks whether UAC is enabled
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3872
                        • \??\c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k netsvcs -s BITS
                          1⤵
                          • Suspicious use of SetThreadContext
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1416
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k SystemNetworkService
                            2⤵
                            • Drops file in System32 directory
                            • Checks processor information in registry
                            • Modifies data under HKEY_USERS
                            • Modifies registry class
                            PID:4568
                        • C:\Windows\system32\rundll32.exe
                          rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                          1⤵
                          • Process spawned unexpected child process
                          • Suspicious use of WriteProcessMemory
                          PID:5112
                          • C:\Windows\SysWOW64\rundll32.exe
                            rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                            2⤵
                            • Loads dropped DLL
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:1136

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
                          MD5

                          f7dcb24540769805e5bb30d193944dce

                          SHA1

                          e26c583c562293356794937d9e2e6155d15449ee

                          SHA256

                          6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

                          SHA512

                          cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
                          MD5

                          6adf62fa9bcc9833da0d28d797f7de79

                          SHA1

                          20691dbf4afc6f72041cf4026c1656b09df1d4c0

                          SHA256

                          c1e8effe82b5e3714a32221460b07a8324aa08f69de3eba89070b425b578b9d6

                          SHA512

                          5c16aea010eed60fac3b80e1de7a0fc65b72b9b31f0740eb248c4942c58bd101cd3240f645525fc7c5db57353d3e2c9d88b153d142804d0c57fdc88abc9f1d9c

                        • C:\Users\Admin\AppData\Local\Temp\11111.exe
                          MD5

                          cc0d6b6813f92dbf5be3ecacf44d662a

                          SHA1

                          b968c57a14ddada4128356f6e39fb66c6d864d3f

                          SHA256

                          0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                          SHA512

                          4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                        • C:\Users\Admin\AppData\Local\Temp\11111.exe
                          MD5

                          cc0d6b6813f92dbf5be3ecacf44d662a

                          SHA1

                          b968c57a14ddada4128356f6e39fb66c6d864d3f

                          SHA256

                          0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                          SHA512

                          4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                        • C:\Users\Admin\AppData\Local\Temp\11111.exe
                          MD5

                          cc0d6b6813f92dbf5be3ecacf44d662a

                          SHA1

                          b968c57a14ddada4128356f6e39fb66c6d864d3f

                          SHA256

                          0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                          SHA512

                          4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                        • C:\Users\Admin\AppData\Local\Temp\11111.exe
                          MD5

                          cc0d6b6813f92dbf5be3ecacf44d662a

                          SHA1

                          b968c57a14ddada4128356f6e39fb66c6d864d3f

                          SHA256

                          0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                          SHA512

                          4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                        • C:\Users\Admin\AppData\Local\Temp\11111.exe
                          MD5

                          cc0d6b6813f92dbf5be3ecacf44d662a

                          SHA1

                          b968c57a14ddada4128356f6e39fb66c6d864d3f

                          SHA256

                          0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                          SHA512

                          4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                        • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                          MD5

                          b7161c0845a64ff6d7345b67ff97f3b0

                          SHA1

                          d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                          SHA256

                          fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                          SHA512

                          98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                        • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                          MD5

                          b7161c0845a64ff6d7345b67ff97f3b0

                          SHA1

                          d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                          SHA256

                          fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                          SHA512

                          98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                        • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                          MD5

                          b7161c0845a64ff6d7345b67ff97f3b0

                          SHA1

                          d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                          SHA256

                          fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                          SHA512

                          98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                        • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                          MD5

                          b7161c0845a64ff6d7345b67ff97f3b0

                          SHA1

                          d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                          SHA256

                          fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                          SHA512

                          98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                        • C:\Users\Admin\AppData\Local\Temp\sqlite.dat
                          MD5

                          266267be53bbea16010d282401d23a4a

                          SHA1

                          fad116b5265e4c957c68581ff9c9dea6c73ab81f

                          SHA256

                          e96f5a7e5ff1b4115263ea102416b29efd2ebd756ea0556a121067f132ae2169

                          SHA512

                          d176afb96d7c24760f72ba8a9c2ba915cb0457159db7815117f3a423235b98b5d3ef2fb379fb34817b92883dad0e587a73eb5471dce9801bf7b022d15070d63c

                        • C:\Users\Admin\AppData\Local\Temp\sqlite.dll
                          MD5

                          829c4eacad9a7d2a1cb15392007a9a99

                          SHA1

                          e21d4d178c90adadc8cc5d93db3ea9a42d1eaf30

                          SHA256

                          cfa573ccafb459b7281d9183962ad7510e7161ea79ce66bcf4affde1b2b82aec

                          SHA512

                          7ece8e670aa3dc87457c11f12558e789802475325a13c47874c0876d493d4a270cc348ebed7f49f52a6802667eecd92cddb314caf72f77b629c3cb040ccdecea

                        • C:\Users\Admin\AppData\Roaming\2971079.exe
                          MD5

                          237a01f4ef3fd3cb900f6d90d151e358

                          SHA1

                          71c120fcc89de9353335ad739f4be3bd4adacda3

                          SHA256

                          fb88585498d6248539afed1619c9c004dc979c5daf98093602fe9b0ea28efd27

                          SHA512

                          2c5fa2f7bacf927cd04740ac8206bf886af329dfa64b0a5fd543ef235aa240483f6016d933a0c9aee14928383894452ee61decf802f672fe4815b74c42906e45

                        • C:\Users\Admin\AppData\Roaming\2971079.exe
                          MD5

                          237a01f4ef3fd3cb900f6d90d151e358

                          SHA1

                          71c120fcc89de9353335ad739f4be3bd4adacda3

                          SHA256

                          fb88585498d6248539afed1619c9c004dc979c5daf98093602fe9b0ea28efd27

                          SHA512

                          2c5fa2f7bacf927cd04740ac8206bf886af329dfa64b0a5fd543ef235aa240483f6016d933a0c9aee14928383894452ee61decf802f672fe4815b74c42906e45

                        • C:\Users\Admin\AppData\Roaming\4837905.exe
                          MD5

                          2d727bc338847fe133de57a38ab9f68f

                          SHA1

                          1d8b89846d2a6e11311f672a0550e73cac495eed

                          SHA256

                          9792cbe88daccd67ec3f24015b8b7a5693a85d6c0a91811bd384f566d06c15bd

                          SHA512

                          f11772f3c08a043573202193baa96790f7f8879650d1e152097011853341ff4a197f2f614bbe38c34b194380fe349bcbce149af1d18cf5db7da3ea5232505f93

                        • C:\Users\Admin\AppData\Roaming\4837905.exe
                          MD5

                          2d727bc338847fe133de57a38ab9f68f

                          SHA1

                          1d8b89846d2a6e11311f672a0550e73cac495eed

                          SHA256

                          9792cbe88daccd67ec3f24015b8b7a5693a85d6c0a91811bd384f566d06c15bd

                          SHA512

                          f11772f3c08a043573202193baa96790f7f8879650d1e152097011853341ff4a197f2f614bbe38c34b194380fe349bcbce149af1d18cf5db7da3ea5232505f93

                        • C:\Users\Admin\AppData\Roaming\7124066.exe
                          MD5

                          65c7a654420fa25cac71c6ff3e135ed6

                          SHA1

                          9df0f0146cb1f6a8217289f68b81d520c2fc07cf

                          SHA256

                          076c2bfb41f22b6c035970397345b4e7df19a366064d7f1d6b506fb6352b9ed6

                          SHA512

                          69ce21d549a51720d01b80ad0913b7a828164e304ce8a75615cfe769f9acf3a211ce669bb57c8ce72e07ad190185d728bfc3662220db43acbae29e4296eebbfb

                        • C:\Users\Admin\AppData\Roaming\7124066.exe
                          MD5

                          65c7a654420fa25cac71c6ff3e135ed6

                          SHA1

                          9df0f0146cb1f6a8217289f68b81d520c2fc07cf

                          SHA256

                          076c2bfb41f22b6c035970397345b4e7df19a366064d7f1d6b506fb6352b9ed6

                          SHA512

                          69ce21d549a51720d01b80ad0913b7a828164e304ce8a75615cfe769f9acf3a211ce669bb57c8ce72e07ad190185d728bfc3662220db43acbae29e4296eebbfb

                        • C:\Users\Admin\AppData\Roaming\7429413.exe
                          MD5

                          1d095bc417db73c6bc6e4c4e7b43106f

                          SHA1

                          db7e49df1fb5a0a665976f98ff7128aeba40c5f3

                          SHA256

                          b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee

                          SHA512

                          3d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097

                        • C:\Users\Admin\AppData\Roaming\7429413.exe
                          MD5

                          1d095bc417db73c6bc6e4c4e7b43106f

                          SHA1

                          db7e49df1fb5a0a665976f98ff7128aeba40c5f3

                          SHA256

                          b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee

                          SHA512

                          3d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097

                        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                          MD5

                          1d095bc417db73c6bc6e4c4e7b43106f

                          SHA1

                          db7e49df1fb5a0a665976f98ff7128aeba40c5f3

                          SHA256

                          b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee

                          SHA512

                          3d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097

                        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                          MD5

                          1d095bc417db73c6bc6e4c4e7b43106f

                          SHA1

                          db7e49df1fb5a0a665976f98ff7128aeba40c5f3

                          SHA256

                          b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee

                          SHA512

                          3d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097

                        • C:\Users\Admin\Documents\9GB24453D4GRXS12Z7CMUIOUZ.exe
                          MD5

                          09bbb3e275b933030e970564ac22fe77

                          SHA1

                          a26b0b1fa8085aba01f4215af7c3347ae5ebd53c

                          SHA256

                          e5f67dca4decc6164f5fa50bb6343ee98ae743e6d04bfdb42d790feef2e4e565

                          SHA512

                          9d2300c8aebab886310e97916bfb07e1858151eb88910c7d892b7c5519aaec6a2027ee6b8f46e76b121254ac95591d98bc5b0995b99d28d2a622fcb860d19be7

                        • C:\Users\Admin\Documents\9GB24453D4GRXS12Z7CMUIOUZ.exe
                          MD5

                          09bbb3e275b933030e970564ac22fe77

                          SHA1

                          a26b0b1fa8085aba01f4215af7c3347ae5ebd53c

                          SHA256

                          e5f67dca4decc6164f5fa50bb6343ee98ae743e6d04bfdb42d790feef2e4e565

                          SHA512

                          9d2300c8aebab886310e97916bfb07e1858151eb88910c7d892b7c5519aaec6a2027ee6b8f46e76b121254ac95591d98bc5b0995b99d28d2a622fcb860d19be7

                        • C:\Users\Admin\Documents\I9HOYOA4HBOQPC1QW7PD2NH9B.exe
                          MD5

                          8e33397689414f30209a555b0ae1fe5c

                          SHA1

                          b915a1cb575c181c01b11a0f6b8a5e00e946e9c3

                          SHA256

                          45b8610362cb8b8948f0a3a193daaeca16a13798921573cd708450f478079976

                          SHA512

                          f8bfab698890515c7df76d6147e423faacd0e6d58b9e5ba9b891b56c5b62e0d1798165d510fa22b9a453e80a7e9eb511418c00158126b89aacbd7c7a43873b84

                        • C:\Users\Admin\Documents\I9HOYOA4HBOQPC1QW7PD2NH9B.exe
                          MD5

                          8e33397689414f30209a555b0ae1fe5c

                          SHA1

                          b915a1cb575c181c01b11a0f6b8a5e00e946e9c3

                          SHA256

                          45b8610362cb8b8948f0a3a193daaeca16a13798921573cd708450f478079976

                          SHA512

                          f8bfab698890515c7df76d6147e423faacd0e6d58b9e5ba9b891b56c5b62e0d1798165d510fa22b9a453e80a7e9eb511418c00158126b89aacbd7c7a43873b84

                        • C:\Users\Admin\Documents\LJEFGL2INURGH4106A8P8QNFG.exe
                          MD5

                          f947d6a85933040df750747cb102ca4b

                          SHA1

                          91e1dcb82c7174a8ffc912623efd7721714161ff

                          SHA256

                          65968ced8e381ae06e600dd18e46826c342bc57e4eb28cc97784e0976ce057b7

                          SHA512

                          ba2f72c82ef49d1dda200b84c865776d563b314df5523cb2fd628533e6e93d1a92af3c4f2b85be716f0d3a3e4c728920bba4521a52d283cd4f1388e1149a010f

                        • C:\Users\Admin\Documents\LJEFGL2INURGH4106A8P8QNFG.exe
                          MD5

                          f947d6a85933040df750747cb102ca4b

                          SHA1

                          91e1dcb82c7174a8ffc912623efd7721714161ff

                          SHA256

                          65968ced8e381ae06e600dd18e46826c342bc57e4eb28cc97784e0976ce057b7

                          SHA512

                          ba2f72c82ef49d1dda200b84c865776d563b314df5523cb2fd628533e6e93d1a92af3c4f2b85be716f0d3a3e4c728920bba4521a52d283cd4f1388e1149a010f

                        • C:\Users\Admin\Documents\LY4G3P8QFC9SOI2UK282ZI4VC.exe
                          MD5

                          bbf20f907ca5473e50b1727701a84686

                          SHA1

                          79a7f093dd5edfbf2920774f83beb2d9b97bb77c

                          SHA256

                          97a11f799b8aae5ff085e6c21ca81e21c2e5756ff85b33482d57c9afd0d31e99

                          SHA512

                          0d3de2e1f06b4f44c68d4be18e2e3855c6ab4348cb5fe2e6c097a44e145824380b511a016a85e64e0fd723d3af7ed7250f51e1e5f117698d4cbd02c5b1b46ffd

                        • C:\Users\Admin\Documents\LY4G3P8QFC9SOI2UK282ZI4VC.exe
                          MD5

                          bbf20f907ca5473e50b1727701a84686

                          SHA1

                          79a7f093dd5edfbf2920774f83beb2d9b97bb77c

                          SHA256

                          97a11f799b8aae5ff085e6c21ca81e21c2e5756ff85b33482d57c9afd0d31e99

                          SHA512

                          0d3de2e1f06b4f44c68d4be18e2e3855c6ab4348cb5fe2e6c097a44e145824380b511a016a85e64e0fd723d3af7ed7250f51e1e5f117698d4cbd02c5b1b46ffd

                        • C:\Users\Admin\Documents\Q2N3M0VHY7K6OHYD9F78HUI8Z.exe
                          MD5

                          4412eaa3c2dbe82ac9cf982b1229548d

                          SHA1

                          5a129bbd71b1d07234a47e376b1d3afc7cfca8dc

                          SHA256

                          fdcfcab9289bcfc6ae67590a2995a8a5fedb19338d9eeac1ddf61acefbd36e56

                          SHA512

                          c5b60affc5564747785452776ec7b6ecdd3ebbbb6f4285dd5fb39a4abafdb78a4e554796395fc2a4ba1334d7b950bc5f91ec0a44b57d78397c6cc2e696505bbd

                        • C:\Users\Admin\Documents\Q2N3M0VHY7K6OHYD9F78HUI8Z.exe
                          MD5

                          4412eaa3c2dbe82ac9cf982b1229548d

                          SHA1

                          5a129bbd71b1d07234a47e376b1d3afc7cfca8dc

                          SHA256

                          fdcfcab9289bcfc6ae67590a2995a8a5fedb19338d9eeac1ddf61acefbd36e56

                          SHA512

                          c5b60affc5564747785452776ec7b6ecdd3ebbbb6f4285dd5fb39a4abafdb78a4e554796395fc2a4ba1334d7b950bc5f91ec0a44b57d78397c6cc2e696505bbd

                        • C:\Users\Admin\Documents\Q2N3M0VHY7K6OHYD9F78HUI8Z.exe
                          MD5

                          4412eaa3c2dbe82ac9cf982b1229548d

                          SHA1

                          5a129bbd71b1d07234a47e376b1d3afc7cfca8dc

                          SHA256

                          fdcfcab9289bcfc6ae67590a2995a8a5fedb19338d9eeac1ddf61acefbd36e56

                          SHA512

                          c5b60affc5564747785452776ec7b6ecdd3ebbbb6f4285dd5fb39a4abafdb78a4e554796395fc2a4ba1334d7b950bc5f91ec0a44b57d78397c6cc2e696505bbd

                        • C:\Users\Admin\Documents\XXOMQC4JER28RXHDTPNFWII4J.exe
                          MD5

                          f3ff94b8971f889bb8555e94b56f58ab

                          SHA1

                          22a606a18a767474a6e69c799d06b1d53ad15c5e

                          SHA256

                          ca23812eecb2698b18ec9e22417776f425a94ef5df1cdb644d3a3c5dfcec1c4d

                          SHA512

                          0201e6e9ccc8fb04beee5b51d3b28160d20720aba2bc671f629af35a46da7c2ef8bf6a96a72d2b306c98949c16423ae7083fd7b4112a142992aaf0c044f77046

                        • C:\Users\Admin\Documents\XXOMQC4JER28RXHDTPNFWII4J.exe
                          MD5

                          f3ff94b8971f889bb8555e94b56f58ab

                          SHA1

                          22a606a18a767474a6e69c799d06b1d53ad15c5e

                          SHA256

                          ca23812eecb2698b18ec9e22417776f425a94ef5df1cdb644d3a3c5dfcec1c4d

                          SHA512

                          0201e6e9ccc8fb04beee5b51d3b28160d20720aba2bc671f629af35a46da7c2ef8bf6a96a72d2b306c98949c16423ae7083fd7b4112a142992aaf0c044f77046

                        • \Users\Admin\AppData\Local\Temp\sqlite.dll
                          MD5

                          829c4eacad9a7d2a1cb15392007a9a99

                          SHA1

                          e21d4d178c90adadc8cc5d93db3ea9a42d1eaf30

                          SHA256

                          cfa573ccafb459b7281d9183962ad7510e7161ea79ce66bcf4affde1b2b82aec

                          SHA512

                          7ece8e670aa3dc87457c11f12558e789802475325a13c47874c0876d493d4a270cc348ebed7f49f52a6802667eecd92cddb314caf72f77b629c3cb040ccdecea

                        • memory/296-499-0x0000023F3A890000-0x0000023F3A904000-memory.dmp
                          Filesize

                          464KB

                        • memory/992-114-0x0000000000090000-0x0000000000091000-memory.dmp
                          Filesize

                          4KB

                        • memory/992-366-0x00000000049F0000-0x00000000049F1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-149-0x0000000008CF0000-0x0000000008CF1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-119-0x00000000064A0000-0x00000000064A1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-120-0x0000000006B10000-0x0000000006B11000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-127-0x00000000073A0000-0x00000000073A1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-122-0x0000000006492000-0x0000000006493000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-121-0x0000000006490000-0x0000000006491000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-144-0x0000000008980000-0x0000000008981000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-126-0x0000000007530000-0x0000000007531000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-116-0x0000000000000000-mapping.dmp
                        • memory/1016-351-0x0000000006770000-0x0000000006771000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-129-0x0000000007C40000-0x0000000007C41000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-125-0x00000000074C0000-0x00000000074C1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-137-0x0000000008BA0000-0x0000000008BD3000-memory.dmp
                          Filesize

                          204KB

                        • memory/1016-123-0x0000000006A80000-0x0000000006A81000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-345-0x0000000006780000-0x0000000006781000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-128-0x0000000007930000-0x0000000007931000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-152-0x0000000008F10000-0x0000000008F11000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-150-0x000000007ED80000-0x000000007ED81000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-151-0x0000000006493000-0x0000000006494000-memory.dmp
                          Filesize

                          4KB

                        • memory/1016-124-0x0000000007270000-0x0000000007271000-memory.dmp
                          Filesize

                          4KB

                        • memory/1036-527-0x000001B2B3800000-0x000001B2B3874000-memory.dmp
                          Filesize

                          464KB

                        • memory/1100-526-0x000001D443270000-0x000001D4432E4000-memory.dmp
                          Filesize

                          464KB

                        • memory/1136-484-0x0000000004830000-0x000000000488F000-memory.dmp
                          Filesize

                          380KB

                        • memory/1136-483-0x00000000048D5000-0x00000000049D6000-memory.dmp
                          Filesize

                          1.0MB

                        • memory/1136-467-0x0000000000000000-mapping.dmp
                        • memory/1152-400-0x000000001B620000-0x000000001B622000-memory.dmp
                          Filesize

                          8KB

                        • memory/1152-383-0x0000000000EA0000-0x0000000000EA1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1152-375-0x0000000000850000-0x0000000000851000-memory.dmp
                          Filesize

                          4KB

                        • memory/1152-367-0x0000000000000000-mapping.dmp
                        • memory/1152-382-0x0000000000E80000-0x0000000000E9B000-memory.dmp
                          Filesize

                          108KB

                        • memory/1152-381-0x0000000000E70000-0x0000000000E71000-memory.dmp
                          Filesize

                          4KB

                        • memory/1176-530-0x000001A7DCAB0000-0x000001A7DCB24000-memory.dmp
                          Filesize

                          464KB

                        • memory/1236-391-0x0000000000000000-mapping.dmp
                        • memory/1236-415-0x0000000001270000-0x00000000012A1000-memory.dmp
                          Filesize

                          196KB

                        • memory/1236-422-0x000000001B8D0000-0x000000001B8D2000-memory.dmp
                          Filesize

                          8KB

                        • memory/1236-408-0x0000000001150000-0x0000000001151000-memory.dmp
                          Filesize

                          4KB

                        • memory/1236-397-0x0000000000B40000-0x0000000000B41000-memory.dmp
                          Filesize

                          4KB

                        • memory/1236-419-0x00000000012B0000-0x00000000012B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1396-528-0x000001F8395B0000-0x000001F839624000-memory.dmp
                          Filesize

                          464KB

                        • memory/1408-531-0x000001B0F0AA0000-0x000001B0F0B14000-memory.dmp
                          Filesize

                          464KB

                        • memory/1416-494-0x000002149EF50000-0x000002149EF9D000-memory.dmp
                          Filesize

                          308KB

                        • memory/1416-497-0x000002149F010000-0x000002149F084000-memory.dmp
                          Filesize

                          464KB

                        • memory/1440-464-0x0000000000000000-mapping.dmp
                        • memory/1868-529-0x0000022DD8260000-0x0000022DD82D4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2344-416-0x0000000008290000-0x0000000008291000-memory.dmp
                          Filesize

                          4KB

                        • memory/2344-398-0x0000000000000000-mapping.dmp
                        • memory/2344-404-0x0000000000F80000-0x0000000000F81000-memory.dmp
                          Filesize

                          4KB

                        • memory/2344-412-0x00000000018A0000-0x00000000018A7000-memory.dmp
                          Filesize

                          28KB

                        • memory/2344-423-0x0000000007D90000-0x0000000007D91000-memory.dmp
                          Filesize

                          4KB

                        • memory/2400-524-0x000002B85DC80000-0x000002B85DCF4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2420-523-0x00000180CA120000-0x00000180CA194000-memory.dmp
                          Filesize

                          464KB

                        • memory/2648-403-0x0000000000000000-mapping.dmp
                        • memory/2648-442-0x0000000007C60000-0x0000000007C61000-memory.dmp
                          Filesize

                          4KB

                        • memory/2648-431-0x00000000081B0000-0x00000000081B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2648-428-0x00000000052B0000-0x00000000052DB000-memory.dmp
                          Filesize

                          172KB

                        • memory/2648-426-0x00000000052E0000-0x00000000052E1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2648-418-0x00000000009B0000-0x00000000009B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2712-498-0x000001D700370000-0x000001D7003E4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2720-533-0x000002426F220000-0x000002426F294000-memory.dmp
                          Filesize

                          464KB

                        • memory/2728-532-0x0000019964560000-0x00000199645D4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2736-546-0x0000000000000000-mapping.dmp
                        • memory/2884-384-0x0000000000000000-mapping.dmp
                        • memory/3188-421-0x0000000000760000-0x0000000000761000-memory.dmp
                          Filesize

                          4KB

                        • memory/3188-429-0x0000000000AB0000-0x0000000000AF4000-memory.dmp
                          Filesize

                          272KB

                        • memory/3188-449-0x0000000004AC0000-0x0000000004AC1000-memory.dmp
                          Filesize

                          4KB

                        • memory/3188-413-0x0000000000040000-0x0000000000041000-memory.dmp
                          Filesize

                          4KB

                        • memory/3188-409-0x0000000000000000-mapping.dmp
                        • memory/3188-430-0x0000000000790000-0x0000000000791000-memory.dmp
                          Filesize

                          4KB

                        • memory/3192-387-0x0000000000000000-mapping.dmp
                        • memory/3548-448-0x0000000000400000-0x0000000002C87000-memory.dmp
                          Filesize

                          40.5MB

                        • memory/3548-458-0x00000000073E4000-0x00000000073E6000-memory.dmp
                          Filesize

                          8KB

                        • memory/3548-373-0x0000000000000000-mapping.dmp
                        • memory/3548-432-0x0000000004B40000-0x0000000004B5C000-memory.dmp
                          Filesize

                          112KB

                        • memory/3548-452-0x00000000073E2000-0x00000000073E3000-memory.dmp
                          Filesize

                          4KB

                        • memory/3548-425-0x0000000004880000-0x00000000048AF000-memory.dmp
                          Filesize

                          188KB

                        • memory/3548-451-0x00000000073E0000-0x00000000073E1000-memory.dmp
                          Filesize

                          4KB

                        • memory/3548-438-0x0000000004D50000-0x0000000004D6A000-memory.dmp
                          Filesize

                          104KB

                        • memory/3548-446-0x0000000007290000-0x0000000007291000-memory.dmp
                          Filesize

                          4KB

                        • memory/3548-453-0x00000000073E3000-0x00000000073E4000-memory.dmp
                          Filesize

                          4KB

                        • memory/3708-368-0x0000000000000000-mapping.dmp
                        • memory/3852-424-0x000001AA8A4C0000-0x000001AA8A52F000-memory.dmp
                          Filesize

                          444KB

                        • memory/3852-377-0x0000000000000000-mapping.dmp
                        • memory/3852-427-0x000001AA8A530000-0x000001AA8A5FF000-memory.dmp
                          Filesize

                          828KB

                        • memory/3860-596-0x0000000000000000-mapping.dmp
                        • memory/3872-405-0x0000000000400000-0x000000000060D000-memory.dmp
                          Filesize

                          2.1MB

                        • memory/3872-392-0x0000000000000000-mapping.dmp
                        • memory/4200-459-0x0000000000000000-mapping.dmp
                        • memory/4268-433-0x0000000000000000-mapping.dmp
                        • memory/4268-450-0x0000000004F60000-0x0000000004F61000-memory.dmp
                          Filesize

                          4KB

                        • memory/4568-500-0x0000026EA12D0000-0x0000026EA1344000-memory.dmp
                          Filesize

                          464KB

                        • memory/4568-489-0x00007FF709C04060-mapping.dmp
                        • memory/4568-619-0x0000026EA3B00000-0x0000026EA3C06000-memory.dmp
                          Filesize

                          1.0MB

                        • memory/4568-618-0x0000026EA2B00000-0x0000026EA2B1B000-memory.dmp
                          Filesize

                          108KB

                        • memory/4644-462-0x0000000000000000-mapping.dmp
                        • memory/4944-615-0x0000000000000000-mapping.dmp