Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    23-10-2021 15:59

General

  • Target

    Valorant SkinChanger.exe

  • Size

    2.3MB

  • MD5

    2593da293c10bebca0895f0636e56689

  • SHA1

    27201a2d876de5c1fc1b735f0f671398ebc6f2a5

  • SHA256

    9e3f93ae0a1f76351b69714917b3f1cd965b09e2e696964b28d693c14f71f007

  • SHA512

    fa6d250297cf381d5181a81d8efe319cc2f278383e992d98e72823dd37498cd8d04e43e6c8830995f2d8908e09cc2bcd8d1762cf9a2245f5387b2f317f74c469

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Valorant SkinChanger.exe
    "C:\Users\Admin\AppData\Local\Temp\Valorant SkinChanger.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4144
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Windows\system32\mode.com
        mode 65,10
        3⤵
          PID:4244
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e file.zip -p___________29783pwd19393pwd12772pwd8909pwd27852pwd25744pwd14383___________ -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4236
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_10.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1676
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_9.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4356
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_8.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4404
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_7.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4324
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_6.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1020
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_5.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1116
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_4.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1320
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_3.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1440
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_2.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1624
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_1.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1812
        • C:\Windows\system32\attrib.exe
          attrib +H "bild.exe"
          3⤵
          • Views/modifies file attributes
          PID:2084
        • C:\Users\Admin\AppData\Local\Temp\main\bild.exe
          "bild.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2208
          • C:\Users\Admin\AppData\Local\Temp\sys32.exe
            "C:\Users\Admin\AppData\Local\Temp\sys32.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3168
            • C:\Windows\System32\conhost.exe
              "C:\Windows\System32\\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\sys32.exe"
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3688
              • C:\Windows\System32\cmd.exe
                "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1524
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4728
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4512
              • C:\Windows\System32\cmd.exe
                "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Users\Admin\services32.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:5008
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Users\Admin\services32.exe"
                  7⤵
                  • Creates scheduled task(s)
                  PID:604
              • C:\Windows\System32\cmd.exe
                "cmd" cmd /c "C:\Users\Admin\services32.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2456
                • C:\Users\Admin\services32.exe
                  C:\Users\Admin\services32.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2984
                  • C:\Windows\System32\conhost.exe
                    "C:\Windows\System32\\conhost.exe" "C:\Users\Admin\services32.exe"
                    8⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:1756
                    • C:\Windows\System32\cmd.exe
                      "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
                      9⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3604
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
                        10⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3200
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
                        10⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1216
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:4252
                      • C:\Windows\System32\conhost.exe
                        "C:\Windows\System32\\conhost.exe" "/sihost32"
                        10⤵
                          PID:3160

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Hidden Files and Directories

      1
      T1158

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Hidden Files and Directories

      1
      T1158

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log
        MD5

        84f2160705ac9a032c002f966498ef74

        SHA1

        e9f3db2e1ad24a4f7e5c203af03bbc07235e704c

        SHA256

        7840ca7ea27e8a24ebc4877774be6013ab4f81d1eb83c121e4c3290ceb532d93

        SHA512

        f41c289770d8817ee612e53880d3f6492d50d08fb5104bf76440c2a93539dd25f6f15179b318e67b9202aabbe802941f80ac2dbadfd6ff1081b0d37c33f9da57

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
        MD5

        8592ba100a78835a6b94d5949e13dfc1

        SHA1

        63e901200ab9a57c7dd4c078d7f75dcd3b357020

        SHA256

        fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c

        SHA512

        87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        MD5

        1321eb2b510cb80d41940ab74c9b6534

        SHA1

        c0f42fbfd29236c4f24c8217ff721267b5bfb8fd

        SHA256

        d6baf226fa7d853f270a9712f925dff6ec952512a2060ea187d1558816d3a124

        SHA512

        cfc2a69682849568569deee2e1ff16297607004acb3afaa6d47583622e4c4659be20917b2e9ba31f9289fd94c340ee16f5bb6756ef805f7657af5831d59332be

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        MD5

        b28d891ce9487b26e04d6bbc7b3378d1

        SHA1

        12e5c6dc2a8e404ba4673d8ed857760e11924001

        SHA256

        13d68fab8db61f5b563b65d91f88971bd736d1f2322a2136c771363ffcdd926d

        SHA512

        5661eb2c760a3c63dd09d589b267ac2ef7551feba2b1e85b4b22d89fddfb51fce01b8e55fc5f01698c423c97747974be9777d6ca86da2dfe76e8fe4f2052ea85

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        MD5

        e716973dd998ab780bc3d465ba77ef0e

        SHA1

        fd7b7caf1146997ac925c123a20a791d7284f65e

        SHA256

        c0faf950af40bf256765550d73d8350d20368e0ebf3de3ae535f473dd88cb1ef

        SHA512

        276f3e37d7d862c52c757052f36723f57c8e425c98ac542d243327726eb1eb31c544c9315ff2f52dfdb7c8e1667875716a571d75866e9c68cc462957594076f6

      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\bild.exe
        MD5

        e34a55a90ff2c71809d41b65cd7817f9

        SHA1

        b93d259f4918264ee7b46a17a5736a59149e6f5f

        SHA256

        ccf645ccd85d91b6a9a01044d72ac8879da021416113a74bb7588e17b06fcd7b

        SHA512

        c101e63333fa364f53835c476f8a299b95da0b6a21673d005bee715c6c3cb66dd3982607ce7b31cb3744c8b1def1d020839ef654ddc82999d25db1c0acedf00d

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT
        MD5

        b14ec742af218c5e8103c238945b46ba

        SHA1

        2fa1b3bf322359750b106e66b7829ea76e029fb6

        SHA256

        c41be9cfd72d0004d68d11beabb25c7c09e5a7c81f49c2004094dfdc681e7889

        SHA512

        fd20d7dcdecbcb2a185c73f248f9c4090d0def62ddda6bcf2f8e891d73faae3ddc4287575dd2bafdf2dc9bb8203ba465883a7d0ca226b22c86e6cc9b12acbf30

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\bild.exe
        MD5

        e34a55a90ff2c71809d41b65cd7817f9

        SHA1

        b93d259f4918264ee7b46a17a5736a59149e6f5f

        SHA256

        ccf645ccd85d91b6a9a01044d72ac8879da021416113a74bb7588e17b06fcd7b

        SHA512

        c101e63333fa364f53835c476f8a299b95da0b6a21673d005bee715c6c3cb66dd3982607ce7b31cb3744c8b1def1d020839ef654ddc82999d25db1c0acedf00d

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip
        MD5

        ca18bf83bff029b2ce2729c56fd14199

        SHA1

        20249ffe4843d6f925a3a1c6177b9dfeba72d376

        SHA256

        248c00ddcfe789719baac113396e992f00d1757e13b34fadff464a6fb5f22c06

        SHA512

        784b67937cd133aba86e1e8bce7a70cafcba4acd294f51fc3d428b6fb4e1c2f12fb84322e3aeecc8e1830fb136873ee29f37b809a9e757c1630a05cb733c6b7d

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_10.zip
        MD5

        8ddef9c49e170a324f348c9eff284966

        SHA1

        d68d0e0ba0bde529d0c079b9d4c681f57b3b29d2

        SHA256

        80113ad4ad151d9725b2deb0c3ac59a984c97803d58217304320bc30fbb341d4

        SHA512

        85d89dc98a9548092ff6a576757f4a7d5d6381a1f74291a342dc8bc6195b7e29a5ca12b7f3a10eb2b6efc5269d5e54d3aa8cb7124c539bfcd035451643bb9508

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip
        MD5

        df419191fd93a9bbc5cd1d4bd3b2614f

        SHA1

        d974478d3a2583697b359de6947ea747032daec1

        SHA256

        51a148a77ea6524b71af2febb51a07b872c35fe8feb915f9270e45e5c277150b

        SHA512

        0420423016ee1c8e202a9a4825cc9cf99206fa82517f78612dbd02f6118ceae7805a8cebdfd520ae08e4872295f63d2b0cc9d47feca8e04c63db1cd79c803995

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip
        MD5

        b4ab662b21302e8eb0308aaf9b661036

        SHA1

        7e0d1de1070410a24c1df82b1fa26074c5d12185

        SHA256

        c333e92b6459f2ad2e940c331414c99a8d5103dd0bf8fa2541c24de6f31540c7

        SHA512

        beeb6edd8752bbb889afba7d915a213709c3408f7741c7e0925ca4db71b44036d0d2589813f42355ec77651e4c1701b9f86915921b0367b42ecdf9619979ce34

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip
        MD5

        dd49bf0ebd5df0401177739a932f9d6e

        SHA1

        7ead8be5fc5aa2cdcb03981a89de8ba4b8099db9

        SHA256

        ddc18c1d846c84ae6df2b7480ec4df0995d338187c1046fd1ff9b49478e1851f

        SHA512

        befb16ccc817d899b056512c1effe2b757b3b7a9e6afdeea6d7cb594c45a290ea1cf2e8402aa7582d5bb98d48ee02b841aed7f4d39640f67eb62b4c674f3cb8a

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip
        MD5

        e7483b41fbfe506f26f1a504b618e819

        SHA1

        8ff4c76318765ff3f484f02e8a43c8da3fb548f3

        SHA256

        e01d5e70df82f5725e23d4bc1f4fc460d4482191843bd3ce18d22d655d8be8ce

        SHA512

        358eecef7a4f3443100c83e1eb671218e625e730ef59a6007a750de9e82f85548e29e6bc1e9b50128a23300fe62f88a38e4e7f72defa1ad9515a870a7202ed4c

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip
        MD5

        3982673f62b6fbbe38c91245bc412f86

        SHA1

        6499e8a235610f8c796051815c643d6ff342bfec

        SHA256

        857bfc0873ec950f4b94ec05a880b1f8320a37b364ce58fe915e9576d045bcfe

        SHA512

        3b814381cce232ba27f0d76337b0f63e32cdc0229c0be18e45ae007a41a1798a50963caff7beb6893bdf058a20dcc232ec09d54b041cd090fde2c2dc46f026fb

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip
        MD5

        c66ad08af96bd54e50f40fab02994c45

        SHA1

        002ce5ad7a410e5f7dbc739a7d95e274756ffc67

        SHA256

        b71250b48d62e797af001d858f5fd4ce233590837e6edcceee5baa985b5b2d84

        SHA512

        422eb98f889591ebf6edc1934c7b43f3901868ad1149cf9356726b988183ea1e3b853f852c269edf54d765dff11072509560ad352e44293790dea4e842796179

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_8.zip
        MD5

        a2afcde35ffc208876cc8d05a977a2a9

        SHA1

        e51bd3eadfaf232fa9ead6d2f3bc3c00a96089c6

        SHA256

        7e44a5eb7a9a33b90468a7df349a18c97a743308e386c3e81d0a4a7e8f88c6e5

        SHA512

        8e70df438b6c8e1d7d417f8e8747aa59c980f79a235fb8a0dff1aa8a027fe183625af7fd29aa7f3f80d165fee690a77cb1076bb21e8507ccf1578173ea70a1fa

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_9.zip
        MD5

        65f2772b6505d45a2db6ac742652d8c6

        SHA1

        c13fac816c1dc4637a9b61438c023e1c6ed80637

        SHA256

        b2d4c236439cb879130c4d8458790ea1890d26557ad74a0991c9bfbe8b12a392

        SHA512

        724592163279627c0856e2d2065c338a4f49296e6ee88959af05cfc7709726322a1dc59ac64d6299df41b68ca908a51d71dbdc62e0a74b43eb6fd35ce2a157c2

      • C:\Users\Admin\AppData\Local\Temp\main\file.bin
        MD5

        04f549f38286af52578374a1c2074b89

        SHA1

        dfce157fe1b58dbed9855412b857ba66aed605f4

        SHA256

        7c1eeac03e9218dab57e658fceaf920769f9987fe0dd550aa0a4673715c4a449

        SHA512

        76be6fcdb720096259091c8cacbc3bacd33bc256c1a2455a4cdace85b7e6f689fbb5ef4a2d980a4b7035df0efa6181830633405907c913fb2ddbecbd78276d19

      • C:\Users\Admin\AppData\Local\Temp\main\main.bat
        MD5

        56d6975d2d7a9a569611d984a9ff2edc

        SHA1

        a596f2563ac7a5adcf98a24cc24b468cbd5b1f3f

        SHA256

        274858c65dcdea186e7b3ce7848f10a39e400462fdff4d57e304fd87f0a4de29

        SHA512

        158d7aff224143713995aab34dc1f6538bfde4360c4fab6487924adf11ccc54631ca0c57b8d4a8181518d8f5fdd22af70d161dd6863d578a2f51db822ad67379

      • C:\Users\Admin\AppData\Local\Temp\sys32.exe
        MD5

        6498515d9098f58b2d88cdd7feb3d49e

        SHA1

        78d2cdc3aac2ef9822c253b4ac2f12917ddfadb5

        SHA256

        5e034787a349fa813e584f28e5a727938cf1cd9e3db092084787cae10e859c3d

        SHA512

        453308fec581ddfcc127a74f4c31e40c8caab45a2154942fd25ba0784e31afe6756b43dcead3e3af7a3b7ecde7a46e3784c236d2b969f6b8df44467c8206bee3

      • C:\Users\Admin\AppData\Local\Temp\sys32.exe
        MD5

        6498515d9098f58b2d88cdd7feb3d49e

        SHA1

        78d2cdc3aac2ef9822c253b4ac2f12917ddfadb5

        SHA256

        5e034787a349fa813e584f28e5a727938cf1cd9e3db092084787cae10e859c3d

        SHA512

        453308fec581ddfcc127a74f4c31e40c8caab45a2154942fd25ba0784e31afe6756b43dcead3e3af7a3b7ecde7a46e3784c236d2b969f6b8df44467c8206bee3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
        MD5

        541f0f75d75afcf4ec6b7423b432f4c2

        SHA1

        91a44ccdbdcbfa84b608d5ab96f9fef8f31e13e3

        SHA256

        1d7346374a1d3c2c6c3951b9665a9002110495eedc7a66f23c445d3ede1f00e0

        SHA512

        42f874bc72f3a51cbaece6890243c2906db8b4174e48a49536bcff7a1e1f5394bc15f63d452e880eb48ae87964dac165b402a784e0c147837c2345e8659cb0dc

      • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
        MD5

        541f0f75d75afcf4ec6b7423b432f4c2

        SHA1

        91a44ccdbdcbfa84b608d5ab96f9fef8f31e13e3

        SHA256

        1d7346374a1d3c2c6c3951b9665a9002110495eedc7a66f23c445d3ede1f00e0

        SHA512

        42f874bc72f3a51cbaece6890243c2906db8b4174e48a49536bcff7a1e1f5394bc15f63d452e880eb48ae87964dac165b402a784e0c147837c2345e8659cb0dc

      • C:\Users\Admin\services32.exe
        MD5

        6498515d9098f58b2d88cdd7feb3d49e

        SHA1

        78d2cdc3aac2ef9822c253b4ac2f12917ddfadb5

        SHA256

        5e034787a349fa813e584f28e5a727938cf1cd9e3db092084787cae10e859c3d

        SHA512

        453308fec581ddfcc127a74f4c31e40c8caab45a2154942fd25ba0784e31afe6756b43dcead3e3af7a3b7ecde7a46e3784c236d2b969f6b8df44467c8206bee3

      • C:\Users\Admin\services32.exe
        MD5

        6498515d9098f58b2d88cdd7feb3d49e

        SHA1

        78d2cdc3aac2ef9822c253b4ac2f12917ddfadb5

        SHA256

        5e034787a349fa813e584f28e5a727938cf1cd9e3db092084787cae10e859c3d

        SHA512

        453308fec581ddfcc127a74f4c31e40c8caab45a2154942fd25ba0784e31afe6756b43dcead3e3af7a3b7ecde7a46e3784c236d2b969f6b8df44467c8206bee3

      • \Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll
        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • memory/604-216-0x0000000000000000-mapping.dmp
      • memory/1020-139-0x0000000000000000-mapping.dmp
      • memory/1116-143-0x0000000000000000-mapping.dmp
      • memory/1216-367-0x0000000000000000-mapping.dmp
      • memory/1216-409-0x00000198C5958000-0x00000198C5959000-memory.dmp
        Filesize

        4KB

      • memory/1216-408-0x00000198C5956000-0x00000198C5958000-memory.dmp
        Filesize

        8KB

      • memory/1216-383-0x00000198C5953000-0x00000198C5955000-memory.dmp
        Filesize

        8KB

      • memory/1216-382-0x00000198C5950000-0x00000198C5952000-memory.dmp
        Filesize

        8KB

      • memory/1320-147-0x0000000000000000-mapping.dmp
      • memory/1440-151-0x0000000000000000-mapping.dmp
      • memory/1524-196-0x0000000000000000-mapping.dmp
      • memory/1624-155-0x0000000000000000-mapping.dmp
      • memory/1676-123-0x0000000000000000-mapping.dmp
      • memory/1756-312-0x000001604D8B6000-0x000001604D8B7000-memory.dmp
        Filesize

        4KB

      • memory/1756-311-0x000001604D8B3000-0x000001604D8B5000-memory.dmp
        Filesize

        8KB

      • memory/1756-310-0x000001604D8B0000-0x000001604D8B2000-memory.dmp
        Filesize

        8KB

      • memory/1812-159-0x0000000000000000-mapping.dmp
      • memory/2084-165-0x0000000000000000-mapping.dmp
      • memory/2120-115-0x0000000000000000-mapping.dmp
      • memory/2208-175-0x0000000005620000-0x0000000005C26000-memory.dmp
        Filesize

        6.0MB

      • memory/2208-166-0x0000000000000000-mapping.dmp
      • memory/2208-178-0x0000000007500000-0x0000000007501000-memory.dmp
        Filesize

        4KB

      • memory/2208-177-0x0000000005B10000-0x0000000005B11000-memory.dmp
        Filesize

        4KB

      • memory/2208-168-0x0000000000370000-0x0000000000371000-memory.dmp
        Filesize

        4KB

      • memory/2208-172-0x0000000004D80000-0x0000000004D81000-memory.dmp
        Filesize

        4KB

      • memory/2208-173-0x0000000004D30000-0x0000000004D31000-memory.dmp
        Filesize

        4KB

      • memory/2208-181-0x0000000008410000-0x0000000008411000-memory.dmp
        Filesize

        4KB

      • memory/2208-180-0x0000000007920000-0x0000000007921000-memory.dmp
        Filesize

        4KB

      • memory/2208-170-0x0000000005120000-0x0000000005121000-memory.dmp
        Filesize

        4KB

      • memory/2208-182-0x0000000008730000-0x0000000008731000-memory.dmp
        Filesize

        4KB

      • memory/2208-183-0x0000000008E30000-0x0000000008E31000-memory.dmp
        Filesize

        4KB

      • memory/2208-179-0x00000000075C0000-0x00000000075C1000-memory.dmp
        Filesize

        4KB

      • memory/2208-176-0x0000000005720000-0x0000000005721000-memory.dmp
        Filesize

        4KB

      • memory/2208-174-0x0000000004F30000-0x0000000004F31000-memory.dmp
        Filesize

        4KB

      • memory/2208-171-0x0000000005C30000-0x0000000005C31000-memory.dmp
        Filesize

        4KB

      • memory/2456-286-0x0000000000000000-mapping.dmp
      • memory/2984-289-0x0000000000000000-mapping.dmp
      • memory/3160-419-0x000001BF53B60000-0x000001BF53B62000-memory.dmp
        Filesize

        8KB

      • memory/3160-418-0x000001BF39710000-0x000001BF39717000-memory.dmp
        Filesize

        28KB

      • memory/3160-420-0x000001BF53B63000-0x000001BF53B65000-memory.dmp
        Filesize

        8KB

      • memory/3160-421-0x000001BF53B66000-0x000001BF53B67000-memory.dmp
        Filesize

        4KB

      • memory/3168-184-0x0000000000000000-mapping.dmp
      • memory/3200-363-0x00000198254B6000-0x00000198254B8000-memory.dmp
        Filesize

        8KB

      • memory/3200-303-0x0000000000000000-mapping.dmp
      • memory/3200-313-0x00000198254B0000-0x00000198254B2000-memory.dmp
        Filesize

        8KB

      • memory/3200-314-0x00000198254B3000-0x00000198254B5000-memory.dmp
        Filesize

        8KB

      • memory/3200-381-0x00000198254B8000-0x00000198254B9000-memory.dmp
        Filesize

        4KB

      • memory/3604-302-0x0000000000000000-mapping.dmp
      • memory/3688-213-0x0000015D1DB06000-0x0000015D1DB07000-memory.dmp
        Filesize

        4KB

      • memory/3688-195-0x0000015D05050000-0x0000015D05052000-memory.dmp
        Filesize

        8KB

      • memory/3688-188-0x0000015D05050000-0x0000015D05052000-memory.dmp
        Filesize

        8KB

      • memory/3688-187-0x0000015D05050000-0x0000015D05052000-memory.dmp
        Filesize

        8KB

      • memory/3688-189-0x0000015D05050000-0x0000015D05052000-memory.dmp
        Filesize

        8KB

      • memory/3688-190-0x0000015D05050000-0x0000015D05052000-memory.dmp
        Filesize

        8KB

      • memory/3688-191-0x0000015D05080000-0x0000015D0508C000-memory.dmp
        Filesize

        48KB

      • memory/3688-193-0x0000015D05050000-0x0000015D05052000-memory.dmp
        Filesize

        8KB

      • memory/3688-194-0x0000015D050D0000-0x0000015D050D1000-memory.dmp
        Filesize

        4KB

      • memory/3688-209-0x0000015D03620000-0x0000015D0362F000-memory.dmp
        Filesize

        60KB

      • memory/3688-210-0x0000015D1DB00000-0x0000015D1DB02000-memory.dmp
        Filesize

        8KB

      • memory/3688-207-0x0000015D05050000-0x0000015D05052000-memory.dmp
        Filesize

        8KB

      • memory/3688-212-0x0000015D1DB03000-0x0000015D1DB05000-memory.dmp
        Filesize

        8KB

      • memory/4236-119-0x0000000000000000-mapping.dmp
      • memory/4244-117-0x0000000000000000-mapping.dmp
      • memory/4252-322-0x0000000000000000-mapping.dmp
      • memory/4324-135-0x0000000000000000-mapping.dmp
      • memory/4356-127-0x0000000000000000-mapping.dmp
      • memory/4404-131-0x0000000000000000-mapping.dmp
      • memory/4512-249-0x000002B7276C0000-0x000002B7276C2000-memory.dmp
        Filesize

        8KB

      • memory/4512-280-0x000002B727710000-0x000002B727712000-memory.dmp
        Filesize

        8KB

      • memory/4512-285-0x000002B727718000-0x000002B727719000-memory.dmp
        Filesize

        4KB

      • memory/4512-282-0x000002B727716000-0x000002B727718000-memory.dmp
        Filesize

        8KB

      • memory/4512-281-0x000002B727713000-0x000002B727715000-memory.dmp
        Filesize

        8KB

      • memory/4512-245-0x0000000000000000-mapping.dmp
      • memory/4512-247-0x000002B7276C0000-0x000002B7276C2000-memory.dmp
        Filesize

        8KB

      • memory/4512-248-0x000002B7276C0000-0x000002B7276C2000-memory.dmp
        Filesize

        8KB

      • memory/4728-204-0x0000020F45140000-0x0000020F45142000-memory.dmp
        Filesize

        8KB

      • memory/4728-214-0x0000020F5F0D0000-0x0000020F5F0D2000-memory.dmp
        Filesize

        8KB

      • memory/4728-201-0x0000020F45140000-0x0000020F45142000-memory.dmp
        Filesize

        8KB

      • memory/4728-202-0x0000020F45140000-0x0000020F45142000-memory.dmp
        Filesize

        8KB

      • memory/4728-215-0x0000020F5F0D3000-0x0000020F5F0D5000-memory.dmp
        Filesize

        8KB

      • memory/4728-200-0x0000020F45140000-0x0000020F45142000-memory.dmp
        Filesize

        8KB

      • memory/4728-217-0x0000020F45140000-0x0000020F45142000-memory.dmp
        Filesize

        8KB

      • memory/4728-199-0x0000020F45140000-0x0000020F45142000-memory.dmp
        Filesize

        8KB

      • memory/4728-198-0x0000020F45140000-0x0000020F45142000-memory.dmp
        Filesize

        8KB

      • memory/4728-203-0x0000020F5F030000-0x0000020F5F031000-memory.dmp
        Filesize

        4KB

      • memory/4728-197-0x0000000000000000-mapping.dmp
      • memory/4728-205-0x0000020F45140000-0x0000020F45142000-memory.dmp
        Filesize

        8KB

      • memory/4728-206-0x0000020F5FBF0000-0x0000020F5FBF1000-memory.dmp
        Filesize

        4KB

      • memory/4728-244-0x0000020F45140000-0x0000020F45142000-memory.dmp
        Filesize

        8KB

      • memory/4728-243-0x0000020F5F0D8000-0x0000020F5F0D9000-memory.dmp
        Filesize

        4KB

      • memory/4728-240-0x0000020F5F0D6000-0x0000020F5F0D8000-memory.dmp
        Filesize

        8KB

      • memory/4728-220-0x0000020F45140000-0x0000020F45142000-memory.dmp
        Filesize

        8KB

      • memory/4728-219-0x0000020F45140000-0x0000020F45142000-memory.dmp
        Filesize

        8KB

      • memory/5008-211-0x0000000000000000-mapping.dmp