Analysis

  • max time kernel
    170s
  • max time network
    268s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2022 15:06

General

  • Target

    9480e8b5b5d3b10d6d8ce91c81a260057d8c22740960960a05cc338b3c8e3073.exe

  • Size

    383KB

  • MD5

    249afc0c47910087eb313fb999b7bc4c

  • SHA1

    7389d6eeb571bfa4731a06deb9535996d2c1828f

  • SHA256

    9480e8b5b5d3b10d6d8ce91c81a260057d8c22740960960a05cc338b3c8e3073

  • SHA512

    af8581f9ecb2fd7475b86c02159cb16c79973e12bd914cefb885400bc3ea6fb01749aabe3d89d66c084c60db2310afec9bda0c3ea3ad2906800f1e8c6e6d712e

  • SSDEEP

    6144:+iWKESG24OQjFnM6X4nLlHxmbxS5t8EovmIi+IJmk9nSTtT6V12RBq1DooGHp38V:6SG1InLlakHoOIizLdgswRBq1iJ8

Malware Config

Extracted

Family

redline

Botnet

Lyla19.11

C2

185.215.113.216:21921

Attributes
  • auth_value

    d794b35d7fc2b68cd29e01294b41b9b6

Extracted

Family

redline

Botnet

top1

C2

chardhesha.xyz:81

jalocliche.xyz:81

Attributes
  • auth_value

    fa2afa98a6579319e36e31ee0552bd57

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • VMProtect packed file 8 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 15 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9480e8b5b5d3b10d6d8ce91c81a260057d8c22740960960a05cc338b3c8e3073.exe
    "C:\Users\Admin\AppData\Local\Temp\9480e8b5b5d3b10d6d8ce91c81a260057d8c22740960960a05cc338b3c8e3073.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Windows\Temp\16.exe
      "C:\Windows\Temp\16.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1092
        • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
          C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1704
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1704 -s 56
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:296
      • C:\Users\Admin\AppData\Local\Temp\293E5C21KBK8L16.exe
        "C:\Users\Admin\AppData\Local\Temp\293E5C21KBK8L16.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1108
        • C:\Windows\Temp\Lyla1911.exe
          "C:\Windows\Temp\Lyla1911.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1356
      • C:\Users\Admin\AppData\Local\Temp\G3FH3347I99CEFK.exe
        "C:\Users\Admin\AppData\Local\Temp\G3FH3347I99CEFK.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Windows\Temp\top1.exe
          "C:\Windows\Temp\top1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1884
      • C:\Users\Admin\AppData\Local\Temp\A4JD8AGKL800DAE.exe
        "C:\Users\Admin\AppData\Local\Temp\A4JD8AGKL800DAE.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1364
        • C:\Windows\Temp\swiftfix.exe
          "C:\Windows\Temp\swiftfix.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:1496
      • C:\Users\Admin\AppData\Local\Temp\LL549AAF96GDAL3.exe
        "C:\Users\Admin\AppData\Local\Temp\LL549AAF96GDAL3.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:960
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" -S AVL77d.QY7 -U
          4⤵
          • Loads dropped DLL
          PID:1948
      • C:\Users\Admin\AppData\Local\Temp\3H1D8IMG820L6L9.exe
        https://iplogger.org/1DJDa7
        3⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1964

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\293E5C21KBK8L16.exe
    Filesize

    393KB

    MD5

    a98935aa932118fc1465dae41b58b33c

    SHA1

    2a27bdecf3b482faa8192e5ef93a38b9c0ede987

    SHA256

    736f4fbb6e046648147eb44a6759257e0ecc1b931c3c6e3a8f531677e0a46eb5

    SHA512

    aff3b1be21ead5e98c3207b821522910d293131124b2b66a904c63f3c28b77a8c6dad8904090a62c46aa787d0ea490602f31f63eb3d58f27a8c309e18b17e777

  • C:\Users\Admin\AppData\Local\Temp\293E5C21KBK8L16.exe
    Filesize

    393KB

    MD5

    a98935aa932118fc1465dae41b58b33c

    SHA1

    2a27bdecf3b482faa8192e5ef93a38b9c0ede987

    SHA256

    736f4fbb6e046648147eb44a6759257e0ecc1b931c3c6e3a8f531677e0a46eb5

    SHA512

    aff3b1be21ead5e98c3207b821522910d293131124b2b66a904c63f3c28b77a8c6dad8904090a62c46aa787d0ea490602f31f63eb3d58f27a8c309e18b17e777

  • C:\Users\Admin\AppData\Local\Temp\3H1D8IMG820L6L9.exe
    Filesize

    8KB

    MD5

    8719ce641e7c777ac1b0eaec7b5fa7c7

    SHA1

    c04de52cb511480cc7d00d67f1d9e17b02d6406b

    SHA256

    6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

    SHA512

    7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

  • C:\Users\Admin\AppData\Local\Temp\3H1D8IMG820L6L9.exe
    Filesize

    8KB

    MD5

    8719ce641e7c777ac1b0eaec7b5fa7c7

    SHA1

    c04de52cb511480cc7d00d67f1d9e17b02d6406b

    SHA256

    6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

    SHA512

    7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

  • C:\Users\Admin\AppData\Local\Temp\A4JD8AGKL800DAE.exe
    Filesize

    337KB

    MD5

    c1a938e95426a6adf3ff866bea1d1cbf

    SHA1

    9c846653986e0fcedfff31f7703c4da1296262bc

    SHA256

    3eca25fbe03b2a9521916ffa9dfb0e31950776af9cbf528fdf693fedba978b41

    SHA512

    4d62b31ee969f7653e340fa3440834008e36f1f8f108f27ae87a7a263e7ad75656423340f8ec48f4d2793ae0f5e34a67d6f224ddc03aa1493854c9891e545284

  • C:\Users\Admin\AppData\Local\Temp\A4JD8AGKL800DAE.exe
    Filesize

    337KB

    MD5

    c1a938e95426a6adf3ff866bea1d1cbf

    SHA1

    9c846653986e0fcedfff31f7703c4da1296262bc

    SHA256

    3eca25fbe03b2a9521916ffa9dfb0e31950776af9cbf528fdf693fedba978b41

    SHA512

    4d62b31ee969f7653e340fa3440834008e36f1f8f108f27ae87a7a263e7ad75656423340f8ec48f4d2793ae0f5e34a67d6f224ddc03aa1493854c9891e545284

  • C:\Users\Admin\AppData\Local\Temp\AVL77d.QY7
    Filesize

    1.8MB

    MD5

    f46cdd3b0f4e17ad9944c2ab07e521e6

    SHA1

    e72ef04e49d89dc8a39d219b9434d7b44bc9c7f9

    SHA256

    03337345edef5283707512253d1f6aa68e0abea01cbe93739a71b7c553332f4c

    SHA512

    b1c86f5662a00c71f7cbd571bee3cafc1d8ca8158b496db0d88bceb87aa2b50b1866afd9c3dad9fea91d056177e9c702460a28e4cf783228899cd5de13110870

  • C:\Users\Admin\AppData\Local\Temp\G3FH3347I99CEFK.exe
    Filesize

    385KB

    MD5

    55b1fd7484074158f9e9e8f657ec5a94

    SHA1

    6988125039cbf77b4ff06fa75fa56975004d3333

    SHA256

    92d305d4c7faa7d3d004a7c535d289235b187c4f72a97e76736f6fcd3fdbac22

    SHA512

    a7b292cc74578308b4c3d129809119a96c6522185e05ddaefb294ae6636894a145383140d23b1d3217f300ee63646d6f185fdb02dcbd9ab0ee5d840aa49b4de9

  • C:\Users\Admin\AppData\Local\Temp\G3FH3347I99CEFK.exe
    Filesize

    385KB

    MD5

    55b1fd7484074158f9e9e8f657ec5a94

    SHA1

    6988125039cbf77b4ff06fa75fa56975004d3333

    SHA256

    92d305d4c7faa7d3d004a7c535d289235b187c4f72a97e76736f6fcd3fdbac22

    SHA512

    a7b292cc74578308b4c3d129809119a96c6522185e05ddaefb294ae6636894a145383140d23b1d3217f300ee63646d6f185fdb02dcbd9ab0ee5d840aa49b4de9

  • C:\Users\Admin\AppData\Local\Temp\LL549AAF96GDAL3.exe
    Filesize

    1.8MB

    MD5

    6474e2bb0653c801720141864d0a47fc

    SHA1

    1437bf6e37e43674ba17b1560879b4ef15994106

    SHA256

    1117693668d29e59a35caa9a21dd9f86a65107688413745051d4a94612ac7e9a

    SHA512

    037452bf76f5de0ed518e4e857cff00db2adfe1a26ea1954ecc0ee497fba4a07127e683912c6ebc8cb1c6edb01b0c6dd8732b56d2836a805800ffc079bb6b1da

  • C:\Users\Admin\AppData\Local\Temp\LL549AAF96GDAL3.exe
    Filesize

    1.8MB

    MD5

    6474e2bb0653c801720141864d0a47fc

    SHA1

    1437bf6e37e43674ba17b1560879b4ef15994106

    SHA256

    1117693668d29e59a35caa9a21dd9f86a65107688413745051d4a94612ac7e9a

    SHA512

    037452bf76f5de0ed518e4e857cff00db2adfe1a26ea1954ecc0ee497fba4a07127e683912c6ebc8cb1c6edb01b0c6dd8732b56d2836a805800ffc079bb6b1da

  • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • C:\Windows\Temp\16.exe
    Filesize

    111KB

    MD5

    d5e60efb9108de74544c623538278585

    SHA1

    fc03eda03ca0510dfb26cf5ea1b3d4e6ff7567b7

    SHA256

    353e1bf0f0f4deb4203328160856d4e967a1fe36b4a5d126d799c1b7dee027c0

    SHA512

    769c9ec6808af451eb58a1a2d767f8f10fec5d7abe616737ae6d81b107546e0bbfcbef7cf2f2bc9bcebfcf96bdfc4b55b4c3a506beb3f094093d9c6682ffa4ca

  • C:\Windows\Temp\Lyla1911.exe
    Filesize

    199KB

    MD5

    7abf2ed011e32db98ad7cd7c1f840aef

    SHA1

    7a703f6e669c453c1101fc6438dfa729b264e9a4

    SHA256

    2d378587d81eb37f137664163bcd886eda936103ad92064b6b34657e85f26fc2

    SHA512

    d0cc913590cd70b9f3be8d252cf9fe92f1dc4f64900c2f5879e9e7f135f4c0c533aa146be32981a3b6d4e140d3d2d3db9c32a1eb78c8188988ff693fd36c6de8

  • C:\Windows\Temp\Lyla1911.exe
    Filesize

    199KB

    MD5

    7abf2ed011e32db98ad7cd7c1f840aef

    SHA1

    7a703f6e669c453c1101fc6438dfa729b264e9a4

    SHA256

    2d378587d81eb37f137664163bcd886eda936103ad92064b6b34657e85f26fc2

    SHA512

    d0cc913590cd70b9f3be8d252cf9fe92f1dc4f64900c2f5879e9e7f135f4c0c533aa146be32981a3b6d4e140d3d2d3db9c32a1eb78c8188988ff693fd36c6de8

  • C:\Windows\Temp\swiftfix.exe
    Filesize

    17KB

    MD5

    c5d67a98b53d07c90b6bf8a54d87cca3

    SHA1

    4cf957464a178b219184308d9110bab3efc3fd78

    SHA256

    23b36cbe0d774877af73bce1eb468db5026f8b4b5b83650baa6fb13beba3e9ac

    SHA512

    7dc2223c4a196d70744617411b0202ab64bcb1dd53aea90d7a71cb3d353b0fa708fdf8acb289c93cc742f77cfdba5aaee069adfcce91368457b8443899c075c8

  • C:\Windows\Temp\swiftfix.exe
    Filesize

    17KB

    MD5

    c5d67a98b53d07c90b6bf8a54d87cca3

    SHA1

    4cf957464a178b219184308d9110bab3efc3fd78

    SHA256

    23b36cbe0d774877af73bce1eb468db5026f8b4b5b83650baa6fb13beba3e9ac

    SHA512

    7dc2223c4a196d70744617411b0202ab64bcb1dd53aea90d7a71cb3d353b0fa708fdf8acb289c93cc742f77cfdba5aaee069adfcce91368457b8443899c075c8

  • C:\Windows\Temp\top1.exe
    Filesize

    137KB

    MD5

    a135b9085fa8ef921eec14057b03125f

    SHA1

    4bf5ad5601da96ad4304f3d02b169868c972415d

    SHA256

    24aebc01eb25512c266cc73a1bf90a40b92e5924ddb94ba6db3be9aa89539ea3

    SHA512

    c7d4f74bedb81125a5ba42dad7be1dfa8220f1f5da96d61cc3e6b87fa9dd18217b9c6683ab6f16e0197084eead7db50df401d06a7ef4434038512d7d391effab

  • C:\Windows\Temp\top1.exe
    Filesize

    137KB

    MD5

    a135b9085fa8ef921eec14057b03125f

    SHA1

    4bf5ad5601da96ad4304f3d02b169868c972415d

    SHA256

    24aebc01eb25512c266cc73a1bf90a40b92e5924ddb94ba6db3be9aa89539ea3

    SHA512

    c7d4f74bedb81125a5ba42dad7be1dfa8220f1f5da96d61cc3e6b87fa9dd18217b9c6683ab6f16e0197084eead7db50df401d06a7ef4434038512d7d391effab

  • \Users\Admin\AppData\Local\Temp\293E5C21KBK8L16.exe
    Filesize

    393KB

    MD5

    a98935aa932118fc1465dae41b58b33c

    SHA1

    2a27bdecf3b482faa8192e5ef93a38b9c0ede987

    SHA256

    736f4fbb6e046648147eb44a6759257e0ecc1b931c3c6e3a8f531677e0a46eb5

    SHA512

    aff3b1be21ead5e98c3207b821522910d293131124b2b66a904c63f3c28b77a8c6dad8904090a62c46aa787d0ea490602f31f63eb3d58f27a8c309e18b17e777

  • \Users\Admin\AppData\Local\Temp\3H1D8IMG820L6L9.exe
    Filesize

    8KB

    MD5

    8719ce641e7c777ac1b0eaec7b5fa7c7

    SHA1

    c04de52cb511480cc7d00d67f1d9e17b02d6406b

    SHA256

    6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

    SHA512

    7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

  • \Users\Admin\AppData\Local\Temp\A4JD8AGKL800DAE.exe
    Filesize

    337KB

    MD5

    c1a938e95426a6adf3ff866bea1d1cbf

    SHA1

    9c846653986e0fcedfff31f7703c4da1296262bc

    SHA256

    3eca25fbe03b2a9521916ffa9dfb0e31950776af9cbf528fdf693fedba978b41

    SHA512

    4d62b31ee969f7653e340fa3440834008e36f1f8f108f27ae87a7a263e7ad75656423340f8ec48f4d2793ae0f5e34a67d6f224ddc03aa1493854c9891e545284

  • \Users\Admin\AppData\Local\Temp\G3FH3347I99CEFK.exe
    Filesize

    385KB

    MD5

    55b1fd7484074158f9e9e8f657ec5a94

    SHA1

    6988125039cbf77b4ff06fa75fa56975004d3333

    SHA256

    92d305d4c7faa7d3d004a7c535d289235b187c4f72a97e76736f6fcd3fdbac22

    SHA512

    a7b292cc74578308b4c3d129809119a96c6522185e05ddaefb294ae6636894a145383140d23b1d3217f300ee63646d6f185fdb02dcbd9ab0ee5d840aa49b4de9

  • \Users\Admin\AppData\Local\Temp\LL549AAF96GDAL3.exe
    Filesize

    1.8MB

    MD5

    6474e2bb0653c801720141864d0a47fc

    SHA1

    1437bf6e37e43674ba17b1560879b4ef15994106

    SHA256

    1117693668d29e59a35caa9a21dd9f86a65107688413745051d4a94612ac7e9a

    SHA512

    037452bf76f5de0ed518e4e857cff00db2adfe1a26ea1954ecc0ee497fba4a07127e683912c6ebc8cb1c6edb01b0c6dd8732b56d2836a805800ffc079bb6b1da

  • \Users\Admin\AppData\Local\Temp\aVL77d.qY7
    Filesize

    1.8MB

    MD5

    f46cdd3b0f4e17ad9944c2ab07e521e6

    SHA1

    e72ef04e49d89dc8a39d219b9434d7b44bc9c7f9

    SHA256

    03337345edef5283707512253d1f6aa68e0abea01cbe93739a71b7c553332f4c

    SHA512

    b1c86f5662a00c71f7cbd571bee3cafc1d8ca8158b496db0d88bceb87aa2b50b1866afd9c3dad9fea91d056177e9c702460a28e4cf783228899cd5de13110870

  • \Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • \Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • \Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • \Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • \Windows\Temp\16.exe
    Filesize

    111KB

    MD5

    d5e60efb9108de74544c623538278585

    SHA1

    fc03eda03ca0510dfb26cf5ea1b3d4e6ff7567b7

    SHA256

    353e1bf0f0f4deb4203328160856d4e967a1fe36b4a5d126d799c1b7dee027c0

    SHA512

    769c9ec6808af451eb58a1a2d767f8f10fec5d7abe616737ae6d81b107546e0bbfcbef7cf2f2bc9bcebfcf96bdfc4b55b4c3a506beb3f094093d9c6682ffa4ca

  • \Windows\Temp\16.exe
    Filesize

    111KB

    MD5

    d5e60efb9108de74544c623538278585

    SHA1

    fc03eda03ca0510dfb26cf5ea1b3d4e6ff7567b7

    SHA256

    353e1bf0f0f4deb4203328160856d4e967a1fe36b4a5d126d799c1b7dee027c0

    SHA512

    769c9ec6808af451eb58a1a2d767f8f10fec5d7abe616737ae6d81b107546e0bbfcbef7cf2f2bc9bcebfcf96bdfc4b55b4c3a506beb3f094093d9c6682ffa4ca

  • \Windows\Temp\Lyla1911.exe
    Filesize

    199KB

    MD5

    7abf2ed011e32db98ad7cd7c1f840aef

    SHA1

    7a703f6e669c453c1101fc6438dfa729b264e9a4

    SHA256

    2d378587d81eb37f137664163bcd886eda936103ad92064b6b34657e85f26fc2

    SHA512

    d0cc913590cd70b9f3be8d252cf9fe92f1dc4f64900c2f5879e9e7f135f4c0c533aa146be32981a3b6d4e140d3d2d3db9c32a1eb78c8188988ff693fd36c6de8

  • \Windows\Temp\swiftfix.exe
    Filesize

    17KB

    MD5

    c5d67a98b53d07c90b6bf8a54d87cca3

    SHA1

    4cf957464a178b219184308d9110bab3efc3fd78

    SHA256

    23b36cbe0d774877af73bce1eb468db5026f8b4b5b83650baa6fb13beba3e9ac

    SHA512

    7dc2223c4a196d70744617411b0202ab64bcb1dd53aea90d7a71cb3d353b0fa708fdf8acb289c93cc742f77cfdba5aaee069adfcce91368457b8443899c075c8

  • \Windows\Temp\top1.exe
    Filesize

    137KB

    MD5

    a135b9085fa8ef921eec14057b03125f

    SHA1

    4bf5ad5601da96ad4304f3d02b169868c972415d

    SHA256

    24aebc01eb25512c266cc73a1bf90a40b92e5924ddb94ba6db3be9aa89539ea3

    SHA512

    c7d4f74bedb81125a5ba42dad7be1dfa8220f1f5da96d61cc3e6b87fa9dd18217b9c6683ab6f16e0197084eead7db50df401d06a7ef4434038512d7d391effab

  • memory/296-67-0x0000000000000000-mapping.dmp
  • memory/848-59-0x0000000000000000-mapping.dmp
  • memory/960-110-0x0000000000000000-mapping.dmp
  • memory/1092-61-0x0000000000000000-mapping.dmp
  • memory/1108-75-0x00000000003F0000-0x0000000000458000-memory.dmp
    Filesize

    416KB

  • memory/1108-72-0x0000000000000000-mapping.dmp
  • memory/1108-78-0x00000000008A0000-0x00000000008D8000-memory.dmp
    Filesize

    224KB

  • memory/1356-90-0x00000000010C0000-0x00000000010F8000-memory.dmp
    Filesize

    224KB

  • memory/1356-87-0x0000000000000000-mapping.dmp
  • memory/1364-94-0x0000000000000000-mapping.dmp
  • memory/1364-100-0x0000000001200000-0x000000000125A000-memory.dmp
    Filesize

    360KB

  • memory/1364-102-0x00000000003E0000-0x00000000003EC000-memory.dmp
    Filesize

    48KB

  • memory/1496-105-0x0000000000000000-mapping.dmp
  • memory/1496-114-0x00000000001D0000-0x00000000001DA000-memory.dmp
    Filesize

    40KB

  • memory/1596-54-0x0000000000F20000-0x0000000000F86000-memory.dmp
    Filesize

    408KB

  • memory/1596-55-0x0000000075FF1000-0x0000000075FF3000-memory.dmp
    Filesize

    8KB

  • memory/1596-56-0x0000000000980000-0x00000000009A2000-memory.dmp
    Filesize

    136KB

  • memory/1704-63-0x0000000000000000-mapping.dmp
  • memory/1704-70-0x000000013F340000-0x000000013FBD5000-memory.dmp
    Filesize

    8.6MB

  • memory/1704-66-0x000000013F340000-0x000000013FBD5000-memory.dmp
    Filesize

    8.6MB

  • memory/1884-93-0x0000000000000000-mapping.dmp
  • memory/1884-98-0x00000000009A0000-0x00000000009C8000-memory.dmp
    Filesize

    160KB

  • memory/1948-121-0x00000000025A0000-0x00000000026C8000-memory.dmp
    Filesize

    1.2MB

  • memory/1948-115-0x0000000000000000-mapping.dmp
  • memory/1948-120-0x0000000002310000-0x0000000002462000-memory.dmp
    Filesize

    1.3MB

  • memory/1948-119-0x0000000000A10000-0x0000000000BE7000-memory.dmp
    Filesize

    1.8MB

  • memory/1948-122-0x00000000026D0000-0x00000000027A0000-memory.dmp
    Filesize

    832KB

  • memory/1948-123-0x00000000027A0000-0x000000000285D000-memory.dmp
    Filesize

    756KB

  • memory/1948-126-0x00000000025A0000-0x00000000026C8000-memory.dmp
    Filesize

    1.2MB

  • memory/1960-85-0x00000000006B0000-0x00000000006DA000-memory.dmp
    Filesize

    168KB

  • memory/1960-80-0x0000000000000000-mapping.dmp
  • memory/1960-83-0x0000000000970000-0x00000000009D6000-memory.dmp
    Filesize

    408KB

  • memory/1964-128-0x0000000000000000-mapping.dmp
  • memory/1964-131-0x000000013F6F0000-0x000000013F6F6000-memory.dmp
    Filesize

    24KB

  • memory/1964-132-0x000007FEFC4B1000-0x000007FEFC4B3000-memory.dmp
    Filesize

    8KB

  • memory/1964-133-0x000000001C1A9000-0x000000001C1C8000-memory.dmp
    Filesize

    124KB

  • memory/1964-134-0x0000000026CC0000-0x0000000027466000-memory.dmp
    Filesize

    7.6MB

  • memory/1964-135-0x000000001C1A9000-0x000000001C1C8000-memory.dmp
    Filesize

    124KB