Analysis

  • max time kernel
    66s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2022 08:39

General

  • Target

    file.exe

  • Size

    383KB

  • MD5

    58e19e4ecbfc9e2f32e2a300635bd82d

  • SHA1

    58d58d5b242d1cb1df7fa761df6eaf127b71719f

  • SHA256

    f36a8b642ad4cbf276e83861df2328926ec3f899794036e30736e63a9d078185

  • SHA512

    a262de9767d891b586ffd9a95080c9fc87fab44b923b1adad6e6dc94a7eecd1c57c0feca2dc00150f5f4aac3049c8d0e9a46ed778e9747b518d72b96703372c0

  • SSDEEP

    6144:hLrW6JxFI46YeEIDgIs8wx9nVVFpIVSPapjQWVwv8TJH:JW6nEI8wx95OVSPCQW2MJ

Malware Config

Extracted

Family

redline

Botnet

top1

C2

chardhesha.xyz:81

jalocliche.xyz:81

Attributes
  • auth_value

    fa2afa98a6579319e36e31ee0552bd57

Extracted

Family

redline

Botnet

Lyla.22.11

C2

185.215.113.216:21921

Attributes
  • auth_value

    4e1560b379e71c6ab6ae277b9d4c6895

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • VMProtect packed file 8 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 20 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\Temp\16.exe
      "C:\Windows\Temp\16.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:668
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
          C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1656
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1656 -s 56
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1168
      • C:\Users\Admin\AppData\Local\Temp\6EC8K7C9GDDHLF5.exe
        "C:\Users\Admin\AppData\Local\Temp\6EC8K7C9GDDHLF5.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Windows\Temp\top1.exe
          "C:\Windows\Temp\top1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:360
      • C:\Users\Admin\AppData\Local\Temp\3803KC2K76M7A2G.exe
        "C:\Users\Admin\AppData\Local\Temp\3803KC2K76M7A2G.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Windows\Temp\Lyla2211.exe
          "C:\Windows\Temp\Lyla2211.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1900
      • C:\Users\Admin\AppData\Local\Temp\IKL867D437GBK67.exe
        "C:\Users\Admin\AppData\Local\Temp\IKL867D437GBK67.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1016
        • C:\Windows\Temp\swiftfix.exe
          "C:\Windows\Temp\swiftfix.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:1572
      • C:\Users\Admin\AppData\Local\Temp\I93D7I0A09BEE2E.exe
        "C:\Users\Admin\AppData\Local\Temp\I93D7I0A09BEE2E.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Windows\SysWOW64\control.exe
          "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\RTTfOX3V.Cpl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:112
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\RTTfOX3V.Cpl",
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1640
            • C:\Windows\system32\RunDll32.exe
              C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\RTTfOX3V.Cpl",
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:652
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\RTTfOX3V.Cpl",
                7⤵
                • Loads dropped DLL
                PID:1924
      • C:\Users\Admin\AppData\Local\Temp\21BBDAKJ30E7L0I.exe
        https://iplogger.org/1DJDa7
        3⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:792

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\21BBDAKJ30E7L0I.exe
    Filesize

    8KB

    MD5

    8719ce641e7c777ac1b0eaec7b5fa7c7

    SHA1

    c04de52cb511480cc7d00d67f1d9e17b02d6406b

    SHA256

    6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

    SHA512

    7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

  • C:\Users\Admin\AppData\Local\Temp\21BBDAKJ30E7L0I.exe
    Filesize

    8KB

    MD5

    8719ce641e7c777ac1b0eaec7b5fa7c7

    SHA1

    c04de52cb511480cc7d00d67f1d9e17b02d6406b

    SHA256

    6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

    SHA512

    7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

  • C:\Users\Admin\AppData\Local\Temp\3803KC2K76M7A2G.exe
    Filesize

    389KB

    MD5

    27923f661f1fcafca76b0d4acf4e3f50

    SHA1

    8229a8d9ceb303930534467d46322149265c4723

    SHA256

    581c8579e88b5cf136ec0ad2d061df9a4af395f253d33e570db2860623ea57d9

    SHA512

    d3088f7575ff666f38e711f2373d9e826a3201565834425a8653edf475f994da510e3bcb643b2ca436a6752adf6300c04e436247d94ab4841d8e5d08d0d52f0a

  • C:\Users\Admin\AppData\Local\Temp\3803KC2K76M7A2G.exe
    Filesize

    389KB

    MD5

    27923f661f1fcafca76b0d4acf4e3f50

    SHA1

    8229a8d9ceb303930534467d46322149265c4723

    SHA256

    581c8579e88b5cf136ec0ad2d061df9a4af395f253d33e570db2860623ea57d9

    SHA512

    d3088f7575ff666f38e711f2373d9e826a3201565834425a8653edf475f994da510e3bcb643b2ca436a6752adf6300c04e436247d94ab4841d8e5d08d0d52f0a

  • C:\Users\Admin\AppData\Local\Temp\6EC8K7C9GDDHLF5.exe
    Filesize

    385KB

    MD5

    90767e692f4ceba7298c5636811bf1cc

    SHA1

    4b03b979fb759a6e1d5a6e6bf3052f03acda9c1e

    SHA256

    0af6a93e24056542121e224b3bc4ff3ebe3e021b7c28bcdf0815b5944fcf4898

    SHA512

    5f11946f6ee85d44d120f1e6b16344a2217fe28c18e8b7a4d141b17a1585c03c22f15c9fa70b1810707c62c522b97d18a40f3a9c6d58e1e0d543b809f6a70f70

  • C:\Users\Admin\AppData\Local\Temp\6EC8K7C9GDDHLF5.exe
    Filesize

    385KB

    MD5

    90767e692f4ceba7298c5636811bf1cc

    SHA1

    4b03b979fb759a6e1d5a6e6bf3052f03acda9c1e

    SHA256

    0af6a93e24056542121e224b3bc4ff3ebe3e021b7c28bcdf0815b5944fcf4898

    SHA512

    5f11946f6ee85d44d120f1e6b16344a2217fe28c18e8b7a4d141b17a1585c03c22f15c9fa70b1810707c62c522b97d18a40f3a9c6d58e1e0d543b809f6a70f70

  • C:\Users\Admin\AppData\Local\Temp\I93D7I0A09BEE2E.exe
    Filesize

    1.7MB

    MD5

    d09d3b7e11d05bd30fe6da5f21f353a4

    SHA1

    fec5a633af78e7961485fe0e97b0d6878d545174

    SHA256

    9608d79a8f04e95bf1c16e459458e2afe25c3bfc0c0fa3917fe23ddc2bbd7f45

    SHA512

    85965f59a1b27a27be22bd44d0995d354a4f0a41bcc3e729c505e0754fa089d32dfae7b8217a0d6976e4841c175db71654b24b07c48423ae5f943114f62e4f91

  • C:\Users\Admin\AppData\Local\Temp\I93D7I0A09BEE2E.exe
    Filesize

    1.7MB

    MD5

    d09d3b7e11d05bd30fe6da5f21f353a4

    SHA1

    fec5a633af78e7961485fe0e97b0d6878d545174

    SHA256

    9608d79a8f04e95bf1c16e459458e2afe25c3bfc0c0fa3917fe23ddc2bbd7f45

    SHA512

    85965f59a1b27a27be22bd44d0995d354a4f0a41bcc3e729c505e0754fa089d32dfae7b8217a0d6976e4841c175db71654b24b07c48423ae5f943114f62e4f91

  • C:\Users\Admin\AppData\Local\Temp\IKL867D437GBK67.exe
    Filesize

    333KB

    MD5

    59718e10ab8973add6082a88429acf2f

    SHA1

    996e942c8be550db9600d5d544f1c09ef41c3047

    SHA256

    016006b4e10e6833e36780f68777b7265f105b21a09cbab4f0be8fc45c2e12c0

    SHA512

    83b81ebf0864d6d2ba8902c576416f3b02ede7ed9962af9a0ed8b9e54f4002001d37422262ab8379a13acc69d8ec80b6dae5d48c89e856c52394ac3fc0d6bb50

  • C:\Users\Admin\AppData\Local\Temp\IKL867D437GBK67.exe
    Filesize

    333KB

    MD5

    59718e10ab8973add6082a88429acf2f

    SHA1

    996e942c8be550db9600d5d544f1c09ef41c3047

    SHA256

    016006b4e10e6833e36780f68777b7265f105b21a09cbab4f0be8fc45c2e12c0

    SHA512

    83b81ebf0864d6d2ba8902c576416f3b02ede7ed9962af9a0ed8b9e54f4002001d37422262ab8379a13acc69d8ec80b6dae5d48c89e856c52394ac3fc0d6bb50

  • C:\Users\Admin\AppData\Local\Temp\RTTfOX3V.Cpl
    Filesize

    1.7MB

    MD5

    45df0b20e6ca9fa82262395394d0054d

    SHA1

    70e6734c70da14d9356d5abbff27542926da34da

    SHA256

    0c0767b5ee6edf1bcfc66ddd68af8bff18e40d87417a1537671e948c3756bfae

    SHA512

    fe2a52e95b4710e47bce08ee485a9dea95fecc1517c9c27146f0238c64b3c5a3fa48210d78f83a62bb8b9802837fd28f5a9d7bbe2d66d439ed2eeeef196f6507

  • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • C:\Windows\Temp\16.exe
    Filesize

    115KB

    MD5

    5abe44351d425458a0b1aa5c6a2d007c

    SHA1

    1cf91938b5d6a1d49531d07fc4d0612b4ce18365

    SHA256

    7275527161e158dfeaf9dd744bba65bb9de548616d7f34457c6aa1b4969bacc9

    SHA512

    557b0e9a6cca7a33284a463075b2c5e8198e8e489307fceebd3c43d461b0f3447856325b8aa82c1b62d93328cf435baae9fcee124a9d537fca02be9edad2b291

  • C:\Windows\Temp\Lyla2211.exe
    Filesize

    199KB

    MD5

    f3328099e8d1f53b20e4e59c0c2c0603

    SHA1

    7922e1a1365eeccb099a39f05b7cf23786130dd9

    SHA256

    6d979cf2150d9fc4c694ea93c93d8a87aeccb541caec3003651f87f65b498154

    SHA512

    6aac667a06c61e68d79ff08f319f7d234dded2dec75c5ffd5112b8f9a59859f37dc4d7fdbadfd8db40757e85eb64ef4044dac2ce66fb9e9a4c6131dd70a3d408

  • C:\Windows\Temp\Lyla2211.exe
    Filesize

    199KB

    MD5

    f3328099e8d1f53b20e4e59c0c2c0603

    SHA1

    7922e1a1365eeccb099a39f05b7cf23786130dd9

    SHA256

    6d979cf2150d9fc4c694ea93c93d8a87aeccb541caec3003651f87f65b498154

    SHA512

    6aac667a06c61e68d79ff08f319f7d234dded2dec75c5ffd5112b8f9a59859f37dc4d7fdbadfd8db40757e85eb64ef4044dac2ce66fb9e9a4c6131dd70a3d408

  • C:\Windows\Temp\swiftfix.exe
    Filesize

    17KB

    MD5

    c5d67a98b53d07c90b6bf8a54d87cca3

    SHA1

    4cf957464a178b219184308d9110bab3efc3fd78

    SHA256

    23b36cbe0d774877af73bce1eb468db5026f8b4b5b83650baa6fb13beba3e9ac

    SHA512

    7dc2223c4a196d70744617411b0202ab64bcb1dd53aea90d7a71cb3d353b0fa708fdf8acb289c93cc742f77cfdba5aaee069adfcce91368457b8443899c075c8

  • C:\Windows\Temp\swiftfix.exe
    Filesize

    17KB

    MD5

    c5d67a98b53d07c90b6bf8a54d87cca3

    SHA1

    4cf957464a178b219184308d9110bab3efc3fd78

    SHA256

    23b36cbe0d774877af73bce1eb468db5026f8b4b5b83650baa6fb13beba3e9ac

    SHA512

    7dc2223c4a196d70744617411b0202ab64bcb1dd53aea90d7a71cb3d353b0fa708fdf8acb289c93cc742f77cfdba5aaee069adfcce91368457b8443899c075c8

  • C:\Windows\Temp\top1.exe
    Filesize

    137KB

    MD5

    a135b9085fa8ef921eec14057b03125f

    SHA1

    4bf5ad5601da96ad4304f3d02b169868c972415d

    SHA256

    24aebc01eb25512c266cc73a1bf90a40b92e5924ddb94ba6db3be9aa89539ea3

    SHA512

    c7d4f74bedb81125a5ba42dad7be1dfa8220f1f5da96d61cc3e6b87fa9dd18217b9c6683ab6f16e0197084eead7db50df401d06a7ef4434038512d7d391effab

  • C:\Windows\Temp\top1.exe
    Filesize

    137KB

    MD5

    a135b9085fa8ef921eec14057b03125f

    SHA1

    4bf5ad5601da96ad4304f3d02b169868c972415d

    SHA256

    24aebc01eb25512c266cc73a1bf90a40b92e5924ddb94ba6db3be9aa89539ea3

    SHA512

    c7d4f74bedb81125a5ba42dad7be1dfa8220f1f5da96d61cc3e6b87fa9dd18217b9c6683ab6f16e0197084eead7db50df401d06a7ef4434038512d7d391effab

  • \??\PIPE\lsarpc
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \Users\Admin\AppData\Local\Temp\21BBDAKJ30E7L0I.exe
    Filesize

    8KB

    MD5

    8719ce641e7c777ac1b0eaec7b5fa7c7

    SHA1

    c04de52cb511480cc7d00d67f1d9e17b02d6406b

    SHA256

    6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

    SHA512

    7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

  • \Users\Admin\AppData\Local\Temp\3803KC2K76M7A2G.exe
    Filesize

    389KB

    MD5

    27923f661f1fcafca76b0d4acf4e3f50

    SHA1

    8229a8d9ceb303930534467d46322149265c4723

    SHA256

    581c8579e88b5cf136ec0ad2d061df9a4af395f253d33e570db2860623ea57d9

    SHA512

    d3088f7575ff666f38e711f2373d9e826a3201565834425a8653edf475f994da510e3bcb643b2ca436a6752adf6300c04e436247d94ab4841d8e5d08d0d52f0a

  • \Users\Admin\AppData\Local\Temp\6EC8K7C9GDDHLF5.exe
    Filesize

    385KB

    MD5

    90767e692f4ceba7298c5636811bf1cc

    SHA1

    4b03b979fb759a6e1d5a6e6bf3052f03acda9c1e

    SHA256

    0af6a93e24056542121e224b3bc4ff3ebe3e021b7c28bcdf0815b5944fcf4898

    SHA512

    5f11946f6ee85d44d120f1e6b16344a2217fe28c18e8b7a4d141b17a1585c03c22f15c9fa70b1810707c62c522b97d18a40f3a9c6d58e1e0d543b809f6a70f70

  • \Users\Admin\AppData\Local\Temp\I93D7I0A09BEE2E.exe
    Filesize

    1.7MB

    MD5

    d09d3b7e11d05bd30fe6da5f21f353a4

    SHA1

    fec5a633af78e7961485fe0e97b0d6878d545174

    SHA256

    9608d79a8f04e95bf1c16e459458e2afe25c3bfc0c0fa3917fe23ddc2bbd7f45

    SHA512

    85965f59a1b27a27be22bd44d0995d354a4f0a41bcc3e729c505e0754fa089d32dfae7b8217a0d6976e4841c175db71654b24b07c48423ae5f943114f62e4f91

  • \Users\Admin\AppData\Local\Temp\IKL867D437GBK67.exe
    Filesize

    333KB

    MD5

    59718e10ab8973add6082a88429acf2f

    SHA1

    996e942c8be550db9600d5d544f1c09ef41c3047

    SHA256

    016006b4e10e6833e36780f68777b7265f105b21a09cbab4f0be8fc45c2e12c0

    SHA512

    83b81ebf0864d6d2ba8902c576416f3b02ede7ed9962af9a0ed8b9e54f4002001d37422262ab8379a13acc69d8ec80b6dae5d48c89e856c52394ac3fc0d6bb50

  • \Users\Admin\AppData\Local\Temp\RTTfoX3V.cpl
    Filesize

    1.7MB

    MD5

    45df0b20e6ca9fa82262395394d0054d

    SHA1

    70e6734c70da14d9356d5abbff27542926da34da

    SHA256

    0c0767b5ee6edf1bcfc66ddd68af8bff18e40d87417a1537671e948c3756bfae

    SHA512

    fe2a52e95b4710e47bce08ee485a9dea95fecc1517c9c27146f0238c64b3c5a3fa48210d78f83a62bb8b9802837fd28f5a9d7bbe2d66d439ed2eeeef196f6507

  • \Users\Admin\AppData\Local\Temp\RTTfoX3V.cpl
    Filesize

    1.7MB

    MD5

    45df0b20e6ca9fa82262395394d0054d

    SHA1

    70e6734c70da14d9356d5abbff27542926da34da

    SHA256

    0c0767b5ee6edf1bcfc66ddd68af8bff18e40d87417a1537671e948c3756bfae

    SHA512

    fe2a52e95b4710e47bce08ee485a9dea95fecc1517c9c27146f0238c64b3c5a3fa48210d78f83a62bb8b9802837fd28f5a9d7bbe2d66d439ed2eeeef196f6507

  • \Users\Admin\AppData\Local\Temp\RTTfoX3V.cpl
    Filesize

    1.7MB

    MD5

    45df0b20e6ca9fa82262395394d0054d

    SHA1

    70e6734c70da14d9356d5abbff27542926da34da

    SHA256

    0c0767b5ee6edf1bcfc66ddd68af8bff18e40d87417a1537671e948c3756bfae

    SHA512

    fe2a52e95b4710e47bce08ee485a9dea95fecc1517c9c27146f0238c64b3c5a3fa48210d78f83a62bb8b9802837fd28f5a9d7bbe2d66d439ed2eeeef196f6507

  • \Users\Admin\AppData\Local\Temp\RTTfoX3V.cpl
    Filesize

    1.7MB

    MD5

    45df0b20e6ca9fa82262395394d0054d

    SHA1

    70e6734c70da14d9356d5abbff27542926da34da

    SHA256

    0c0767b5ee6edf1bcfc66ddd68af8bff18e40d87417a1537671e948c3756bfae

    SHA512

    fe2a52e95b4710e47bce08ee485a9dea95fecc1517c9c27146f0238c64b3c5a3fa48210d78f83a62bb8b9802837fd28f5a9d7bbe2d66d439ed2eeeef196f6507

  • \Users\Admin\AppData\Local\Temp\RTTfoX3V.cpl
    Filesize

    1.7MB

    MD5

    45df0b20e6ca9fa82262395394d0054d

    SHA1

    70e6734c70da14d9356d5abbff27542926da34da

    SHA256

    0c0767b5ee6edf1bcfc66ddd68af8bff18e40d87417a1537671e948c3756bfae

    SHA512

    fe2a52e95b4710e47bce08ee485a9dea95fecc1517c9c27146f0238c64b3c5a3fa48210d78f83a62bb8b9802837fd28f5a9d7bbe2d66d439ed2eeeef196f6507

  • \Users\Admin\AppData\Local\Temp\RTTfoX3V.cpl
    Filesize

    1.7MB

    MD5

    45df0b20e6ca9fa82262395394d0054d

    SHA1

    70e6734c70da14d9356d5abbff27542926da34da

    SHA256

    0c0767b5ee6edf1bcfc66ddd68af8bff18e40d87417a1537671e948c3756bfae

    SHA512

    fe2a52e95b4710e47bce08ee485a9dea95fecc1517c9c27146f0238c64b3c5a3fa48210d78f83a62bb8b9802837fd28f5a9d7bbe2d66d439ed2eeeef196f6507

  • \Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • \Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • \Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • \Users\Admin\AppData\Roaming\explorer\explorer.exe
    Filesize

    5.2MB

    MD5

    dee1568dc4d523e4aff5c7563b26887c

    SHA1

    565a8f3d02746fb203c5a7e2777211bf33cf656b

    SHA256

    f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b

    SHA512

    0e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2

  • \Windows\Temp\16.exe
    Filesize

    115KB

    MD5

    5abe44351d425458a0b1aa5c6a2d007c

    SHA1

    1cf91938b5d6a1d49531d07fc4d0612b4ce18365

    SHA256

    7275527161e158dfeaf9dd744bba65bb9de548616d7f34457c6aa1b4969bacc9

    SHA512

    557b0e9a6cca7a33284a463075b2c5e8198e8e489307fceebd3c43d461b0f3447856325b8aa82c1b62d93328cf435baae9fcee124a9d537fca02be9edad2b291

  • \Windows\Temp\16.exe
    Filesize

    115KB

    MD5

    5abe44351d425458a0b1aa5c6a2d007c

    SHA1

    1cf91938b5d6a1d49531d07fc4d0612b4ce18365

    SHA256

    7275527161e158dfeaf9dd744bba65bb9de548616d7f34457c6aa1b4969bacc9

    SHA512

    557b0e9a6cca7a33284a463075b2c5e8198e8e489307fceebd3c43d461b0f3447856325b8aa82c1b62d93328cf435baae9fcee124a9d537fca02be9edad2b291

  • \Windows\Temp\Lyla2211.exe
    Filesize

    199KB

    MD5

    f3328099e8d1f53b20e4e59c0c2c0603

    SHA1

    7922e1a1365eeccb099a39f05b7cf23786130dd9

    SHA256

    6d979cf2150d9fc4c694ea93c93d8a87aeccb541caec3003651f87f65b498154

    SHA512

    6aac667a06c61e68d79ff08f319f7d234dded2dec75c5ffd5112b8f9a59859f37dc4d7fdbadfd8db40757e85eb64ef4044dac2ce66fb9e9a4c6131dd70a3d408

  • \Windows\Temp\swiftfix.exe
    Filesize

    17KB

    MD5

    c5d67a98b53d07c90b6bf8a54d87cca3

    SHA1

    4cf957464a178b219184308d9110bab3efc3fd78

    SHA256

    23b36cbe0d774877af73bce1eb468db5026f8b4b5b83650baa6fb13beba3e9ac

    SHA512

    7dc2223c4a196d70744617411b0202ab64bcb1dd53aea90d7a71cb3d353b0fa708fdf8acb289c93cc742f77cfdba5aaee069adfcce91368457b8443899c075c8

  • \Windows\Temp\top1.exe
    Filesize

    137KB

    MD5

    a135b9085fa8ef921eec14057b03125f

    SHA1

    4bf5ad5601da96ad4304f3d02b169868c972415d

    SHA256

    24aebc01eb25512c266cc73a1bf90a40b92e5924ddb94ba6db3be9aa89539ea3

    SHA512

    c7d4f74bedb81125a5ba42dad7be1dfa8220f1f5da96d61cc3e6b87fa9dd18217b9c6683ab6f16e0197084eead7db50df401d06a7ef4434038512d7d391effab

  • memory/112-116-0x0000000000000000-mapping.dmp
  • memory/360-83-0x00000000003A0000-0x00000000003C8000-memory.dmp
    Filesize

    160KB

  • memory/360-80-0x0000000000000000-mapping.dmp
  • memory/652-137-0x0000000000000000-mapping.dmp
  • memory/668-59-0x0000000000000000-mapping.dmp
  • memory/792-131-0x000000013F730000-0x000000013F736000-memory.dmp
    Filesize

    24KB

  • memory/792-144-0x0000000002639000-0x0000000002658000-memory.dmp
    Filesize

    124KB

  • memory/792-149-0x0000000002639000-0x0000000002658000-memory.dmp
    Filesize

    124KB

  • memory/792-147-0x0000000026BB0000-0x0000000027356000-memory.dmp
    Filesize

    7.6MB

  • memory/792-132-0x000007FEFB771000-0x000007FEFB773000-memory.dmp
    Filesize

    8KB

  • memory/792-128-0x0000000000000000-mapping.dmp
  • memory/1016-99-0x0000000000000000-mapping.dmp
  • memory/1016-102-0x0000000000F50000-0x0000000000FAA000-memory.dmp
    Filesize

    360KB

  • memory/1016-105-0x0000000000560000-0x000000000056C000-memory.dmp
    Filesize

    48KB

  • memory/1168-67-0x0000000000000000-mapping.dmp
  • memory/1464-78-0x00000000008E0000-0x000000000090A000-memory.dmp
    Filesize

    168KB

  • memory/1464-76-0x0000000000E00000-0x0000000000E66000-memory.dmp
    Filesize

    408KB

  • memory/1464-73-0x0000000000000000-mapping.dmp
  • memory/1572-110-0x0000000000CE0000-0x0000000000CEA000-memory.dmp
    Filesize

    40KB

  • memory/1572-107-0x0000000000000000-mapping.dmp
  • memory/1640-148-0x0000000002060000-0x0000000002CAA000-memory.dmp
    Filesize

    12.3MB

  • memory/1640-134-0x00000000029B0000-0x0000000002A67000-memory.dmp
    Filesize

    732KB

  • memory/1640-125-0x0000000002060000-0x0000000002CAA000-memory.dmp
    Filesize

    12.3MB

  • memory/1640-126-0x0000000002060000-0x0000000002CAA000-memory.dmp
    Filesize

    12.3MB

  • memory/1640-118-0x0000000000000000-mapping.dmp
  • memory/1640-124-0x00000000009F0000-0x0000000000BB3000-memory.dmp
    Filesize

    1.8MB

  • memory/1656-66-0x000000013F400000-0x000000013FC95000-memory.dmp
    Filesize

    8.6MB

  • memory/1656-71-0x000000013F400000-0x000000013FC95000-memory.dmp
    Filesize

    8.6MB

  • memory/1656-63-0x0000000000000000-mapping.dmp
  • memory/1708-61-0x0000000000000000-mapping.dmp
  • memory/1900-96-0x0000000000B20000-0x0000000000B58000-memory.dmp
    Filesize

    224KB

  • memory/1900-93-0x0000000000000000-mapping.dmp
  • memory/1924-138-0x0000000000000000-mapping.dmp
  • memory/1924-145-0x0000000002060000-0x0000000002CAA000-memory.dmp
    Filesize

    12.3MB

  • memory/1924-146-0x0000000002060000-0x0000000002CAA000-memory.dmp
    Filesize

    12.3MB

  • memory/1924-150-0x0000000002060000-0x0000000002CAA000-memory.dmp
    Filesize

    12.3MB

  • memory/1924-152-0x0000000002940000-0x00000000029F7000-memory.dmp
    Filesize

    732KB

  • memory/1960-91-0x0000000002000000-0x0000000002038000-memory.dmp
    Filesize

    224KB

  • memory/1960-89-0x0000000000050000-0x00000000000B8000-memory.dmp
    Filesize

    416KB

  • memory/1960-86-0x0000000000000000-mapping.dmp
  • memory/2012-55-0x0000000074B51000-0x0000000074B53000-memory.dmp
    Filesize

    8KB

  • memory/2012-56-0x0000000000370000-0x0000000000394000-memory.dmp
    Filesize

    144KB

  • memory/2012-54-0x0000000000990000-0x00000000009F6000-memory.dmp
    Filesize

    408KB

  • memory/2012-112-0x0000000000000000-mapping.dmp