Analysis
-
max time kernel
293s -
max time network
290s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe
Resource
win7-20240508-en
General
-
Target
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe
-
Size
1.9MB
-
MD5
eaa443f37443cb7221d63e0891243384
-
SHA1
d3242326b2ac1ae6e9817a49df33c3a79e209aee
-
SHA256
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13
-
SHA512
8405c44c1eea8578224eb6495f689d66e4e2f6503c0bf08d3c111e4e307603a35089649296ebf89b76d339c9517a83133b741c655097a9fe319f25aae1f6afdb
-
SSDEEP
49152:6YyPZ96v5ohNyPiYPl5A7E2+P75+Zg6RenX1IAhTiz8wPT:kBSPiYNK7mP91/TOQ
Malware Config
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Extracted
redline
newlogs
85.28.47.7:17210
Extracted
stealc
ZOV
http://40.86.87.10
-
url_path
/108e010e8f91c38c.php
Extracted
redline
newbuild
185.215.113.67:40960
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe family_redline behavioral1/memory/2976-320-0x00000000002C0000-0x0000000000310000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe family_redline behavioral1/memory/1240-356-0x00000000001A0000-0x00000000001F0000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exeaxplong.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exeaxplong.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Executes dropped EXE 9 IoCs
Processes:
axplong.exestreamer.exeTpWWMUpe0LEV.exeFreshbuild.exeHkbsse.execrypt6.exenewlogs.exestealc_zov.exenewbuild.exepid process 2896 axplong.exe 2308 streamer.exe 1664 TpWWMUpe0LEV.exe 2700 Freshbuild.exe 1504 Hkbsse.exe 2640 crypt6.exe 2976 newlogs.exe 1348 stealc_zov.exe 1240 newbuild.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exeaxplong.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine axplong.exe -
Loads dropped DLL 18 IoCs
Processes:
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exeaxplong.exeTpWWMUpe0LEV.exeFreshbuild.exeWerFault.exestealc_zov.exepid process 2212 bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe 2896 axplong.exe 2896 axplong.exe 2896 axplong.exe 1664 TpWWMUpe0LEV.exe 2896 axplong.exe 2700 Freshbuild.exe 2896 axplong.exe 2896 axplong.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 2896 axplong.exe 2896 axplong.exe 2896 axplong.exe 2896 axplong.exe 1348 stealc_zov.exe 1348 stealc_zov.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exeaxplong.exepid process 2212 bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe 2896 axplong.exe -
Drops file in Windows directory 2 IoCs
Processes:
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exeFreshbuild.exedescription ioc process File created C:\Windows\Tasks\axplong.job bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe File created C:\Windows\Tasks\Hkbsse.job Freshbuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3000 2640 WerFault.exe crypt6.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
stealc_zov.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_zov.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_zov.exe -
Processes:
axplong.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 19000000010000001000000044ba5fd9039fc9b56fd8aadccd597ca6030000000100000014000000317a2ad07f2b335ef5a1c34e4b57e8b7d8f1fca61d00000001000000100000005959ddbc9c7632ba0a05f06316846fe6140000000100000014000000a848b4242fc6ea24a0d78e3cb93c5c78d79833e4090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000002e00000053007400610072006600690065006c006400200054006500630068006e006f006c006f006700690065007300000053000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c00f000000010000001400000007eeabaf80a9ef4ae1b2cb9b4b5fc70d0428e6a92000000001000000eb020000308202e730820250020101300d06092a864886f70d01010505003081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d301e170d3939303632363030313935345a170d3139303632363030313935345a3081bb312430220603550407131b56616c69436572742056616c69646174696f6e204e6574776f726b31173015060355040a130e56616c69436572742c20496e632e31353033060355040b132c56616c694365727420436c617373203220506f6c6963792056616c69646174696f6e20417574686f726974793121301f06035504031318687474703a2f2f7777772e76616c69636572742e636f6d2f3120301e06092a864886f70d0109011611696e666f4076616c69636572742e636f6d30819f300d06092a864886f70d010101050003818d0030818902818100ce3a71cae5abc8599255d7abd8740ef9eed9f655475965470e0555dceb98363c5c535dd330cf38ecbd4189ed254209246b0a5eb37cdd522d4ce6d4d67d5a59a965d449132d244d1c506fb5c185543bfe71e4d35c42f980e0911a0a5b393667f33f557c1b3fb45f647334e3b412bf8764f8da12ff3727c1b343bbef7b6e2e69f70203010001300d06092a864886f70d0101050500038181003b7f506f6f509499496238381f4bf8a5c83ea78281f62bc7e8c5cee83a1082cb18008e4dbda8587fa17900b5bbe98daf41d90f34ee218119a0324928f4c48e56d55233fd50d57e996c03e4c94cfccb6cab66b34a218ce5b50c323e10b2cc6ca1dc9a984c025bf3ceb99ea5720e4ab73f3ce61668f8beed744cbc5bd5621f43dd axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 axplong.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A axplong.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 axplong.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 axplong.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exeaxplong.exestealc_zov.exepid process 2212 bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe 2896 axplong.exe 1348 stealc_zov.exe 1348 stealc_zov.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exeFreshbuild.exepid process 2212 bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe 2700 Freshbuild.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exeaxplong.exeFreshbuild.execrypt6.exedescription pid process target process PID 2212 wrote to memory of 2896 2212 bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe axplong.exe PID 2212 wrote to memory of 2896 2212 bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe axplong.exe PID 2212 wrote to memory of 2896 2212 bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe axplong.exe PID 2212 wrote to memory of 2896 2212 bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe axplong.exe PID 2896 wrote to memory of 2308 2896 axplong.exe streamer.exe PID 2896 wrote to memory of 2308 2896 axplong.exe streamer.exe PID 2896 wrote to memory of 2308 2896 axplong.exe streamer.exe PID 2896 wrote to memory of 2308 2896 axplong.exe streamer.exe PID 2896 wrote to memory of 1664 2896 axplong.exe TpWWMUpe0LEV.exe PID 2896 wrote to memory of 1664 2896 axplong.exe TpWWMUpe0LEV.exe PID 2896 wrote to memory of 1664 2896 axplong.exe TpWWMUpe0LEV.exe PID 2896 wrote to memory of 1664 2896 axplong.exe TpWWMUpe0LEV.exe PID 2896 wrote to memory of 2700 2896 axplong.exe Freshbuild.exe PID 2896 wrote to memory of 2700 2896 axplong.exe Freshbuild.exe PID 2896 wrote to memory of 2700 2896 axplong.exe Freshbuild.exe PID 2896 wrote to memory of 2700 2896 axplong.exe Freshbuild.exe PID 2700 wrote to memory of 1504 2700 Freshbuild.exe Hkbsse.exe PID 2700 wrote to memory of 1504 2700 Freshbuild.exe Hkbsse.exe PID 2700 wrote to memory of 1504 2700 Freshbuild.exe Hkbsse.exe PID 2700 wrote to memory of 1504 2700 Freshbuild.exe Hkbsse.exe PID 2896 wrote to memory of 2640 2896 axplong.exe crypt6.exe PID 2896 wrote to memory of 2640 2896 axplong.exe crypt6.exe PID 2896 wrote to memory of 2640 2896 axplong.exe crypt6.exe PID 2896 wrote to memory of 2640 2896 axplong.exe crypt6.exe PID 2640 wrote to memory of 3000 2640 crypt6.exe WerFault.exe PID 2640 wrote to memory of 3000 2640 crypt6.exe WerFault.exe PID 2640 wrote to memory of 3000 2640 crypt6.exe WerFault.exe PID 2640 wrote to memory of 3000 2640 crypt6.exe WerFault.exe PID 2896 wrote to memory of 2976 2896 axplong.exe newlogs.exe PID 2896 wrote to memory of 2976 2896 axplong.exe newlogs.exe PID 2896 wrote to memory of 2976 2896 axplong.exe newlogs.exe PID 2896 wrote to memory of 2976 2896 axplong.exe newlogs.exe PID 2896 wrote to memory of 1348 2896 axplong.exe stealc_zov.exe PID 2896 wrote to memory of 1348 2896 axplong.exe stealc_zov.exe PID 2896 wrote to memory of 1348 2896 axplong.exe stealc_zov.exe PID 2896 wrote to memory of 1348 2896 axplong.exe stealc_zov.exe PID 2896 wrote to memory of 1240 2896 axplong.exe newbuild.exe PID 2896 wrote to memory of 1240 2896 axplong.exe newbuild.exe PID 2896 wrote to memory of 1240 2896 axplong.exe newbuild.exe PID 2896 wrote to memory of 1240 2896 axplong.exe newbuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe"C:\Users\Admin\AppData\Local\Temp\bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe"C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe"C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe"C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 964⤵
- Loads dropped DLL
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe"C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe"C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe"C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD514fa1dae2bd3ff12a9fb61d4a46709c8
SHA17d4563d96c31f7e21946b649fa4ecad96cf7b49f
SHA2561b6e7f099333cf0657f242b3bb3d9ac6124672f75fb006a5e14a5135a691293c
SHA512ec0afa29bba501e64ed22b93c06a80d498f8e480b69947bba433885327ee6ab7155f5be182b9e99d0b831c6c8f23f6a53146d2cb5a2569476161db23dc5ceb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5179f21c3f04ff4acd61047a98e751ddd
SHA1603a3af574f08c92168c2e1267a694673050e7ba
SHA25635f9f2134376c357bf65035334eb4c87b1957ba6a3aaf3ace6927dc0d0d7056c
SHA51246db0ebcf48a3684f95270b6204e7a6d8a3c369e4b2239b82248ad991c0c78141e6982808b37542593a26a40baddcb840356cbf7f10aaa6bb4e1411bbecdfc73
-
C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exeFilesize
6.2MB
MD5b9265c31743db2e9698a08df7b0c5e9d
SHA1aa01367b13f827a5773d0781692809ae175bc718
SHA256b2a10d42ed9b902a6a4a40b47da8448c9fa61f268f3ffb37d08bd5f5e213a0af
SHA5121678d62ad17ce27394599f2835f3c1f209f544fdfae4c54034e7da06936768fe487a55811d9f0919018113af50153437ea0631968814910db69df0ffda36a133
-
C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeFilesize
1.2MB
MD5242214131486132e33ceda794d66ca1f
SHA14ce34fd91f5c9e35b8694007b286635663ef9bf2
SHA256bac402b5749b2da2211db6d2404c1c621ccd0c2e5d492eb6f973b3e2d38dd361
SHA512031e0904d949cec515f2d6f2b5e4b9c0df03637787ff14f20c58e711c54eec77d1f22aa0cf0f6efd65362c1fc0066645d5d005c6a77fe5b169427cdd42555d29
-
C:\Users\Admin\AppData\Local\Temp\1000115001\build.exeFilesize
26KB
MD5d4772d72345f5954d7b861cf083f8a98
SHA1d8c7fe851babf5d1c581fbb8acc086f136bcc621
SHA256f2605302b0acafeaf7fe2a1729e952ae5bf6de60f03b5be4cc35e7e127081543
SHA51203cc77e1839019018c5be3c53adcd16a7709d0b8124e5646453f073cc701c67c5e82ccd53132e45651bd19cff324284bc90ef68d81e4f5c68e3511c61a2d621b
-
C:\Users\Admin\AppData\Local\Temp\1000116001\FILE1.exeFilesize
26KB
MD5dc9594dc1a1a39edfc0ab32584e78089
SHA18c8437cfdfd4275f4a43e7c9f9efee310a373491
SHA25647fad70877dc21b147e9fcf0582c40e31cb7696db7d91981b518682d11965187
SHA51298ff90c4ea8348a48cc6d41badde653f77ef875092fb54c0ae2aa540abc3e378ca60f1798faa395dba16de2bf89cd2b49c263d0bcf077093928f741768951068
-
C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exeFilesize
415KB
MD507101cac5b9477ba636cd8ca7b9932cb
SHA159ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1
SHA256488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77
SHA51202240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887
-
C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exeFilesize
512KB
MD5a957dc16d684fbd7e12fc87e8ee12fea
SHA120c73ccfdba13fd9b79c9e02432be39e48e4b37d
SHA256071b6c448d2546dea8caed872fca0d002f59a6b9849f0de2a565fc74b487fa37
SHA512fd6982587fba779d6febb84dfa65ec3e048e17733c2f01b61996bedb170bb4bb1cbb822c0dd2cf44a7e601373abaf499885b13b7957dd2a307bbd8f2120e9b3b
-
C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exeFilesize
297KB
MD50970456d2e2bcb36f49d23f5f2eec4ce
SHA11e427bbeb209b636371d17801b14fabff87921be
SHA256264db4d677606c95912a93a457675d5ebaa24dc886da8bbcb800fe831c540a54
SHA51243c233e6c6fb20ee5830672f68eec2a1930aff6c3da185b7af56ede90970041157755b8893a86336711c8ba8cbe3f22818de8ddc1789ed65a7aacd596771909e
-
C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exeFilesize
158KB
MD5253ccac8a47b80287f651987c0c779ea
SHA111db405849dbaa9b3759de921835df20fab35bc3
SHA256262a400b339deea5089433709ce559d23253e23d23c07595b515755114147e2f
SHA512af40e01bc3d36baf47eba1d5d6406220dfbcc52c6123dd8450e709fed3e72bed82aac6257fa7bdf7dd774f182919a5051e9712b2e7f1329defd0b159cb08385d
-
C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exeFilesize
297KB
MD59ab4de8b2f2b99f009d32aa790cd091b
SHA1a86b16ee4676850bac14c50ee698a39454d0231e
SHA2568a254344702dc6560312a8028e08f844b16804b1fbf4c438c3ca5058d7b65ea1
SHA512a79341ec3407529daa0384de4cac25b665d3b0cb81e52ecada0ebfe37d7616b16da96b47b04f50ce0a6e46d5fced3298a459f78a087c6b6eac4ed444434c5fbe
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeFilesize
1.9MB
MD5eaa443f37443cb7221d63e0891243384
SHA1d3242326b2ac1ae6e9817a49df33c3a79e209aee
SHA256bef6f82a9c4064f8639e804036f460bafdd01eec87a355e247775d315b76db13
SHA5128405c44c1eea8578224eb6495f689d66e4e2f6503c0bf08d3c111e4e307603a35089649296ebf89b76d339c9517a83133b741c655097a9fe319f25aae1f6afdb
-
C:\Users\Admin\AppData\Local\Temp\Tar398E.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
\Users\Admin\AppData\Roaming\d3d9.dllFilesize
279KB
MD58fa26f1e37d3ff7f736fc93d520bc8ab
SHA1ad532e1cb4a1b3cd82c7a85647f8f6dd99833bb1
SHA2566c47da8fbd12f22d7272fbf223e054bf5093c0922d0e8fb7d6289a5913c2e45d
SHA5128a0b53cbc3a20e2f0fd41c486b1af1fbbcf7f2fed9f7368b672a07f25faaa2568bbdbcf0841233ac8c473a4d1dee099e90bf6098a6fa15e44b8526efdafc1287
-
memory/1240-356-0x00000000001A0000-0x00000000001F0000-memory.dmpFilesize
320KB
-
memory/1348-603-0x0000000000960000-0x0000000000B9C000-memory.dmpFilesize
2.2MB
-
memory/1348-340-0x0000000000960000-0x0000000000B9C000-memory.dmpFilesize
2.2MB
-
memory/1348-428-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/1664-242-0x0000000000B50000-0x0000000000C82000-memory.dmpFilesize
1.2MB
-
memory/2212-16-0x0000000007060000-0x0000000007531000-memory.dmpFilesize
4.8MB
-
memory/2212-0-0x00000000010D0000-0x00000000015A1000-memory.dmpFilesize
4.8MB
-
memory/2212-15-0x00000000010D0000-0x00000000015A1000-memory.dmpFilesize
4.8MB
-
memory/2212-9-0x00000000010D0000-0x00000000015A1000-memory.dmpFilesize
4.8MB
-
memory/2212-5-0x00000000010D0000-0x00000000015A1000-memory.dmpFilesize
4.8MB
-
memory/2212-3-0x00000000010D0000-0x00000000015A1000-memory.dmpFilesize
4.8MB
-
memory/2212-2-0x00000000010D1000-0x00000000010FF000-memory.dmpFilesize
184KB
-
memory/2212-1-0x00000000774A0000-0x00000000774A2000-memory.dmpFilesize
8KB
-
memory/2308-225-0x000000013F090000-0x000000013F726000-memory.dmpFilesize
6.6MB
-
memory/2896-613-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-627-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-337-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-339-0x0000000008280000-0x00000000084BC000-memory.dmpFilesize
2.2MB
-
memory/2896-632-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-227-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-611-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-22-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-20-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-19-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-602-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-18-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-605-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-606-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-607-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-608-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-609-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-338-0x0000000008280000-0x00000000084BC000-memory.dmpFilesize
2.2MB
-
memory/2896-426-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-341-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-610-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-614-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-615-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-616-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-617-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-618-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-619-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-620-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-621-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-622-0x0000000008280000-0x00000000084BC000-memory.dmpFilesize
2.2MB
-
memory/2896-623-0x0000000008280000-0x00000000084BC000-memory.dmpFilesize
2.2MB
-
memory/2896-624-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-625-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-626-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-612-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-628-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-629-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-630-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2896-631-0x0000000000D30000-0x0000000001201000-memory.dmpFilesize
4.8MB
-
memory/2976-320-0x00000000002C0000-0x0000000000310000-memory.dmpFilesize
320KB