Analysis

  • max time kernel
    85s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-01-2021 01:06

General

  • Target

    atikmdag-patcher 1.4.7.exe

  • Size

    6.3MB

  • MD5

    1e43d60694f42e1c1360f484a3d8af44

  • SHA1

    f347872032eba7c0a83e3b02a320d0ff822a41f1

  • SHA256

    08dbec2319a6dc6fc42ac20e63560ff2796b9106ab9cfd4ea3974b45460f4c6b

  • SHA512

    a428139d5f4238289cc1d30918046f503e496ef5ad0275e6d4e828c1f928fb201b83155fec1676c12b185dba40667a4a8b579200c787e9a88a2e53d24947f9eb

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 85 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe
    "C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Users\Admin\AppData\Local\Temp\is-VMPOE.tmp\atikmdag-patcher 1.4.7.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-VMPOE.tmp\atikmdag-patcher 1.4.7.tmp" /SL5="$6005A,5891519,780800,C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe
        "C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe" /VERYSILENT
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2924
        • C:\Users\Admin\AppData\Local\Temp\is-9QP7T.tmp\atikmdag-patcher 1.4.7.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-9QP7T.tmp\atikmdag-patcher 1.4.7.tmp" /SL5="$7005A,5891519,780800,C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.7.exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4084
          • C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.7.exe
            "C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.7.exe" C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.7.exe
            5⤵
            • Executes dropped EXE
            PID:184
          • C:\Program Files (x86)\My Program\keep.exe
            "C:\Program Files (x86)\My Program\keep.exe" C:\Program Files (x86)\My Program\keep.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:700
            • C:\Users\Admin\AppData\Local\Temp\rt.exe
              "C:\Users\Admin\AppData\Local\Temp/rt.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:4028
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c YwQV
                7⤵
                  PID:4040
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c certutil -decode Viso.pdf Fara.pdf & cmd < Fara.pdf
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2576
                  • C:\Windows\SysWOW64\certutil.exe
                    certutil -decode Viso.pdf Fara.pdf
                    8⤵
                      PID:848
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1488
                      • C:\Windows\SysWOW64\findstr.exe
                        findstr /V /R "^wSZJdQSZwKBWJCtpbfZHNwzsXALug$" Ansiosa.wks
                        9⤵
                          PID:760
                        • C:\Windows\SysWOW64\certutil.exe
                          certutil -decode Ma.xls M
                          9⤵
                            PID:204
                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Appare.com
                            Appare.com M
                            9⤵
                            • Executes dropped EXE
                            PID:2200
                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Appare.com
                              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Appare.com M
                              10⤵
                              • Executes dropped EXE
                              • Drops startup file
                              • Suspicious use of SetThreadContext
                              PID:3220
                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                                11⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of SetWindowsHookEx
                                PID:4240
                          • C:\Windows\SysWOW64\PING.EXE
                            ping 127.0.0.1 -n 30
                            9⤵
                            • Runs ping.exe
                            PID:3136
                    • C:\Users\Admin\AppData\Local\Temp\stpopit.exe
                      "C:\Users\Admin\AppData\Local\Temp/stpopit.exe"
                      6⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of WriteProcessMemory
                      PID:1884
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c TxoIPAEm
                        7⤵
                          PID:2692
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c certutil -decode Ascoltami.vsd Tue.html & cmd < Tue.html
                          7⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2244
                          • C:\Windows\SysWOW64\certutil.exe
                            certutil -decode Ascoltami.vsd Tue.html
                            8⤵
                              PID:2220
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd
                              8⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3944
                              • C:\Windows\SysWOW64\findstr.exe
                                findstr /V /R "^kRZuMjyBJtsZkHQEHRpy$" Magro.m4a
                                9⤵
                                  PID:2756
                                • C:\Windows\SysWOW64\certutil.exe
                                  certutil -decode Ne.cab E
                                  9⤵
                                    PID:4092
                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Da.com
                                    Da.com E
                                    9⤵
                                    • Executes dropped EXE
                                    PID:1928
                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Da.com
                                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Da.com E
                                      10⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      PID:3928
                                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                                        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                                        11⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4108
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping 127.0.0.1 -n 30
                                    9⤵
                                    • Runs ping.exe
                                    PID:2084

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.7.exe

                    MD5

                    5616e95156f37d4445947144eb72d84b

                    SHA1

                    2ce32920b08f8b6a0959905010b3699fa9111f28

                    SHA256

                    f3b0e3ba3beb72ad455f478bca6347fbcabbce4ddfa2a6e34f72f11412502434

                    SHA512

                    27f5a5bbb8dd752b575a74a38ab2aa66c9e714fc9c3e7351005be86c856c6f3cc5bb39835ceb5bd3f7b0f08e4bceb5157970cbf8bd0b927d89b35e042b85552e

                  • C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.7.exe

                    MD5

                    5616e95156f37d4445947144eb72d84b

                    SHA1

                    2ce32920b08f8b6a0959905010b3699fa9111f28

                    SHA256

                    f3b0e3ba3beb72ad455f478bca6347fbcabbce4ddfa2a6e34f72f11412502434

                    SHA512

                    27f5a5bbb8dd752b575a74a38ab2aa66c9e714fc9c3e7351005be86c856c6f3cc5bb39835ceb5bd3f7b0f08e4bceb5157970cbf8bd0b927d89b35e042b85552e

                  • C:\Program Files (x86)\My Program\keep.exe

                    MD5

                    8f1560ffac4b5f685d957f26f3da8c91

                    SHA1

                    f0a8f67f32e1486b5ebbeb56ae0c74d3608183f6

                    SHA256

                    c61355b31953f2b6853f380f1c77e6b9263b93cad54d8f4db8e91a54f775b00c

                    SHA512

                    2f8a55cb2afa86cb2d83f5483bfa96b04266f95983cf4590b3fdd9644711d45d5372767b4d3bcc88c798a8cf9a6d37d475b9e7cda7d0d1761137965a103b8998

                  • C:\Program Files (x86)\My Program\keep.exe

                    MD5

                    8f1560ffac4b5f685d957f26f3da8c91

                    SHA1

                    f0a8f67f32e1486b5ebbeb56ae0c74d3608183f6

                    SHA256

                    c61355b31953f2b6853f380f1c77e6b9263b93cad54d8f4db8e91a54f775b00c

                    SHA512

                    2f8a55cb2afa86cb2d83f5483bfa96b04266f95983cf4590b3fdd9644711d45d5372767b4d3bcc88c798a8cf9a6d37d475b9e7cda7d0d1761137965a103b8998

                  • C:\Program Files (x86)\My Program\resource.dll

                    MD5

                    013a6f2f31161c91a9a445bd6cc230e1

                    SHA1

                    ca2de735fe750e91320100b81e0058523c7652a6

                    SHA256

                    6019c54be638bdac665c249634ff5384d7e34f5ee8cb0d8283de14f2ec70e9fd

                    SHA512

                    56d99898efb64595cf1b516482d918ef557cc26f9ea7ea5e6aa0191365566e97df6da6ec019ed0190cf3f065899087690ab96b8c9f611cb5ac356eaa2d7ed7b0

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ansiosa.wks

                    MD5

                    f363043e498919650e397754ec7c8c9d

                    SHA1

                    804ad4227c2f18abd799af862e0d16dc4a299c4d

                    SHA256

                    24c6e2095ee6a98e4dfa0634f60214bff38d6a7633ac3a3a7d53fd03c01b41c2

                    SHA512

                    206bfab0fbff30201c529bb6c3ff3394545bb870e57d3901795b6834d0730e9b7937568d30bceeb6069105752f04d7f859878b3ba67d41ae9d6f5bd3d0118b1b

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Appare.com

                    MD5

                    78ba0653a340bac5ff152b21a83626cc

                    SHA1

                    b12da9cb5d024555405040e65ad89d16ae749502

                    SHA256

                    05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

                    SHA512

                    efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Appare.com

                    MD5

                    78ba0653a340bac5ff152b21a83626cc

                    SHA1

                    b12da9cb5d024555405040e65ad89d16ae749502

                    SHA256

                    05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

                    SHA512

                    efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Appare.com

                    MD5

                    78ba0653a340bac5ff152b21a83626cc

                    SHA1

                    b12da9cb5d024555405040e65ad89d16ae749502

                    SHA256

                    05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

                    SHA512

                    efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fara.pdf

                    MD5

                    e978b8eff23960f958f41c82683db764

                    SHA1

                    f548ce7eca4c7eb58fdb67725a86fc8c7ed2a8dc

                    SHA256

                    3835d4d1d81946a2760df7c78d58df6eef867a15498436e38d48d74941e845aa

                    SHA512

                    167299e411099c3ea722fa3401ac1bbc165ceee3fb3ae4aeae083e6f1a1ab4ab4c2b714bb85c2e42e8b1c48b575233ab81810d51565a6e434729749edf929115

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fresche.wpd

                    MD5

                    808b36526737125ad413e5d772a253ba

                    SHA1

                    1a529db41dbe5555fb42b444b434dabd3bd5ceed

                    SHA256

                    7ca9c4d248c6bf823e7d4d745cf8cd7c3a95593f075e85d29ae71c414e95e25a

                    SHA512

                    ce3fcf6fd4e7c1d9a2512b6e5d982567ce905dc0ba3b401167e1d63043d810d03055966c0dd3c33677eb4d844deafe24b481a919ac9653ab854ce1a0c79afc95

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M

                    MD5

                    3de6c2c92e9f7adc08b0d888a63177d6

                    SHA1

                    0afe6e14dce87a263a8cf4accb63a36c3b0818e2

                    SHA256

                    2021f9828abd8dea0378d5f414fe4f06ef5926ffead111fa5c4e551e903df081

                    SHA512

                    94c259727b69baf04b32a2e06a118d1f4694791b71eb3cffb3981f96c4da32db40ac3f96c3ac6136b864cc1e57223db53ef9851d655631dca5e6ee44e5297aff

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ma.xls

                    MD5

                    bbaf0e88e94b7498d7bb2efbc867a0ca

                    SHA1

                    a264a580e4b1fa2c68aa8bcdb246bbbe558c3d97

                    SHA256

                    15d3f2fed1de2513f8a8f841a08c24025abc42e9ce97f613893bcfb7e4a593ef

                    SHA512

                    66bcdebb7579ed58472d2c96fa8c4e97d1b69398719da411ac654cb4f9136f007ee4538d4efedc57f645bc2cf3fa28126589f18c7ab7dac727fc4b908339ddf1

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe

                    MD5

                    b58b926c3574d28d5b7fdd2ca3ec30d5

                    SHA1

                    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                    SHA256

                    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                    SHA512

                    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe

                    MD5

                    b58b926c3574d28d5b7fdd2ca3ec30d5

                    SHA1

                    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                    SHA256

                    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                    SHA512

                    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Viso.pdf

                    MD5

                    c41a4c03c29003bc0a717a47c05d9b88

                    SHA1

                    e6c18e38fda5ab34c251a5b3b01309b3476489e0

                    SHA256

                    522c2942e9154228e10f9359566b6c647a378c05e4cd59c42527b2094691aa81

                    SHA512

                    1f0cfe111fc260bd5fdca9f3c905f9c7f2a7ad7f76bf1feaa69bed12dc38c70f0b0ba4e1b1e46c5cfd48726bdb6a417e8a20417e87e35b0c9f349f8a5ad7edcd

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ascoltami.vsd

                    MD5

                    70edb93e086c46de7138d7437df387c0

                    SHA1

                    b507df7b8622a44b29f70946cdc82789067f3f14

                    SHA256

                    fcf760f3d25131763bb68a4e0ca6edaad10530d9b53413383721f035fd0838be

                    SHA512

                    d0e8b1378ab58fcc3c6f24103c8c7df9e1a9bac390987a41b93351f8dd3b5dfba9b8fd9577b5393ba4140e856ab9e6440227c36fef666e994b6a233e48fe49c5

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Da.com

                    MD5

                    78ba0653a340bac5ff152b21a83626cc

                    SHA1

                    b12da9cb5d024555405040e65ad89d16ae749502

                    SHA256

                    05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

                    SHA512

                    efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Da.com

                    MD5

                    78ba0653a340bac5ff152b21a83626cc

                    SHA1

                    b12da9cb5d024555405040e65ad89d16ae749502

                    SHA256

                    05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

                    SHA512

                    efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Da.com

                    MD5

                    78ba0653a340bac5ff152b21a83626cc

                    SHA1

                    b12da9cb5d024555405040e65ad89d16ae749502

                    SHA256

                    05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

                    SHA512

                    efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\E

                    MD5

                    12903c30dcfcf2b57cf3bd85857088a3

                    SHA1

                    7b310e4d763bbb756e41bf1b37c15345883fb8ac

                    SHA256

                    968ffd11166d926c7756b83d0ca17d3d9d475a8677d321995d0d9a44630fc142

                    SHA512

                    c1e2709ef0474afb05bf09377261c525e3044e3bf4a9d388200f53ace1b7ecaed9f11a8ae89e4c5e281310871a04119b24bc54b9f15224bd568a69cea06ea1eb

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Magro.m4a

                    MD5

                    2f6790ccf7cea7c5f858b769f06709e7

                    SHA1

                    002abffcca6d4701a4f4d9f0340bbd555200e672

                    SHA256

                    a16cc02f8a3c93874de5888855246eaabb5ae1908d70266ab4428765de373c22

                    SHA512

                    46fd1bab2c49c043a19ae1b71559694162823e17620fb29c1c68dc09a28241a12d58969d77ea482e5e38a9dd23a9a1299c195c6102fe5dfd1e233801709c2176

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ne.cab

                    MD5

                    191f78d91c00aae954c20e7d7cea361e

                    SHA1

                    407d4901ec62efd52f1339e183b88315f8ebc8e1

                    SHA256

                    75dfa8b6b61a531bc3d76d2de4abe4c65fa83b4fddfd17a8cf2a07a52e076b4f

                    SHA512

                    fbe25f494d1db18dac12dde905fc21a7232ed3da72911124a0b5cdcf4ac827d5133b2681c1714e7b359fb9555bac1ca13b637d1119a127fbbea42ccfbd50b091

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Promesso.jar

                    MD5

                    ab04c32370b5b3a8c1612ac506176bf1

                    SHA1

                    c33dcdceaf8bb68082e55a1421d48c53bc4f083b

                    SHA256

                    6769f7fad25a161290777b143322bee65df02e7f4549d7abfe5d429f6fa9b0ea

                    SHA512

                    7afb6b4dc8ee3dfabc3194c9dd544f9b52757f9bc69a369fd07418b06e91148a202bafc7bbe71d034e26a0e5a9251238445c070ec2046cbeb496b16f9d5f46bb

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe

                    MD5

                    b58b926c3574d28d5b7fdd2ca3ec30d5

                    SHA1

                    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                    SHA256

                    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                    SHA512

                    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe

                    MD5

                    b58b926c3574d28d5b7fdd2ca3ec30d5

                    SHA1

                    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                    SHA256

                    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                    SHA512

                    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Tue.html

                    MD5

                    028baf06dfed68e9c21977aecac57b1f

                    SHA1

                    472059c93b1183200bca025f62f2e0c472b94fd7

                    SHA256

                    e9bc2db22920ac2433dd459fbf30bf56e11133ac56b3426a12c523eb7e50bb33

                    SHA512

                    82679f7738d5e8a32571b07a0027fddb6b4e88207c943981e441eba6301ce37295fd32d750ff084f29d9f00e0467945eacd0328f8871c9222f7c1bdd1694cc3b

                  • C:\Users\Admin\AppData\Local\Temp\is-9QP7T.tmp\atikmdag-patcher 1.4.7.tmp

                    MD5

                    db27920346f23c1d742ec0722426417e

                    SHA1

                    adf18d452653e13ab5518706ea9c4c492a46f4f7

                    SHA256

                    a43522b8be197d4097bc7a04ac42e7bfb7e085e39969b58d0e4f2e7ff4cbc0f5

                    SHA512

                    43f57a95c574c92d8d73f9767844681e1a45c7def5dc79848d357a1cf437b7874325af12b72c226fcdd109a9f8824c4e735d515d04b7fa65186604309dad10e5

                  • C:\Users\Admin\AppData\Local\Temp\is-VMPOE.tmp\atikmdag-patcher 1.4.7.tmp

                    MD5

                    db27920346f23c1d742ec0722426417e

                    SHA1

                    adf18d452653e13ab5518706ea9c4c492a46f4f7

                    SHA256

                    a43522b8be197d4097bc7a04ac42e7bfb7e085e39969b58d0e4f2e7ff4cbc0f5

                    SHA512

                    43f57a95c574c92d8d73f9767844681e1a45c7def5dc79848d357a1cf437b7874325af12b72c226fcdd109a9f8824c4e735d515d04b7fa65186604309dad10e5

                  • C:\Users\Admin\AppData\Local\Temp\rt.exe

                    MD5

                    bb4beef02da8dad3d51e5b633aa7bd7e

                    SHA1

                    2697021d2e7fcc7897bd783d43e2641985dcaebd

                    SHA256

                    fe41d5e451fad456182894fdfa58509b2cc00ba19d026932b0cabdc173b3d7e0

                    SHA512

                    48ee4f8febc1d2a049586b8704022bfaf03b8d9d79e4ca2fc9fbdee40534f1a5db23342e62f2c812d2d04e413d3eac5839e0e251e16d7e39a27594aae4fef33d

                  • C:\Users\Admin\AppData\Local\Temp\stpopit.exe

                    MD5

                    9cdcb057318090085378e27abb294c49

                    SHA1

                    31026fc4a3abaa89c19f65c67dc0abc5fb66f320

                    SHA256

                    3f80def9b910063314c8593a48a28647a060f5eaed7a46c6be24a6e36a0b2e48

                    SHA512

                    018ec6b7f0104cbf7adb89893a9079ece63744c9572dfd4727bbeb133c0c73b539069e35fd32279890300ad2970bb6b621ae78ddeaed433e5cce16b37a6a3c01

                  • \Program Files (x86)\My Program\resource.dll

                    MD5

                    013a6f2f31161c91a9a445bd6cc230e1

                    SHA1

                    ca2de735fe750e91320100b81e0058523c7652a6

                    SHA256

                    6019c54be638bdac665c249634ff5384d7e34f5ee8cb0d8283de14f2ec70e9fd

                    SHA512

                    56d99898efb64595cf1b516482d918ef557cc26f9ea7ea5e6aa0191365566e97df6da6ec019ed0190cf3f065899087690ab96b8c9f611cb5ac356eaa2d7ed7b0

                  • memory/184-11-0x0000000000000000-mapping.dmp

                  • memory/204-42-0x0000000000000000-mapping.dmp

                  • memory/700-20-0x0000000000400000-0x0000000000AEA000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/700-19-0x0000000064640000-0x0000000064730000-memory.dmp

                    Filesize

                    960KB

                  • memory/700-14-0x0000000000000000-mapping.dmp

                  • memory/760-38-0x0000000000000000-mapping.dmp

                  • memory/848-28-0x0000000000000000-mapping.dmp

                  • memory/1488-35-0x0000000000000000-mapping.dmp

                  • memory/1884-24-0x0000000000000000-mapping.dmp

                  • memory/1928-47-0x0000000000000000-mapping.dmp

                  • memory/2084-49-0x0000000000000000-mapping.dmp

                  • memory/2200-45-0x0000000000000000-mapping.dmp

                  • memory/2220-30-0x0000000000000000-mapping.dmp

                  • memory/2244-29-0x0000000000000000-mapping.dmp

                  • memory/2576-26-0x0000000000000000-mapping.dmp

                  • memory/2680-5-0x0000000000770000-0x0000000000771000-memory.dmp

                    Filesize

                    4KB

                  • memory/2680-2-0x0000000000000000-mapping.dmp

                  • memory/2692-27-0x0000000000000000-mapping.dmp

                  • memory/2756-37-0x0000000000000000-mapping.dmp

                  • memory/2924-6-0x0000000000000000-mapping.dmp

                  • memory/3084-4-0x0000000000401000-0x00000000004B7000-memory.dmp

                    Filesize

                    728KB

                  • memory/3136-51-0x0000000000000000-mapping.dmp

                  • memory/3220-53-0x0000000000000000-mapping.dmp

                  • memory/3928-54-0x0000000000000000-mapping.dmp

                  • memory/3928-60-0x0000000000D40000-0x0000000000D41000-memory.dmp

                    Filesize

                    4KB

                  • memory/3944-36-0x0000000000000000-mapping.dmp

                  • memory/4028-21-0x0000000000000000-mapping.dmp

                  • memory/4040-23-0x0000000000000000-mapping.dmp

                  • memory/4084-10-0x0000000000780000-0x0000000000781000-memory.dmp

                    Filesize

                    4KB

                  • memory/4084-7-0x0000000000000000-mapping.dmp

                  • memory/4092-41-0x0000000000000000-mapping.dmp

                  • memory/4108-64-0x00000000726A0000-0x0000000072D8E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/4108-67-0x0000000005180000-0x0000000005181000-memory.dmp

                    Filesize

                    4KB

                  • memory/4108-70-0x0000000004C90000-0x0000000004C91000-memory.dmp

                    Filesize

                    4KB

                  • memory/4108-71-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                    Filesize

                    4KB

                  • memory/4108-72-0x0000000004F00000-0x0000000004F01000-memory.dmp

                    Filesize

                    4KB

                  • memory/4108-68-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

                    Filesize

                    4KB

                  • memory/4108-75-0x0000000005F00000-0x0000000005F01000-memory.dmp

                    Filesize

                    4KB

                  • memory/4108-76-0x0000000006600000-0x0000000006601000-memory.dmp

                    Filesize

                    4KB

                  • memory/4108-95-0x0000000007F20000-0x0000000007F21000-memory.dmp

                    Filesize

                    4KB

                  • memory/4108-69-0x0000000004C50000-0x0000000004C51000-memory.dmp

                    Filesize

                    4KB

                  • memory/4108-61-0x0000000000780000-0x00000000007A6000-memory.dmp

                    Filesize

                    152KB

                  • memory/4108-92-0x00000000065A0000-0x00000000065A1000-memory.dmp

                    Filesize

                    4KB

                  • memory/4108-88-0x0000000006170000-0x0000000006171000-memory.dmp

                    Filesize

                    4KB

                  • memory/4108-87-0x00000000061F0000-0x00000000061F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/4240-84-0x0000000005050000-0x0000000005051000-memory.dmp

                    Filesize

                    4KB

                  • memory/4240-83-0x0000000005550000-0x0000000005551000-memory.dmp

                    Filesize

                    4KB

                  • memory/4240-89-0x0000000005160000-0x0000000005161000-memory.dmp

                    Filesize

                    4KB

                  • memory/4240-80-0x00000000726A0000-0x0000000072D8E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/4240-94-0x00000000066C0000-0x00000000066C1000-memory.dmp

                    Filesize

                    4KB

                  • memory/4240-77-0x0000000000B10000-0x0000000000B5E000-memory.dmp

                    Filesize

                    312KB