Analysis

  • max time kernel
    300s
  • max time network
    341s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 22:18

General

  • Target

    d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890.exe

  • Size

    241KB

  • MD5

    3c0eaa80d5332030e07f85fbd5960044

  • SHA1

    4f3495495a1eb31709949979dc78c23406eb9648

  • SHA256

    d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890

  • SHA512

    4380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa

  • SSDEEP

    6144:6BizIWRzBlSIiLaliSMrf5ujpmzqaAl5LiS:6asaxMNujpcqae4S

Malware Config

Extracted

Family

amadey

Version

3.50

C2

1h3art.me/i4kvjd3xc/index.php

193.56.146.174/g84kvj4jck/index.php

Extracted

Family

redline

Botnet

5139967220

C2

79.137.192.6:8362

Extracted

Family

laplas

C2

79.137.206.137

Attributes
  • api_key

    0f183cb4288647960d1c458ed8456bf6524ebfbc16ebc53caab66c2376fd0eef

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects LgoogLoader payload 1 IoCs
  • Laplas Clipper

    Laplas is a crypto wallet stealer with two variants written in Golang and C#.

  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 18 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 18 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890.exe
    "C:\Users\Admin\AppData\Local\Temp\d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:572
      • C:\Users\Admin\AppData\Local\Temp\1000001001\Amadey.exe
        "C:\Users\Admin\AppData\Local\Temp\1000001001\Amadey.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
          "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1708
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1304
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1472
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:280
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "rovwer.exe" /P "Admin:N"
                6⤵
                  PID:1688
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rovwer.exe" /P "Admin:R" /E
                  6⤵
                    PID:1748
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:608
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\99e342142d" /P "Admin:N"
                      6⤵
                        PID:948
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\99e342142d" /P "Admin:R" /E
                        6⤵
                          PID:1728
                      • C:\Users\Admin\AppData\Roaming\1000209000\mine.exe
                        "C:\Users\Admin\AppData\Roaming\1000209000\mine.exe"
                        5⤵
                        • Executes dropped EXE
                        PID:588
                      • C:\Users\Admin\AppData\Local\Temp\1000212001\3000.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000212001\3000.exe"
                        5⤵
                        • Executes dropped EXE
                        PID:572
                      • C:\Users\Admin\AppData\Local\Temp\1000214001\zzz.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000214001\zzz.exe"
                        5⤵
                        • Executes dropped EXE
                        PID:1812
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1000214001\zzz.exe
                          6⤵
                            PID:1832
                            • C:\Windows\system32\choice.exe
                              choice /C Y /N /D Y /T 0
                              7⤵
                                PID:1620
                          • C:\Users\Admin\AppData\Local\Temp\1000215001\zzz.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000215001\zzz.exe"
                            5⤵
                            • Executes dropped EXE
                            PID:952
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1000215001\zzz.exe
                              6⤵
                                PID:1396
                                • C:\Windows\system32\choice.exe
                                  choice /C Y /N /D Y /T 0
                                  7⤵
                                    PID:1624
                              • C:\Users\Admin\AppData\Local\Temp\1000216001\1.exe
                                "C:\Users\Admin\AppData\Local\Temp\1000216001\1.exe"
                                5⤵
                                • UAC bypass
                                • Executes dropped EXE
                                • Sets service image path in registry
                                • Checks whether UAC is enabled
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: LoadsDriver
                                • Suspicious use of AdjustPrivilegeToken
                                • System policy modification
                                PID:1492
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000216001\1.exe" -Force
                                  6⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1768
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                  6⤵
                                    PID:1348
                                • C:\Users\Admin\AppData\Local\Temp\1000217001\1000.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1000217001\1000.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  PID:828
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                                    6⤵
                                    • Loads dropped DLL
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1100
                                    • C:\Users\Admin\AppData\Local\Temp\Smart.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Smart.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      PID:1152
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 36
                                    6⤵
                                    • Loads dropped DLL
                                    • Program crash
                                    PID:872
                        • C:\Windows\system32\taskeng.exe
                          taskeng.exe {6AEFC730-DC3B-48BC-8800-F4F8924F9FDA} S-1-5-21-575491160-2295418218-1540667289-1000:VZODHOJJ\Admin:Interactive:[1]
                          1⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1372
                          • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            2⤵
                            • Executes dropped EXE
                            PID:1412
                          • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                            C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                            2⤵
                            • Executes dropped EXE
                            PID:756
                          • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            2⤵
                            • Executes dropped EXE
                            PID:540
                          • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                            C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                            2⤵
                            • Executes dropped EXE
                            PID:2020
                          • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            2⤵
                            • Executes dropped EXE
                            PID:800
                          • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                            C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                            2⤵
                            • Executes dropped EXE
                            PID:1152
                          • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                            C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                            2⤵
                            • Executes dropped EXE
                            PID:2044
                          • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                            2⤵
                            • Executes dropped EXE
                            PID:1768

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Execution

                        Scripting

                        1
                        T1064

                        Scheduled Task

                        1
                        T1053

                        Persistence

                        Registry Run Keys / Startup Folder

                        2
                        T1060

                        Scheduled Task

                        1
                        T1053

                        Privilege Escalation

                        Bypass User Account Control

                        1
                        T1088

                        Scheduled Task

                        1
                        T1053

                        Defense Evasion

                        Bypass User Account Control

                        1
                        T1088

                        Disabling Security Tools

                        1
                        T1089

                        Modify Registry

                        4
                        T1112

                        Scripting

                        1
                        T1064

                        Credential Access

                        Credentials in Files

                        2
                        T1081

                        Discovery

                        System Information Discovery

                        2
                        T1082

                        Collection

                        Data from Local System

                        2
                        T1005

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\1000001001\Amadey.exe
                          Filesize

                          241KB

                          MD5

                          b466f58861bb4069db99312de146a2e8

                          SHA1

                          295f06794b26ba5ac7c73fbf636c581624f897cd

                          SHA256

                          6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                          SHA512

                          8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                        • C:\Users\Admin\AppData\Local\Temp\1000001001\Amadey.exe
                          Filesize

                          241KB

                          MD5

                          b466f58861bb4069db99312de146a2e8

                          SHA1

                          295f06794b26ba5ac7c73fbf636c581624f897cd

                          SHA256

                          6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                          SHA512

                          8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                        • C:\Users\Admin\AppData\Local\Temp\1000212001\3000.exe
                          Filesize

                          2.4MB

                          MD5

                          77181eb9385b899f4bce3387a2efe18c

                          SHA1

                          68488c2d2aae96c6f552bcddb81e198b0390312a

                          SHA256

                          e18597f8343d2752ecfea69c4615ea58f37d948ee5d0741791410fb2a4827b1b

                          SHA512

                          3d034f0b238ad5da850d38f3f247693415ca1773aab84f25c32d500864d7a11b8385d2c5da45a19950c5cdad9664963af85ae13d48da7fceee895d847f94eeb9

                        • C:\Users\Admin\AppData\Local\Temp\1000214001\zzz.exe
                          Filesize

                          2.4MB

                          MD5

                          e289e55c96e8c077a682aa0530841161

                          SHA1

                          d5154044ff465fa535955c857118b59124c85547

                          SHA256

                          a9e18560e367a43b940ba8ff800dc6eb77c44d03ebc9e1686d0f2e8e5496814a

                          SHA512

                          a9a33b18c30a0016b7d2d5818c9922afa31e79e6783021dfa838672c7900b22a8b9041df6b0847a54e39b40fb7e62b2c341de64b140b24d54c0cb41a49301eaf

                        • C:\Users\Admin\AppData\Local\Temp\1000214001\zzz.exe
                          Filesize

                          2.4MB

                          MD5

                          e289e55c96e8c077a682aa0530841161

                          SHA1

                          d5154044ff465fa535955c857118b59124c85547

                          SHA256

                          a9e18560e367a43b940ba8ff800dc6eb77c44d03ebc9e1686d0f2e8e5496814a

                          SHA512

                          a9a33b18c30a0016b7d2d5818c9922afa31e79e6783021dfa838672c7900b22a8b9041df6b0847a54e39b40fb7e62b2c341de64b140b24d54c0cb41a49301eaf

                        • C:\Users\Admin\AppData\Local\Temp\1000215001\zzz.exe
                          Filesize

                          2.4MB

                          MD5

                          e289e55c96e8c077a682aa0530841161

                          SHA1

                          d5154044ff465fa535955c857118b59124c85547

                          SHA256

                          a9e18560e367a43b940ba8ff800dc6eb77c44d03ebc9e1686d0f2e8e5496814a

                          SHA512

                          a9a33b18c30a0016b7d2d5818c9922afa31e79e6783021dfa838672c7900b22a8b9041df6b0847a54e39b40fb7e62b2c341de64b140b24d54c0cb41a49301eaf

                        • C:\Users\Admin\AppData\Local\Temp\1000215001\zzz.exe
                          Filesize

                          2.4MB

                          MD5

                          e289e55c96e8c077a682aa0530841161

                          SHA1

                          d5154044ff465fa535955c857118b59124c85547

                          SHA256

                          a9e18560e367a43b940ba8ff800dc6eb77c44d03ebc9e1686d0f2e8e5496814a

                          SHA512

                          a9a33b18c30a0016b7d2d5818c9922afa31e79e6783021dfa838672c7900b22a8b9041df6b0847a54e39b40fb7e62b2c341de64b140b24d54c0cb41a49301eaf

                        • C:\Users\Admin\AppData\Local\Temp\1000216001\1.exe
                          Filesize

                          485KB

                          MD5

                          197cc0b311afc440dd150387e68bf49f

                          SHA1

                          78434666b854de78dfbfb253e66644865d324586

                          SHA256

                          d0f5a3be9ab80e06600ffcb13d897f325b7c8737b895223b3b7e03ecc79abbca

                          SHA512

                          93e805b0956a69a2f9bcabd059bafef689a82aa8654a71bf56d9834db9a5d1904aca34178e02b47f85b6bbac3b4430209dc989071e50c1d63c152daeb5052fed

                        • C:\Users\Admin\AppData\Local\Temp\1000216001\1.exe
                          Filesize

                          485KB

                          MD5

                          197cc0b311afc440dd150387e68bf49f

                          SHA1

                          78434666b854de78dfbfb253e66644865d324586

                          SHA256

                          d0f5a3be9ab80e06600ffcb13d897f325b7c8737b895223b3b7e03ecc79abbca

                          SHA512

                          93e805b0956a69a2f9bcabd059bafef689a82aa8654a71bf56d9834db9a5d1904aca34178e02b47f85b6bbac3b4430209dc989071e50c1d63c152daeb5052fed

                        • C:\Users\Admin\AppData\Local\Temp\1000217001\1000.exe
                          Filesize

                          182KB

                          MD5

                          75e4e9080625c45150fb0c729677203e

                          SHA1

                          c31559bf53e9be7501c6fcad32ad29368d514e7d

                          SHA256

                          081efe08a54211147b7fb7f7dafba081da5ca5c0902f741003c4e4374e773869

                          SHA512

                          fcb0e13c5e3e1bf54dcb22470fc83097dffffd191e6f112595e0338b0a9f33dd45feb774a94dc8a00f35c09970d671a057ff5bd646541872abe8f26aa791bcbe

                        • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                          Filesize

                          241KB

                          MD5

                          3c0eaa80d5332030e07f85fbd5960044

                          SHA1

                          4f3495495a1eb31709949979dc78c23406eb9648

                          SHA256

                          d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890

                          SHA512

                          4380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa

                        • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                          Filesize

                          241KB

                          MD5

                          3c0eaa80d5332030e07f85fbd5960044

                          SHA1

                          4f3495495a1eb31709949979dc78c23406eb9648

                          SHA256

                          d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890

                          SHA512

                          4380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa

                        • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                          Filesize

                          241KB

                          MD5

                          3c0eaa80d5332030e07f85fbd5960044

                          SHA1

                          4f3495495a1eb31709949979dc78c23406eb9648

                          SHA256

                          d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890

                          SHA512

                          4380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa

                        • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                          Filesize

                          241KB

                          MD5

                          3c0eaa80d5332030e07f85fbd5960044

                          SHA1

                          4f3495495a1eb31709949979dc78c23406eb9648

                          SHA256

                          d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890

                          SHA512

                          4380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa

                        • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                          Filesize

                          241KB

                          MD5

                          3c0eaa80d5332030e07f85fbd5960044

                          SHA1

                          4f3495495a1eb31709949979dc78c23406eb9648

                          SHA256

                          d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890

                          SHA512

                          4380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa

                        • C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                          Filesize

                          241KB

                          MD5

                          3c0eaa80d5332030e07f85fbd5960044

                          SHA1

                          4f3495495a1eb31709949979dc78c23406eb9648

                          SHA256

                          d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890

                          SHA512

                          4380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          241KB

                          MD5

                          b466f58861bb4069db99312de146a2e8

                          SHA1

                          295f06794b26ba5ac7c73fbf636c581624f897cd

                          SHA256

                          6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                          SHA512

                          8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          241KB

                          MD5

                          b466f58861bb4069db99312de146a2e8

                          SHA1

                          295f06794b26ba5ac7c73fbf636c581624f897cd

                          SHA256

                          6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                          SHA512

                          8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          241KB

                          MD5

                          b466f58861bb4069db99312de146a2e8

                          SHA1

                          295f06794b26ba5ac7c73fbf636c581624f897cd

                          SHA256

                          6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                          SHA512

                          8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          241KB

                          MD5

                          b466f58861bb4069db99312de146a2e8

                          SHA1

                          295f06794b26ba5ac7c73fbf636c581624f897cd

                          SHA256

                          6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                          SHA512

                          8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          241KB

                          MD5

                          b466f58861bb4069db99312de146a2e8

                          SHA1

                          295f06794b26ba5ac7c73fbf636c581624f897cd

                          SHA256

                          6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                          SHA512

                          8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                        • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          241KB

                          MD5

                          b466f58861bb4069db99312de146a2e8

                          SHA1

                          295f06794b26ba5ac7c73fbf636c581624f897cd

                          SHA256

                          6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                          SHA512

                          8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                        • C:\Users\Admin\AppData\Local\Temp\Smart.exe
                          Filesize

                          4.6MB

                          MD5

                          21f79006cf7560986de8ec8a60998894

                          SHA1

                          b4e170268721f7ddfb33c2cb5af3f953a0f16278

                          SHA256

                          3c39c19a17c68b76ab916e85cc9d7a2e24525f4099a6d258f28dd27353febd25

                          SHA512

                          f794f98972f9a7ee2cf5ee9541db8f83d6670cea95289dd8f55a52d576b2fdce58136d21b85f278ca28e545c522efecaea6529736ca89e62f8f596bd102f5615

                        • C:\Users\Admin\AppData\Local\Temp\Smart.exe
                          Filesize

                          4.6MB

                          MD5

                          21f79006cf7560986de8ec8a60998894

                          SHA1

                          b4e170268721f7ddfb33c2cb5af3f953a0f16278

                          SHA256

                          3c39c19a17c68b76ab916e85cc9d7a2e24525f4099a6d258f28dd27353febd25

                          SHA512

                          f794f98972f9a7ee2cf5ee9541db8f83d6670cea95289dd8f55a52d576b2fdce58136d21b85f278ca28e545c522efecaea6529736ca89e62f8f596bd102f5615

                        • C:\Users\Admin\AppData\Roaming\1000209000\mine.exe
                          Filesize

                          241KB

                          MD5

                          3c0eaa80d5332030e07f85fbd5960044

                          SHA1

                          4f3495495a1eb31709949979dc78c23406eb9648

                          SHA256

                          d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890

                          SHA512

                          4380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa

                        • \Users\Admin\AppData\Local\Temp\1000001001\Amadey.exe
                          Filesize

                          241KB

                          MD5

                          b466f58861bb4069db99312de146a2e8

                          SHA1

                          295f06794b26ba5ac7c73fbf636c581624f897cd

                          SHA256

                          6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                          SHA512

                          8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                        • \Users\Admin\AppData\Local\Temp\1000212001\3000.exe
                          Filesize

                          2.4MB

                          MD5

                          77181eb9385b899f4bce3387a2efe18c

                          SHA1

                          68488c2d2aae96c6f552bcddb81e198b0390312a

                          SHA256

                          e18597f8343d2752ecfea69c4615ea58f37d948ee5d0741791410fb2a4827b1b

                          SHA512

                          3d034f0b238ad5da850d38f3f247693415ca1773aab84f25c32d500864d7a11b8385d2c5da45a19950c5cdad9664963af85ae13d48da7fceee895d847f94eeb9

                        • \Users\Admin\AppData\Local\Temp\1000214001\zzz.exe
                          Filesize

                          2.4MB

                          MD5

                          e289e55c96e8c077a682aa0530841161

                          SHA1

                          d5154044ff465fa535955c857118b59124c85547

                          SHA256

                          a9e18560e367a43b940ba8ff800dc6eb77c44d03ebc9e1686d0f2e8e5496814a

                          SHA512

                          a9a33b18c30a0016b7d2d5818c9922afa31e79e6783021dfa838672c7900b22a8b9041df6b0847a54e39b40fb7e62b2c341de64b140b24d54c0cb41a49301eaf

                        • \Users\Admin\AppData\Local\Temp\1000214001\zzz.exe
                          Filesize

                          2.4MB

                          MD5

                          e289e55c96e8c077a682aa0530841161

                          SHA1

                          d5154044ff465fa535955c857118b59124c85547

                          SHA256

                          a9e18560e367a43b940ba8ff800dc6eb77c44d03ebc9e1686d0f2e8e5496814a

                          SHA512

                          a9a33b18c30a0016b7d2d5818c9922afa31e79e6783021dfa838672c7900b22a8b9041df6b0847a54e39b40fb7e62b2c341de64b140b24d54c0cb41a49301eaf

                        • \Users\Admin\AppData\Local\Temp\1000215001\zzz.exe
                          Filesize

                          2.4MB

                          MD5

                          e289e55c96e8c077a682aa0530841161

                          SHA1

                          d5154044ff465fa535955c857118b59124c85547

                          SHA256

                          a9e18560e367a43b940ba8ff800dc6eb77c44d03ebc9e1686d0f2e8e5496814a

                          SHA512

                          a9a33b18c30a0016b7d2d5818c9922afa31e79e6783021dfa838672c7900b22a8b9041df6b0847a54e39b40fb7e62b2c341de64b140b24d54c0cb41a49301eaf

                        • \Users\Admin\AppData\Local\Temp\1000215001\zzz.exe
                          Filesize

                          2.4MB

                          MD5

                          e289e55c96e8c077a682aa0530841161

                          SHA1

                          d5154044ff465fa535955c857118b59124c85547

                          SHA256

                          a9e18560e367a43b940ba8ff800dc6eb77c44d03ebc9e1686d0f2e8e5496814a

                          SHA512

                          a9a33b18c30a0016b7d2d5818c9922afa31e79e6783021dfa838672c7900b22a8b9041df6b0847a54e39b40fb7e62b2c341de64b140b24d54c0cb41a49301eaf

                        • \Users\Admin\AppData\Local\Temp\1000216001\1.exe
                          Filesize

                          485KB

                          MD5

                          197cc0b311afc440dd150387e68bf49f

                          SHA1

                          78434666b854de78dfbfb253e66644865d324586

                          SHA256

                          d0f5a3be9ab80e06600ffcb13d897f325b7c8737b895223b3b7e03ecc79abbca

                          SHA512

                          93e805b0956a69a2f9bcabd059bafef689a82aa8654a71bf56d9834db9a5d1904aca34178e02b47f85b6bbac3b4430209dc989071e50c1d63c152daeb5052fed

                        • \Users\Admin\AppData\Local\Temp\1000217001\1000.exe
                          Filesize

                          182KB

                          MD5

                          75e4e9080625c45150fb0c729677203e

                          SHA1

                          c31559bf53e9be7501c6fcad32ad29368d514e7d

                          SHA256

                          081efe08a54211147b7fb7f7dafba081da5ca5c0902f741003c4e4374e773869

                          SHA512

                          fcb0e13c5e3e1bf54dcb22470fc83097dffffd191e6f112595e0338b0a9f33dd45feb774a94dc8a00f35c09970d671a057ff5bd646541872abe8f26aa791bcbe

                        • \Users\Admin\AppData\Local\Temp\1000217001\1000.exe
                          Filesize

                          182KB

                          MD5

                          75e4e9080625c45150fb0c729677203e

                          SHA1

                          c31559bf53e9be7501c6fcad32ad29368d514e7d

                          SHA256

                          081efe08a54211147b7fb7f7dafba081da5ca5c0902f741003c4e4374e773869

                          SHA512

                          fcb0e13c5e3e1bf54dcb22470fc83097dffffd191e6f112595e0338b0a9f33dd45feb774a94dc8a00f35c09970d671a057ff5bd646541872abe8f26aa791bcbe

                        • \Users\Admin\AppData\Local\Temp\1000217001\1000.exe
                          Filesize

                          182KB

                          MD5

                          75e4e9080625c45150fb0c729677203e

                          SHA1

                          c31559bf53e9be7501c6fcad32ad29368d514e7d

                          SHA256

                          081efe08a54211147b7fb7f7dafba081da5ca5c0902f741003c4e4374e773869

                          SHA512

                          fcb0e13c5e3e1bf54dcb22470fc83097dffffd191e6f112595e0338b0a9f33dd45feb774a94dc8a00f35c09970d671a057ff5bd646541872abe8f26aa791bcbe

                        • \Users\Admin\AppData\Local\Temp\1000217001\1000.exe
                          Filesize

                          182KB

                          MD5

                          75e4e9080625c45150fb0c729677203e

                          SHA1

                          c31559bf53e9be7501c6fcad32ad29368d514e7d

                          SHA256

                          081efe08a54211147b7fb7f7dafba081da5ca5c0902f741003c4e4374e773869

                          SHA512

                          fcb0e13c5e3e1bf54dcb22470fc83097dffffd191e6f112595e0338b0a9f33dd45feb774a94dc8a00f35c09970d671a057ff5bd646541872abe8f26aa791bcbe

                        • \Users\Admin\AppData\Local\Temp\1000217001\1000.exe
                          Filesize

                          182KB

                          MD5

                          75e4e9080625c45150fb0c729677203e

                          SHA1

                          c31559bf53e9be7501c6fcad32ad29368d514e7d

                          SHA256

                          081efe08a54211147b7fb7f7dafba081da5ca5c0902f741003c4e4374e773869

                          SHA512

                          fcb0e13c5e3e1bf54dcb22470fc83097dffffd191e6f112595e0338b0a9f33dd45feb774a94dc8a00f35c09970d671a057ff5bd646541872abe8f26aa791bcbe

                        • \Users\Admin\AppData\Local\Temp\1000217001\1000.exe
                          Filesize

                          182KB

                          MD5

                          75e4e9080625c45150fb0c729677203e

                          SHA1

                          c31559bf53e9be7501c6fcad32ad29368d514e7d

                          SHA256

                          081efe08a54211147b7fb7f7dafba081da5ca5c0902f741003c4e4374e773869

                          SHA512

                          fcb0e13c5e3e1bf54dcb22470fc83097dffffd191e6f112595e0338b0a9f33dd45feb774a94dc8a00f35c09970d671a057ff5bd646541872abe8f26aa791bcbe

                        • \Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe
                          Filesize

                          241KB

                          MD5

                          3c0eaa80d5332030e07f85fbd5960044

                          SHA1

                          4f3495495a1eb31709949979dc78c23406eb9648

                          SHA256

                          d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890

                          SHA512

                          4380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa

                        • \Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
                          Filesize

                          241KB

                          MD5

                          b466f58861bb4069db99312de146a2e8

                          SHA1

                          295f06794b26ba5ac7c73fbf636c581624f897cd

                          SHA256

                          6cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420

                          SHA512

                          8693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d

                        • \Users\Admin\AppData\Local\Temp\Smart.exe
                          Filesize

                          4.6MB

                          MD5

                          21f79006cf7560986de8ec8a60998894

                          SHA1

                          b4e170268721f7ddfb33c2cb5af3f953a0f16278

                          SHA256

                          3c39c19a17c68b76ab916e85cc9d7a2e24525f4099a6d258f28dd27353febd25

                          SHA512

                          f794f98972f9a7ee2cf5ee9541db8f83d6670cea95289dd8f55a52d576b2fdce58136d21b85f278ca28e545c522efecaea6529736ca89e62f8f596bd102f5615

                        • \Users\Admin\AppData\Local\Temp\Smart.exe
                          Filesize

                          4.6MB

                          MD5

                          21f79006cf7560986de8ec8a60998894

                          SHA1

                          b4e170268721f7ddfb33c2cb5af3f953a0f16278

                          SHA256

                          3c39c19a17c68b76ab916e85cc9d7a2e24525f4099a6d258f28dd27353febd25

                          SHA512

                          f794f98972f9a7ee2cf5ee9541db8f83d6670cea95289dd8f55a52d576b2fdce58136d21b85f278ca28e545c522efecaea6529736ca89e62f8f596bd102f5615

                        • \Users\Admin\AppData\Roaming\1000209000\mine.exe
                          Filesize

                          241KB

                          MD5

                          3c0eaa80d5332030e07f85fbd5960044

                          SHA1

                          4f3495495a1eb31709949979dc78c23406eb9648

                          SHA256

                          d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890

                          SHA512

                          4380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa

                        • memory/280-72-0x0000000000000000-mapping.dmp
                        • memory/540-144-0x0000000000000000-mapping.dmp
                        • memory/572-90-0x0000000000000000-mapping.dmp
                        • memory/572-59-0x0000000000000000-mapping.dmp
                        • memory/588-80-0x0000000000000000-mapping.dmp
                        • memory/608-76-0x0000000000000000-mapping.dmp
                        • memory/756-83-0x0000000000000000-mapping.dmp
                        • memory/800-161-0x0000000000000000-mapping.dmp
                        • memory/828-119-0x0000000000000000-mapping.dmp
                        • memory/872-129-0x0000000000000000-mapping.dmp
                        • memory/948-77-0x0000000000000000-mapping.dmp
                        • memory/952-105-0x0000000001200000-0x00000000019E2000-memory.dmp
                          Filesize

                          7.9MB

                        • memory/952-98-0x0000000000000000-mapping.dmp
                        • memory/952-111-0x0000000001200000-0x00000000019E2000-memory.dmp
                          Filesize

                          7.9MB

                        • memory/1100-128-0x000000000041972E-mapping.dmp
                        • memory/1100-131-0x0000000000400000-0x000000000041E000-memory.dmp
                          Filesize

                          120KB

                        • memory/1100-130-0x0000000000400000-0x000000000041E000-memory.dmp
                          Filesize

                          120KB

                        • memory/1100-123-0x0000000000400000-0x000000000041E000-memory.dmp
                          Filesize

                          120KB

                        • memory/1100-121-0x0000000000400000-0x000000000041E000-memory.dmp
                          Filesize

                          120KB

                        • memory/1152-175-0x0000000000000000-mapping.dmp
                        • memory/1152-162-0x0000000000000000-mapping.dmp
                        • memory/1240-54-0x00000000760B1000-0x00000000760B3000-memory.dmp
                          Filesize

                          8KB

                        • memory/1304-70-0x0000000000000000-mapping.dmp
                        • memory/1348-155-0x0000000000400000-0x0000000000438000-memory.dmp
                          Filesize

                          224KB

                        • memory/1348-146-0x0000000000403BA0-mapping.dmp
                        • memory/1348-145-0x0000000000400000-0x0000000000438000-memory.dmp
                          Filesize

                          224KB

                        • memory/1348-156-0x0000000000140000-0x0000000000149000-memory.dmp
                          Filesize

                          36KB

                        • memory/1348-157-0x0000000000270000-0x000000000027D000-memory.dmp
                          Filesize

                          52KB

                        • memory/1396-108-0x0000000000000000-mapping.dmp
                        • memory/1412-84-0x0000000000000000-mapping.dmp
                        • memory/1472-71-0x0000000000000000-mapping.dmp
                        • memory/1492-138-0x0000000000D60000-0x0000000000DDA000-memory.dmp
                          Filesize

                          488KB

                        • memory/1492-136-0x0000000000E10000-0x0000000000E8E000-memory.dmp
                          Filesize

                          504KB

                        • memory/1492-115-0x0000000000000000-mapping.dmp
                        • memory/1504-56-0x0000000000000000-mapping.dmp
                        • memory/1620-109-0x0000000000000000-mapping.dmp
                        • memory/1624-110-0x0000000000000000-mapping.dmp
                        • memory/1688-73-0x0000000000000000-mapping.dmp
                        • memory/1708-103-0x0000000003A80000-0x0000000004262000-memory.dmp
                          Filesize

                          7.9MB

                        • memory/1708-67-0x0000000000000000-mapping.dmp
                        • memory/1708-100-0x0000000003C60000-0x0000000004442000-memory.dmp
                          Filesize

                          7.9MB

                        • memory/1708-101-0x0000000003C60000-0x0000000004442000-memory.dmp
                          Filesize

                          7.9MB

                        • memory/1708-104-0x0000000003A80000-0x0000000004262000-memory.dmp
                          Filesize

                          7.9MB

                        • memory/1728-78-0x0000000000000000-mapping.dmp
                        • memory/1748-75-0x0000000000000000-mapping.dmp
                        • memory/1768-141-0x000007FEFC481000-0x000007FEFC483000-memory.dmp
                          Filesize

                          8KB

                        • memory/1768-150-0x000007FEF58E0000-0x000007FEF643D000-memory.dmp
                          Filesize

                          11.4MB

                        • memory/1768-160-0x000000000255B000-0x000000000257A000-memory.dmp
                          Filesize

                          124KB

                        • memory/1768-140-0x0000000000000000-mapping.dmp
                        • memory/1768-158-0x000000000255B000-0x000000000257A000-memory.dmp
                          Filesize

                          124KB

                        • memory/1768-151-0x0000000002554000-0x0000000002557000-memory.dmp
                          Filesize

                          12KB

                        • memory/1768-142-0x000007FEEC2C0000-0x000007FEECCE3000-memory.dmp
                          Filesize

                          10.1MB

                        • memory/1768-167-0x0000000000000000-mapping.dmp
                        • memory/1768-159-0x0000000002554000-0x0000000002557000-memory.dmp
                          Filesize

                          12KB

                        • memory/1812-107-0x0000000000CA0000-0x0000000001482000-memory.dmp
                          Filesize

                          7.9MB

                        • memory/1812-102-0x0000000000CA0000-0x0000000001482000-memory.dmp
                          Filesize

                          7.9MB

                        • memory/1812-94-0x0000000000000000-mapping.dmp
                        • memory/1832-106-0x0000000000000000-mapping.dmp
                        • memory/2020-143-0x0000000000000000-mapping.dmp
                        • memory/2028-62-0x0000000000000000-mapping.dmp
                        • memory/2044-168-0x0000000000000000-mapping.dmp