Analysis

  • max time kernel
    141s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2023 10:21

General

  • Target

    1a66e4cdfe3293fabb78fc949656c8c4.exe

  • Size

    748KB

  • MD5

    1a66e4cdfe3293fabb78fc949656c8c4

  • SHA1

    8ea8449a04f6cc19c24192b26bf5a33a95e2a162

  • SHA256

    aaf68237e25f419cf5312359a50c52088737f3e13727622d5c486a8b349c5a49

  • SHA512

    52c70bdd6b9ae9911c6d39153518cbaea18e9ca06c9a395c519b6a14c72ebf76c7a0f185ed59d8c3cc34a67f6a826f9785587a0d21077d2a31bba7c85598ee27

  • SSDEEP

    12288:HMrzy90VIbpOovH53dS6TtO5EAeHZX1LtqyJ/Ue4n+U9uVC:oy02pO8jTU5EAe5X1wsse4+XC

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.130:19061

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a66e4cdfe3293fabb78fc949656c8c4.exe
    "C:\Users\Admin\AppData\Local\Temp\1a66e4cdfe3293fabb78fc949656c8c4.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7997634.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7997634.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5752356.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5752356.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1476
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y1142097.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y1142097.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1180
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j4513252.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j4513252.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:860
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k6536110.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k6536110.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1500
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8748038.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8748038.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9314346.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9314346.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1420
        • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
          "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1708
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1832
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit
            5⤵
              PID:1060
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                6⤵
                  PID:916
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rugen.exe" /P "Admin:N"
                  6⤵
                    PID:1584
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "rugen.exe" /P "Admin:R" /E
                    6⤵
                      PID:860
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      6⤵
                        PID:1216
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\200f691d32" /P "Admin:N"
                        6⤵
                          PID:1572
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\200f691d32" /P "Admin:R" /E
                          6⤵
                            PID:1900
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          5⤵
                          • Loads dropped DLL
                          PID:1780
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n1461160.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n1461160.exe
                    2⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:688
                • C:\Windows\system32\taskeng.exe
                  taskeng.exe {1602A433-3318-4EBD-9620-DB21048EE277} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]
                  1⤵
                    PID:328
                    • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                      C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                      2⤵
                      • Executes dropped EXE
                      PID:608
                    • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                      C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                      2⤵
                      • Executes dropped EXE
                      PID:1716

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                    Filesize

                    205KB

                    MD5

                    5c07d3cb2a425ca4bc865bb4908e4ecd

                    SHA1

                    6d06d353a31e12d7ce8f3812e1bbcf2e14bbe2ca

                    SHA256

                    12abcb9b9f402286b90cd7c2e7d77365b7d4a6ea4b678ffccbcfb7eec7b8d6d0

                    SHA512

                    834c68490237582db65d28733f70dbca930c59179187048b8e99e1ff52508f5f9a27f4f165e8715bd4a6f7782aecadc70741d6114b931b5fb302c742171f8380

                  • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                    Filesize

                    205KB

                    MD5

                    5c07d3cb2a425ca4bc865bb4908e4ecd

                    SHA1

                    6d06d353a31e12d7ce8f3812e1bbcf2e14bbe2ca

                    SHA256

                    12abcb9b9f402286b90cd7c2e7d77365b7d4a6ea4b678ffccbcfb7eec7b8d6d0

                    SHA512

                    834c68490237582db65d28733f70dbca930c59179187048b8e99e1ff52508f5f9a27f4f165e8715bd4a6f7782aecadc70741d6114b931b5fb302c742171f8380

                  • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                    Filesize

                    205KB

                    MD5

                    5c07d3cb2a425ca4bc865bb4908e4ecd

                    SHA1

                    6d06d353a31e12d7ce8f3812e1bbcf2e14bbe2ca

                    SHA256

                    12abcb9b9f402286b90cd7c2e7d77365b7d4a6ea4b678ffccbcfb7eec7b8d6d0

                    SHA512

                    834c68490237582db65d28733f70dbca930c59179187048b8e99e1ff52508f5f9a27f4f165e8715bd4a6f7782aecadc70741d6114b931b5fb302c742171f8380

                  • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                    Filesize

                    205KB

                    MD5

                    5c07d3cb2a425ca4bc865bb4908e4ecd

                    SHA1

                    6d06d353a31e12d7ce8f3812e1bbcf2e14bbe2ca

                    SHA256

                    12abcb9b9f402286b90cd7c2e7d77365b7d4a6ea4b678ffccbcfb7eec7b8d6d0

                    SHA512

                    834c68490237582db65d28733f70dbca930c59179187048b8e99e1ff52508f5f9a27f4f165e8715bd4a6f7782aecadc70741d6114b931b5fb302c742171f8380

                  • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                    Filesize

                    205KB

                    MD5

                    5c07d3cb2a425ca4bc865bb4908e4ecd

                    SHA1

                    6d06d353a31e12d7ce8f3812e1bbcf2e14bbe2ca

                    SHA256

                    12abcb9b9f402286b90cd7c2e7d77365b7d4a6ea4b678ffccbcfb7eec7b8d6d0

                    SHA512

                    834c68490237582db65d28733f70dbca930c59179187048b8e99e1ff52508f5f9a27f4f165e8715bd4a6f7782aecadc70741d6114b931b5fb302c742171f8380

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n1461160.exe

                    Filesize

                    285KB

                    MD5

                    26260b1a173cddbe7bef7c0c2d045c85

                    SHA1

                    e74ba172ee8c1ad54699d287a7027ffa067218ac

                    SHA256

                    0d8b7d0faadd8f9f72af7206474c5f3a946a87edac9264d3630271d4728d66cb

                    SHA512

                    690b60d7f6d7a4a0fa94b2b4d5d08ed0eb049420e3ddc66ac57d879393ad480d912489276b32626ff09f2766dde938531ebf2a5afc71be4dff2d644e8b593cb2

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n1461160.exe

                    Filesize

                    285KB

                    MD5

                    26260b1a173cddbe7bef7c0c2d045c85

                    SHA1

                    e74ba172ee8c1ad54699d287a7027ffa067218ac

                    SHA256

                    0d8b7d0faadd8f9f72af7206474c5f3a946a87edac9264d3630271d4728d66cb

                    SHA512

                    690b60d7f6d7a4a0fa94b2b4d5d08ed0eb049420e3ddc66ac57d879393ad480d912489276b32626ff09f2766dde938531ebf2a5afc71be4dff2d644e8b593cb2

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n1461160.exe

                    Filesize

                    285KB

                    MD5

                    26260b1a173cddbe7bef7c0c2d045c85

                    SHA1

                    e74ba172ee8c1ad54699d287a7027ffa067218ac

                    SHA256

                    0d8b7d0faadd8f9f72af7206474c5f3a946a87edac9264d3630271d4728d66cb

                    SHA512

                    690b60d7f6d7a4a0fa94b2b4d5d08ed0eb049420e3ddc66ac57d879393ad480d912489276b32626ff09f2766dde938531ebf2a5afc71be4dff2d644e8b593cb2

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7997634.exe

                    Filesize

                    537KB

                    MD5

                    2ad2d93409deaf87fd43035889870447

                    SHA1

                    4eda78e136890e025521ddd94309e41417bccc2e

                    SHA256

                    0d6bd4da4310ca25335ad89d2fbbfc3597fe6015a980ef40fe6141ed9ebefde3

                    SHA512

                    e6ea03d768446bcd94fd70f2bc75d410e28c0fe71195b0c12c3ac2c73837e470e87341b4b689a71f5089d8dccbbcbde32d4b0f5a19df17403f77d8093a71d4d1

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7997634.exe

                    Filesize

                    537KB

                    MD5

                    2ad2d93409deaf87fd43035889870447

                    SHA1

                    4eda78e136890e025521ddd94309e41417bccc2e

                    SHA256

                    0d6bd4da4310ca25335ad89d2fbbfc3597fe6015a980ef40fe6141ed9ebefde3

                    SHA512

                    e6ea03d768446bcd94fd70f2bc75d410e28c0fe71195b0c12c3ac2c73837e470e87341b4b689a71f5089d8dccbbcbde32d4b0f5a19df17403f77d8093a71d4d1

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9314346.exe

                    Filesize

                    205KB

                    MD5

                    5c07d3cb2a425ca4bc865bb4908e4ecd

                    SHA1

                    6d06d353a31e12d7ce8f3812e1bbcf2e14bbe2ca

                    SHA256

                    12abcb9b9f402286b90cd7c2e7d77365b7d4a6ea4b678ffccbcfb7eec7b8d6d0

                    SHA512

                    834c68490237582db65d28733f70dbca930c59179187048b8e99e1ff52508f5f9a27f4f165e8715bd4a6f7782aecadc70741d6114b931b5fb302c742171f8380

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9314346.exe

                    Filesize

                    205KB

                    MD5

                    5c07d3cb2a425ca4bc865bb4908e4ecd

                    SHA1

                    6d06d353a31e12d7ce8f3812e1bbcf2e14bbe2ca

                    SHA256

                    12abcb9b9f402286b90cd7c2e7d77365b7d4a6ea4b678ffccbcfb7eec7b8d6d0

                    SHA512

                    834c68490237582db65d28733f70dbca930c59179187048b8e99e1ff52508f5f9a27f4f165e8715bd4a6f7782aecadc70741d6114b931b5fb302c742171f8380

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5752356.exe

                    Filesize

                    365KB

                    MD5

                    18d2436069f5a3508062de4ce9af06d5

                    SHA1

                    a4e9ab137975269c7f04042c12b69829387b4b22

                    SHA256

                    eaa80399a43bf7429bb102a56ca02ab366521185fa0e990cfc6b09637157c5a8

                    SHA512

                    6ec3e1dc7c19c6026fd1f105632465817057836039a00a666771de137e053b6dcb4a6e1f7ec97d7a4676629b45fa5e81fbf57c6267df7507448c8561d19d51e6

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5752356.exe

                    Filesize

                    365KB

                    MD5

                    18d2436069f5a3508062de4ce9af06d5

                    SHA1

                    a4e9ab137975269c7f04042c12b69829387b4b22

                    SHA256

                    eaa80399a43bf7429bb102a56ca02ab366521185fa0e990cfc6b09637157c5a8

                    SHA512

                    6ec3e1dc7c19c6026fd1f105632465817057836039a00a666771de137e053b6dcb4a6e1f7ec97d7a4676629b45fa5e81fbf57c6267df7507448c8561d19d51e6

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8748038.exe

                    Filesize

                    172KB

                    MD5

                    a35ce204286d62fe58a52e67bad9539b

                    SHA1

                    81c38911a14be2375b4d4978b8a3951ff78bc53f

                    SHA256

                    823f948cf74b5f564ae7e823f765955517268540faa49f7d099904fa0649e4a2

                    SHA512

                    f64c7a5db8e1df248c2acef32994e88da632024ca6c11103ef9e5a94b575a92d6742d0baa97f7e5f6d06a6f5663261f784142295f76ccf96dda7b6053ec1156d

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8748038.exe

                    Filesize

                    172KB

                    MD5

                    a35ce204286d62fe58a52e67bad9539b

                    SHA1

                    81c38911a14be2375b4d4978b8a3951ff78bc53f

                    SHA256

                    823f948cf74b5f564ae7e823f765955517268540faa49f7d099904fa0649e4a2

                    SHA512

                    f64c7a5db8e1df248c2acef32994e88da632024ca6c11103ef9e5a94b575a92d6742d0baa97f7e5f6d06a6f5663261f784142295f76ccf96dda7b6053ec1156d

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y1142097.exe

                    Filesize

                    209KB

                    MD5

                    7b679d0c45f9c38bdf07ab4ae929177b

                    SHA1

                    1a69166d6f6ebaeda387cada022bf8f568b826a2

                    SHA256

                    19f2fe6397acd9fa568c298c6d408df4ed1ddd1afc0d306a6bc34bb001a6e24c

                    SHA512

                    7203d80aa22df8df8d0683073e108ad3aee218b7deb48d40cac7bdc9297a2f4bdfd41002720cc436d1f7e6f1fac95c40e1f7fee4c923c5e474ef4ca513091a25

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y1142097.exe

                    Filesize

                    209KB

                    MD5

                    7b679d0c45f9c38bdf07ab4ae929177b

                    SHA1

                    1a69166d6f6ebaeda387cada022bf8f568b826a2

                    SHA256

                    19f2fe6397acd9fa568c298c6d408df4ed1ddd1afc0d306a6bc34bb001a6e24c

                    SHA512

                    7203d80aa22df8df8d0683073e108ad3aee218b7deb48d40cac7bdc9297a2f4bdfd41002720cc436d1f7e6f1fac95c40e1f7fee4c923c5e474ef4ca513091a25

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j4513252.exe

                    Filesize

                    124KB

                    MD5

                    0aaeb01399025030104c703a5d3ee79d

                    SHA1

                    894578a3cfa63dd9b78a2545abc8cc9bcf9f6468

                    SHA256

                    7b249ea16eca11b07b990eedb6bf8cdd28281cd2b992e202ef53c04a77099a16

                    SHA512

                    e71dcc86bc213aab3f08757e14a1a4666caa43fec179616d675d78c0212d156c9aef5e74c03264976fe210ce264891e67c851776de92c74c70bfd4fde212208c

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j4513252.exe

                    Filesize

                    124KB

                    MD5

                    0aaeb01399025030104c703a5d3ee79d

                    SHA1

                    894578a3cfa63dd9b78a2545abc8cc9bcf9f6468

                    SHA256

                    7b249ea16eca11b07b990eedb6bf8cdd28281cd2b992e202ef53c04a77099a16

                    SHA512

                    e71dcc86bc213aab3f08757e14a1a4666caa43fec179616d675d78c0212d156c9aef5e74c03264976fe210ce264891e67c851776de92c74c70bfd4fde212208c

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j4513252.exe

                    Filesize

                    124KB

                    MD5

                    0aaeb01399025030104c703a5d3ee79d

                    SHA1

                    894578a3cfa63dd9b78a2545abc8cc9bcf9f6468

                    SHA256

                    7b249ea16eca11b07b990eedb6bf8cdd28281cd2b992e202ef53c04a77099a16

                    SHA512

                    e71dcc86bc213aab3f08757e14a1a4666caa43fec179616d675d78c0212d156c9aef5e74c03264976fe210ce264891e67c851776de92c74c70bfd4fde212208c

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k6536110.exe

                    Filesize

                    11KB

                    MD5

                    4e4f55b1289a76e35a501f79c9202d30

                    SHA1

                    0f097b8bf3124bc9fc5a79490a2f375d12befb0c

                    SHA256

                    a90c2b48894648bbcd6b31f143ea5b1ee911e9be23bfd2566d602b392ba775e4

                    SHA512

                    6a937f31c5f5eba0fe6f8610e70c2baf227125593954db68db6c6458f9728717d561c393a4e80ce8f64480ae9110f885ef3fb1ca1244986782d0d69552420d3e

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k6536110.exe

                    Filesize

                    11KB

                    MD5

                    4e4f55b1289a76e35a501f79c9202d30

                    SHA1

                    0f097b8bf3124bc9fc5a79490a2f375d12befb0c

                    SHA256

                    a90c2b48894648bbcd6b31f143ea5b1ee911e9be23bfd2566d602b392ba775e4

                    SHA512

                    6a937f31c5f5eba0fe6f8610e70c2baf227125593954db68db6c6458f9728717d561c393a4e80ce8f64480ae9110f885ef3fb1ca1244986782d0d69552420d3e

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                    Filesize

                    162B

                    MD5

                    1b7c22a214949975556626d7217e9a39

                    SHA1

                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                    SHA256

                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                    SHA512

                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                  • \Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                    Filesize

                    205KB

                    MD5

                    5c07d3cb2a425ca4bc865bb4908e4ecd

                    SHA1

                    6d06d353a31e12d7ce8f3812e1bbcf2e14bbe2ca

                    SHA256

                    12abcb9b9f402286b90cd7c2e7d77365b7d4a6ea4b678ffccbcfb7eec7b8d6d0

                    SHA512

                    834c68490237582db65d28733f70dbca930c59179187048b8e99e1ff52508f5f9a27f4f165e8715bd4a6f7782aecadc70741d6114b931b5fb302c742171f8380

                  • \Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                    Filesize

                    205KB

                    MD5

                    5c07d3cb2a425ca4bc865bb4908e4ecd

                    SHA1

                    6d06d353a31e12d7ce8f3812e1bbcf2e14bbe2ca

                    SHA256

                    12abcb9b9f402286b90cd7c2e7d77365b7d4a6ea4b678ffccbcfb7eec7b8d6d0

                    SHA512

                    834c68490237582db65d28733f70dbca930c59179187048b8e99e1ff52508f5f9a27f4f165e8715bd4a6f7782aecadc70741d6114b931b5fb302c742171f8380

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\n1461160.exe

                    Filesize

                    285KB

                    MD5

                    26260b1a173cddbe7bef7c0c2d045c85

                    SHA1

                    e74ba172ee8c1ad54699d287a7027ffa067218ac

                    SHA256

                    0d8b7d0faadd8f9f72af7206474c5f3a946a87edac9264d3630271d4728d66cb

                    SHA512

                    690b60d7f6d7a4a0fa94b2b4d5d08ed0eb049420e3ddc66ac57d879393ad480d912489276b32626ff09f2766dde938531ebf2a5afc71be4dff2d644e8b593cb2

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\n1461160.exe

                    Filesize

                    285KB

                    MD5

                    26260b1a173cddbe7bef7c0c2d045c85

                    SHA1

                    e74ba172ee8c1ad54699d287a7027ffa067218ac

                    SHA256

                    0d8b7d0faadd8f9f72af7206474c5f3a946a87edac9264d3630271d4728d66cb

                    SHA512

                    690b60d7f6d7a4a0fa94b2b4d5d08ed0eb049420e3ddc66ac57d879393ad480d912489276b32626ff09f2766dde938531ebf2a5afc71be4dff2d644e8b593cb2

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\n1461160.exe

                    Filesize

                    285KB

                    MD5

                    26260b1a173cddbe7bef7c0c2d045c85

                    SHA1

                    e74ba172ee8c1ad54699d287a7027ffa067218ac

                    SHA256

                    0d8b7d0faadd8f9f72af7206474c5f3a946a87edac9264d3630271d4728d66cb

                    SHA512

                    690b60d7f6d7a4a0fa94b2b4d5d08ed0eb049420e3ddc66ac57d879393ad480d912489276b32626ff09f2766dde938531ebf2a5afc71be4dff2d644e8b593cb2

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y7997634.exe

                    Filesize

                    537KB

                    MD5

                    2ad2d93409deaf87fd43035889870447

                    SHA1

                    4eda78e136890e025521ddd94309e41417bccc2e

                    SHA256

                    0d6bd4da4310ca25335ad89d2fbbfc3597fe6015a980ef40fe6141ed9ebefde3

                    SHA512

                    e6ea03d768446bcd94fd70f2bc75d410e28c0fe71195b0c12c3ac2c73837e470e87341b4b689a71f5089d8dccbbcbde32d4b0f5a19df17403f77d8093a71d4d1

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y7997634.exe

                    Filesize

                    537KB

                    MD5

                    2ad2d93409deaf87fd43035889870447

                    SHA1

                    4eda78e136890e025521ddd94309e41417bccc2e

                    SHA256

                    0d6bd4da4310ca25335ad89d2fbbfc3597fe6015a980ef40fe6141ed9ebefde3

                    SHA512

                    e6ea03d768446bcd94fd70f2bc75d410e28c0fe71195b0c12c3ac2c73837e470e87341b4b689a71f5089d8dccbbcbde32d4b0f5a19df17403f77d8093a71d4d1

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m9314346.exe

                    Filesize

                    205KB

                    MD5

                    5c07d3cb2a425ca4bc865bb4908e4ecd

                    SHA1

                    6d06d353a31e12d7ce8f3812e1bbcf2e14bbe2ca

                    SHA256

                    12abcb9b9f402286b90cd7c2e7d77365b7d4a6ea4b678ffccbcfb7eec7b8d6d0

                    SHA512

                    834c68490237582db65d28733f70dbca930c59179187048b8e99e1ff52508f5f9a27f4f165e8715bd4a6f7782aecadc70741d6114b931b5fb302c742171f8380

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m9314346.exe

                    Filesize

                    205KB

                    MD5

                    5c07d3cb2a425ca4bc865bb4908e4ecd

                    SHA1

                    6d06d353a31e12d7ce8f3812e1bbcf2e14bbe2ca

                    SHA256

                    12abcb9b9f402286b90cd7c2e7d77365b7d4a6ea4b678ffccbcfb7eec7b8d6d0

                    SHA512

                    834c68490237582db65d28733f70dbca930c59179187048b8e99e1ff52508f5f9a27f4f165e8715bd4a6f7782aecadc70741d6114b931b5fb302c742171f8380

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\y5752356.exe

                    Filesize

                    365KB

                    MD5

                    18d2436069f5a3508062de4ce9af06d5

                    SHA1

                    a4e9ab137975269c7f04042c12b69829387b4b22

                    SHA256

                    eaa80399a43bf7429bb102a56ca02ab366521185fa0e990cfc6b09637157c5a8

                    SHA512

                    6ec3e1dc7c19c6026fd1f105632465817057836039a00a666771de137e053b6dcb4a6e1f7ec97d7a4676629b45fa5e81fbf57c6267df7507448c8561d19d51e6

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\y5752356.exe

                    Filesize

                    365KB

                    MD5

                    18d2436069f5a3508062de4ce9af06d5

                    SHA1

                    a4e9ab137975269c7f04042c12b69829387b4b22

                    SHA256

                    eaa80399a43bf7429bb102a56ca02ab366521185fa0e990cfc6b09637157c5a8

                    SHA512

                    6ec3e1dc7c19c6026fd1f105632465817057836039a00a666771de137e053b6dcb4a6e1f7ec97d7a4676629b45fa5e81fbf57c6267df7507448c8561d19d51e6

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\l8748038.exe

                    Filesize

                    172KB

                    MD5

                    a35ce204286d62fe58a52e67bad9539b

                    SHA1

                    81c38911a14be2375b4d4978b8a3951ff78bc53f

                    SHA256

                    823f948cf74b5f564ae7e823f765955517268540faa49f7d099904fa0649e4a2

                    SHA512

                    f64c7a5db8e1df248c2acef32994e88da632024ca6c11103ef9e5a94b575a92d6742d0baa97f7e5f6d06a6f5663261f784142295f76ccf96dda7b6053ec1156d

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\l8748038.exe

                    Filesize

                    172KB

                    MD5

                    a35ce204286d62fe58a52e67bad9539b

                    SHA1

                    81c38911a14be2375b4d4978b8a3951ff78bc53f

                    SHA256

                    823f948cf74b5f564ae7e823f765955517268540faa49f7d099904fa0649e4a2

                    SHA512

                    f64c7a5db8e1df248c2acef32994e88da632024ca6c11103ef9e5a94b575a92d6742d0baa97f7e5f6d06a6f5663261f784142295f76ccf96dda7b6053ec1156d

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\y1142097.exe

                    Filesize

                    209KB

                    MD5

                    7b679d0c45f9c38bdf07ab4ae929177b

                    SHA1

                    1a69166d6f6ebaeda387cada022bf8f568b826a2

                    SHA256

                    19f2fe6397acd9fa568c298c6d408df4ed1ddd1afc0d306a6bc34bb001a6e24c

                    SHA512

                    7203d80aa22df8df8d0683073e108ad3aee218b7deb48d40cac7bdc9297a2f4bdfd41002720cc436d1f7e6f1fac95c40e1f7fee4c923c5e474ef4ca513091a25

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\y1142097.exe

                    Filesize

                    209KB

                    MD5

                    7b679d0c45f9c38bdf07ab4ae929177b

                    SHA1

                    1a69166d6f6ebaeda387cada022bf8f568b826a2

                    SHA256

                    19f2fe6397acd9fa568c298c6d408df4ed1ddd1afc0d306a6bc34bb001a6e24c

                    SHA512

                    7203d80aa22df8df8d0683073e108ad3aee218b7deb48d40cac7bdc9297a2f4bdfd41002720cc436d1f7e6f1fac95c40e1f7fee4c923c5e474ef4ca513091a25

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\j4513252.exe

                    Filesize

                    124KB

                    MD5

                    0aaeb01399025030104c703a5d3ee79d

                    SHA1

                    894578a3cfa63dd9b78a2545abc8cc9bcf9f6468

                    SHA256

                    7b249ea16eca11b07b990eedb6bf8cdd28281cd2b992e202ef53c04a77099a16

                    SHA512

                    e71dcc86bc213aab3f08757e14a1a4666caa43fec179616d675d78c0212d156c9aef5e74c03264976fe210ce264891e67c851776de92c74c70bfd4fde212208c

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\j4513252.exe

                    Filesize

                    124KB

                    MD5

                    0aaeb01399025030104c703a5d3ee79d

                    SHA1

                    894578a3cfa63dd9b78a2545abc8cc9bcf9f6468

                    SHA256

                    7b249ea16eca11b07b990eedb6bf8cdd28281cd2b992e202ef53c04a77099a16

                    SHA512

                    e71dcc86bc213aab3f08757e14a1a4666caa43fec179616d675d78c0212d156c9aef5e74c03264976fe210ce264891e67c851776de92c74c70bfd4fde212208c

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\j4513252.exe

                    Filesize

                    124KB

                    MD5

                    0aaeb01399025030104c703a5d3ee79d

                    SHA1

                    894578a3cfa63dd9b78a2545abc8cc9bcf9f6468

                    SHA256

                    7b249ea16eca11b07b990eedb6bf8cdd28281cd2b992e202ef53c04a77099a16

                    SHA512

                    e71dcc86bc213aab3f08757e14a1a4666caa43fec179616d675d78c0212d156c9aef5e74c03264976fe210ce264891e67c851776de92c74c70bfd4fde212208c

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\k6536110.exe

                    Filesize

                    11KB

                    MD5

                    4e4f55b1289a76e35a501f79c9202d30

                    SHA1

                    0f097b8bf3124bc9fc5a79490a2f375d12befb0c

                    SHA256

                    a90c2b48894648bbcd6b31f143ea5b1ee911e9be23bfd2566d602b392ba775e4

                    SHA512

                    6a937f31c5f5eba0fe6f8610e70c2baf227125593954db68db6c6458f9728717d561c393a4e80ce8f64480ae9110f885ef3fb1ca1244986782d0d69552420d3e

                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • memory/688-141-0x0000000000280000-0x00000000002B0000-memory.dmp

                    Filesize

                    192KB

                  • memory/688-145-0x0000000000460000-0x0000000000466000-memory.dmp

                    Filesize

                    24KB

                  • memory/688-146-0x0000000001F90000-0x0000000001FD0000-memory.dmp

                    Filesize

                    256KB

                  • memory/860-97-0x0000000000020000-0x000000000002A000-memory.dmp

                    Filesize

                    40KB

                  • memory/1492-113-0x00000000002D0000-0x0000000000300000-memory.dmp

                    Filesize

                    192KB

                  • memory/1492-114-0x00000000002B0000-0x00000000002B6000-memory.dmp

                    Filesize

                    24KB

                  • memory/1492-115-0x00000000049D0000-0x0000000004A10000-memory.dmp

                    Filesize

                    256KB

                  • memory/1500-106-0x0000000000920000-0x000000000092A000-memory.dmp

                    Filesize

                    40KB