Analysis

  • max time kernel
    98s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2023 12:16

General

  • Target

    03687799.exe

  • Size

    806KB

  • MD5

    b4dfa1573daf2b94ce47106ffc248b5a

  • SHA1

    521ac99ab28693b6b2d3023ad47739d8daaa2982

  • SHA256

    80a5552633e679459396c1c07bfe3841fb17c55cbfd1fb836da974977d38beb9

  • SHA512

    0b8c0587d6ddb4e3ae8003c4308741bfee69852e4118e47bd02a1f2caa0c0259d028e1884526c6f63fd69b819a427763675b1d12172a6c24cbbc414813613799

  • SSDEEP

    24576:oyf2SY0sXe8xvhGm4fdp/D6JQCJfC7F5+GOQS:vJMX1GldZ6CCJq7OL

Malware Config

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.130:19061

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 25 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03687799.exe
    "C:\Users\Admin\AppData\Local\Temp\03687799.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7240973.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7240973.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9455542.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9455542.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6723188.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6723188.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1056
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3014895.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3014895.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:984
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0290561.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0290561.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0332359.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0332359.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9665577.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9665577.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
          "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1756
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1228
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit
            5⤵
              PID:1504
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                6⤵
                  PID:520
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rugen.exe" /P "Admin:N"
                  6⤵
                    PID:1500
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "rugen.exe" /P "Admin:R" /E
                    6⤵
                      PID:624
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      6⤵
                        PID:1792
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\200f691d32" /P "Admin:N"
                        6⤵
                          PID:896
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\200f691d32" /P "Admin:R" /E
                          6⤵
                            PID:340
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          5⤵
                          • Loads dropped DLL
                          PID:820
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2032398.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2032398.exe
                    2⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:296
                • C:\Windows\system32\taskeng.exe
                  taskeng.exe {6ADE2A7C-53A7-4664-BF13-F623BAEC673B} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]
                  1⤵
                    PID:944
                    • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                      C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                      2⤵
                      • Executes dropped EXE
                      PID:2032

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Execution

                  Scheduled Task

                  1
                  T1053

                  Persistence

                  Modify Existing Service

                  1
                  T1031

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Scheduled Task

                  1
                  T1053

                  Privilege Escalation

                  Scheduled Task

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  3
                  T1112

                  Disabling Security Tools

                  2
                  T1089

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Discovery

                  Query Registry

                  1
                  T1012

                  System Information Discovery

                  1
                  T1082

                  Collection

                  Data from Local System

                  1
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                    Filesize

                    205KB

                    MD5

                    2142c3c5c8f5e3c2ca1009adeacca3ac

                    SHA1

                    169715328ad9b36a02b2af74fac4af37dd7e943c

                    SHA256

                    778572e80cf509f686d9bd3327a99b8d438e08ebd9af2bfe1b22bae7cc44e38d

                    SHA512

                    93befcef29c58164d314aee62fbe95cdb04b78eeb3c2f80c77c95b27586d45857f20752b2a1ae5a94864fe0c9fba83fe0d6a6e89fdb95859d66020b4dd5a947c

                  • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                    Filesize

                    205KB

                    MD5

                    2142c3c5c8f5e3c2ca1009adeacca3ac

                    SHA1

                    169715328ad9b36a02b2af74fac4af37dd7e943c

                    SHA256

                    778572e80cf509f686d9bd3327a99b8d438e08ebd9af2bfe1b22bae7cc44e38d

                    SHA512

                    93befcef29c58164d314aee62fbe95cdb04b78eeb3c2f80c77c95b27586d45857f20752b2a1ae5a94864fe0c9fba83fe0d6a6e89fdb95859d66020b4dd5a947c

                  • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                    Filesize

                    205KB

                    MD5

                    2142c3c5c8f5e3c2ca1009adeacca3ac

                    SHA1

                    169715328ad9b36a02b2af74fac4af37dd7e943c

                    SHA256

                    778572e80cf509f686d9bd3327a99b8d438e08ebd9af2bfe1b22bae7cc44e38d

                    SHA512

                    93befcef29c58164d314aee62fbe95cdb04b78eeb3c2f80c77c95b27586d45857f20752b2a1ae5a94864fe0c9fba83fe0d6a6e89fdb95859d66020b4dd5a947c

                  • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                    Filesize

                    205KB

                    MD5

                    2142c3c5c8f5e3c2ca1009adeacca3ac

                    SHA1

                    169715328ad9b36a02b2af74fac4af37dd7e943c

                    SHA256

                    778572e80cf509f686d9bd3327a99b8d438e08ebd9af2bfe1b22bae7cc44e38d

                    SHA512

                    93befcef29c58164d314aee62fbe95cdb04b78eeb3c2f80c77c95b27586d45857f20752b2a1ae5a94864fe0c9fba83fe0d6a6e89fdb95859d66020b4dd5a947c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2032398.exe
                    Filesize

                    285KB

                    MD5

                    09300f9b97dc5112e8291f4b5695e731

                    SHA1

                    bb5b91d40a39d7a510afcb6bac76d633a76b9cfe

                    SHA256

                    e153b38e22e35db685e71cd8133a41b94ee1d73861732be9a18deda6095a4282

                    SHA512

                    104b70cf9e2ea94b7c13d08df9c50bf734fed0837132150cf2820a5524aa00f5e97d4fd145231be5f4f1eef8392ac58454af27b0579fcf97608bb27e69cf208b

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2032398.exe
                    Filesize

                    285KB

                    MD5

                    09300f9b97dc5112e8291f4b5695e731

                    SHA1

                    bb5b91d40a39d7a510afcb6bac76d633a76b9cfe

                    SHA256

                    e153b38e22e35db685e71cd8133a41b94ee1d73861732be9a18deda6095a4282

                    SHA512

                    104b70cf9e2ea94b7c13d08df9c50bf734fed0837132150cf2820a5524aa00f5e97d4fd145231be5f4f1eef8392ac58454af27b0579fcf97608bb27e69cf208b

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7240973.exe
                    Filesize

                    602KB

                    MD5

                    189e526d3b727503a5b16fecca7598c4

                    SHA1

                    33d02b8c9055965639edcdf42c93f8f18e7b6b8b

                    SHA256

                    d65338cafa890c23bdc2289214c05db2e13a001b263f928b79b39b15bce79e8c

                    SHA512

                    2544484b12c15657790d57e70f3b9fbdda022d8d2f5ab164d536b77a08e858e63cd2e3eab1b32426b101d12418348c03847cd2799d9accbc9b63f8d4ec933117

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7240973.exe
                    Filesize

                    602KB

                    MD5

                    189e526d3b727503a5b16fecca7598c4

                    SHA1

                    33d02b8c9055965639edcdf42c93f8f18e7b6b8b

                    SHA256

                    d65338cafa890c23bdc2289214c05db2e13a001b263f928b79b39b15bce79e8c

                    SHA512

                    2544484b12c15657790d57e70f3b9fbdda022d8d2f5ab164d536b77a08e858e63cd2e3eab1b32426b101d12418348c03847cd2799d9accbc9b63f8d4ec933117

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9665577.exe
                    Filesize

                    205KB

                    MD5

                    2142c3c5c8f5e3c2ca1009adeacca3ac

                    SHA1

                    169715328ad9b36a02b2af74fac4af37dd7e943c

                    SHA256

                    778572e80cf509f686d9bd3327a99b8d438e08ebd9af2bfe1b22bae7cc44e38d

                    SHA512

                    93befcef29c58164d314aee62fbe95cdb04b78eeb3c2f80c77c95b27586d45857f20752b2a1ae5a94864fe0c9fba83fe0d6a6e89fdb95859d66020b4dd5a947c

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9665577.exe
                    Filesize

                    205KB

                    MD5

                    2142c3c5c8f5e3c2ca1009adeacca3ac

                    SHA1

                    169715328ad9b36a02b2af74fac4af37dd7e943c

                    SHA256

                    778572e80cf509f686d9bd3327a99b8d438e08ebd9af2bfe1b22bae7cc44e38d

                    SHA512

                    93befcef29c58164d314aee62fbe95cdb04b78eeb3c2f80c77c95b27586d45857f20752b2a1ae5a94864fe0c9fba83fe0d6a6e89fdb95859d66020b4dd5a947c

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9455542.exe
                    Filesize

                    430KB

                    MD5

                    513b040fa08047cee90ff7456dc823a2

                    SHA1

                    dc30a2a8c4fce9f62246321d00f5d1afc8d6cdea

                    SHA256

                    1c65a75e0559709eb19f1b3149464f5eed0a28ea926a84a29f66048d150dd9ba

                    SHA512

                    951c26c9d831b4e07b74b10f0e886d09a2add160837a5563dd6aaa9dec8d3df9e35204d0bb2dbffcb55af8ab15af39a8f8af36582f6c82a3bb7f38f37f79be67

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9455542.exe
                    Filesize

                    430KB

                    MD5

                    513b040fa08047cee90ff7456dc823a2

                    SHA1

                    dc30a2a8c4fce9f62246321d00f5d1afc8d6cdea

                    SHA256

                    1c65a75e0559709eb19f1b3149464f5eed0a28ea926a84a29f66048d150dd9ba

                    SHA512

                    951c26c9d831b4e07b74b10f0e886d09a2add160837a5563dd6aaa9dec8d3df9e35204d0bb2dbffcb55af8ab15af39a8f8af36582f6c82a3bb7f38f37f79be67

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0332359.exe
                    Filesize

                    172KB

                    MD5

                    91f6cc1facfd04df68d8ad11bfbe850a

                    SHA1

                    f765058e6b58071659c3ca6633fa4b7f1d29c2c2

                    SHA256

                    09763cef39ee69c692180fe7fc91a61aae80aaf28da995c1d52dc29f6949ea1e

                    SHA512

                    fa07f865cd344c205607e4295575056309f36892c1bcd728135d4304390073e3f8367a4264db69331054004599c59811001ddfb1680582305041d0146ab35cd5

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0332359.exe
                    Filesize

                    172KB

                    MD5

                    91f6cc1facfd04df68d8ad11bfbe850a

                    SHA1

                    f765058e6b58071659c3ca6633fa4b7f1d29c2c2

                    SHA256

                    09763cef39ee69c692180fe7fc91a61aae80aaf28da995c1d52dc29f6949ea1e

                    SHA512

                    fa07f865cd344c205607e4295575056309f36892c1bcd728135d4304390073e3f8367a4264db69331054004599c59811001ddfb1680582305041d0146ab35cd5

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6723188.exe
                    Filesize

                    275KB

                    MD5

                    f2a42c9bec297e3efabce28dfb68c43a

                    SHA1

                    a915e93c0ec9a0c4a9d0f7bacb5b9e297b7b9ac3

                    SHA256

                    98e254b564ffd821d0afd746316d6f4e7d8ad074cfd48fa46d3fe18907e5afdf

                    SHA512

                    6a71c57dfe2e27932503f0fac730ac1581ef9f780242e04c81ef11c98fb3e3affc590cacedaf5c475febe613b18bb6ea77a74e79c01e41bc158892d8df025afa

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6723188.exe
                    Filesize

                    275KB

                    MD5

                    f2a42c9bec297e3efabce28dfb68c43a

                    SHA1

                    a915e93c0ec9a0c4a9d0f7bacb5b9e297b7b9ac3

                    SHA256

                    98e254b564ffd821d0afd746316d6f4e7d8ad074cfd48fa46d3fe18907e5afdf

                    SHA512

                    6a71c57dfe2e27932503f0fac730ac1581ef9f780242e04c81ef11c98fb3e3affc590cacedaf5c475febe613b18bb6ea77a74e79c01e41bc158892d8df025afa

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3014895.exe
                    Filesize

                    285KB

                    MD5

                    af8e5be7ac34530d0ee04f4a374865cd

                    SHA1

                    eb5c502e9e474bd0142f58c67a69e944b96e8bea

                    SHA256

                    e6b97a81a62c5a82652b7dbf3a65cb0835232ffb3693427d7d769437551ce2a1

                    SHA512

                    f1bd07d549ec857c966725eb75202cd442027bd77a46a4835e368df4c46d266532e31f3347fa4c5d6a554c9ac4c44ffaa1d4a6658cc1782bcc217aab1f31037e

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3014895.exe
                    Filesize

                    285KB

                    MD5

                    af8e5be7ac34530d0ee04f4a374865cd

                    SHA1

                    eb5c502e9e474bd0142f58c67a69e944b96e8bea

                    SHA256

                    e6b97a81a62c5a82652b7dbf3a65cb0835232ffb3693427d7d769437551ce2a1

                    SHA512

                    f1bd07d549ec857c966725eb75202cd442027bd77a46a4835e368df4c46d266532e31f3347fa4c5d6a554c9ac4c44ffaa1d4a6658cc1782bcc217aab1f31037e

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3014895.exe
                    Filesize

                    285KB

                    MD5

                    af8e5be7ac34530d0ee04f4a374865cd

                    SHA1

                    eb5c502e9e474bd0142f58c67a69e944b96e8bea

                    SHA256

                    e6b97a81a62c5a82652b7dbf3a65cb0835232ffb3693427d7d769437551ce2a1

                    SHA512

                    f1bd07d549ec857c966725eb75202cd442027bd77a46a4835e368df4c46d266532e31f3347fa4c5d6a554c9ac4c44ffaa1d4a6658cc1782bcc217aab1f31037e

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0290561.exe
                    Filesize

                    124KB

                    MD5

                    24f9712b19f12e008c2160b2594d6198

                    SHA1

                    3d8fec2400cbd94db9ad1c82f0d4316628753c3a

                    SHA256

                    f70504f60f29a116159581540d1ffa0b51c1d2e869829662822ff952d905abbd

                    SHA512

                    24c35b44327f0ffe0d33756e2e41278839eca276ce01521ee1fdc656f8e52f18d818e49495d00478eff558b8f18c87fafb9b048a098509701aec4d2e5fb0d284

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0290561.exe
                    Filesize

                    124KB

                    MD5

                    24f9712b19f12e008c2160b2594d6198

                    SHA1

                    3d8fec2400cbd94db9ad1c82f0d4316628753c3a

                    SHA256

                    f70504f60f29a116159581540d1ffa0b51c1d2e869829662822ff952d905abbd

                    SHA512

                    24c35b44327f0ffe0d33756e2e41278839eca276ce01521ee1fdc656f8e52f18d818e49495d00478eff558b8f18c87fafb9b048a098509701aec4d2e5fb0d284

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0290561.exe
                    Filesize

                    124KB

                    MD5

                    24f9712b19f12e008c2160b2594d6198

                    SHA1

                    3d8fec2400cbd94db9ad1c82f0d4316628753c3a

                    SHA256

                    f70504f60f29a116159581540d1ffa0b51c1d2e869829662822ff952d905abbd

                    SHA512

                    24c35b44327f0ffe0d33756e2e41278839eca276ce01521ee1fdc656f8e52f18d818e49495d00478eff558b8f18c87fafb9b048a098509701aec4d2e5fb0d284

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                    Filesize

                    162B

                    MD5

                    1b7c22a214949975556626d7217e9a39

                    SHA1

                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                    SHA256

                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                    SHA512

                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                  • \Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                    Filesize

                    205KB

                    MD5

                    2142c3c5c8f5e3c2ca1009adeacca3ac

                    SHA1

                    169715328ad9b36a02b2af74fac4af37dd7e943c

                    SHA256

                    778572e80cf509f686d9bd3327a99b8d438e08ebd9af2bfe1b22bae7cc44e38d

                    SHA512

                    93befcef29c58164d314aee62fbe95cdb04b78eeb3c2f80c77c95b27586d45857f20752b2a1ae5a94864fe0c9fba83fe0d6a6e89fdb95859d66020b4dd5a947c

                  • \Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                    Filesize

                    205KB

                    MD5

                    2142c3c5c8f5e3c2ca1009adeacca3ac

                    SHA1

                    169715328ad9b36a02b2af74fac4af37dd7e943c

                    SHA256

                    778572e80cf509f686d9bd3327a99b8d438e08ebd9af2bfe1b22bae7cc44e38d

                    SHA512

                    93befcef29c58164d314aee62fbe95cdb04b78eeb3c2f80c77c95b27586d45857f20752b2a1ae5a94864fe0c9fba83fe0d6a6e89fdb95859d66020b4dd5a947c

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\e2032398.exe
                    Filesize

                    285KB

                    MD5

                    09300f9b97dc5112e8291f4b5695e731

                    SHA1

                    bb5b91d40a39d7a510afcb6bac76d633a76b9cfe

                    SHA256

                    e153b38e22e35db685e71cd8133a41b94ee1d73861732be9a18deda6095a4282

                    SHA512

                    104b70cf9e2ea94b7c13d08df9c50bf734fed0837132150cf2820a5524aa00f5e97d4fd145231be5f4f1eef8392ac58454af27b0579fcf97608bb27e69cf208b

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\e2032398.exe
                    Filesize

                    285KB

                    MD5

                    09300f9b97dc5112e8291f4b5695e731

                    SHA1

                    bb5b91d40a39d7a510afcb6bac76d633a76b9cfe

                    SHA256

                    e153b38e22e35db685e71cd8133a41b94ee1d73861732be9a18deda6095a4282

                    SHA512

                    104b70cf9e2ea94b7c13d08df9c50bf734fed0837132150cf2820a5524aa00f5e97d4fd145231be5f4f1eef8392ac58454af27b0579fcf97608bb27e69cf208b

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\e2032398.exe
                    Filesize

                    285KB

                    MD5

                    09300f9b97dc5112e8291f4b5695e731

                    SHA1

                    bb5b91d40a39d7a510afcb6bac76d633a76b9cfe

                    SHA256

                    e153b38e22e35db685e71cd8133a41b94ee1d73861732be9a18deda6095a4282

                    SHA512

                    104b70cf9e2ea94b7c13d08df9c50bf734fed0837132150cf2820a5524aa00f5e97d4fd145231be5f4f1eef8392ac58454af27b0579fcf97608bb27e69cf208b

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7240973.exe
                    Filesize

                    602KB

                    MD5

                    189e526d3b727503a5b16fecca7598c4

                    SHA1

                    33d02b8c9055965639edcdf42c93f8f18e7b6b8b

                    SHA256

                    d65338cafa890c23bdc2289214c05db2e13a001b263f928b79b39b15bce79e8c

                    SHA512

                    2544484b12c15657790d57e70f3b9fbdda022d8d2f5ab164d536b77a08e858e63cd2e3eab1b32426b101d12418348c03847cd2799d9accbc9b63f8d4ec933117

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7240973.exe
                    Filesize

                    602KB

                    MD5

                    189e526d3b727503a5b16fecca7598c4

                    SHA1

                    33d02b8c9055965639edcdf42c93f8f18e7b6b8b

                    SHA256

                    d65338cafa890c23bdc2289214c05db2e13a001b263f928b79b39b15bce79e8c

                    SHA512

                    2544484b12c15657790d57e70f3b9fbdda022d8d2f5ab164d536b77a08e858e63cd2e3eab1b32426b101d12418348c03847cd2799d9accbc9b63f8d4ec933117

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\d9665577.exe
                    Filesize

                    205KB

                    MD5

                    2142c3c5c8f5e3c2ca1009adeacca3ac

                    SHA1

                    169715328ad9b36a02b2af74fac4af37dd7e943c

                    SHA256

                    778572e80cf509f686d9bd3327a99b8d438e08ebd9af2bfe1b22bae7cc44e38d

                    SHA512

                    93befcef29c58164d314aee62fbe95cdb04b78eeb3c2f80c77c95b27586d45857f20752b2a1ae5a94864fe0c9fba83fe0d6a6e89fdb95859d66020b4dd5a947c

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\d9665577.exe
                    Filesize

                    205KB

                    MD5

                    2142c3c5c8f5e3c2ca1009adeacca3ac

                    SHA1

                    169715328ad9b36a02b2af74fac4af37dd7e943c

                    SHA256

                    778572e80cf509f686d9bd3327a99b8d438e08ebd9af2bfe1b22bae7cc44e38d

                    SHA512

                    93befcef29c58164d314aee62fbe95cdb04b78eeb3c2f80c77c95b27586d45857f20752b2a1ae5a94864fe0c9fba83fe0d6a6e89fdb95859d66020b4dd5a947c

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9455542.exe
                    Filesize

                    430KB

                    MD5

                    513b040fa08047cee90ff7456dc823a2

                    SHA1

                    dc30a2a8c4fce9f62246321d00f5d1afc8d6cdea

                    SHA256

                    1c65a75e0559709eb19f1b3149464f5eed0a28ea926a84a29f66048d150dd9ba

                    SHA512

                    951c26c9d831b4e07b74b10f0e886d09a2add160837a5563dd6aaa9dec8d3df9e35204d0bb2dbffcb55af8ab15af39a8f8af36582f6c82a3bb7f38f37f79be67

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9455542.exe
                    Filesize

                    430KB

                    MD5

                    513b040fa08047cee90ff7456dc823a2

                    SHA1

                    dc30a2a8c4fce9f62246321d00f5d1afc8d6cdea

                    SHA256

                    1c65a75e0559709eb19f1b3149464f5eed0a28ea926a84a29f66048d150dd9ba

                    SHA512

                    951c26c9d831b4e07b74b10f0e886d09a2add160837a5563dd6aaa9dec8d3df9e35204d0bb2dbffcb55af8ab15af39a8f8af36582f6c82a3bb7f38f37f79be67

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c0332359.exe
                    Filesize

                    172KB

                    MD5

                    91f6cc1facfd04df68d8ad11bfbe850a

                    SHA1

                    f765058e6b58071659c3ca6633fa4b7f1d29c2c2

                    SHA256

                    09763cef39ee69c692180fe7fc91a61aae80aaf28da995c1d52dc29f6949ea1e

                    SHA512

                    fa07f865cd344c205607e4295575056309f36892c1bcd728135d4304390073e3f8367a4264db69331054004599c59811001ddfb1680582305041d0146ab35cd5

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c0332359.exe
                    Filesize

                    172KB

                    MD5

                    91f6cc1facfd04df68d8ad11bfbe850a

                    SHA1

                    f765058e6b58071659c3ca6633fa4b7f1d29c2c2

                    SHA256

                    09763cef39ee69c692180fe7fc91a61aae80aaf28da995c1d52dc29f6949ea1e

                    SHA512

                    fa07f865cd344c205607e4295575056309f36892c1bcd728135d4304390073e3f8367a4264db69331054004599c59811001ddfb1680582305041d0146ab35cd5

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6723188.exe
                    Filesize

                    275KB

                    MD5

                    f2a42c9bec297e3efabce28dfb68c43a

                    SHA1

                    a915e93c0ec9a0c4a9d0f7bacb5b9e297b7b9ac3

                    SHA256

                    98e254b564ffd821d0afd746316d6f4e7d8ad074cfd48fa46d3fe18907e5afdf

                    SHA512

                    6a71c57dfe2e27932503f0fac730ac1581ef9f780242e04c81ef11c98fb3e3affc590cacedaf5c475febe613b18bb6ea77a74e79c01e41bc158892d8df025afa

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6723188.exe
                    Filesize

                    275KB

                    MD5

                    f2a42c9bec297e3efabce28dfb68c43a

                    SHA1

                    a915e93c0ec9a0c4a9d0f7bacb5b9e297b7b9ac3

                    SHA256

                    98e254b564ffd821d0afd746316d6f4e7d8ad074cfd48fa46d3fe18907e5afdf

                    SHA512

                    6a71c57dfe2e27932503f0fac730ac1581ef9f780242e04c81ef11c98fb3e3affc590cacedaf5c475febe613b18bb6ea77a74e79c01e41bc158892d8df025afa

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3014895.exe
                    Filesize

                    285KB

                    MD5

                    af8e5be7ac34530d0ee04f4a374865cd

                    SHA1

                    eb5c502e9e474bd0142f58c67a69e944b96e8bea

                    SHA256

                    e6b97a81a62c5a82652b7dbf3a65cb0835232ffb3693427d7d769437551ce2a1

                    SHA512

                    f1bd07d549ec857c966725eb75202cd442027bd77a46a4835e368df4c46d266532e31f3347fa4c5d6a554c9ac4c44ffaa1d4a6658cc1782bcc217aab1f31037e

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3014895.exe
                    Filesize

                    285KB

                    MD5

                    af8e5be7ac34530d0ee04f4a374865cd

                    SHA1

                    eb5c502e9e474bd0142f58c67a69e944b96e8bea

                    SHA256

                    e6b97a81a62c5a82652b7dbf3a65cb0835232ffb3693427d7d769437551ce2a1

                    SHA512

                    f1bd07d549ec857c966725eb75202cd442027bd77a46a4835e368df4c46d266532e31f3347fa4c5d6a554c9ac4c44ffaa1d4a6658cc1782bcc217aab1f31037e

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3014895.exe
                    Filesize

                    285KB

                    MD5

                    af8e5be7ac34530d0ee04f4a374865cd

                    SHA1

                    eb5c502e9e474bd0142f58c67a69e944b96e8bea

                    SHA256

                    e6b97a81a62c5a82652b7dbf3a65cb0835232ffb3693427d7d769437551ce2a1

                    SHA512

                    f1bd07d549ec857c966725eb75202cd442027bd77a46a4835e368df4c46d266532e31f3347fa4c5d6a554c9ac4c44ffaa1d4a6658cc1782bcc217aab1f31037e

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b0290561.exe
                    Filesize

                    124KB

                    MD5

                    24f9712b19f12e008c2160b2594d6198

                    SHA1

                    3d8fec2400cbd94db9ad1c82f0d4316628753c3a

                    SHA256

                    f70504f60f29a116159581540d1ffa0b51c1d2e869829662822ff952d905abbd

                    SHA512

                    24c35b44327f0ffe0d33756e2e41278839eca276ce01521ee1fdc656f8e52f18d818e49495d00478eff558b8f18c87fafb9b048a098509701aec4d2e5fb0d284

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b0290561.exe
                    Filesize

                    124KB

                    MD5

                    24f9712b19f12e008c2160b2594d6198

                    SHA1

                    3d8fec2400cbd94db9ad1c82f0d4316628753c3a

                    SHA256

                    f70504f60f29a116159581540d1ffa0b51c1d2e869829662822ff952d905abbd

                    SHA512

                    24c35b44327f0ffe0d33756e2e41278839eca276ce01521ee1fdc656f8e52f18d818e49495d00478eff558b8f18c87fafb9b048a098509701aec4d2e5fb0d284

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b0290561.exe
                    Filesize

                    124KB

                    MD5

                    24f9712b19f12e008c2160b2594d6198

                    SHA1

                    3d8fec2400cbd94db9ad1c82f0d4316628753c3a

                    SHA256

                    f70504f60f29a116159581540d1ffa0b51c1d2e869829662822ff952d905abbd

                    SHA512

                    24c35b44327f0ffe0d33756e2e41278839eca276ce01521ee1fdc656f8e52f18d818e49495d00478eff558b8f18c87fafb9b048a098509701aec4d2e5fb0d284

                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                    Filesize

                    89KB

                    MD5

                    83fc14fb36516facb19e0e96286f7f48

                    SHA1

                    40082ca06de4c377585cd164fb521bacadb673da

                    SHA256

                    08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                    SHA512

                    ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

                  • memory/296-152-0x0000000000320000-0x0000000000350000-memory.dmp
                    Filesize

                    192KB

                  • memory/296-156-0x0000000001FE0000-0x0000000002020000-memory.dmp
                    Filesize

                    256KB

                  • memory/984-101-0x0000000000AE0000-0x0000000000AE6000-memory.dmp
                    Filesize

                    24KB

                  • memory/984-97-0x0000000000250000-0x0000000000280000-memory.dmp
                    Filesize

                    192KB

                  • memory/984-102-0x0000000004B70000-0x0000000004BB0000-memory.dmp
                    Filesize

                    256KB

                  • memory/996-124-0x0000000000940000-0x0000000000970000-memory.dmp
                    Filesize

                    192KB

                  • memory/996-126-0x0000000000540000-0x0000000000580000-memory.dmp
                    Filesize

                    256KB

                  • memory/996-125-0x0000000000590000-0x0000000000596000-memory.dmp
                    Filesize

                    24KB

                  • memory/1764-113-0x0000000000020000-0x000000000002A000-memory.dmp
                    Filesize

                    40KB