Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2023 13:41

General

  • Target

    9faf7dd05baeee347014e49d14628e051614f172a265f7d716e8739c14404873.exe

  • Size

    560KB

  • MD5

    8316514054866b36518117f05877f1b7

  • SHA1

    2516bc306cd8be38f07fc8dc9afd142216ef3d29

  • SHA256

    9faf7dd05baeee347014e49d14628e051614f172a265f7d716e8739c14404873

  • SHA512

    c24b18b3b2a733767e9e0eefaeaa86d699f9db4a93dfbce16bb618dc7937c9bd739fe3e0763b33c0151d69cf1dd8806c6c53f882def54fc9a14a7725fa6e1c7c

  • SSDEEP

    12288:gMrGy90fzM7aOzXGeKSp5yjtYsyftxidVcgeltZ:WymOaOujLyVxcaln

Malware Config

Extracted

Family

amadey

Version

3.87

C2

193.233.255.9/nasa/index.php

Extracted

Family

redline

Botnet

dodge

C2

77.91.124.156:19071

Attributes
  • auth_value

    3372223e987be2a16148c072df30163d

Extracted

Family

systembc

C2

ar.undata.cc:5320

ar1.undata.cc:5320

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9faf7dd05baeee347014e49d14628e051614f172a265f7d716e8739c14404873.exe
    "C:\Users\Admin\AppData\Local\Temp\9faf7dd05baeee347014e49d14628e051614f172a265f7d716e8739c14404873.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2325660.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2325660.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4757330.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4757330.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:852
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3179277.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3179277.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4792
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2355768.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2355768.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4828
          • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
            "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1192
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legosa.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:212
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legosa.exe" /P "Admin:N"&&CACLS "legosa.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1980
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4988
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "legosa.exe" /P "Admin:N"
                  7⤵
                    PID:1312
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "legosa.exe" /P "Admin:R" /E
                    7⤵
                      PID:3420
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:4028
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\ebb444342c" /P "Admin:N"
                        7⤵
                          PID:696
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\ebb444342c" /P "Admin:R" /E
                          7⤵
                            PID:3940
                        • C:\Users\Admin\AppData\Local\Temp\1000035001\5.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000035001\5.exe"
                          6⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of WriteProcessMemory
                          PID:4200
                        • C:\Users\Admin\AppData\Roaming\activeds\ICQ.exe
                          "C:\Users\Admin\AppData\Roaming\activeds\ICQ.exe"
                          6⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of WriteProcessMemory
                          PID:4556
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\SysWOW64\cmd.exe"
                            7⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:2276
                            • C:\Windows\SysWOW64\explorer.exe
                              "C:\Windows\SysWOW64\explorer.exe"
                              8⤵
                                PID:2228
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                            6⤵
                            • Loads dropped DLL
                            PID:4608
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8142386.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8142386.exe
                      3⤵
                      • Executes dropped EXE
                      PID:468
                • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                  C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4572
                • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                  C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                  1⤵
                  • Executes dropped EXE
                  PID:1148

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\1000035001\5.exe

                  Filesize

                  2.4MB

                  MD5

                  82cf051811579ee4f1d9978af52f12db

                  SHA1

                  34122975ea9238001cb644955a1474f4d33f9e7b

                  SHA256

                  2227d5b2e2782a03bdb847a8ebf9ea40cc2c9f10f48385154c66ded1577b1deb

                  SHA512

                  1eb2df40b3e98a0289b2ccd51d0d0861c9e967220b745643210ecdda63e2aeebaf5940b2d0a319dd0ffc6754238aa0a897ee261d06528c645740082a07de3b73

                • C:\Users\Admin\AppData\Local\Temp\1000035001\5.exe

                  Filesize

                  2.4MB

                  MD5

                  82cf051811579ee4f1d9978af52f12db

                  SHA1

                  34122975ea9238001cb644955a1474f4d33f9e7b

                  SHA256

                  2227d5b2e2782a03bdb847a8ebf9ea40cc2c9f10f48385154c66ded1577b1deb

                  SHA512

                  1eb2df40b3e98a0289b2ccd51d0d0861c9e967220b745643210ecdda63e2aeebaf5940b2d0a319dd0ffc6754238aa0a897ee261d06528c645740082a07de3b73

                • C:\Users\Admin\AppData\Local\Temp\1000035001\5.exe

                  Filesize

                  2.4MB

                  MD5

                  82cf051811579ee4f1d9978af52f12db

                  SHA1

                  34122975ea9238001cb644955a1474f4d33f9e7b

                  SHA256

                  2227d5b2e2782a03bdb847a8ebf9ea40cc2c9f10f48385154c66ded1577b1deb

                  SHA512

                  1eb2df40b3e98a0289b2ccd51d0d0861c9e967220b745643210ecdda63e2aeebaf5940b2d0a319dd0ffc6754238aa0a897ee261d06528c645740082a07de3b73

                • C:\Users\Admin\AppData\Local\Temp\2e2d34b1

                  Filesize

                  436KB

                  MD5

                  788e8043441996c454e0039105d73c5f

                  SHA1

                  7d2df8ff5ed8a87d35557c6a7c795fe69cb853b8

                  SHA256

                  bef12d1ea94a908cf0332ad620620a1503d73227c43b2d01dbc15e97ca326508

                  SHA512

                  fbebe4d6ad712f3e8b83e512b7ad139adec382233bff5a724cd0d63e5b1d4f79774933af61a20f563c8485dd29ab1619c95c232f82124a36cddaadb041b7095d

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2325660.exe

                  Filesize

                  433KB

                  MD5

                  bc9f49b0b34dd7eeaf6307cbc040bcb6

                  SHA1

                  bdd2b7af8f281fe70546279f4b39fb26b85c1ac1

                  SHA256

                  ead7da30cdbea09e968493f343cda958047285bb98d832df37d60b3a6c8f41ff

                  SHA512

                  fa2b3828478fc3ca3ef6e6a1dd16c7859d1184250a601a853671b614401308e18104f20ec4880ba1870b3c36e506ff0c88eb07baf433cb2a74ac71e09aa785c5

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2325660.exe

                  Filesize

                  433KB

                  MD5

                  bc9f49b0b34dd7eeaf6307cbc040bcb6

                  SHA1

                  bdd2b7af8f281fe70546279f4b39fb26b85c1ac1

                  SHA256

                  ead7da30cdbea09e968493f343cda958047285bb98d832df37d60b3a6c8f41ff

                  SHA512

                  fa2b3828478fc3ca3ef6e6a1dd16c7859d1184250a601a853671b614401308e18104f20ec4880ba1870b3c36e506ff0c88eb07baf433cb2a74ac71e09aa785c5

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8142386.exe

                  Filesize

                  175KB

                  MD5

                  4cc3c9fd8b8a3720731299aad9ee3f23

                  SHA1

                  8e4b58bf3e8118dbe1847a3748bf5f729c9e4917

                  SHA256

                  03b9c9fb490c07c31f69a29d556d77c39f27d766d5c11d19bbb9ddec960b70c2

                  SHA512

                  9624c2bdf14c6347db0069422bb8794fe3c6e8207928816ab1259841877d961b683dc93ee4438aef582cd235c1cd2bb256f583c78a88f46e1b17b72091f4cd6b

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s8142386.exe

                  Filesize

                  175KB

                  MD5

                  4cc3c9fd8b8a3720731299aad9ee3f23

                  SHA1

                  8e4b58bf3e8118dbe1847a3748bf5f729c9e4917

                  SHA256

                  03b9c9fb490c07c31f69a29d556d77c39f27d766d5c11d19bbb9ddec960b70c2

                  SHA512

                  9624c2bdf14c6347db0069422bb8794fe3c6e8207928816ab1259841877d961b683dc93ee4438aef582cd235c1cd2bb256f583c78a88f46e1b17b72091f4cd6b

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4757330.exe

                  Filesize

                  277KB

                  MD5

                  0d8d5361f9c22f03b4b02a11072356ab

                  SHA1

                  a919715a578e73aabafeaaaea2c3fb4c51093a2f

                  SHA256

                  5fe2570cc42aa5ef7b0afa82b8d0ef7939de722323f1d8dc5ef34bbc3f05cc5a

                  SHA512

                  231300e53ca395d4d5e52d19ef4176328a7c68363d9357bcd54c8605af68944792685fd0048c4058a5564fbd8a6c9bcd7bd7fa8d27230d9f5c56a7fbb8f08756

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4757330.exe

                  Filesize

                  277KB

                  MD5

                  0d8d5361f9c22f03b4b02a11072356ab

                  SHA1

                  a919715a578e73aabafeaaaea2c3fb4c51093a2f

                  SHA256

                  5fe2570cc42aa5ef7b0afa82b8d0ef7939de722323f1d8dc5ef34bbc3f05cc5a

                  SHA512

                  231300e53ca395d4d5e52d19ef4176328a7c68363d9357bcd54c8605af68944792685fd0048c4058a5564fbd8a6c9bcd7bd7fa8d27230d9f5c56a7fbb8f08756

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3179277.exe

                  Filesize

                  11KB

                  MD5

                  7e93bacbbc33e6652e147e7fe07572a0

                  SHA1

                  421a7167da01c8da4dc4d5234ca3dd84e319e762

                  SHA256

                  850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                  SHA512

                  250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3179277.exe

                  Filesize

                  11KB

                  MD5

                  7e93bacbbc33e6652e147e7fe07572a0

                  SHA1

                  421a7167da01c8da4dc4d5234ca3dd84e319e762

                  SHA256

                  850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                  SHA512

                  250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2355768.exe

                  Filesize

                  313KB

                  MD5

                  2c1528a6992ce0ac3a41d0da5cf846ba

                  SHA1

                  c315a74e85861b7abd2b9f213982f536a018a63d

                  SHA256

                  b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742

                  SHA512

                  f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2355768.exe

                  Filesize

                  313KB

                  MD5

                  2c1528a6992ce0ac3a41d0da5cf846ba

                  SHA1

                  c315a74e85861b7abd2b9f213982f536a018a63d

                  SHA256

                  b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742

                  SHA512

                  f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341

                • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                  Filesize

                  313KB

                  MD5

                  2c1528a6992ce0ac3a41d0da5cf846ba

                  SHA1

                  c315a74e85861b7abd2b9f213982f536a018a63d

                  SHA256

                  b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742

                  SHA512

                  f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341

                • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                  Filesize

                  313KB

                  MD5

                  2c1528a6992ce0ac3a41d0da5cf846ba

                  SHA1

                  c315a74e85861b7abd2b9f213982f536a018a63d

                  SHA256

                  b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742

                  SHA512

                  f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341

                • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                  Filesize

                  313KB

                  MD5

                  2c1528a6992ce0ac3a41d0da5cf846ba

                  SHA1

                  c315a74e85861b7abd2b9f213982f536a018a63d

                  SHA256

                  b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742

                  SHA512

                  f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341

                • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                  Filesize

                  313KB

                  MD5

                  2c1528a6992ce0ac3a41d0da5cf846ba

                  SHA1

                  c315a74e85861b7abd2b9f213982f536a018a63d

                  SHA256

                  b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742

                  SHA512

                  f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341

                • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                  Filesize

                  313KB

                  MD5

                  2c1528a6992ce0ac3a41d0da5cf846ba

                  SHA1

                  c315a74e85861b7abd2b9f213982f536a018a63d

                  SHA256

                  b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742

                  SHA512

                  f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341

                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                  Filesize

                  89KB

                  MD5

                  43762ddccb9db44ea9914e448ba3e43e

                  SHA1

                  87e5766061740cf4a570133af6108399a11dbd1b

                  SHA256

                  459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef

                  SHA512

                  ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651

                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                  Filesize

                  89KB

                  MD5

                  43762ddccb9db44ea9914e448ba3e43e

                  SHA1

                  87e5766061740cf4a570133af6108399a11dbd1b

                  SHA256

                  459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef

                  SHA512

                  ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651

                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                  Filesize

                  89KB

                  MD5

                  43762ddccb9db44ea9914e448ba3e43e

                  SHA1

                  87e5766061740cf4a570133af6108399a11dbd1b

                  SHA256

                  459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef

                  SHA512

                  ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651

                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                  Filesize

                  162B

                  MD5

                  1b7c22a214949975556626d7217e9a39

                  SHA1

                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                  SHA256

                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                  SHA512

                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                • C:\Users\Admin\AppData\Roaming\activeds\ICQ.exe

                  Filesize

                  168KB

                  MD5

                  aef6452711538d9021f929a2a5f633cf

                  SHA1

                  205b7fab75e77d1ff123991489462d39128e03f6

                  SHA256

                  e611a1ffbe9e08a2660bc290a581aa0b54637524aaf6040a70e54f97136ce5ac

                  SHA512

                  7ad84d4d3bab3f5a3e14f336d8931bf4b876299000081b2a94a3fcf698c56b82514753b483c5b8d7ae84ddd92ee1c4043fa5e7fb7c4f7e9eb52ca8c794e508b7

                • C:\Users\Admin\AppData\Roaming\activeds\ICQ.exe

                  Filesize

                  168KB

                  MD5

                  aef6452711538d9021f929a2a5f633cf

                  SHA1

                  205b7fab75e77d1ff123991489462d39128e03f6

                  SHA256

                  e611a1ffbe9e08a2660bc290a581aa0b54637524aaf6040a70e54f97136ce5ac

                  SHA512

                  7ad84d4d3bab3f5a3e14f336d8931bf4b876299000081b2a94a3fcf698c56b82514753b483c5b8d7ae84ddd92ee1c4043fa5e7fb7c4f7e9eb52ca8c794e508b7

                • C:\Users\Admin\AppData\Roaming\activeds\MCoreLib.dll

                  Filesize

                  106KB

                  MD5

                  815b07c37c83b13457d37ca8c6a7a561

                  SHA1

                  746138b85e5611fd058c008411889a15870083cd

                  SHA256

                  153c1b5e96e7bc4c9f858c3cc3bc6cd5e09ef68776d95871ca38824c430654c4

                  SHA512

                  8949ab1deae036ae785ad20c634519aa368b4768f0dd65c0dc53f8ea70dd7d707c984277b914de14054eb8a044182ff78205e3a02555e377750bb829760b8c31

                • C:\Users\Admin\AppData\Roaming\activeds\MCoreLib.dll

                  Filesize

                  106KB

                  MD5

                  815b07c37c83b13457d37ca8c6a7a561

                  SHA1

                  746138b85e5611fd058c008411889a15870083cd

                  SHA256

                  153c1b5e96e7bc4c9f858c3cc3bc6cd5e09ef68776d95871ca38824c430654c4

                  SHA512

                  8949ab1deae036ae785ad20c634519aa368b4768f0dd65c0dc53f8ea70dd7d707c984277b914de14054eb8a044182ff78205e3a02555e377750bb829760b8c31

                • C:\Users\Admin\AppData\Roaming\activeds\MDb.dll

                  Filesize

                  205KB

                  MD5

                  be1262b27ff4a4349b337cc95b7746e7

                  SHA1

                  a88b9a167baedbaef047b862caecb8206548c2f6

                  SHA256

                  ab47f3a52c1c2a7f1855c48e2d085e87345590b1fb78353c7070c3b6600843fd

                  SHA512

                  d70a9f1113b2b11ff5df3644b97d13cfe1deee1def13e751eabd8e84858e4ae6eb58d45926a1443cafbb7a261bcb61285b4c316014b43c6c6971f7261e13bb96

                • C:\Users\Admin\AppData\Roaming\activeds\MDb.dll

                  Filesize

                  205KB

                  MD5

                  be1262b27ff4a4349b337cc95b7746e7

                  SHA1

                  a88b9a167baedbaef047b862caecb8206548c2f6

                  SHA256

                  ab47f3a52c1c2a7f1855c48e2d085e87345590b1fb78353c7070c3b6600843fd

                  SHA512

                  d70a9f1113b2b11ff5df3644b97d13cfe1deee1def13e751eabd8e84858e4ae6eb58d45926a1443cafbb7a261bcb61285b4c316014b43c6c6971f7261e13bb96

                • C:\Users\Admin\AppData\Roaming\activeds\MKernel.dll

                  Filesize

                  219KB

                  MD5

                  ab9ee0529bab6495e65bf7d25c2476a2

                  SHA1

                  4438dc373b04cbab0320ccdf3ec5da8fb85f5f4f

                  SHA256

                  4f3e310c5b4fe873a91b19db66e2c1b69a30b4bf7362570d6b1d7d5105a4b0a9

                  SHA512

                  05f4018f370ac18e32ab2c2642430154b5050948b12f0822024c960ffed94dc65469c22f01d67d0948fc1aa3eea16d3f0b47569275e87aacd934b74e83e2e7b4

                • C:\Users\Admin\AppData\Roaming\activeds\MKernel.dll

                  Filesize

                  219KB

                  MD5

                  ab9ee0529bab6495e65bf7d25c2476a2

                  SHA1

                  4438dc373b04cbab0320ccdf3ec5da8fb85f5f4f

                  SHA256

                  4f3e310c5b4fe873a91b19db66e2c1b69a30b4bf7362570d6b1d7d5105a4b0a9

                  SHA512

                  05f4018f370ac18e32ab2c2642430154b5050948b12f0822024c960ffed94dc65469c22f01d67d0948fc1aa3eea16d3f0b47569275e87aacd934b74e83e2e7b4

                • C:\Users\Admin\AppData\Roaming\activeds\MSVCP71.dll

                  Filesize

                  488KB

                  MD5

                  561fa2abb31dfa8fab762145f81667c2

                  SHA1

                  c8ccb04eedac821a13fae314a2435192860c72b8

                  SHA256

                  df96156f6a548fd6fe5672918de5ae4509d3c810a57bffd2a91de45a3ed5b23b

                  SHA512

                  7d960aa8e3cce22d63a6723d7f00c195de7de83b877eca126e339e2d8cc9859e813e05c5c0a5671a75bb717243e9295fd13e5e17d8c6660eb59f5baee63a7c43

                • C:\Users\Admin\AppData\Roaming\activeds\MSVCR71.dll

                  Filesize

                  340KB

                  MD5

                  86f1895ae8c5e8b17d99ece768a70732

                  SHA1

                  d5502a1d00787d68f548ddeebbde1eca5e2b38ca

                  SHA256

                  8094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe

                  SHA512

                  3b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da

                • C:\Users\Admin\AppData\Roaming\activeds\MUICoreLib.dll

                  Filesize

                  824KB

                  MD5

                  60a5383ba17d8f519cb4356e28873a14

                  SHA1

                  6bf70393d957320a921226c7fcdf352a0a67442d

                  SHA256

                  80878e4543959b63cbd87e3ebb82f4988cbbdf9da564370aa15410783c5f343f

                  SHA512

                  a0e0ef1d821e13977d14a806357128285edc0a26c01dcf9fd99e7c62f8efccdf608b1c0dceb1f3f40e988692eb549e22193d9ce253a1c0c1d8b10c46955bee12

                • C:\Users\Admin\AppData\Roaming\activeds\MUICoreLib.dll

                  Filesize

                  824KB

                  MD5

                  60a5383ba17d8f519cb4356e28873a14

                  SHA1

                  6bf70393d957320a921226c7fcdf352a0a67442d

                  SHA256

                  80878e4543959b63cbd87e3ebb82f4988cbbdf9da564370aa15410783c5f343f

                  SHA512

                  a0e0ef1d821e13977d14a806357128285edc0a26c01dcf9fd99e7c62f8efccdf608b1c0dceb1f3f40e988692eb549e22193d9ce253a1c0c1d8b10c46955bee12

                • C:\Users\Admin\AppData\Roaming\activeds\MUICoreLib.dll

                  Filesize

                  824KB

                  MD5

                  60a5383ba17d8f519cb4356e28873a14

                  SHA1

                  6bf70393d957320a921226c7fcdf352a0a67442d

                  SHA256

                  80878e4543959b63cbd87e3ebb82f4988cbbdf9da564370aa15410783c5f343f

                  SHA512

                  a0e0ef1d821e13977d14a806357128285edc0a26c01dcf9fd99e7c62f8efccdf608b1c0dceb1f3f40e988692eb549e22193d9ce253a1c0c1d8b10c46955bee12

                • C:\Users\Admin\AppData\Roaming\activeds\MUIUtils.dll

                  Filesize

                  385KB

                  MD5

                  97d6efb8b8e0b0f03701a7bafc398545

                  SHA1

                  0fe11e0b7f47fdec9aaa98b83728c125409e9d5b

                  SHA256

                  51c8715fac6797b7f962a68903f1f994c2af1088ac31972b5e512dab5ab4fd8e

                  SHA512

                  2bf8935ad96f35586be6074e8798fa36ee13a05cef05aa0df120ef6800cc1d941310c672894d2380b87c7491663c137fa5bcade4a732bcc6448ba3bf0badb2d7

                • C:\Users\Admin\AppData\Roaming\activeds\MUIUtils.dll

                  Filesize

                  385KB

                  MD5

                  97d6efb8b8e0b0f03701a7bafc398545

                  SHA1

                  0fe11e0b7f47fdec9aaa98b83728c125409e9d5b

                  SHA256

                  51c8715fac6797b7f962a68903f1f994c2af1088ac31972b5e512dab5ab4fd8e

                  SHA512

                  2bf8935ad96f35586be6074e8798fa36ee13a05cef05aa0df120ef6800cc1d941310c672894d2380b87c7491663c137fa5bcade4a732bcc6448ba3bf0badb2d7

                • C:\Users\Admin\AppData\Roaming\activeds\MUIUtils.dll

                  Filesize

                  385KB

                  MD5

                  97d6efb8b8e0b0f03701a7bafc398545

                  SHA1

                  0fe11e0b7f47fdec9aaa98b83728c125409e9d5b

                  SHA256

                  51c8715fac6797b7f962a68903f1f994c2af1088ac31972b5e512dab5ab4fd8e

                  SHA512

                  2bf8935ad96f35586be6074e8798fa36ee13a05cef05aa0df120ef6800cc1d941310c672894d2380b87c7491663c137fa5bcade4a732bcc6448ba3bf0badb2d7

                • C:\Users\Admin\AppData\Roaming\activeds\MUtils.dll

                  Filesize

                  619KB

                  MD5

                  6da9a492898b66db78f5c9d3fc7ecc64

                  SHA1

                  d264f67d92ccd4cfeaed1510ed0b6ae90d3f7db4

                  SHA256

                  50dfc607913a47dd266e27f6533f3f6b8f9fe995582f7662a944149a26b5054c

                  SHA512

                  11bc138d16f279d70ece09e3d238ce891bc5015b6d49a750e153c2b9286bf95e285e818ed5e25e7c731cdfff1324cdb74155f68fda0ef8104eb0d554e2b2923e

                • C:\Users\Admin\AppData\Roaming\activeds\MUtils.dll

                  Filesize

                  619KB

                  MD5

                  6da9a492898b66db78f5c9d3fc7ecc64

                  SHA1

                  d264f67d92ccd4cfeaed1510ed0b6ae90d3f7db4

                  SHA256

                  50dfc607913a47dd266e27f6533f3f6b8f9fe995582f7662a944149a26b5054c

                  SHA512

                  11bc138d16f279d70ece09e3d238ce891bc5015b6d49a750e153c2b9286bf95e285e818ed5e25e7c731cdfff1324cdb74155f68fda0ef8104eb0d554e2b2923e

                • C:\Users\Admin\AppData\Roaming\activeds\coolcore49.dll

                  Filesize

                  764KB

                  MD5

                  4f27d1bacaf09d1919484355b341c868

                  SHA1

                  f1be78d484235270a1416c6acb20e2915ae050db

                  SHA256

                  12cddd3c62ff777f1738226fe0b4b36c8170e5e1c0c47fb5913f1a780dc5f450

                  SHA512

                  328277fe18d2bbc11160d0c239c90e94d2689b8dbefb6fe46febb730fbcc6e18ced429f839d7a81d8e1b42fe4c1cb4afaaa5745353daf271ac21984f5c67aced

                • C:\Users\Admin\AppData\Roaming\activeds\coolcore49.dll

                  Filesize

                  764KB

                  MD5

                  4f27d1bacaf09d1919484355b341c868

                  SHA1

                  f1be78d484235270a1416c6acb20e2915ae050db

                  SHA256

                  12cddd3c62ff777f1738226fe0b4b36c8170e5e1c0c47fb5913f1a780dc5f450

                  SHA512

                  328277fe18d2bbc11160d0c239c90e94d2689b8dbefb6fe46febb730fbcc6e18ced429f839d7a81d8e1b42fe4c1cb4afaaa5745353daf271ac21984f5c67aced

                • C:\Users\Admin\AppData\Roaming\activeds\coolcore49.dll

                  Filesize

                  764KB

                  MD5

                  4f27d1bacaf09d1919484355b341c868

                  SHA1

                  f1be78d484235270a1416c6acb20e2915ae050db

                  SHA256

                  12cddd3c62ff777f1738226fe0b4b36c8170e5e1c0c47fb5913f1a780dc5f450

                  SHA512

                  328277fe18d2bbc11160d0c239c90e94d2689b8dbefb6fe46febb730fbcc6e18ced429f839d7a81d8e1b42fe4c1cb4afaaa5745353daf271ac21984f5c67aced

                • C:\Users\Admin\AppData\Roaming\activeds\coolcore49.dll

                  Filesize

                  764KB

                  MD5

                  4f27d1bacaf09d1919484355b341c868

                  SHA1

                  f1be78d484235270a1416c6acb20e2915ae050db

                  SHA256

                  12cddd3c62ff777f1738226fe0b4b36c8170e5e1c0c47fb5913f1a780dc5f450

                  SHA512

                  328277fe18d2bbc11160d0c239c90e94d2689b8dbefb6fe46febb730fbcc6e18ced429f839d7a81d8e1b42fe4c1cb4afaaa5745353daf271ac21984f5c67aced

                • C:\Users\Admin\AppData\Roaming\activeds\msvcp71.dll

                  Filesize

                  488KB

                  MD5

                  561fa2abb31dfa8fab762145f81667c2

                  SHA1

                  c8ccb04eedac821a13fae314a2435192860c72b8

                  SHA256

                  df96156f6a548fd6fe5672918de5ae4509d3c810a57bffd2a91de45a3ed5b23b

                  SHA512

                  7d960aa8e3cce22d63a6723d7f00c195de7de83b877eca126e339e2d8cc9859e813e05c5c0a5671a75bb717243e9295fd13e5e17d8c6660eb59f5baee63a7c43

                • C:\Users\Admin\AppData\Roaming\activeds\msvcr71.dll

                  Filesize

                  340KB

                  MD5

                  86f1895ae8c5e8b17d99ece768a70732

                  SHA1

                  d5502a1d00787d68f548ddeebbde1eca5e2b38ca

                  SHA256

                  8094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe

                  SHA512

                  3b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da

                • C:\Users\Admin\AppData\Roaming\activeds\shallop.wmv

                  Filesize

                  312KB

                  MD5

                  983058d5482f9477c6b4fe17faef85db

                  SHA1

                  00d43c0588c8c88c9076b911d65d94d0b0913b69

                  SHA256

                  d3b79dee1b597a1901e7c7721b8019b79e555495d234056a85bbf0d7b1fc83a2

                  SHA512

                  d8a5589c890faf88dfac93c3f1d4818a6d20db5bd7830366c49247ec20426605c4c4b868eca4e0729a01f56dce3c87bfbe379d2c50f9bf5ffef3afcc50f8163a

                • C:\Users\Admin\AppData\Roaming\activeds\xprt6.dll

                  Filesize

                  244KB

                  MD5

                  d145903e217ddde20ce32ed9e5074e16

                  SHA1

                  bdb3265d872f446d7445aae4f2d0beba5dae3bd8

                  SHA256

                  9317971d3615415691420d06b06de89b67aea164877b74e308bb9c338ca0eca4

                  SHA512

                  00e7df32ab3c8a46b4e8761634ddeac28410f46a9312923f46b1d83376d69489653763661f2c51ac9f85028a11d8496c911eabcb55a19222caf311be61504666

                • C:\Users\Admin\AppData\Roaming\activeds\xprt6.dll

                  Filesize

                  244KB

                  MD5

                  d145903e217ddde20ce32ed9e5074e16

                  SHA1

                  bdb3265d872f446d7445aae4f2d0beba5dae3bd8

                  SHA256

                  9317971d3615415691420d06b06de89b67aea164877b74e308bb9c338ca0eca4

                  SHA512

                  00e7df32ab3c8a46b4e8761634ddeac28410f46a9312923f46b1d83376d69489653763661f2c51ac9f85028a11d8496c911eabcb55a19222caf311be61504666

                • memory/468-174-0x0000000073890000-0x0000000074040000-memory.dmp

                  Filesize

                  7.7MB

                • memory/468-246-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                  Filesize

                  64KB

                • memory/468-196-0x0000000004C00000-0x0000000004C3C000-memory.dmp

                  Filesize

                  240KB

                • memory/468-175-0x00000000000C0000-0x00000000000F0000-memory.dmp

                  Filesize

                  192KB

                • memory/468-194-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                  Filesize

                  72KB

                • memory/468-195-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                  Filesize

                  64KB

                • memory/468-193-0x0000000004CB0000-0x0000000004DBA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/468-192-0x00000000051C0000-0x00000000057D8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/468-244-0x0000000073890000-0x0000000074040000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2228-268-0x0000000000400000-0x0000000000408000-memory.dmp

                  Filesize

                  32KB

                • memory/2228-252-0x00007FFFA8AF0000-0x00007FFFA8CE5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2228-267-0x0000000000E80000-0x00000000012B3000-memory.dmp

                  Filesize

                  4.2MB

                • memory/2228-269-0x0000000000400000-0x0000000000408000-memory.dmp

                  Filesize

                  32KB

                • memory/2228-266-0x0000000000400000-0x0000000000408000-memory.dmp

                  Filesize

                  32KB

                • memory/2276-248-0x000000006BCE0000-0x000000006CF34000-memory.dmp

                  Filesize

                  18.3MB

                • memory/2276-250-0x00007FFFA8AF0000-0x00007FFFA8CE5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/4200-198-0x000000006CCA0000-0x000000006CF31000-memory.dmp

                  Filesize

                  2.6MB

                • memory/4556-237-0x0000000002080000-0x00000000020E3000-memory.dmp

                  Filesize

                  396KB

                • memory/4556-243-0x000000006BCE0000-0x000000006CF34000-memory.dmp

                  Filesize

                  18.3MB

                • memory/4556-240-0x00000000020F0000-0x00000000021C1000-memory.dmp

                  Filesize

                  836KB

                • memory/4792-158-0x00007FFF8ADC0000-0x00007FFF8B881000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4792-156-0x00007FFF8ADC0000-0x00007FFF8B881000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4792-155-0x00007FFF8ADC0000-0x00007FFF8B881000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4792-154-0x0000000000010000-0x000000000001A000-memory.dmp

                  Filesize

                  40KB