Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2024 05:55

General

  • Target

    50d55c187abcd975629a918970b0a2f1.exe

  • Size

    4.9MB

  • MD5

    50d55c187abcd975629a918970b0a2f1

  • SHA1

    2c248c8f093561cc2318179ea1179fd5b172e6be

  • SHA256

    ffc320e5f95d05b9eb4b50db80a8f2f29b20bc166ed6476c570d7276ce8432db

  • SHA512

    9a4ff95a3a2fd2b4dbeb98c7d1061d1991be5868093f3095e29ee3db8369b41e507d8d0f6bd85b77619431f60cc5532fc6a7a59612a6b30583194c07adee1d5b

  • SSDEEP

    98304:9ayPd4hW/JfMkTQmWPKql6M96BRqchrx91hDORM7seCKaZSwWyQ+kivmjw38:9FJRkm6Kql6MMBRqchrx9ktBZ78jwM

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

5.42.65.68:29093

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 29 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    PID:3448
    • C:\Users\Admin\AppData\Local\Temp\50d55c187abcd975629a918970b0a2f1.exe
      "C:\Users\Admin\AppData\Local\Temp\50d55c187abcd975629a918970b0a2f1.exe"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:832
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\run.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:184
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\coms.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\coms.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4384
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1580
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              6⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2524
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4272
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4460
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:4644
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fud.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\fud.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4192
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 760
            5⤵
            • Program crash
            PID:1992
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 812
            5⤵
            • Program crash
            PID:2436
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 864
            5⤵
            • Program crash
            PID:1136
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 904
            5⤵
            • Program crash
            PID:3252
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 880
            5⤵
            • Program crash
            PID:1580
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 752
            5⤵
            • Program crash
            PID:1808
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 1136
            5⤵
            • Program crash
            PID:4132
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 1196
            5⤵
            • Program crash
            PID:2284
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 1240
            5⤵
            • Program crash
            PID:3116
          • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
            "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1048
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 552
              6⤵
              • Program crash
              PID:2460
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 572
              6⤵
              • Program crash
              PID:1928
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 580
              6⤵
              • Program crash
              PID:3928
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 816
              6⤵
              • Program crash
              PID:1624
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 876
              6⤵
              • Program crash
              PID:2392
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 896
              6⤵
              • Program crash
              PID:2296
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 904
              6⤵
              • Program crash
              PID:3084
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 948
              6⤵
              • Program crash
              PID:5080
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 968
              6⤵
              • Program crash
              PID:3316
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 1032
              6⤵
              • Program crash
              PID:4952
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 1128
              6⤵
              • Program crash
              PID:1620
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 1324
              6⤵
              • Program crash
              PID:4312
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 1420
              6⤵
              • Program crash
              PID:2992
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 1656
              6⤵
              • Program crash
              PID:2620
            • C:\Users\Admin\1000062002\nativecrypt.exe
              "C:\Users\Admin\1000062002\nativecrypt.exe"
              6⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5092
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 1624
              6⤵
              • Program crash
              PID:1320
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1288
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
                7⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:4076
                • C:\Windows\system32\netsh.exe
                  netsh wlan show profiles
                  8⤵
                    PID:1624
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\497073144238_Desktop.zip' -CompressionLevel Optimal
                    8⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1396
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
                6⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                PID:1736
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 1684
                6⤵
                • Program crash
                PID:3292
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 1656
                6⤵
                • Program crash
                PID:1700
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 872
              5⤵
              • Program crash
              PID:4940
      • C:\Windows\SysWOW64\ctfmon.exe
        "C:\Windows\SysWOW64\ctfmon.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:1356
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4192 -ip 4192
      1⤵
        PID:3732
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 4192 -ip 4192
        1⤵
          PID:2168
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4192 -ip 4192
          1⤵
            PID:2764
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4192 -ip 4192
            1⤵
              PID:4864
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4192 -ip 4192
              1⤵
                PID:532
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4192 -ip 4192
                1⤵
                  PID:1752
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4192 -ip 4192
                  1⤵
                    PID:5000
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4192 -ip 4192
                    1⤵
                      PID:4324
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4192 -ip 4192
                      1⤵
                        PID:4840
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4192 -ip 4192
                        1⤵
                          PID:4104
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1048 -ip 1048
                          1⤵
                            PID:3388
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1048 -ip 1048
                            1⤵
                              PID:1448
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1048 -ip 1048
                              1⤵
                                PID:2808
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1048 -ip 1048
                                1⤵
                                  PID:760
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1048 -ip 1048
                                  1⤵
                                    PID:4476
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1048 -ip 1048
                                    1⤵
                                      PID:4836
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 1048 -ip 1048
                                      1⤵
                                        PID:1396
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1048 -ip 1048
                                        1⤵
                                          PID:1444
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1048 -ip 1048
                                          1⤵
                                            PID:1208
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1048 -ip 1048
                                            1⤵
                                              PID:4232
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 1048 -ip 1048
                                              1⤵
                                                PID:3688
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1048 -ip 1048
                                                1⤵
                                                  PID:4592
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 1048 -ip 1048
                                                  1⤵
                                                    PID:3740
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1048 -ip 1048
                                                    1⤵
                                                      PID:3524
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1048 -ip 1048
                                                      1⤵
                                                        PID:964
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1048 -ip 1048
                                                        1⤵
                                                          PID:4112
                                                        • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                          C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                          1⤵
                                                          • Executes dropped EXE
                                                          PID:448
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 444
                                                            2⤵
                                                            • Program crash
                                                            PID:2636
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 448 -ip 448
                                                          1⤵
                                                            PID:4028
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1048 -ip 1048
                                                            1⤵
                                                              PID:2284
                                                            • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                              C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:1348
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 448
                                                                2⤵
                                                                • Program crash
                                                                PID:3248
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1348 -ip 1348
                                                              1⤵
                                                                PID:2352

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\1000062002\nativecrypt.exe

                                                                Filesize

                                                                425KB

                                                                MD5

                                                                867db3f60c59188cb4baf8a5aa399752

                                                                SHA1

                                                                64a62a163ef37dc75601aaa3a9b1459f6972ddd1

                                                                SHA256

                                                                5197def97c9d6e3f9c0e55f4a91a424ece5a89d4882a0d413a9260123010ec4c

                                                                SHA512

                                                                f9e6ab200331855e4686abe63cac501e6965fd4a80b26fbbeb70875500e9f0733187c5534e22309ef31cf8fc017f07cf1bd029dd2e093af57651349e8a015f45

                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                1d9baa1ecff25a746da1a720f0521e7d

                                                                SHA1

                                                                726166dfd01c9b9cb13b4f326765a68430b831b4

                                                                SHA256

                                                                ecad817d723d059d1f6d2a8cd54d0eefaf061220c9bd97491f2124d2d44fd606

                                                                SHA512

                                                                e12b6f9d813483b68030e0714b744ec2ba67cbb879ba1f200b219a65e022a4190f62bd29f501a071a0fdefb60d126ce836ff9d0f707d62ae53801969fad5a321

                                                              • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

                                                                Filesize

                                                                128KB

                                                                MD5

                                                                b680805ecd76bf458cf8987e4e23cf02

                                                                SHA1

                                                                3e27fc34bf67401b5d9de93f6d9b843e9c39ef52

                                                                SHA256

                                                                3a46d3c07211a92bc4799f114c546a00792b8f8c7172ddd0e60f317a82737d7e

                                                                SHA512

                                                                5ac3303dfdc557c50d41c1db81c0a305c89719b37104c14b10e0cfc6c84e927b237a089bb1f9ba22afcd3bf999037d7aab68a7b22ff401d91495c07fd5aeb701

                                                              • C:\Users\Admin\AppData\Local\Temp\497073144238

                                                                Filesize

                                                                76KB

                                                                MD5

                                                                93697cb73e8180055fe0b56f8ce81574

                                                                SHA1

                                                                e0fac71e7e884bef33403aad575b9571c2cf2b4c

                                                                SHA256

                                                                1058598410c0220f089558e7a1c766bafbf87be830f674ecbb84d3df5e0106ae

                                                                SHA512

                                                                b72afd86bdb3b066e697651433a874d3bd25ba770ea9fa35907b9a048039f1df3ed1070be55cb0d41e22d35d7bd038ca0d064856e139612b48764dbe2e8f7c68

                                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\coms.exe

                                                                Filesize

                                                                1.1MB

                                                                MD5

                                                                3a71ad4c1f82afed7bd46f62c0e7afb9

                                                                SHA1

                                                                bef84b153f0fb1c2959b7cbdf931692d0281b732

                                                                SHA256

                                                                0bbebcfe4de01913b271c3a1245c7b920e0b0e38db8c75f8cf3568a2bbef0dcb

                                                                SHA512

                                                                5d67f7ff1fe98add2deccf16355420fabf90653a06aaf3dedfa17ca6121d91e821778421ef078313c67860a47bc4e70ea1af4a96de79adc51c7410442731c3e6

                                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\coms.exe

                                                                Filesize

                                                                3.4MB

                                                                MD5

                                                                06b72b31597aef7bdce48bbe45873b7f

                                                                SHA1

                                                                3e3e6bbe376a9493bc3f9d6475bdd49b413b5d7f

                                                                SHA256

                                                                66c6679b7c46d1490f171a035ea12bbee7ee84471ac00d97fa2aa030bb4a8002

                                                                SHA512

                                                                118210358ecdd1b365344e22890eb5190a1616aab1aed5080acd09d30a39d453101c2a35374acd074e66df515a94e82841060d722007a7d4049bdf2dd4d904b9

                                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fud.exe

                                                                Filesize

                                                                419KB

                                                                MD5

                                                                27499cf0e73817392b9f50cc9e82c2b3

                                                                SHA1

                                                                a0efab9cdb4b2a4a920f4ab76095d24806d7812f

                                                                SHA256

                                                                bbe53788c93f1feb8c52908d74ae463d58addef354242fb4bfa423560ea82458

                                                                SHA512

                                                                94b6768d229da70e558ede3b339b99f3c67657f5ce6b76d123a9df0226c3c6677e9585dd42fa5a74df901e7b0cc3dd0a89a0c9bfc82271706b4af97a00f4f414

                                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\run.vbs

                                                                Filesize

                                                                252B

                                                                MD5

                                                                96544ef7574c29c4c5dbfc2c56718bf5

                                                                SHA1

                                                                dce5192f6b4a6deadef71d3e84c561f8369e9607

                                                                SHA256

                                                                d32bda698c5647d80a4ff9ad8c6493a70ee1fbd69a1adc47ee2cb7d72f82a1ea

                                                                SHA512

                                                                706ffeb527846b9b8937d91d3684b76992b9c6b840d68d028093fb4b832d8aa413a9c460b41e3da1edff9979f32c04ceac28149887cba93cdc4264c2d2b376af

                                                              • C:\Users\Admin\AppData\Local\Temp\Tmp71F4.tmp

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                1420d30f964eac2c85b2ccfe968eebce

                                                                SHA1

                                                                bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                SHA256

                                                                f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                SHA512

                                                                6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_usxibz3o.f0q.ps1

                                                                Filesize

                                                                60B

                                                                MD5

                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                SHA1

                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                SHA256

                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                SHA512

                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                              • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

                                                                Filesize

                                                                109KB

                                                                MD5

                                                                ca684dc5ebed4381701a39f1cc3a0fb2

                                                                SHA1

                                                                8c4a375aa583bd1c705597a7f45fd18934276770

                                                                SHA256

                                                                b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

                                                                SHA512

                                                                8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

                                                              • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                                Filesize

                                                                1.2MB

                                                                MD5

                                                                4876ee75ce2712147c41ff1277cd2d30

                                                                SHA1

                                                                3733dc92318f0c6b92cb201e49151686281acda6

                                                                SHA256

                                                                bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed

                                                                SHA512

                                                                9bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9

                                                              • memory/448-186-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/448-185-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/448-184-0x0000000000DD0000-0x0000000000ED0000-memory.dmp

                                                                Filesize

                                                                1024KB

                                                              • memory/1048-42-0x0000000000D70000-0x0000000000E70000-memory.dmp

                                                                Filesize

                                                                1024KB

                                                              • memory/1048-116-0x0000000000D70000-0x0000000000E70000-memory.dmp

                                                                Filesize

                                                                1024KB

                                                              • memory/1048-175-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/1048-163-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/1048-121-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/1048-43-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/1048-111-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/1348-224-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/1356-249-0x0000000000E20000-0x0000000000E5F000-memory.dmp

                                                                Filesize

                                                                252KB

                                                              • memory/1356-243-0x0000000000E20000-0x0000000000E5F000-memory.dmp

                                                                Filesize

                                                                252KB

                                                              • memory/1396-148-0x00007FF973D40000-0x00007FF974801000-memory.dmp

                                                                Filesize

                                                                10.8MB

                                                              • memory/1396-137-0x0000026D7FE60000-0x0000026D7FE82000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/1396-161-0x00007FF973D40000-0x00007FF974801000-memory.dmp

                                                                Filesize

                                                                10.8MB

                                                              • memory/1396-154-0x0000026D7FE30000-0x0000026D7FE42000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/1396-150-0x0000026D1A130000-0x0000026D1A140000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/1396-155-0x0000026D7FDD0000-0x0000026D7FDDA000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/1396-149-0x0000026D1A130000-0x0000026D1A140000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/1396-153-0x0000026D1A130000-0x0000026D1A140000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/1580-176-0x0000000000400000-0x0000000000552000-memory.dmp

                                                                Filesize

                                                                1.3MB

                                                              • memory/1580-203-0x0000000005760000-0x0000000005770000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/1580-180-0x0000000005760000-0x0000000005770000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/1580-179-0x0000000072810000-0x0000000072FC0000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/1580-191-0x0000000072810000-0x0000000072FC0000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/1580-193-0x0000000005760000-0x0000000005770000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/1580-177-0x0000000000400000-0x0000000000552000-memory.dmp

                                                                Filesize

                                                                1.3MB

                                                              • memory/2524-206-0x0000000005740000-0x0000000005750000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/2524-205-0x0000000005330000-0x0000000005684000-memory.dmp

                                                                Filesize

                                                                3.3MB

                                                              • memory/2524-204-0x0000000072810000-0x0000000072FC0000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/2524-202-0x0000000000400000-0x000000000045A000-memory.dmp

                                                                Filesize

                                                                360KB

                                                              • memory/2524-200-0x0000000000400000-0x000000000045A000-memory.dmp

                                                                Filesize

                                                                360KB

                                                              • memory/3448-262-0x0000000007130000-0x00000000071EB000-memory.dmp

                                                                Filesize

                                                                748KB

                                                              • memory/4192-17-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/4192-44-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/4192-15-0x0000000002690000-0x00000000026FF000-memory.dmp

                                                                Filesize

                                                                444KB

                                                              • memory/4192-18-0x0000000000DF0000-0x0000000000EF0000-memory.dmp

                                                                Filesize

                                                                1024KB

                                                              • memory/4384-198-0x0000000072810000-0x0000000072FC0000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/4384-20-0x00000000058B0000-0x0000000005E54000-memory.dmp

                                                                Filesize

                                                                5.6MB

                                                              • memory/4384-19-0x0000000005210000-0x00000000052AC000-memory.dmp

                                                                Filesize

                                                                624KB

                                                              • memory/4384-112-0x0000000006950000-0x000000000696A000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/4384-190-0x0000000002D20000-0x0000000002D30000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/4384-178-0x0000000002D20000-0x0000000002D30000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/4384-110-0x0000000072810000-0x0000000072FC0000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/4384-14-0x0000000072810000-0x0000000072FC0000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/4384-113-0x0000000002C00000-0x0000000002C06000-memory.dmp

                                                                Filesize

                                                                24KB

                                                              • memory/4384-16-0x0000000000DA0000-0x00000000012D6000-memory.dmp

                                                                Filesize

                                                                5.2MB

                                                              • memory/4384-21-0x00000000053A0000-0x0000000005432000-memory.dmp

                                                                Filesize

                                                                584KB

                                                              • memory/4384-22-0x0000000002D20000-0x0000000002D30000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/4384-115-0x0000000002D20000-0x0000000002D30000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/4384-24-0x0000000005650000-0x0000000005694000-memory.dmp

                                                                Filesize

                                                                272KB

                                                              • memory/4384-25-0x0000000005810000-0x000000000581A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/4460-232-0x0000000000400000-0x000000000048C000-memory.dmp

                                                                Filesize

                                                                560KB

                                                              • memory/4644-227-0x0000000000400000-0x0000000000442000-memory.dmp

                                                                Filesize

                                                                264KB

                                                              • memory/4644-196-0x0000000000400000-0x0000000000442000-memory.dmp

                                                                Filesize

                                                                264KB

                                                              • memory/5092-76-0x0000000002740000-0x000000000279F000-memory.dmp

                                                                Filesize

                                                                380KB

                                                              • memory/5092-152-0x0000000008730000-0x0000000008C5C000-memory.dmp

                                                                Filesize

                                                                5.2MB

                                                              • memory/5092-151-0x00000000081C0000-0x0000000008382000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/5092-138-0x0000000072810000-0x0000000072FC0000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/5092-131-0x0000000000CA0000-0x0000000000DA0000-memory.dmp

                                                                Filesize

                                                                1024KB

                                                              • memory/5092-133-0x00000000052E0000-0x00000000052F0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/5092-132-0x00000000052E0000-0x00000000052F0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/5092-120-0x0000000007560000-0x00000000075B0000-memory.dmp

                                                                Filesize

                                                                320KB

                                                              • memory/5092-117-0x0000000007260000-0x00000000072C6000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/5092-109-0x0000000007110000-0x000000000715C000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/5092-108-0x00000000070B0000-0x00000000070EC000-memory.dmp

                                                                Filesize

                                                                240KB

                                                              • memory/5092-107-0x0000000007090000-0x00000000070A2000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/5092-106-0x0000000006F50000-0x000000000705A000-memory.dmp

                                                                Filesize

                                                                1.0MB

                                                              • memory/5092-105-0x00000000068B0000-0x0000000006EC8000-memory.dmp

                                                                Filesize

                                                                6.1MB

                                                              • memory/5092-102-0x0000000006750000-0x000000000676E000-memory.dmp

                                                                Filesize

                                                                120KB

                                                              • memory/5092-99-0x0000000072810000-0x0000000072FC0000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/5092-100-0x0000000005DC0000-0x0000000005E36000-memory.dmp

                                                                Filesize

                                                                472KB

                                                              • memory/5092-101-0x00000000052E0000-0x00000000052F0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/5092-82-0x00000000052E0000-0x00000000052F0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/5092-81-0x00000000052E0000-0x00000000052F0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/5092-80-0x00000000052E0000-0x00000000052F0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/5092-79-0x0000000000400000-0x0000000000B13000-memory.dmp

                                                                Filesize

                                                                7.1MB

                                                              • memory/5092-78-0x0000000005120000-0x0000000005176000-memory.dmp

                                                                Filesize

                                                                344KB

                                                              • memory/5092-77-0x0000000002C10000-0x0000000002C68000-memory.dmp

                                                                Filesize

                                                                352KB

                                                              • memory/5092-75-0x0000000000CA0000-0x0000000000DA0000-memory.dmp

                                                                Filesize

                                                                1024KB