Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2024 19:16

General

  • Target

    34468074c946943518ab33be24c01ef9.bin.exe

  • Size

    442KB

  • MD5

    34468074c946943518ab33be24c01ef9

  • SHA1

    742cf7ff13dcab6a99b372dc99f362f45be3d69c

  • SHA256

    339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99

  • SHA512

    b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b

  • SSDEEP

    6144:9qIH8p8GgMyYRhuPTMCGzlmJDZWgECsFjKdJtH3s5ZBjnA:9d8p8GgAWP4CYE4BCsmdJFij0

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

5.42.65.68:29093

Extracted

Family

amadey

Version

4.18

Attributes
  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 34 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34468074c946943518ab33be24c01ef9.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\34468074c946943518ab33be24c01ef9.bin.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 764
      2⤵
      • Program crash
      PID:4972
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 832
      2⤵
      • Program crash
      PID:3692
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 872
      2⤵
      • Program crash
      PID:2392
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 920
      2⤵
      • Program crash
      PID:2356
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 928
      2⤵
      • Program crash
      PID:3836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 960
      2⤵
      • Program crash
      PID:5020
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 1132
      2⤵
      • Program crash
      PID:3356
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 1152
      2⤵
      • Program crash
      PID:4956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 1240
      2⤵
      • Program crash
      PID:4948
    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 552
        3⤵
        • Program crash
        PID:4552
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 596
        3⤵
        • Program crash
        PID:3276
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 616
        3⤵
        • Program crash
        PID:2540
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 680
        3⤵
        • Program crash
        PID:2496
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 884
        3⤵
        • Program crash
        PID:3088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 888
        3⤵
        • Program crash
        PID:1764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 884
        3⤵
        • Program crash
        PID:2916
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 884
        3⤵
        • Program crash
        PID:4128
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 952
        3⤵
        • Program crash
        PID:4552
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 944
        3⤵
        • Program crash
        PID:4492
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1028
        3⤵
        • Program crash
        PID:5112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1148
        3⤵
        • Program crash
        PID:4064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1016
        3⤵
        • Program crash
        PID:4692
      • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
        "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
        3⤵
          PID:4788
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1116
          3⤵
          • Program crash
          PID:4248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1624
          3⤵
          • Program crash
          PID:5008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1688
          3⤵
          • Program crash
          PID:4452
        • C:\Users\Admin\1000071002\nativecrypt6.exe
          "C:\Users\Admin\1000071002\nativecrypt6.exe"
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4136
        • C:\Users\Admin\AppData\Roaming\1000072000\nativecrypt6.exe
          "C:\Users\Admin\AppData\Roaming\1000072000\nativecrypt6.exe"
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:996
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1668
          3⤵
          • Program crash
          PID:4320
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1688
          3⤵
          • Program crash
          PID:2408
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:4552
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4548
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              5⤵
                PID:2928
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\808065738166_Desktop.zip' -CompressionLevel Optimal
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1100
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:4324
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1412
            3⤵
            • Program crash
            PID:1100
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1744
            3⤵
            • Program crash
            PID:864
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1200
            3⤵
            • Program crash
            PID:1056
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 1028
            3⤵
            • Program crash
            PID:2548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 1308
          2⤵
          • Program crash
          PID:4612
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3576 -ip 3576
        1⤵
          PID:4848
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3576 -ip 3576
          1⤵
            PID:4788
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3576 -ip 3576
            1⤵
              PID:2468
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3576 -ip 3576
              1⤵
                PID:4680
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3576 -ip 3576
                1⤵
                  PID:1860
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3576 -ip 3576
                  1⤵
                    PID:1100
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3576 -ip 3576
                    1⤵
                      PID:4064
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3576 -ip 3576
                      1⤵
                        PID:1120
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3576 -ip 3576
                        1⤵
                          PID:2932
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3576 -ip 3576
                          1⤵
                            PID:3692
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1768 -ip 1768
                            1⤵
                              PID:212
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1768 -ip 1768
                              1⤵
                                PID:636
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1768 -ip 1768
                                1⤵
                                  PID:4924
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1768 -ip 1768
                                  1⤵
                                    PID:2108
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1768 -ip 1768
                                    1⤵
                                      PID:1260
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1768 -ip 1768
                                      1⤵
                                        PID:2728
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1768 -ip 1768
                                        1⤵
                                          PID:4592
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1768 -ip 1768
                                          1⤵
                                            PID:3660
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1768 -ip 1768
                                            1⤵
                                              PID:3556
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1768 -ip 1768
                                              1⤵
                                                PID:4532
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1768 -ip 1768
                                                1⤵
                                                  PID:4052
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1768 -ip 1768
                                                  1⤵
                                                    PID:2612
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1768 -ip 1768
                                                    1⤵
                                                      PID:3088
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1768 -ip 1768
                                                      1⤵
                                                        PID:2916
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1768 -ip 1768
                                                        1⤵
                                                          PID:4488
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1768 -ip 1768
                                                          1⤵
                                                            PID:4492
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1768 -ip 1768
                                                            1⤵
                                                              PID:3088
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1768 -ip 1768
                                                              1⤵
                                                                PID:4592
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1768 -ip 1768
                                                                1⤵
                                                                  PID:2008
                                                                • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  PID:1856
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 444
                                                                    2⤵
                                                                    • Program crash
                                                                    PID:2488
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1856 -ip 1856
                                                                  1⤵
                                                                    PID:912
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1768 -ip 1768
                                                                    1⤵
                                                                      PID:4408
                                                                    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:2004
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 440
                                                                        2⤵
                                                                        • Program crash
                                                                        PID:2156
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2004 -ip 2004
                                                                      1⤵
                                                                        PID:2724
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1768 -ip 1768
                                                                        1⤵
                                                                          PID:3528
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1768 -ip 1768
                                                                          1⤵
                                                                            PID:4068

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\1000071002\nativecrypt6.exe

                                                                            Filesize

                                                                            447KB

                                                                            MD5

                                                                            ef4b0d33ed0eb8ec64c7073ea8409cad

                                                                            SHA1

                                                                            b3c1b0b7e282a26bcc4ddb84cfac0437e3cff209

                                                                            SHA256

                                                                            37c593afa2791249363f27cb2818fe560338c9abdfb2b270b26a88696a87c3e9

                                                                            SHA512

                                                                            21076c222c0ee27ad88b682639bc82d8be50a0d369a5eec7a66023b0a8ced6cc9348b5b6cc7794c22269adc9b9faa38503276ba4b2d7e922beb1ce0e575a6228

                                                                          • C:\Users\Admin\1000071002\nativecrypt6.exe

                                                                            Filesize

                                                                            235KB

                                                                            MD5

                                                                            d6ec14d4006c215ddf5f25e757b6a0d2

                                                                            SHA1

                                                                            d18387a6a2ab4513708d2460c2f889af2181d959

                                                                            SHA256

                                                                            52eb5cc828a0a8e6df0578bdec79ae42cb44409b6386caad0f3a1c59025374b4

                                                                            SHA512

                                                                            30a9305d1530c0b38b570339b4db2dacc1760de0eb05ed6b09706479a71c4292e19825fbe5123ed0267a4bb3c45ef3dc4ab9fe8abe129f033e220f0e4de32b9e

                                                                          • C:\Users\Admin\1000071002\nativecrypt6.exe

                                                                            Filesize

                                                                            176KB

                                                                            MD5

                                                                            d861509fb4c8a898ec17fe11f46f891b

                                                                            SHA1

                                                                            ca985d8833e78683a3252d7374eed1f985fa6668

                                                                            SHA256

                                                                            8ecb93da4817ca5e198151ef894492d76c984ee6f4cc024bdcb9b45f7338ce83

                                                                            SHA512

                                                                            10d5accc5d404e39f0cf7590bc970b6e8771c16e2afd49721bc0103c6e724b28b65c0f5f32b79fabe674592e8d0412124ba08cc1a097b31c7f72d01879d359ba

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nativecrypt6.exe.log

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            e34b053c93dcb4160094249280888117

                                                                            SHA1

                                                                            bd7cd93042c200c5fb012bccf3cd9f72d7e79cef

                                                                            SHA256

                                                                            2bc71ddd63acfb9d101892e29033c75b4023727e1cadc489ecb2421c1960eaa8

                                                                            SHA512

                                                                            f8753ec3f9f413e1fac84caa1905509a978dfc63211dcd0a889a4283840ae2e6e9101e1f7ee7d582acc5e0ae722fdab8f6047aa02cee28869a094b4f494897f2

                                                                          • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

                                                                            Filesize

                                                                            442KB

                                                                            MD5

                                                                            34468074c946943518ab33be24c01ef9

                                                                            SHA1

                                                                            742cf7ff13dcab6a99b372dc99f362f45be3d69c

                                                                            SHA256

                                                                            339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99

                                                                            SHA512

                                                                            b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b

                                                                          • C:\Users\Admin\AppData\Local\Temp\808065738166

                                                                            Filesize

                                                                            81KB

                                                                            MD5

                                                                            4a31957fcc6a12c7f3712f94c819972a

                                                                            SHA1

                                                                            cf6d343b57f93351c28ee8fa52b66cc93576e40a

                                                                            SHA256

                                                                            4744156cf8d830a386449b871e48a577e6fe3673526f2663ab34030124f374b4

                                                                            SHA512

                                                                            a0453268d32a9038337ea30d62c51ef421910c0e1b6c6697a3c61c2bbad1e252680538d14b7abb991200499480d87c0b98fc76a9de61f516c18a99ab67e13ac9

                                                                          • C:\Users\Admin\AppData\Local\Temp\Tmp5FAF.tmp

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            1420d30f964eac2c85b2ccfe968eebce

                                                                            SHA1

                                                                            bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                            SHA256

                                                                            f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                            SHA512

                                                                            6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5f55scjh.z4n.ps1

                                                                            Filesize

                                                                            60B

                                                                            MD5

                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                            SHA1

                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                            SHA256

                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                            SHA512

                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                          • C:\Users\Admin\AppData\Roaming\1000072000\nativecrypt6.exe

                                                                            Filesize

                                                                            250KB

                                                                            MD5

                                                                            1ba155e110194b1bd5c3a0fafb22efb1

                                                                            SHA1

                                                                            f0ca22993de08e42aca63d2ba61fb508887d9063

                                                                            SHA256

                                                                            a33b4d15c3704e9ae986a88192cc569290d9e7533c790ba7736840c8a5d93782

                                                                            SHA512

                                                                            583c34880322b943e484a50cc76269888ef2a9207cf8252cf1df5ab7f4fedaf277e668819a32585a482975f01304ce5aea0a0fe370fa5e626b2d20a7e51f0ee5

                                                                          • C:\Users\Admin\AppData\Roaming\1000072000\nativecrypt6.exe

                                                                            Filesize

                                                                            224KB

                                                                            MD5

                                                                            ed56868f8ebed80e3b21042f95dc7e8a

                                                                            SHA1

                                                                            246a89723f0a891a38e13f50c54fddbd58202cb9

                                                                            SHA256

                                                                            9da26dd076198e05ce2927db85cd3072b6a174c2b07ab85efcd7e3f766982753

                                                                            SHA512

                                                                            008ac4ccc314b2f5e12a468a65a9e119750ba08122af0e797f84d6d2813bc69894a0b489e7732b0ff07bb869916c1856f7127a696a9287e5d07aa16e4ae8c242

                                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

                                                                            Filesize

                                                                            109KB

                                                                            MD5

                                                                            ca684dc5ebed4381701a39f1cc3a0fb2

                                                                            SHA1

                                                                            8c4a375aa583bd1c705597a7f45fd18934276770

                                                                            SHA256

                                                                            b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

                                                                            SHA512

                                                                            8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

                                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                                            Filesize

                                                                            758KB

                                                                            MD5

                                                                            d7c1ce5b7af6d9aa0d802381fe9a0662

                                                                            SHA1

                                                                            95b8176ad64ae9f0e3a59cb8305e9c36b397c8dc

                                                                            SHA256

                                                                            757253bcca7fd7b8af775e895354ec005722e335fd9cd43ace4e7ec59a34fec7

                                                                            SHA512

                                                                            de80de49a76f72d93d71573310d23d95cd7130c679e1afcac08f7acb3f71e1d3aee2d203beb0593a2ab5d33c1a8bf7b7163e8d9956857a6fec9dddbefc4f29e1

                                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                                            Filesize

                                                                            483KB

                                                                            MD5

                                                                            389b16e8c79f728ae26d054305e9e9fe

                                                                            SHA1

                                                                            5a849b5a890368b64de0c8617919489413c9ef1b

                                                                            SHA256

                                                                            b11c0973de4a1292a5ea8dfebf749c20ccbb09b76ae05dfc11597b16363ed66f

                                                                            SHA512

                                                                            9266e0e85f993d21ad3cfa6e14fd88d6190d2890edbdd87b0937933daa71e0288378c476a4e597bf68f49e3cfa0995683ffa4fd195aadd26fc4645434be54fe6

                                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                                            Filesize

                                                                            741KB

                                                                            MD5

                                                                            264996a9e67e97b9d84517aaffe7db7f

                                                                            SHA1

                                                                            8167c6752d065b3ec57118fc2705b38e4d61fe06

                                                                            SHA256

                                                                            babee9cf7cd304c182da1e854602469d577abe5da37ea2e0b9f29dc90f31b7b3

                                                                            SHA512

                                                                            7a87ffd7ad36f35c566f682413281ff73613de6a88596f066c1ff4ea3523b6c02c896b5f1ee99078f68d5d3265882368799db0930a9fa07e09b1bbc580067244

                                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                                            Filesize

                                                                            757KB

                                                                            MD5

                                                                            5ece0da4e5b348dace429b4c35f688e5

                                                                            SHA1

                                                                            7c2e0fb80cb99100353139081b1e564e22d82bb0

                                                                            SHA256

                                                                            5261ffc545d7047d36768251d0edcb67502c06e3214dbb225ba2bf815525b598

                                                                            SHA512

                                                                            55f38e6aacfb6bbadfd558dc91a3ac490ea3372488842b227bc9f838524a63b3f574c6524a1b210f83063c0552a1568c2ec68bb155e7fe21cbce0137697c9b97

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3808065738-1666277613-1125846146-1000\76b53b3ec448f7ccdda2063b15d2bfc3_2397ee06-28fe-4eaa-8777-f7014368c353

                                                                            MD5

                                                                            d41d8cd98f00b204e9800998ecf8427e

                                                                            SHA1

                                                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                            SHA256

                                                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                            SHA512

                                                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3808065738-1666277613-1125846146-1000\76b53b3ec448f7ccdda2063b15d2bfc3_2397ee06-28fe-4eaa-8777-f7014368c353

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            0158fe9cead91d1b027b795984737614

                                                                            SHA1

                                                                            b41a11f909a7bdf1115088790a5680ac4e23031b

                                                                            SHA256

                                                                            513257326e783a862909a2a0f0941d6ff899c403e104fbd1dbc10443c41d9f9a

                                                                            SHA512

                                                                            c48a55cc7a92cefcefe5fb2382ccd8ef651fc8e0885e88a256cd2f5d83b824b7d910f755180b29eccb54d9361d6af82f9cc741bd7e6752122949b657da973676

                                                                          • memory/996-82-0x0000000005860000-0x00000000058B6000-memory.dmp

                                                                            Filesize

                                                                            344KB

                                                                          • memory/996-148-0x0000000006A00000-0x0000000007018000-memory.dmp

                                                                            Filesize

                                                                            6.1MB

                                                                          • memory/996-68-0x0000000000DE0000-0x0000000000EE0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/996-187-0x00000000052A0000-0x00000000052B0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/996-70-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/996-162-0x0000000000DE0000-0x0000000000EE0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/996-72-0x0000000072B60000-0x0000000073310000-memory.dmp

                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/996-151-0x0000000007200000-0x000000000723C000-memory.dmp

                                                                            Filesize

                                                                            240KB

                                                                          • memory/996-149-0x00000000070A0000-0x00000000071AA000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/996-73-0x00000000052A0000-0x00000000052B0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/996-145-0x00000000069E0000-0x00000000069FE000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/996-77-0x00000000052A0000-0x00000000052B0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/996-191-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/996-78-0x00000000052A0000-0x00000000052B0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/996-131-0x0000000005FF0000-0x0000000006066000-memory.dmp

                                                                            Filesize

                                                                            472KB

                                                                          • memory/996-80-0x00000000052B0000-0x0000000005854000-memory.dmp

                                                                            Filesize

                                                                            5.6MB

                                                                          • memory/996-179-0x0000000072B60000-0x0000000073310000-memory.dmp

                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/996-83-0x00000000058C0000-0x0000000005952000-memory.dmp

                                                                            Filesize

                                                                            584KB

                                                                          • memory/996-97-0x0000000005AE0000-0x0000000005AEA000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/996-92-0x00000000052A0000-0x00000000052B0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/996-192-0x00000000052A0000-0x00000000052B0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/1100-132-0x0000022BFBEF0000-0x0000022BFBF12000-memory.dmp

                                                                            Filesize

                                                                            136KB

                                                                          • memory/1100-160-0x00007FFA03E70000-0x00007FFA04931000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/1100-154-0x0000022BFBF20000-0x0000022BFBF2A000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/1100-153-0x0000022BFC410000-0x0000022BFC422000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/1100-143-0x0000022BFBF30000-0x0000022BFBF40000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/1100-142-0x00007FFA03E70000-0x00007FFA04931000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/1768-81-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/1768-17-0x0000000000CF0000-0x0000000000DF0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/1768-161-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/1768-19-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/1768-76-0x0000000000CF0000-0x0000000000DF0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/1768-41-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/1768-186-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/1856-198-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/1856-196-0x0000000000CE0000-0x0000000000DE0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/1856-197-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/2004-221-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/2004-220-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/2004-219-0x0000000000BC0000-0x0000000000CC0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/3576-5-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/3576-20-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/3576-21-0x0000000002890000-0x00000000028FF000-memory.dmp

                                                                            Filesize

                                                                            444KB

                                                                          • memory/3576-18-0x0000000000DF0000-0x0000000000EF0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/3576-1-0x0000000000DF0000-0x0000000000EF0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/3576-3-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/3576-2-0x0000000002890000-0x00000000028FF000-memory.dmp

                                                                            Filesize

                                                                            444KB

                                                                          • memory/4136-69-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/4136-178-0x00000000076D0000-0x0000000007720000-memory.dmp

                                                                            Filesize

                                                                            320KB

                                                                          • memory/4136-177-0x00000000073B0000-0x0000000007416000-memory.dmp

                                                                            Filesize

                                                                            408KB

                                                                          • memory/4136-180-0x0000000007A60000-0x0000000007C22000-memory.dmp

                                                                            Filesize

                                                                            1.8MB

                                                                          • memory/4136-181-0x0000000007C40000-0x000000000816C000-memory.dmp

                                                                            Filesize

                                                                            5.2MB

                                                                          • memory/4136-166-0x0000000072B60000-0x0000000073310000-memory.dmp

                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/4136-185-0x00000000053B0000-0x00000000053C0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/4136-163-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/4136-152-0x0000000007260000-0x00000000072AC000-memory.dmp

                                                                            Filesize

                                                                            304KB

                                                                          • memory/4136-150-0x00000000071E0000-0x00000000071F2000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/4136-190-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                            Filesize

                                                                            7.1MB

                                                                          • memory/4136-144-0x0000000000D40000-0x0000000000E40000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/4136-93-0x00000000053B0000-0x00000000053C0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/4136-79-0x00000000053B0000-0x00000000053C0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/4136-195-0x00000000053B0000-0x00000000053C0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/4136-75-0x0000000002D50000-0x0000000002DA8000-memory.dmp

                                                                            Filesize

                                                                            352KB

                                                                          • memory/4136-74-0x00000000053B0000-0x00000000053C0000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/4136-71-0x0000000072B60000-0x0000000073310000-memory.dmp

                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/4136-67-0x0000000000CA0000-0x0000000000CFF000-memory.dmp

                                                                            Filesize

                                                                            380KB

                                                                          • memory/4136-66-0x0000000000D40000-0x0000000000E40000-memory.dmp

                                                                            Filesize

                                                                            1024KB