Analysis

  • max time kernel
    84s
  • max time network
    157s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-03-2024 16:04

General

  • Target

    5c6e19b88566c3eb7dae582faebbe260b329a227140a8dd35d4ee947749f36fb.exe

  • Size

    1.8MB

  • MD5

    603ace88a70b2e05ae6d1837961b83ff

  • SHA1

    2b492584c3d49ae44e454beb9054d6e7569efbaf

  • SHA256

    5c6e19b88566c3eb7dae582faebbe260b329a227140a8dd35d4ee947749f36fb

  • SHA512

    f8bff5fe957f2f696bc328cc359fc402fb38870797d36778eb25f73f8927e14f982fca9c63789a7e3a0c1d7909058c60eb8a25983c10c07b7150a7e4f049de54

  • SSDEEP

    49152:XjIw52Zcp3HpAXKsNtQrSUNG1Aw+P+ta0RFqQ4:pUchpAasNtQ3NQXq0RFD4

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

185.172.128.33:8970

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

redline

Botnet

Jok123

C2

185.215.113.67:26260

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 31 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 8 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c6e19b88566c3eb7dae582faebbe260b329a227140a8dd35d4ee947749f36fb.exe
    "C:\Users\Admin\AppData\Local\Temp\5c6e19b88566c3eb7dae582faebbe260b329a227140a8dd35d4ee947749f36fb.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    PID:5096
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4592
    • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
      "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      PID:2448
    • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
      "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4400
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
          "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:3776
        • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
          "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:460
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
          4⤵
            PID:1460
            • C:\Windows\SysWOW64\choice.exe
              choice /C Y /N /D Y /T 3
              5⤵
                PID:72
        • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe
          "C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe"
          2⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4852
          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:4164
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
              4⤵
                PID:4120
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                  5⤵
                    PID:4868
                    • C:\Windows\system32\netsh.exe
                      netsh wlan show profiles
                      6⤵
                        PID:1864
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\472529282816_Desktop.zip' -CompressionLevel Optimal
                        6⤵
                          PID:832
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                        PID:3324
                  • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe
                    "C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:960
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                    2⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:128
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                      3⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:4956
                      • C:\Windows\system32\netsh.exe
                        netsh wlan show profiles
                        4⤵
                          PID:3704
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\472529282816_Desktop.zip' -CompressionLevel Optimal
                          4⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4668
                    • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe
                      "C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe"
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:804
                    • C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe
                      "C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe"
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:3288
                      • C:\Windows\SysWOW64\schtasks.exe
                        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe" /F
                        3⤵
                        • Creates scheduled task(s)
                        PID:3936
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      2⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      PID:5092
                    • C:\Users\Admin\AppData\Local\Temp\1001052001\Eljlre.exe
                      "C:\Users\Admin\AppData\Local\Temp\1001052001\Eljlre.exe"
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2784
                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                    C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                    1⤵
                      PID:3540
                    • C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe
                      C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe
                      1⤵
                        PID:3140

                      Network

                      MITRE ATT&CK Matrix ATT&CK v13

                      Execution

                      Scheduled Task/Job

                      1
                      T1053

                      Persistence

                      Boot or Logon Autostart Execution

                      1
                      T1547

                      Registry Run Keys / Startup Folder

                      1
                      T1547.001

                      Scheduled Task/Job

                      1
                      T1053

                      Privilege Escalation

                      Boot or Logon Autostart Execution

                      1
                      T1547

                      Registry Run Keys / Startup Folder

                      1
                      T1547.001

                      Scheduled Task/Job

                      1
                      T1053

                      Defense Evasion

                      Virtualization/Sandbox Evasion

                      2
                      T1497

                      Modify Registry

                      2
                      T1112

                      Subvert Trust Controls

                      1
                      T1553

                      Install Root Certificate

                      1
                      T1553.004

                      Credential Access

                      Unsecured Credentials

                      4
                      T1552

                      Credentials In Files

                      3
                      T1552.001

                      Credentials in Registry

                      1
                      T1552.002

                      Discovery

                      Query Registry

                      4
                      T1012

                      Virtualization/Sandbox Evasion

                      2
                      T1497

                      System Information Discovery

                      2
                      T1082

                      Collection

                      Data from Local System

                      4
                      T1005

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                        Filesize

                        3KB

                        MD5

                        ae626d9a72417b14570daa8fcd5d34a4

                        SHA1

                        c103ebaf4d760df722d620df87e6f07c0486439f

                        SHA256

                        52cc3f3028fab0d347a4a3fffef570b42f85748176d81a3344996d42fd1de32a

                        SHA512

                        a0690bda318bdf43d6f292f88d4ea2ebeec83b95e9ebca80083dbb08e7ddcdb9735cc58b89d369a34f10acf8a114d4a207ed8d0f070c5baf87c5798e9f35bc14

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                        Filesize

                        1KB

                        MD5

                        b3a83d0196afc480a90a1e7444210036

                        SHA1

                        6376ef283df20976769287b3bdc6bcd5d5ce371f

                        SHA256

                        3ac4190b1c447f3b5365b056150575ec779ffba10b82d940c93009e2f6809a07

                        SHA512

                        dfff8f23370ae8ab390b8a3dd675dd71ca6a8d0fac0f0c9a8b43453763ba5fa96a79a4b5a8891bcac86996471b912ca51dfc6b877d647391d14e355191d77370

                      • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                        Filesize

                        1.8MB

                        MD5

                        603ace88a70b2e05ae6d1837961b83ff

                        SHA1

                        2b492584c3d49ae44e454beb9054d6e7569efbaf

                        SHA256

                        5c6e19b88566c3eb7dae582faebbe260b329a227140a8dd35d4ee947749f36fb

                        SHA512

                        f8bff5fe957f2f696bc328cc359fc402fb38870797d36778eb25f73f8927e14f982fca9c63789a7e3a0c1d7909058c60eb8a25983c10c07b7150a7e4f049de54

                      • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
                        Filesize

                        2.9MB

                        MD5

                        ed51bd718ea2a44257a3ed4946ef8f06

                        SHA1

                        e07837a681172006314f201aba5fe2373381956e

                        SHA256

                        8652045f3f5a88878218ee0e5d19476c4d3a46a58e65023f26f07ac2e4ec258a

                        SHA512

                        9a7fa407c4ecd84b140237e219aab1b5be29510d032497005e89876a2ec5a13f7582e724b8f8348b64628e34f6653a6646e0c911ebc281690c9085fc562a1ad4

                      • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
                        Filesize

                        1.7MB

                        MD5

                        85a15f080b09acace350ab30460c8996

                        SHA1

                        3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                        SHA256

                        3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                        SHA512

                        ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                      • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe
                        Filesize

                        1.9MB

                        MD5

                        ce41365e00e741d30b26177c18fa4f27

                        SHA1

                        caebcd79686df00849f5320041a04fe043fe409e

                        SHA256

                        add284edfd40d0d3a69642f4a81fcc5cd1e8a86eb99b40d768a19ef13ce54d3b

                        SHA512

                        07ef30f1cae238301edb0910e9e3f1b121a2c0500db2aa151d292ebec219c0cefb12b2b1501e3266a79650db6f1e3434861471596c86e30579b393632932553e

                      • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe
                        Filesize

                        301KB

                        MD5

                        832eb4dc3ed8ceb9a1735bd0c7acaf1b

                        SHA1

                        b622a406927fbb8f6cd5081bd4455fb831948fca

                        SHA256

                        2a82243697e2eec45bedc754adcdc1f6f41724a40c6d7d96fd41ad144899b6f7

                        SHA512

                        3ab8b25732a7152608be101a3daf0d55833c554ab968be8b3b79a49e1831f3ee0eeeb9586a3334fa387b1f160fd15e98a80dcfece559c9c257b44ef962874894

                      • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe
                        Filesize

                        499KB

                        MD5

                        83d0b41c7a3a0d29a268b49a313c5de5

                        SHA1

                        46f3251c771b67b40b1f3268caef8046174909a5

                        SHA256

                        09cc3364d5e1c15228822926bc65ce290c487dc3b7c0345bf265538110fa9cc9

                        SHA512

                        705ecc7c421338e37ed0d58c2d9fad03fb3565db422a0c9d895e75a399bf5f2a70cfe3ffdc860ffe010d4d1a213e0a844aeadb89ea8e0c830a2fc8c03b7669b5

                      • C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe
                        Filesize

                        418KB

                        MD5

                        0099a99f5ffb3c3ae78af0084136fab3

                        SHA1

                        0205a065728a9ec1133e8a372b1e3864df776e8c

                        SHA256

                        919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                        SHA512

                        5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                      • C:\Users\Admin\AppData\Local\Temp\1001051001\Umr.exe
                        Filesize

                        296B

                        MD5

                        f2f4183ae342466a505cb5b8dc850ce2

                        SHA1

                        3f6ddc6152d0190108953e410ec62e8abcdc51d1

                        SHA256

                        fc56488690aec272d2853fb59f6678391f19fc67707ed0e31688d337d5159b7d

                        SHA512

                        aa5cfb6e787255918880e1e71703c2280e0012ed08d5eaf5a91f8d43d984a8f30107b852bfc74eb1b6004032e4c91cb985629fea3a0a3579ac64564f8c542c73

                      • C:\Users\Admin\AppData\Local\Temp\1001052001\Eljlre.exe
                        Filesize

                        2.8MB

                        MD5

                        1e1152424d7721a51a154a725fe2465e

                        SHA1

                        62bc3d11e915e1dbd3cc3ef5a11afec755c995d9

                        SHA256

                        674cf1a8997ec6ac5b29b8d7eb6a5fb63ce5aaf4b19ff1ec7749b0225c49906c

                        SHA512

                        752e7912d30a2f006ef79600b7412db61644630471ec44bab1e5b2565ef62ccb490ea69159420bb7626248cc8113fe07c09fa51f5c630646b179d880e18b7c02

                      • C:\Users\Admin\AppData\Local\Temp\TmpA43A.tmp
                        Filesize

                        2KB

                        MD5

                        1420d30f964eac2c85b2ccfe968eebce

                        SHA1

                        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                        SHA256

                        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                        SHA512

                        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dxqxages.rey.ps1
                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                        Filesize

                        109KB

                        MD5

                        2afdbe3b99a4736083066a13e4b5d11a

                        SHA1

                        4d4856cf02b3123ac16e63d4a448cdbcb1633546

                        SHA256

                        8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                        SHA512

                        d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                        Filesize

                        1.2MB

                        MD5

                        92fbdfccf6a63acef2743631d16652a7

                        SHA1

                        971968b1378dd89d59d7f84bf92f16fc68664506

                        SHA256

                        b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                        SHA512

                        b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                        Filesize

                        109KB

                        MD5

                        726cd06231883a159ec1ce28dd538699

                        SHA1

                        404897e6a133d255ad5a9c26ac6414d7134285a2

                        SHA256

                        12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                        SHA512

                        9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                        Filesize

                        1.2MB

                        MD5

                        15a42d3e4579da615a384c717ab2109b

                        SHA1

                        22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                        SHA256

                        3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                        SHA512

                        1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                      • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                        Filesize

                        541KB

                        MD5

                        1fc4b9014855e9238a361046cfbf6d66

                        SHA1

                        c17f18c8246026c9979ab595392a14fe65cc5e9f

                        SHA256

                        f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                        SHA512

                        2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                      • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                        Filesize

                        304KB

                        MD5

                        cc90e3326d7b20a33f8037b9aab238e4

                        SHA1

                        236d173a6ac462d85de4e866439634db3b9eeba3

                        SHA256

                        bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                        SHA512

                        b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                      • C:\Users\Admin\Desktop\Microsoft Edge.lnk
                        Filesize

                        2KB

                        MD5

                        435664c9e4cffec9c533f6b5b20b6be1

                        SHA1

                        f4e3e7bb82d9eca20cbb4f9b5467baa525ab6ad8

                        SHA256

                        db0512bc8955879f37d4942c553a28f690ee7eef3acacf6596620203e0d0883a

                        SHA512

                        14e325d015dc0c1645bba1d15c7b73f60252506eede8cd7a4bcc61b270f39ae6567714cc6838c25cd05a7d64bd5eaad19af64107ae9e6e8be5030e14d526a592

                      • C:\Users\Public\Desktop\Google Chrome.lnk
                        Filesize

                        2KB

                        MD5

                        1884426507ca5897251699414c93d85e

                        SHA1

                        57342533c61bb25a02dfc04d8d86d18acf18b23d

                        SHA256

                        ae3842b3c34106c8cbaa5c24f8ebd2090d072af3747763af3332d37a814cfa37

                        SHA512

                        f71702684e95fc0852996755526377bc200ee92c4c4229fa27917637023519168a20e0e30e424a896883db20ad377a6be2fea838af54036f389d9e9ae9fec59d

                      • memory/460-281-0x000000001B2C0000-0x000000001B473000-memory.dmp
                        Filesize

                        1.7MB

                      • memory/460-182-0x0000000002430000-0x0000000002440000-memory.dmp
                        Filesize

                        64KB

                      • memory/460-360-0x000000001B2C0000-0x000000001B473000-memory.dmp
                        Filesize

                        1.7MB

                      • memory/460-175-0x00007FFB6AC90000-0x00007FFB6B752000-memory.dmp
                        Filesize

                        10.8MB

                      • memory/460-152-0x00000000002B0000-0x000000000033C000-memory.dmp
                        Filesize

                        560KB

                      • memory/804-351-0x000000001BCE0000-0x000000001BE93000-memory.dmp
                        Filesize

                        1.7MB

                      • memory/804-230-0x0000000000CF0000-0x0000000000D72000-memory.dmp
                        Filesize

                        520KB

                      • memory/960-195-0x0000000072FE0000-0x0000000073791000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/960-183-0x0000000000500000-0x0000000000550000-memory.dmp
                        Filesize

                        320KB

                      • memory/1644-81-0x0000000072FE0000-0x0000000073791000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/1644-231-0x0000000005110000-0x0000000005120000-memory.dmp
                        Filesize

                        64KB

                      • memory/1644-79-0x0000000005110000-0x0000000005120000-memory.dmp
                        Filesize

                        64KB

                      • memory/1644-72-0x0000000000400000-0x0000000000592000-memory.dmp
                        Filesize

                        1.6MB

                      • memory/2448-342-0x00000000004A0000-0x0000000000839000-memory.dmp
                        Filesize

                        3.6MB

                      • memory/2448-218-0x00000000004A0000-0x0000000000839000-memory.dmp
                        Filesize

                        3.6MB

                      • memory/2448-149-0x00000000004A0000-0x0000000000839000-memory.dmp
                        Filesize

                        3.6MB

                      • memory/2448-47-0x00000000004A0000-0x0000000000839000-memory.dmp
                        Filesize

                        3.6MB

                      • memory/2448-46-0x00000000004A0000-0x0000000000839000-memory.dmp
                        Filesize

                        3.6MB

                      • memory/2784-406-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-368-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-366-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-365-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-370-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-372-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-374-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-378-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-376-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-380-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-382-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-386-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-388-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-390-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-401-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-404-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-408-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-410-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-415-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-419-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-421-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-412-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-423-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-425-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-427-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-429-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/2784-431-0x0000000005510000-0x0000000005726000-memory.dmp
                        Filesize

                        2.1MB

                      • memory/3776-154-0x0000000007160000-0x0000000007778000-memory.dmp
                        Filesize

                        6.1MB

                      • memory/3776-92-0x0000000000BE0000-0x0000000000C32000-memory.dmp
                        Filesize

                        328KB

                      • memory/3776-125-0x0000000005840000-0x0000000005850000-memory.dmp
                        Filesize

                        64KB

                      • memory/3776-176-0x0000000006DC0000-0x0000000006E0C000-memory.dmp
                        Filesize

                        304KB

                      • memory/3776-167-0x0000000006C50000-0x0000000006C8C000-memory.dmp
                        Filesize

                        240KB

                      • memory/3776-155-0x0000000006CB0000-0x0000000006DBA000-memory.dmp
                        Filesize

                        1.0MB

                      • memory/3776-123-0x00000000055C0000-0x00000000055CA000-memory.dmp
                        Filesize

                        40KB

                      • memory/3776-166-0x0000000006BF0000-0x0000000006C02000-memory.dmp
                        Filesize

                        72KB

                      • memory/3776-103-0x0000000005B00000-0x00000000060A6000-memory.dmp
                        Filesize

                        5.6MB

                      • memory/3776-108-0x00000000055F0000-0x0000000005682000-memory.dmp
                        Filesize

                        584KB

                      • memory/3776-93-0x0000000072FE0000-0x0000000073791000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/3776-140-0x0000000005A30000-0x0000000005AA6000-memory.dmp
                        Filesize

                        472KB

                      • memory/3776-148-0x00000000068E0000-0x00000000068FE000-memory.dmp
                        Filesize

                        120KB

                      • memory/4164-217-0x0000000000A20000-0x0000000000EFB000-memory.dmp
                        Filesize

                        4.9MB

                      • memory/4164-350-0x0000000000A20000-0x0000000000EFB000-memory.dmp
                        Filesize

                        4.9MB

                      • memory/4400-77-0x0000000072FE0000-0x0000000073791000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/4400-78-0x0000000003310000-0x0000000005310000-memory.dmp
                        Filesize

                        32.0MB

                      • memory/4400-229-0x0000000003310000-0x0000000005310000-memory.dmp
                        Filesize

                        32.0MB

                      • memory/4400-69-0x0000000003270000-0x0000000003280000-memory.dmp
                        Filesize

                        64KB

                      • memory/4400-68-0x0000000072FE0000-0x0000000073791000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/4400-67-0x0000000000B60000-0x0000000000D1C000-memory.dmp
                        Filesize

                        1.7MB

                      • memory/4592-21-0x00000000050D0000-0x00000000050D1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4592-26-0x0000000005110000-0x0000000005111000-memory.dmp
                        Filesize

                        4KB

                      • memory/4592-124-0x00000000005A0000-0x0000000000A4C000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4592-18-0x00000000005A0000-0x0000000000A4C000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4592-19-0x00000000005A0000-0x0000000000A4C000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4592-22-0x00000000050B0000-0x00000000050B1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4592-121-0x00000000005A0000-0x0000000000A4C000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4592-282-0x00000000005A0000-0x0000000000A4C000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4592-23-0x00000000050F0000-0x00000000050F1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4592-20-0x00000000050C0000-0x00000000050C1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4592-80-0x00000000005A0000-0x0000000000A4C000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/4592-24-0x0000000005090000-0x0000000005091000-memory.dmp
                        Filesize

                        4KB

                      • memory/4592-25-0x00000000050A0000-0x00000000050A1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4852-146-0x0000000005460000-0x0000000005461000-memory.dmp
                        Filesize

                        4KB

                      • memory/4852-144-0x00000000054B0000-0x00000000054B1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4852-177-0x00000000054D0000-0x00000000054D1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4852-216-0x00000000009D0000-0x0000000000EAB000-memory.dmp
                        Filesize

                        4.9MB

                      • memory/4852-153-0x00000000009D0000-0x0000000000EAB000-memory.dmp
                        Filesize

                        4.9MB

                      • memory/4852-141-0x0000000005480000-0x0000000005481000-memory.dmp
                        Filesize

                        4KB

                      • memory/4852-142-0x0000000005490000-0x0000000005491000-memory.dmp
                        Filesize

                        4KB

                      • memory/4852-145-0x0000000005450000-0x0000000005451000-memory.dmp
                        Filesize

                        4KB

                      • memory/4852-122-0x00000000009D0000-0x0000000000EAB000-memory.dmp
                        Filesize

                        4.9MB

                      • memory/4852-179-0x00000000054C0000-0x00000000054C1000-memory.dmp
                        Filesize

                        4KB

                      • memory/4852-143-0x0000000005470000-0x0000000005471000-memory.dmp
                        Filesize

                        4KB

                      • memory/5096-0-0x00000000005C0000-0x0000000000A6C000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/5096-15-0x00000000005C0000-0x0000000000A6C000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/5096-10-0x00000000051D0000-0x00000000051D1000-memory.dmp
                        Filesize

                        4KB

                      • memory/5096-9-0x00000000051E0000-0x00000000051E1000-memory.dmp
                        Filesize

                        4KB

                      • memory/5096-8-0x0000000005160000-0x0000000005161000-memory.dmp
                        Filesize

                        4KB

                      • memory/5096-7-0x0000000005150000-0x0000000005151000-memory.dmp
                        Filesize

                        4KB

                      • memory/5096-6-0x00000000051B0000-0x00000000051B1000-memory.dmp
                        Filesize

                        4KB

                      • memory/5096-3-0x0000000005180000-0x0000000005181000-memory.dmp
                        Filesize

                        4KB

                      • memory/5096-5-0x0000000005170000-0x0000000005171000-memory.dmp
                        Filesize

                        4KB

                      • memory/5096-4-0x0000000005190000-0x0000000005191000-memory.dmp
                        Filesize

                        4KB

                      • memory/5096-2-0x00000000005C0000-0x0000000000A6C000-memory.dmp
                        Filesize

                        4.7MB

                      • memory/5096-1-0x00000000778E6000-0x00000000778E8000-memory.dmp
                        Filesize

                        8KB