Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240319-en
  • resource tags

    arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-03-2024 19:26

General

  • Target

    f5a03aece5dbd56922afdb0aa80a0642b49de093e4e5b218d018fa8f8ee821ea.exe

  • Size

    1.8MB

  • MD5

    8fa9ecda4e2cc34c6948abc1837fc0c0

  • SHA1

    ad42078d3e4f4283d5fb048d44030dcceee1804e

  • SHA256

    f5a03aece5dbd56922afdb0aa80a0642b49de093e4e5b218d018fa8f8ee821ea

  • SHA512

    8051e46c8b7c132ff559330cfb90edfda6933cdcbf00f6c8c59f9e5341478e4898098b5c2b6cfbe327c2c0902e09b7aba63c6536d2e4c0b6095f5797ed6df3a7

  • SSDEEP

    49152:6whzti2kGYSiysrT0HRXiZadJzSutzQHyFCi43f:6szt2nysrTLsAutuyF943f

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

185.172.128.33:8970

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

redline

Botnet

Jok123

C2

185.215.113.67:26260

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 33 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 8 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5a03aece5dbd56922afdb0aa80a0642b49de093e4e5b218d018fa8f8ee821ea.exe
    "C:\Users\Admin\AppData\Local\Temp\f5a03aece5dbd56922afdb0aa80a0642b49de093e4e5b218d018fa8f8ee821ea.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    PID:4744
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
      "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      PID:1768
    • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
      "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:72
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:4092
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2300
          • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
            "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
            4⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2420
          • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
            "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3444
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
            4⤵
              PID:444
              • C:\Windows\SysWOW64\choice.exe
                choice /C Y /N /D Y /T 3
                5⤵
                  PID:4064
          • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe
            "C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe"
            2⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:1032
            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
              "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2920
              • C:\Users\Admin\AppData\Local\Temp\1000041001\e8c1e5d4e7.exe
                "C:\Users\Admin\AppData\Local\Temp\1000041001\e8c1e5d4e7.exe"
                4⤵
                • Executes dropped EXE
                PID:2936
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                4⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:3204
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                  5⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1316
                  • C:\Windows\system32\netsh.exe
                    netsh wlan show profiles
                    6⤵
                      PID:1680
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\233663403127_Desktop.zip' -CompressionLevel Optimal
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3020
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                  4⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  PID:3828
            • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe
              "C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4028
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
              2⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2288
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                3⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:5068
                • C:\Windows\system32\netsh.exe
                  netsh wlan show profiles
                  4⤵
                    PID:4904
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\233663403127_Desktop.zip' -CompressionLevel Optimal
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2940
              • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe
                "C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2484
              • C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe
                "C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2336
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe" /F
                  3⤵
                  • Creates scheduled task(s)
                  PID:4732
              • C:\Users\Admin\AppData\Local\Temp\1001052001\Eljlre.exe
                "C:\Users\Admin\AppData\Local\Temp\1001052001\Eljlre.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:4908
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                2⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                PID:3624
            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
              C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:5000
            • C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe
              C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe
              1⤵
              • Executes dropped EXE
              PID:4608
            • C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe
              C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe
              1⤵
              • Executes dropped EXE
              PID:2216
            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
              C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2776

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Execution

            Scheduled Task/Job

            1
            T1053

            Persistence

            Boot or Logon Autostart Execution

            1
            T1547

            Registry Run Keys / Startup Folder

            1
            T1547.001

            Scheduled Task/Job

            1
            T1053

            Privilege Escalation

            Boot or Logon Autostart Execution

            1
            T1547

            Registry Run Keys / Startup Folder

            1
            T1547.001

            Scheduled Task/Job

            1
            T1053

            Defense Evasion

            Virtualization/Sandbox Evasion

            2
            T1497

            Modify Registry

            2
            T1112

            Subvert Trust Controls

            1
            T1553

            Install Root Certificate

            1
            T1553.004

            Credential Access

            Unsecured Credentials

            4
            T1552

            Credentials In Files

            3
            T1552.001

            Credentials in Registry

            1
            T1552.002

            Discovery

            Query Registry

            4
            T1012

            Virtualization/Sandbox Evasion

            2
            T1497

            System Information Discovery

            2
            T1082

            Collection

            Data from Local System

            4
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
              Filesize

              3KB

              MD5

              ae626d9a72417b14570daa8fcd5d34a4

              SHA1

              c103ebaf4d760df722d620df87e6f07c0486439f

              SHA256

              52cc3f3028fab0d347a4a3fffef570b42f85748176d81a3344996d42fd1de32a

              SHA512

              a0690bda318bdf43d6f292f88d4ea2ebeec83b95e9ebca80083dbb08e7ddcdb9735cc58b89d369a34f10acf8a114d4a207ed8d0f070c5baf87c5798e9f35bc14

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
              Filesize

              1KB

              MD5

              b3a83d0196afc480a90a1e7444210036

              SHA1

              6376ef283df20976769287b3bdc6bcd5d5ce371f

              SHA256

              3ac4190b1c447f3b5365b056150575ec779ffba10b82d940c93009e2f6809a07

              SHA512

              dfff8f23370ae8ab390b8a3dd675dd71ca6a8d0fac0f0c9a8b43453763ba5fa96a79a4b5a8891bcac86996471b912ca51dfc6b877d647391d14e355191d77370

            • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
              Filesize

              1.8MB

              MD5

              8fa9ecda4e2cc34c6948abc1837fc0c0

              SHA1

              ad42078d3e4f4283d5fb048d44030dcceee1804e

              SHA256

              f5a03aece5dbd56922afdb0aa80a0642b49de093e4e5b218d018fa8f8ee821ea

              SHA512

              8051e46c8b7c132ff559330cfb90edfda6933cdcbf00f6c8c59f9e5341478e4898098b5c2b6cfbe327c2c0902e09b7aba63c6536d2e4c0b6095f5797ed6df3a7

            • C:\Users\Admin\AppData\Local\Temp\1000041001\e8c1e5d4e7.exe
              Filesize

              802KB

              MD5

              387de0d7c483a81c9cf541d9c7b21f0f

              SHA1

              a761ad1d01ef276c41530a758830ec940122e984

              SHA256

              0ec3395676f63a30efa1dbb9cbb9552d45f109f0883392290cef25aa561f34f7

              SHA512

              ca5ee7cf11cc017683b9cdb6e9cca3dae8df6440dde0cb8e35650a865045d9910adc77cbccfc9b9aefaf1b7e571fe75c2de58d78aa6605b89487d7b5963bf78b

            • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
              Filesize

              3.0MB

              MD5

              161e486bef0714a47d0952e227991d31

              SHA1

              e6aff34b809d8048b9ad737da1dc5c3f751d9867

              SHA256

              380338a4bae29701ed729b1a2011c524251b0dfa60cb9abb8f37ee214e6585df

              SHA512

              4eb96cd90430d3717ffbb89015dc345d3ebcb9d3026e1b2461822878cc7b0a2ae0a4a520c73085f49b14c68badf648f0d42532e9524c51cb751d7423829cb7d3

            • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
              Filesize

              1.7MB

              MD5

              85a15f080b09acace350ab30460c8996

              SHA1

              3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

              SHA256

              3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

              SHA512

              ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

            • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe
              Filesize

              1.8MB

              MD5

              2df48eca90c65bd7d080bd3a3ed2a046

              SHA1

              01f5657be277c1bb8588bc452fe01a2932de0d93

              SHA256

              bfaaa91e8792e01743c34c2516b547639f8bf808c06a38fe40dc79411cf121b8

              SHA512

              ba02f7ce86c8e5c1bb83fe6bc836d251f2f8095f26257298c91a633bccec9acfee477009dacf91fe2639fec0c6bc4d7ae49c02a32676540592ec767ef8f342ad

            • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe
              Filesize

              301KB

              MD5

              832eb4dc3ed8ceb9a1735bd0c7acaf1b

              SHA1

              b622a406927fbb8f6cd5081bd4455fb831948fca

              SHA256

              2a82243697e2eec45bedc754adcdc1f6f41724a40c6d7d96fd41ad144899b6f7

              SHA512

              3ab8b25732a7152608be101a3daf0d55833c554ab968be8b3b79a49e1831f3ee0eeeb9586a3334fa387b1f160fd15e98a80dcfece559c9c257b44ef962874894

            • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe
              Filesize

              499KB

              MD5

              83d0b41c7a3a0d29a268b49a313c5de5

              SHA1

              46f3251c771b67b40b1f3268caef8046174909a5

              SHA256

              09cc3364d5e1c15228822926bc65ce290c487dc3b7c0345bf265538110fa9cc9

              SHA512

              705ecc7c421338e37ed0d58c2d9fad03fb3565db422a0c9d895e75a399bf5f2a70cfe3ffdc860ffe010d4d1a213e0a844aeadb89ea8e0c830a2fc8c03b7669b5

            • C:\Users\Admin\AppData\Local\Temp\1001050001\NewB.exe
              Filesize

              418KB

              MD5

              0099a99f5ffb3c3ae78af0084136fab3

              SHA1

              0205a065728a9ec1133e8a372b1e3864df776e8c

              SHA256

              919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

              SHA512

              5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

            • C:\Users\Admin\AppData\Local\Temp\1001051001\Umr.exe
              Filesize

              296B

              MD5

              f2f4183ae342466a505cb5b8dc850ce2

              SHA1

              3f6ddc6152d0190108953e410ec62e8abcdc51d1

              SHA256

              fc56488690aec272d2853fb59f6678391f19fc67707ed0e31688d337d5159b7d

              SHA512

              aa5cfb6e787255918880e1e71703c2280e0012ed08d5eaf5a91f8d43d984a8f30107b852bfc74eb1b6004032e4c91cb985629fea3a0a3579ac64564f8c542c73

            • C:\Users\Admin\AppData\Local\Temp\1001052001\Eljlre.exe
              Filesize

              2.8MB

              MD5

              1e1152424d7721a51a154a725fe2465e

              SHA1

              62bc3d11e915e1dbd3cc3ef5a11afec755c995d9

              SHA256

              674cf1a8997ec6ac5b29b8d7eb6a5fb63ce5aaf4b19ff1ec7749b0225c49906c

              SHA512

              752e7912d30a2f006ef79600b7412db61644630471ec44bab1e5b2565ef62ccb490ea69159420bb7626248cc8113fe07c09fa51f5c630646b179d880e18b7c02

            • C:\Users\Admin\AppData\Local\Temp\Tmp344A.tmp
              Filesize

              2KB

              MD5

              1420d30f964eac2c85b2ccfe968eebce

              SHA1

              bdf9a6876578a3e38079c4f8cf5d6c79687ad750

              SHA256

              f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

              SHA512

              6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_acpaneun.o1g.ps1
              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\tmp6E86.tmp
              Filesize

              46KB

              MD5

              02d2c46697e3714e49f46b680b9a6b83

              SHA1

              84f98b56d49f01e9b6b76a4e21accf64fd319140

              SHA256

              522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

              SHA512

              60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

            • C:\Users\Admin\AppData\Local\Temp\tmp707D.tmp
              Filesize

              46KB

              MD5

              14ccc9293153deacbb9a20ee8f6ff1b7

              SHA1

              46b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3

              SHA256

              3195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511

              SHA512

              916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765

            • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
              Filesize

              109KB

              MD5

              2afdbe3b99a4736083066a13e4b5d11a

              SHA1

              4d4856cf02b3123ac16e63d4a448cdbcb1633546

              SHA256

              8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

              SHA512

              d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

            • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
              Filesize

              1.2MB

              MD5

              92fbdfccf6a63acef2743631d16652a7

              SHA1

              971968b1378dd89d59d7f84bf92f16fc68664506

              SHA256

              b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

              SHA512

              b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

            • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1233663403-1277323514-675434005-1000\76b53b3ec448f7ccdda2063b15d2bfc3_51f76018-0820-469a-b12d-f27f55f8b028
              Filesize

              2KB

              MD5

              2f293cde607f7a04743d01bae4b438ee

              SHA1

              ed85fc9c3648f2902fdbc5fef369a1a9b3c7642a

              SHA256

              ee99cff978fe163f615c468c5419c2cec6920f4833d21fc8c4929f8178db49fc

              SHA512

              bf86d096b8d266419ecabf92a92ab488056eafd55e526610535301528427e54434d834fc79ecd84707f3d7d5ca9924fb36fe1123b2d35c34b14eb58b13614ef2

            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
              Filesize

              109KB

              MD5

              726cd06231883a159ec1ce28dd538699

              SHA1

              404897e6a133d255ad5a9c26ac6414d7134285a2

              SHA256

              12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

              SHA512

              9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
              Filesize

              1.2MB

              MD5

              15a42d3e4579da615a384c717ab2109b

              SHA1

              22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

              SHA256

              3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

              SHA512

              1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

            • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
              Filesize

              541KB

              MD5

              1fc4b9014855e9238a361046cfbf6d66

              SHA1

              c17f18c8246026c9979ab595392a14fe65cc5e9f

              SHA256

              f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

              SHA512

              2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

            • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
              Filesize

              304KB

              MD5

              cc90e3326d7b20a33f8037b9aab238e4

              SHA1

              236d173a6ac462d85de4e866439634db3b9eeba3

              SHA256

              bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

              SHA512

              b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

            • C:\Users\Admin\Desktop\Microsoft Edge.lnk
              Filesize

              2KB

              MD5

              8ce12f72e092d6b856a8f7b4ed4b89bb

              SHA1

              9a9ec6877e0201356eda43bea1cb0ce5263ba7ca

              SHA256

              ddc6caafc71d42b3de2d7e39a902d6561af6d0e9deb33d1e0ac43be2803cf117

              SHA512

              1dc7d62b3535093a20f8f27f11d9d4ef10498da780a95ce91547aac2704f12b44a8be8cec7fa2417f778f0e06699b9c58ed639faa10c187a010fa9410dc1dfcb

            • C:\Users\Public\Desktop\Google Chrome.lnk
              Filesize

              2KB

              MD5

              4638e4d5380391c8012ef3448ccdf1d0

              SHA1

              1f42302d0ace00e0f06d26b29e72f0e418f60d72

              SHA256

              d184a7f6075fa5bb566e85f5055302755097965d53b51444bf2fa4def43d7f6a

              SHA512

              59b5c786a86bf648e4a84a7b8fac9f472513d987edeaae856b611f47f787b89c6e0879826215aa01b19713ef93a12cea9768c08e0336a9cfce2afc4aca25d2bd

            • memory/72-245-0x0000000002EA0000-0x0000000004EA0000-memory.dmp
              Filesize

              32.0MB

            • memory/72-66-0x0000000000810000-0x00000000009CC000-memory.dmp
              Filesize

              1.7MB

            • memory/72-67-0x0000000072CF0000-0x00000000734A1000-memory.dmp
              Filesize

              7.7MB

            • memory/72-68-0x00000000053F0000-0x0000000005400000-memory.dmp
              Filesize

              64KB

            • memory/72-76-0x0000000072CF0000-0x00000000734A1000-memory.dmp
              Filesize

              7.7MB

            • memory/72-77-0x0000000002EA0000-0x0000000004EA0000-memory.dmp
              Filesize

              32.0MB

            • memory/1032-145-0x0000000005140000-0x0000000005141000-memory.dmp
              Filesize

              4KB

            • memory/1032-156-0x00000000050E0000-0x00000000050E1000-memory.dmp
              Filesize

              4KB

            • memory/1032-157-0x00000000050F0000-0x00000000050F1000-memory.dmp
              Filesize

              4KB

            • memory/1032-225-0x0000000000A20000-0x0000000000EDA000-memory.dmp
              Filesize

              4.7MB

            • memory/1032-144-0x0000000005100000-0x0000000005101000-memory.dmp
              Filesize

              4KB

            • memory/1032-160-0x0000000005120000-0x0000000005121000-memory.dmp
              Filesize

              4KB

            • memory/1032-170-0x0000000005150000-0x0000000005151000-memory.dmp
              Filesize

              4KB

            • memory/1032-176-0x0000000005160000-0x0000000005161000-memory.dmp
              Filesize

              4KB

            • memory/1032-122-0x0000000000A20000-0x0000000000EDA000-memory.dmp
              Filesize

              4.7MB

            • memory/1032-174-0x0000000000A20000-0x0000000000EDA000-memory.dmp
              Filesize

              4.7MB

            • memory/1032-143-0x0000000005110000-0x0000000005111000-memory.dmp
              Filesize

              4KB

            • memory/1768-228-0x0000000000740000-0x0000000000AE3000-memory.dmp
              Filesize

              3.6MB

            • memory/1768-181-0x0000000000740000-0x0000000000AE3000-memory.dmp
              Filesize

              3.6MB

            • memory/1768-172-0x0000000000740000-0x0000000000AE3000-memory.dmp
              Filesize

              3.6MB

            • memory/1768-46-0x0000000000740000-0x0000000000AE3000-memory.dmp
              Filesize

              3.6MB

            • memory/1768-363-0x0000000000740000-0x0000000000AE3000-memory.dmp
              Filesize

              3.6MB

            • memory/1768-45-0x0000000000740000-0x0000000000AE3000-memory.dmp
              Filesize

              3.6MB

            • memory/2300-80-0x0000000072CF0000-0x00000000734A1000-memory.dmp
              Filesize

              7.7MB

            • memory/2300-79-0x0000000005520000-0x0000000005530000-memory.dmp
              Filesize

              64KB

            • memory/2300-71-0x0000000000400000-0x0000000000592000-memory.dmp
              Filesize

              1.6MB

            • memory/2420-178-0x00000000070A0000-0x00000000070DC000-memory.dmp
              Filesize

              240KB

            • memory/2420-101-0x0000000072CF0000-0x00000000734A1000-memory.dmp
              Filesize

              7.7MB

            • memory/2420-155-0x0000000006CF0000-0x0000000006D0E000-memory.dmp
              Filesize

              120KB

            • memory/2420-140-0x00000000063E0000-0x0000000006456000-memory.dmp
              Filesize

              472KB

            • memory/2420-100-0x0000000000EF0000-0x0000000000F42000-memory.dmp
              Filesize

              328KB

            • memory/2420-169-0x00000000075B0000-0x0000000007BC8000-memory.dmp
              Filesize

              6.1MB

            • memory/2420-124-0x00000000058D0000-0x00000000058DA000-memory.dmp
              Filesize

              40KB

            • memory/2420-123-0x0000000005A30000-0x0000000005A40000-memory.dmp
              Filesize

              64KB

            • memory/2420-173-0x0000000007100000-0x000000000720A000-memory.dmp
              Filesize

              1.0MB

            • memory/2420-175-0x0000000007040000-0x0000000007052000-memory.dmp
              Filesize

              72KB

            • memory/2420-112-0x0000000005DB0000-0x0000000006356000-memory.dmp
              Filesize

              5.6MB

            • memory/2420-118-0x00000000058E0000-0x0000000005972000-memory.dmp
              Filesize

              584KB

            • memory/2420-191-0x0000000007210000-0x000000000725C000-memory.dmp
              Filesize

              304KB

            • memory/2484-230-0x0000000000C50000-0x0000000000CD2000-memory.dmp
              Filesize

              520KB

            • memory/2920-356-0x0000000000180000-0x000000000063A000-memory.dmp
              Filesize

              4.7MB

            • memory/2920-226-0x0000000000180000-0x000000000063A000-memory.dmp
              Filesize

              4.7MB

            • memory/3444-142-0x00007FF8E40A0000-0x00007FF8E4B62000-memory.dmp
              Filesize

              10.8MB

            • memory/3444-161-0x000000001B340000-0x000000001B350000-memory.dmp
              Filesize

              64KB

            • memory/3444-141-0x0000000000470000-0x00000000004FC000-memory.dmp
              Filesize

              560KB

            • memory/4028-192-0x0000000000450000-0x00000000004A0000-memory.dmp
              Filesize

              320KB

            • memory/4028-194-0x0000000004F40000-0x0000000004F50000-memory.dmp
              Filesize

              64KB

            • memory/4028-193-0x0000000072CF0000-0x00000000734A1000-memory.dmp
              Filesize

              7.7MB

            • memory/4528-25-0x0000000004CB0000-0x0000000004CB1000-memory.dmp
              Filesize

              4KB

            • memory/4528-78-0x0000000001000000-0x00000000014C7000-memory.dmp
              Filesize

              4.8MB

            • memory/4528-121-0x0000000001000000-0x00000000014C7000-memory.dmp
              Filesize

              4.8MB

            • memory/4528-24-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
              Filesize

              4KB

            • memory/4528-111-0x0000000001000000-0x00000000014C7000-memory.dmp
              Filesize

              4.8MB

            • memory/4528-23-0x0000000004C40000-0x0000000004C41000-memory.dmp
              Filesize

              4KB

            • memory/4528-248-0x0000000001000000-0x00000000014C7000-memory.dmp
              Filesize

              4.8MB

            • memory/4528-22-0x0000000004C30000-0x0000000004C31000-memory.dmp
              Filesize

              4KB

            • memory/4528-19-0x0000000004C60000-0x0000000004C61000-memory.dmp
              Filesize

              4KB

            • memory/4528-21-0x0000000004C90000-0x0000000004C91000-memory.dmp
              Filesize

              4KB

            • memory/4528-20-0x0000000004C50000-0x0000000004C51000-memory.dmp
              Filesize

              4KB

            • memory/4528-18-0x0000000001000000-0x00000000014C7000-memory.dmp
              Filesize

              4.8MB

            • memory/4528-17-0x0000000001000000-0x00000000014C7000-memory.dmp
              Filesize

              4.8MB

            • memory/4744-9-0x0000000005430000-0x0000000005431000-memory.dmp
              Filesize

              4KB

            • memory/4744-14-0x0000000000A00000-0x0000000000EC7000-memory.dmp
              Filesize

              4.8MB

            • memory/4744-0-0x0000000000A00000-0x0000000000EC7000-memory.dmp
              Filesize

              4.8MB

            • memory/4744-8-0x00000000053C0000-0x00000000053C1000-memory.dmp
              Filesize

              4KB

            • memory/4744-7-0x00000000053B0000-0x00000000053B1000-memory.dmp
              Filesize

              4KB

            • memory/4744-6-0x0000000005410000-0x0000000005411000-memory.dmp
              Filesize

              4KB

            • memory/4744-1-0x00000000775F6000-0x00000000775F8000-memory.dmp
              Filesize

              8KB

            • memory/4744-2-0x0000000000A00000-0x0000000000EC7000-memory.dmp
              Filesize

              4.8MB

            • memory/4744-3-0x00000000053E0000-0x00000000053E1000-memory.dmp
              Filesize

              4KB

            • memory/4744-5-0x00000000053D0000-0x00000000053D1000-memory.dmp
              Filesize

              4KB

            • memory/4744-4-0x00000000053F0000-0x00000000053F1000-memory.dmp
              Filesize

              4KB

            • memory/4908-415-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-437-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-400-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-402-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-404-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-406-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-409-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-412-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-396-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-418-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-421-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-424-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-427-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-431-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-433-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-398-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-440-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-442-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-446-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-448-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-452-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-455-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-457-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-459-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-463-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-394-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-392-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-390-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB

            • memory/4908-388-0x0000000005D60000-0x0000000005F76000-memory.dmp
              Filesize

              2.1MB