Analysis

  • max time kernel
    148s
  • max time network
    161s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240319-en
  • resource tags

    arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    31-03-2024 12:54

General

  • Target

    a7f717a5b8396936e4647b106ba3e355e018077b7a98846e7e89f01c0b0f6701.exe

  • Size

    1.8MB

  • MD5

    3b19df097f80d5ab3b3bf72705d8ad7f

  • SHA1

    1d39f6e092d0d85f9d56f518c84361e100028082

  • SHA256

    a7f717a5b8396936e4647b106ba3e355e018077b7a98846e7e89f01c0b0f6701

  • SHA512

    df53a139eac88b7cbbb0b86a0dd0c266ef3a003e9ed670411c1076678c51926f6b9eec90226abab63a91d062810317e53f7e7c85ac189009a42e5f16f0b25e02

  • SSDEEP

    24576:LdpKg87IG1k8VcUZgG/gtk0qsOR6OCFE17C23C4GWct4VBB/3WdniLdIjhYVxG2k:mzVpZh/Uk0qs269T235ckJsi+Ad5b

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

185.172.128.33:8970

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

redline

Botnet

Jok123

C2

185.215.113.67:26260

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.137.132:1632

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 8 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7f717a5b8396936e4647b106ba3e355e018077b7a98846e7e89f01c0b0f6701.exe
    "C:\Users\Admin\AppData\Local\Temp\a7f717a5b8396936e4647b106ba3e355e018077b7a98846e7e89f01c0b0f6701.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    PID:1732
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:692
    • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
      "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      PID:416
    • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
      "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4020
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2096
        • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
          "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2460
        • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
          "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3260
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
          4⤵
            PID:1108
            • C:\Windows\SysWOW64\choice.exe
              choice /C Y /N /D Y /T 3
              5⤵
                PID:2660
        • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe
          "C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe"
          2⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4080
          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:4060
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
              4⤵
              • Loads dropped DLL
              PID:540
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                5⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                PID:3956
                • C:\Windows\system32\netsh.exe
                  netsh wlan show profiles
                  6⤵
                    PID:3992
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\233663403127_Desktop.zip' -CompressionLevel Optimal
                    6⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4500
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                4⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                PID:3100
          • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe
            "C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2736
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
            2⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:4164
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
              3⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2144
              • C:\Windows\system32\netsh.exe
                netsh wlan show profiles
                4⤵
                  PID:1472
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\233663403127_Desktop.zip' -CompressionLevel Optimal
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4288
            • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe
              "C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4408
            • C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe
              "C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1368
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                  PID:3780
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1876
              • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3532
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe" /F
                  3⤵
                  • Creates scheduled task(s)
                  PID:3404
              • C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe
                "C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4276
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                    PID:2616
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2120
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 916
                    3⤵
                    • Program crash
                    PID:1368
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                  2⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  PID:1336
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4276 -ip 4276
                1⤵
                  PID:1552
                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2780
                • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                  C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3260
                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1868
                • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                  C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4740

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  3KB

                  MD5

                  ae626d9a72417b14570daa8fcd5d34a4

                  SHA1

                  c103ebaf4d760df722d620df87e6f07c0486439f

                  SHA256

                  52cc3f3028fab0d347a4a3fffef570b42f85748176d81a3344996d42fd1de32a

                  SHA512

                  a0690bda318bdf43d6f292f88d4ea2ebeec83b95e9ebca80083dbb08e7ddcdb9735cc58b89d369a34f10acf8a114d4a207ed8d0f070c5baf87c5798e9f35bc14

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  070ab1be93ef965ef5ce97f088557cdf

                  SHA1

                  1735a7dfc291bb614d677a32b249dc49059c2c4d

                  SHA256

                  9bcadc4a8e6a5d6b11095dbbbe6f8a342b70a267773ebb1b4e8851bb25e0fe5a

                  SHA512

                  b48a6ff7e4e8416e4054f10df61ed0d01dfe5ae603704e7d1df44fe2c4efdd4e06d7cb05956a9dea81aee3867bebed9450ce99568ff5f6c8845301100baa7b68

                • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                  Filesize

                  1.8MB

                  MD5

                  3b19df097f80d5ab3b3bf72705d8ad7f

                  SHA1

                  1d39f6e092d0d85f9d56f518c84361e100028082

                  SHA256

                  a7f717a5b8396936e4647b106ba3e355e018077b7a98846e7e89f01c0b0f6701

                  SHA512

                  df53a139eac88b7cbbb0b86a0dd0c266ef3a003e9ed670411c1076678c51926f6b9eec90226abab63a91d062810317e53f7e7c85ac189009a42e5f16f0b25e02

                • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                  Filesize

                  3.0MB

                  MD5

                  da65163d6993c8207ab414fd65cdc164

                  SHA1

                  db762fca49df614a96abf98505a0a470732c549a

                  SHA256

                  c9c36d89661e79a5e7cb01eacdb7f5ba6ca6d729ac9dbb13ec1c7418d57f4839

                  SHA512

                  16caa01ee4e553c03096eac0c1f33f85a1cee18f7bc908629982e24b321307a5533e57c8816ff534f6b4fd8e16b61c4ebe4c8306635ef69d70d46355e9cc1b72

                • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                  Filesize

                  1.7MB

                  MD5

                  85a15f080b09acace350ab30460c8996

                  SHA1

                  3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                  SHA256

                  3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                  SHA512

                  ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe

                  Filesize

                  1.8MB

                  MD5

                  36cdd421bca18b892a7b9acbf8ddae22

                  SHA1

                  7304ee9320fa859d3996603621722b5b4d1af44b

                  SHA256

                  97af1cd8f14c81dc532c69899d8f6efde30e3da17340d0a18cb785ac63eb58f8

                  SHA512

                  db73b4c5fe2cab6220122969594215a292950ccaa028887bfc8d3dd6de8c83d0e0c0495e81250ee33d3e3c718bae663d0eb5aa954cb4b8545b08c32d2cc97855

                • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe

                  Filesize

                  301KB

                  MD5

                  832eb4dc3ed8ceb9a1735bd0c7acaf1b

                  SHA1

                  b622a406927fbb8f6cd5081bd4455fb831948fca

                  SHA256

                  2a82243697e2eec45bedc754adcdc1f6f41724a40c6d7d96fd41ad144899b6f7

                  SHA512

                  3ab8b25732a7152608be101a3daf0d55833c554ab968be8b3b79a49e1831f3ee0eeeb9586a3334fa387b1f160fd15e98a80dcfece559c9c257b44ef962874894

                • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe

                  Filesize

                  499KB

                  MD5

                  83d0b41c7a3a0d29a268b49a313c5de5

                  SHA1

                  46f3251c771b67b40b1f3268caef8046174909a5

                  SHA256

                  09cc3364d5e1c15228822926bc65ce290c487dc3b7c0345bf265538110fa9cc9

                  SHA512

                  705ecc7c421338e37ed0d58c2d9fad03fb3565db422a0c9d895e75a399bf5f2a70cfe3ffdc860ffe010d4d1a213e0a844aeadb89ea8e0c830a2fc8c03b7669b5

                • C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe

                  Filesize

                  464KB

                  MD5

                  c084d6f6ba40534fbfc5a64b21ef99ab

                  SHA1

                  0b4a17da83c0a8abbc8fab321931d5447b32b720

                  SHA256

                  afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                  SHA512

                  a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe

                  Filesize

                  418KB

                  MD5

                  0099a99f5ffb3c3ae78af0084136fab3

                  SHA1

                  0205a065728a9ec1133e8a372b1e3864df776e8c

                  SHA256

                  919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                  SHA512

                  5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                • C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe

                  Filesize

                  321KB

                  MD5

                  1c7d0f34bb1d85b5d2c01367cc8f62ef

                  SHA1

                  33aedadb5361f1646cffd68791d72ba5f1424114

                  SHA256

                  e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                  SHA512

                  53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                • C:\Users\Admin\AppData\Local\Temp\TmpEB4A.tmp

                  Filesize

                  2KB

                  MD5

                  1420d30f964eac2c85b2ccfe968eebce

                  SHA1

                  bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                  SHA256

                  f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                  SHA512

                  6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_px424x5v.a1v.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\tmp2018.tmp

                  Filesize

                  46KB

                  MD5

                  02d2c46697e3714e49f46b680b9a6b83

                  SHA1

                  84f98b56d49f01e9b6b76a4e21accf64fd319140

                  SHA256

                  522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                  SHA512

                  60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                • C:\Users\Admin\AppData\Local\Temp\tmp2192.tmp

                  Filesize

                  46KB

                  MD5

                  14ccc9293153deacbb9a20ee8f6ff1b7

                  SHA1

                  46b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3

                  SHA256

                  3195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511

                  SHA512

                  916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  109KB

                  MD5

                  2afdbe3b99a4736083066a13e4b5d11a

                  SHA1

                  4d4856cf02b3123ac16e63d4a448cdbcb1633546

                  SHA256

                  8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                  SHA512

                  d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                  Filesize

                  1.2MB

                  MD5

                  92fbdfccf6a63acef2743631d16652a7

                  SHA1

                  971968b1378dd89d59d7f84bf92f16fc68664506

                  SHA256

                  b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                  SHA512

                  b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1233663403-1277323514-675434005-1000\76b53b3ec448f7ccdda2063b15d2bfc3_51f76018-0820-469a-b12d-f27f55f8b028

                  Filesize

                  2KB

                  MD5

                  e13cda0804eedb7c12fd5c1f17ce8749

                  SHA1

                  35e97131f7991a7e2fcef7c5b6dfc0064b23291e

                  SHA256

                  e8cf9ab25268f4af3f482cf305a5ce9c60eda371abc6470f86597de9f335bc9e

                  SHA512

                  3b6283778c674290c4584937e2139f5d130da2f48f5370e4362ef3a19c44578f0ca2e123627422237ba05d32c58e0c52fcc171d79dbe9abd4f13c51a285c6a3a

                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                  Filesize

                  109KB

                  MD5

                  726cd06231883a159ec1ce28dd538699

                  SHA1

                  404897e6a133d255ad5a9c26ac6414d7134285a2

                  SHA256

                  12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                  SHA512

                  9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                  Filesize

                  1.2MB

                  MD5

                  15a42d3e4579da615a384c717ab2109b

                  SHA1

                  22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                  SHA256

                  3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                  SHA512

                  1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe

                  Filesize

                  541KB

                  MD5

                  1fc4b9014855e9238a361046cfbf6d66

                  SHA1

                  c17f18c8246026c9979ab595392a14fe65cc5e9f

                  SHA256

                  f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                  SHA512

                  2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                  Filesize

                  304KB

                  MD5

                  cc90e3326d7b20a33f8037b9aab238e4

                  SHA1

                  236d173a6ac462d85de4e866439634db3b9eeba3

                  SHA256

                  bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                  SHA512

                  b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                  Filesize

                  2KB

                  MD5

                  61ec96f533bcab8f6bfce11178fef9d2

                  SHA1

                  70a6aebf59a63ec21f23504f3675145b9c43bf40

                  SHA256

                  97fddb6603381e1406a646f1342f9ca485d8d0aaf7353eaa5bc0fd7ca78a2a04

                  SHA512

                  6439acce90dc94ce6e196011dea7e26187a64c7c51d254ec23c88530d107b21d9b1659c5e17eaa7564f12d46b4f85e40a640eb2f2bcd4280e91d2e427768591e

                • C:\Users\Public\Desktop\Google Chrome.lnk

                  Filesize

                  2KB

                  MD5

                  4638e4d5380391c8012ef3448ccdf1d0

                  SHA1

                  1f42302d0ace00e0f06d26b29e72f0e418f60d72

                  SHA256

                  d184a7f6075fa5bb566e85f5055302755097965d53b51444bf2fa4def43d7f6a

                  SHA512

                  59b5c786a86bf648e4a84a7b8fac9f472513d987edeaae856b611f47f787b89c6e0879826215aa01b19713ef93a12cea9768c08e0336a9cfce2afc4aca25d2bd

                • memory/416-520-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-565-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-47-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-198-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-586-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-382-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-539-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-571-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-145-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-542-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-556-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-568-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-559-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-48-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/416-562-0x0000000000100000-0x00000000004AD000-memory.dmp

                  Filesize

                  3.7MB

                • memory/692-26-0x0000000004F80000-0x0000000004F81000-memory.dmp

                  Filesize

                  4KB

                • memory/692-21-0x0000000004F20000-0x0000000004F21000-memory.dmp

                  Filesize

                  4KB

                • memory/692-564-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-567-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-108-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-561-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-27-0x0000000004F90000-0x0000000004F91000-memory.dmp

                  Filesize

                  4KB

                • memory/692-22-0x0000000004F60000-0x0000000004F61000-memory.dmp

                  Filesize

                  4KB

                • memory/692-558-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-81-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-546-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-25-0x0000000004F40000-0x0000000004F41000-memory.dmp

                  Filesize

                  4KB

                • memory/692-274-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-570-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-541-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-574-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-24-0x0000000004F10000-0x0000000004F11000-memory.dmp

                  Filesize

                  4KB

                • memory/692-526-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-23-0x0000000004F00000-0x0000000004F01000-memory.dmp

                  Filesize

                  4KB

                • memory/692-104-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-20-0x0000000004F30000-0x0000000004F31000-memory.dmp

                  Filesize

                  4KB

                • memory/692-19-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-18-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-439-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/692-588-0x0000000000670000-0x0000000000B2A000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1732-5-0x00000000055C0000-0x00000000055C1000-memory.dmp

                  Filesize

                  4KB

                • memory/1732-4-0x00000000055E0000-0x00000000055E1000-memory.dmp

                  Filesize

                  4KB

                • memory/1732-9-0x0000000005630000-0x0000000005631000-memory.dmp

                  Filesize

                  4KB

                • memory/1732-8-0x00000000055B0000-0x00000000055B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1732-7-0x00000000055A0000-0x00000000055A1000-memory.dmp

                  Filesize

                  4KB

                • memory/1732-6-0x0000000005600000-0x0000000005601000-memory.dmp

                  Filesize

                  4KB

                • memory/1732-10-0x0000000005620000-0x0000000005621000-memory.dmp

                  Filesize

                  4KB

                • memory/1732-1-0x0000000077AF6000-0x0000000077AF8000-memory.dmp

                  Filesize

                  8KB

                • memory/1732-15-0x0000000000A00000-0x0000000000EBA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1732-0-0x0000000000A00000-0x0000000000EBA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1732-3-0x00000000055D0000-0x00000000055D1000-memory.dmp

                  Filesize

                  4KB

                • memory/1732-2-0x0000000000A00000-0x0000000000EBA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1868-585-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1876-294-0x0000000000400000-0x0000000000450000-memory.dmp

                  Filesize

                  320KB

                • memory/2096-80-0x0000000005680000-0x0000000005690000-memory.dmp

                  Filesize

                  64KB

                • memory/2096-73-0x0000000000400000-0x0000000000592000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2096-199-0x0000000005680000-0x0000000005690000-memory.dmp

                  Filesize

                  64KB

                • memory/2096-82-0x00000000731F0000-0x00000000739A1000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2120-387-0x0000000000400000-0x000000000044C000-memory.dmp

                  Filesize

                  304KB

                • memory/2120-393-0x0000000000400000-0x000000000044C000-memory.dmp

                  Filesize

                  304KB

                • memory/2460-125-0x0000000000E60000-0x0000000000EEC000-memory.dmp

                  Filesize

                  560KB

                • memory/2460-139-0x00007FF8345F0000-0x00007FF8350B2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2460-146-0x00000000031C0000-0x00000000031D0000-memory.dmp

                  Filesize

                  64KB

                • memory/2736-184-0x0000000000800000-0x0000000000850000-memory.dmp

                  Filesize

                  320KB

                • memory/2736-185-0x00000000731F0000-0x00000000739A1000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2736-205-0x00000000051B0000-0x00000000051C0000-memory.dmp

                  Filesize

                  64KB

                • memory/2780-555-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/3260-103-0x00000000731F0000-0x00000000739A1000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3260-118-0x0000000004D60000-0x0000000004D70000-memory.dmp

                  Filesize

                  64KB

                • memory/3260-155-0x0000000006210000-0x000000000625C000-memory.dmp

                  Filesize

                  304KB

                • memory/3260-106-0x0000000004AD0000-0x0000000004B62000-memory.dmp

                  Filesize

                  584KB

                • memory/3260-152-0x0000000006040000-0x0000000006052000-memory.dmp

                  Filesize

                  72KB

                • memory/3260-102-0x0000000000030000-0x0000000000082000-memory.dmp

                  Filesize

                  328KB

                • memory/3260-141-0x0000000005610000-0x0000000005686000-memory.dmp

                  Filesize

                  472KB

                • memory/3260-105-0x0000000004FE0000-0x0000000005586000-memory.dmp

                  Filesize

                  5.6MB

                • memory/3260-153-0x00000000060A0000-0x00000000060DC000-memory.dmp

                  Filesize

                  240KB

                • memory/3260-119-0x0000000004A00000-0x0000000004A0A000-memory.dmp

                  Filesize

                  40KB

                • memory/3260-151-0x0000000006100000-0x000000000620A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/3260-150-0x00000000065B0000-0x0000000006BC8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/3260-147-0x0000000005D30000-0x0000000005D4E000-memory.dmp

                  Filesize

                  120KB

                • memory/4020-78-0x0000000003340000-0x0000000005340000-memory.dmp

                  Filesize

                  32.0MB

                • memory/4020-70-0x00000000059E0000-0x00000000059F0000-memory.dmp

                  Filesize

                  64KB

                • memory/4020-195-0x0000000003340000-0x0000000005340000-memory.dmp

                  Filesize

                  32.0MB

                • memory/4020-69-0x00000000731F0000-0x00000000739A1000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4020-79-0x00000000731F0000-0x00000000739A1000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4020-68-0x0000000000CA0000-0x0000000000E5C000-memory.dmp

                  Filesize

                  1.7MB

                • memory/4060-572-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4060-569-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4060-587-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4060-540-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4060-560-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4060-521-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4060-557-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4060-563-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4060-543-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4060-392-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4060-566-0x0000000000530000-0x00000000009DF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4080-144-0x0000000000120000-0x00000000005CF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4080-168-0x0000000004D00000-0x0000000004D01000-memory.dmp

                  Filesize

                  4KB

                • memory/4080-166-0x0000000004D20000-0x0000000004D21000-memory.dmp

                  Filesize

                  4KB

                • memory/4080-167-0x0000000004D60000-0x0000000004D61000-memory.dmp

                  Filesize

                  4KB

                • memory/4080-154-0x0000000000120000-0x00000000005CF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4080-228-0x0000000000120000-0x00000000005CF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4080-156-0x0000000004D30000-0x0000000004D31000-memory.dmp

                  Filesize

                  4KB

                • memory/4080-176-0x0000000004D10000-0x0000000004D11000-memory.dmp

                  Filesize

                  4KB

                • memory/4080-177-0x0000000004D40000-0x0000000004D41000-memory.dmp

                  Filesize

                  4KB

                • memory/4080-181-0x0000000004D90000-0x0000000004D91000-memory.dmp

                  Filesize

                  4KB

                • memory/4080-182-0x0000000004D80000-0x0000000004D81000-memory.dmp

                  Filesize

                  4KB