Malware Analysis Report

2024-09-11 08:56

Sample ID 240402-nh3hpagg25
Target c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.zip
SHA256 73901a3bec1e7ba97a29bbfd7f76e4488df4c273ea6bdfe5e1e6e0b6e016ae55
Tags
redline sectoprat cheat discovery infostealer rat spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

73901a3bec1e7ba97a29bbfd7f76e4488df4c273ea6bdfe5e1e6e0b6e016ae55

Threat Level: Known bad

The file c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.zip was found to be: Known bad.

Malicious Activity Summary

redline sectoprat cheat discovery infostealer rat spyware stealer trojan

RedLine

RedLine payload

SectopRAT payload

SectopRAT

Checks computer location settings

Reads user/profile data of web browsers

Executes dropped EXE

Loads dropped DLL

Accesses cryptocurrency files/wallets, possible credential harvesting

Checks installed software on the system

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-02 11:24

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-02 11:24

Reported

2024-04-02 11:27

Platform

win7-20240221-en

Max time kernel

119s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2648 set thread context of 2844 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\DllHost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2292 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2292 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2292 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2292 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2648 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2648 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2648 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2648 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2648 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe

"C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe"

C:\Windows\SysWOW64\DllHost.exe

C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

Network

Country Destination Domain Proto
NL 185.222.58.253:55615 185.222.58.253 tcp
US 8.8.8.8:53 api.ip.sb udp
US 104.26.13.31:443 api.ip.sb tcp

Files

memory/1536-5-0x0000000000100000-0x0000000000102000-memory.dmp

memory/2292-4-0x00000000008F0000-0x00000000008F2000-memory.dmp

memory/1536-6-0x0000000000300000-0x0000000000301000-memory.dmp

\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

MD5 8dca427eab6afd10df49829925f59d9e
SHA1 9735f697a89255d7641de835e25d7ef1974c31bb
SHA256 c7a4fd70d3705f22f9e60009dc7534be74e6a85358f90316a6af8f24f9676f32
SHA512 bfed795da12b2369c7c9081654d48e486c8a750008173cc1615cdd65f5b9d4f83bac31645f169af80ab9b13bda81a5579872d64a946a2e0762e6dbe292cdcab4

memory/2648-21-0x0000000000120000-0x00000000001A4000-memory.dmp

memory/2648-22-0x0000000073A30000-0x000000007411E000-memory.dmp

memory/2648-23-0x0000000001EB0000-0x0000000001EF0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.jpg

MD5 016025125f3b479aaabf8a4246073856
SHA1 123cf64214f2ba96dedc076d388ddf60d2ec5ce5
SHA256 39f3195908d56ee6d4d0f6484c913bbb268e934121856c590b397bbf7a3573ca
SHA512 4c83f010593e2ec86de367653a0c03aad7a41d1a7f6e26e302666ee81b6f4f4841e3395a026856e35ba9d092ef530af0756b4adb13e944dd7a0d5d5b64ddc62b

memory/2648-25-0x00000000002E0000-0x00000000002F2000-memory.dmp

memory/2648-26-0x0000000000400000-0x000000000040C000-memory.dmp

memory/2648-27-0x0000000002150000-0x00000000021B0000-memory.dmp

memory/1536-28-0x0000000000300000-0x0000000000301000-memory.dmp

memory/2844-32-0x0000000000400000-0x000000000041E000-memory.dmp

memory/2844-34-0x0000000000400000-0x000000000041E000-memory.dmp

memory/2648-37-0x0000000073A30000-0x000000007411E000-memory.dmp

memory/2844-36-0x0000000000400000-0x000000000041E000-memory.dmp

memory/2844-39-0x0000000000400000-0x000000000041E000-memory.dmp

memory/2844-40-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2844-42-0x0000000000400000-0x000000000041E000-memory.dmp

memory/2844-46-0x0000000000400000-0x000000000041E000-memory.dmp

memory/2648-45-0x0000000073A30000-0x000000007411E000-memory.dmp

memory/2844-48-0x0000000000400000-0x000000000041E000-memory.dmp

memory/2844-51-0x0000000073340000-0x0000000073A2E000-memory.dmp

memory/2432-52-0x0000000073B70000-0x000000007411B000-memory.dmp

memory/2432-53-0x0000000073B70000-0x000000007411B000-memory.dmp

memory/2844-54-0x0000000004AC0000-0x0000000004B00000-memory.dmp

memory/2432-55-0x0000000073B70000-0x000000007411B000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

C:\Users\Admin\AppData\Local\Temp\Tar832.tmp

MD5 435a9ac180383f9fa094131b173a2f7b
SHA1 76944ea657a9db94f9a4bef38f88c46ed4166983
SHA256 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA512 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

C:\Users\Admin\AppData\Local\Temp\tmpDA8.tmp

MD5 02d2c46697e3714e49f46b680b9a6b83
SHA1 84f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256 522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA512 60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

C:\Users\Admin\AppData\Local\Temp\tmpDEC.tmp

MD5 2157696941ae13875f8dfe8630ea4029
SHA1 b5ff62b7900cdfc630edd94d737309042de58251
SHA256 90e438a9d6706c8a1e809bfb5babe83508cac27d3c9f3f9b8bd1cd4f3aa3e033
SHA512 61b998e42f5d0121f75e04a46177c1c3a7122dc2014b7bed1d584c9ea53146e87d7a6b9e94bde066d92580c6c2b2316dd860980e5cd8f75984286dc90e43fb6a

memory/2844-171-0x0000000073340000-0x0000000073A2E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-02 11:24

Reported

2024-04-02 11:27

Platform

win10v2004-20240226-en

Max time kernel

142s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4872 set thread context of 1752 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3620 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 3620 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 3620 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 4872 wrote to memory of 5032 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 5032 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 5032 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 4872 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 4872 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 4872 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 4872 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 4872 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 4872 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 4872 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe

"C:\Users\Admin\AppData\Local\Temp\c26bd0f7c7c00b7cbe2545cf2f9240020f9498928f96091da19e1af943ac837b.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3668 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
GB 142.250.187.202:443 tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 24.66.18.2.in-addr.arpa udp
NL 185.222.58.253:55615 185.222.58.253 tcp
US 8.8.8.8:53 253.58.222.185.in-addr.arpa udp
US 8.8.8.8:53 api.ip.sb udp
US 104.26.13.31:443 api.ip.sb tcp
US 8.8.8.8:53 31.13.26.104.in-addr.arpa udp
US 8.8.8.8:53 201.201.50.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

MD5 8dca427eab6afd10df49829925f59d9e
SHA1 9735f697a89255d7641de835e25d7ef1974c31bb
SHA256 c7a4fd70d3705f22f9e60009dc7534be74e6a85358f90316a6af8f24f9676f32
SHA512 bfed795da12b2369c7c9081654d48e486c8a750008173cc1615cdd65f5b9d4f83bac31645f169af80ab9b13bda81a5579872d64a946a2e0762e6dbe292cdcab4

memory/4872-14-0x0000000072DD0000-0x0000000073580000-memory.dmp

memory/4872-15-0x00000000004D0000-0x0000000000554000-memory.dmp

memory/4872-16-0x00000000054D0000-0x0000000005A74000-memory.dmp

memory/4872-17-0x0000000004F20000-0x0000000004FB2000-memory.dmp

memory/4872-18-0x00000000050D0000-0x00000000050E0000-memory.dmp

memory/4872-19-0x00000000050B0000-0x00000000050BA000-memory.dmp

memory/4872-20-0x0000000005180000-0x000000000521C000-memory.dmp

memory/4872-21-0x0000000005290000-0x00000000052A2000-memory.dmp

memory/4872-22-0x00000000052C0000-0x00000000052CC000-memory.dmp

memory/4872-23-0x00000000068F0000-0x0000000006950000-memory.dmp

memory/4872-24-0x0000000072DD0000-0x0000000073580000-memory.dmp

memory/4872-25-0x00000000050D0000-0x00000000050E0000-memory.dmp

memory/5032-26-0x0000000072DD0000-0x0000000073580000-memory.dmp

memory/5032-27-0x0000000002D00000-0x0000000002D10000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.jpg

MD5 016025125f3b479aaabf8a4246073856
SHA1 123cf64214f2ba96dedc076d388ddf60d2ec5ce5
SHA256 39f3195908d56ee6d4d0f6484c913bbb268e934121856c590b397bbf7a3573ca
SHA512 4c83f010593e2ec86de367653a0c03aad7a41d1a7f6e26e302666ee81b6f4f4841e3395a026856e35ba9d092ef530af0756b4adb13e944dd7a0d5d5b64ddc62b

memory/5032-29-0x0000000005170000-0x00000000051A6000-memory.dmp

memory/5032-30-0x0000000002D00000-0x0000000002D10000-memory.dmp

memory/1752-31-0x0000000000400000-0x000000000041E000-memory.dmp

memory/1752-34-0x0000000072DD0000-0x0000000073580000-memory.dmp

memory/4872-35-0x0000000072DD0000-0x0000000073580000-memory.dmp

memory/5032-36-0x00000000057E0000-0x0000000005E08000-memory.dmp

memory/1752-37-0x00000000059F0000-0x0000000006008000-memory.dmp

memory/1752-38-0x0000000005290000-0x00000000052A2000-memory.dmp

memory/5032-39-0x00000000056C0000-0x00000000056E2000-memory.dmp

memory/5032-40-0x0000000005F10000-0x0000000005F76000-memory.dmp

memory/1752-41-0x00000000052F0000-0x000000000532C000-memory.dmp

memory/5032-42-0x0000000006080000-0x00000000060E6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_m1vrvc10.uuc.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1752-48-0x00000000053C0000-0x00000000053D0000-memory.dmp

memory/5032-53-0x0000000006170000-0x00000000064C4000-memory.dmp

memory/1752-54-0x0000000005330000-0x000000000537C000-memory.dmp

memory/5032-55-0x00000000067A0000-0x00000000067BE000-memory.dmp

memory/1752-56-0x00000000055A0000-0x00000000056AA000-memory.dmp

memory/5032-57-0x0000000002D00000-0x0000000002D10000-memory.dmp

memory/5032-58-0x0000000006D80000-0x0000000006DB2000-memory.dmp

memory/5032-59-0x0000000075500000-0x000000007554C000-memory.dmp

memory/5032-69-0x0000000006D60000-0x0000000006D7E000-memory.dmp

memory/5032-70-0x00000000077A0000-0x0000000007843000-memory.dmp

memory/5032-71-0x0000000008110000-0x000000000878A000-memory.dmp

memory/5032-72-0x0000000007AD0000-0x0000000007AEA000-memory.dmp

memory/5032-73-0x0000000007B40000-0x0000000007B4A000-memory.dmp

memory/5032-74-0x0000000007D50000-0x0000000007DE6000-memory.dmp

memory/5032-75-0x0000000007CD0000-0x0000000007CE1000-memory.dmp

memory/5032-76-0x0000000007D00000-0x0000000007D0E000-memory.dmp

memory/5032-77-0x0000000007D10000-0x0000000007D24000-memory.dmp

memory/5032-78-0x0000000007E10000-0x0000000007E2A000-memory.dmp

memory/5032-79-0x0000000007DF0000-0x0000000007DF8000-memory.dmp

memory/1752-80-0x00000000068A0000-0x0000000006A62000-memory.dmp

memory/1752-81-0x0000000006FA0000-0x00000000074CC000-memory.dmp

memory/5032-84-0x0000000072DD0000-0x0000000073580000-memory.dmp

memory/1752-85-0x0000000006C10000-0x0000000006C86000-memory.dmp

memory/1752-86-0x0000000006E40000-0x0000000006E5E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp297.tmp

MD5 02d2c46697e3714e49f46b680b9a6b83
SHA1 84f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256 522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA512 60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

C:\Users\Admin\AppData\Local\Temp\tmp2CC.tmp

MD5 4c2e2189b87f507edc2e72d7d55583a0
SHA1 1f06e340f76d41ea0d1e8560acd380a901b2a5bd
SHA256 99a5f8dea08b5cf512ed888b3e533cc77c08dc644078793dc870abd8828c1bca
SHA512 8b6b49e55afe8a697aaf71d975fab9e906143339827f75a57876a540d0d7b9e3cbbcdd8b5435d6198900a73895cc52d2082e66ee8cec342e72f2e427dde71600

C:\Users\Admin\AppData\Local\Temp\tmp326.tmp

MD5 d444c807029c83b8a892ac0c4971f955
SHA1 fa58ce7588513519dc8fed939b26b05dc25e53b5
SHA256 8297a7698f19bb81539a18363db100c55e357fa73f773c2b883d2c4161f6a259
SHA512 b7958b843639d4223bef65cdc6c664d7d15b76ac4e0a8b1575201dd47a32899feff32389dcc047314f47944ebe7b774cd59e51d49202f49541bbd70ecbb31a2e

C:\Users\Admin\AppData\Local\Temp\tmp35B.tmp

MD5 bf69aee53eb7e09784128e340390db21
SHA1 865c14f705ff90740cfca41125503f7b09d3b02d
SHA256 2e278ecc4627497ad3f5cb82afe333e221e36f464a06b9d0926583add3f5c4b3
SHA512 d6ee39f91cae3960aa6f2a251649eb6f7bf213539aaee8ea9c7db511cd2e35de1c62dab75f6e94eb6c48c45c0825fad0e0073e26204f1f2868e4dfffa44cfcc0

C:\Users\Admin\AppData\Local\Temp\tmp3B5.tmp

MD5 d367ddfda80fdcf578726bc3b0bc3e3c
SHA1 23fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA256 0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA512 40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

memory/1752-220-0x0000000072DD0000-0x0000000073580000-memory.dmp

memory/1752-221-0x00000000053C0000-0x00000000053D0000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO.exe.log

MD5 8ec831f3e3a3f77e4a7b9cd32b48384c
SHA1 d83f09fd87c5bd86e045873c231c14836e76a05c
SHA256 7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA512 26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

memory/1752-247-0x0000000072DD0000-0x0000000073580000-memory.dmp