Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2024, 12:15

General

  • Target

    223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe

  • Size

    1.8MB

  • MD5

    9afd11e0ec6b6d2b686fb038a4a6c42e

  • SHA1

    fdadef19c9cf1a88317f6d4122b9c15b504bfe13

  • SHA256

    223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a

  • SHA512

    fd37c0eb60ec27f6fd892f0c748f04a4cd334fbd4b287891654f014510da11c433151ea8341dda9ce2fec1c4f76342524557883e678a8c6be8765dd0d4495fd0

  • SSDEEP

    49152:a3/bnoJa5fu+CQkh/9yMdlnhWLbjll8/wlZ/VADihMTKie:ajnoCv/kh/0MdlhWLPlu/8/+OhOde

Malware Config

Extracted

Family

amadey

Version

4.20

C2

http://193.233.132.139

Attributes
  • install_dir

    5454e6f062

  • install_file

    explorta.exe

  • strings_key

    c7a869c5ba1d72480093ec207994e2bf

  • url_paths

    /sev56rkm/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 61 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe
    "C:\Users\Admin\AppData\Local\Temp\223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3840
    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
      "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Users\Admin\AppData\Local\Temp\1000009001\0f99a58c5a.exe
        "C:\Users\Admin\AppData\Local\Temp\1000009001\0f99a58c5a.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3520
      • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
        "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:4088
      • C:\Users\Admin\AppData\Local\Temp\1000012001\amert.exe
        "C:\Users\Admin\AppData\Local\Temp\1000012001\amert.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:4140
      • C:\Users\Admin\1000013002\22452f6664.exe
        "C:\Users\Admin\1000013002\22452f6664.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
          4⤵
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:3948
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fff49f0ab58,0x7fff49f0ab68,0x7fff49f0ab78
            5⤵
              PID:4888
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:2
              5⤵
                PID:4864
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1944 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:8
                5⤵
                  PID:3152
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:8
                  5⤵
                    PID:2828
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:1
                    5⤵
                      PID:1620
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:1
                      5⤵
                        PID:5128
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4308 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:1
                        5⤵
                          PID:5532
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3308 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:1
                          5⤵
                            PID:5732
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3388 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:8
                            5⤵
                              PID:5836
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4156 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:8
                              5⤵
                              • Modifies registry class
                              PID:5844
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:8
                              5⤵
                                PID:6004
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:8
                                5⤵
                                  PID:6076
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5060 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:8
                                  5⤵
                                    PID:6136
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:2
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4568
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                            1⤵
                              PID:5248
                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                              C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6028
                            • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
                              C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6048
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                                2⤵
                                • Loads dropped DLL
                                PID:868
                                • C:\Windows\system32\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                                  3⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1264
                                  • C:\Windows\system32\netsh.exe
                                    netsh wlan show profiles
                                    4⤵
                                      PID:2544
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\084619521222_Desktop.zip' -CompressionLevel Optimal
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5692
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                                  2⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  PID:5460
                              • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5172

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\1000013002\22452f6664.exe

                                Filesize

                                1.1MB

                                MD5

                                c092fb0f67a989a62c1a0ac4e9512dbb

                                SHA1

                                163e3395224453e201a8bb1d3a4875617e69b7f8

                                SHA256

                                9cead4b495d88629f80fd5004b18bdd222603a3d9940de2f1e533c8557bbaaba

                                SHA512

                                ea8b1e2b9342f3e7bcd3594c0a48d38385ad117115f7918dbde15149aba584f65ad375bd1f2ac9154a7ef354f2ddc78b93fcdeda364cedf7e1a32c8b687e21b1

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                336B

                                MD5

                                01d03107fd01591741518f3765483c31

                                SHA1

                                1baa53f2b0d223d00b35791a68da7c3ea8d1bbdb

                                SHA256

                                1f7c220515e10dfd1846d27a60cf92fad7875b4a58c1e2f215819f5c35bdbabc

                                SHA512

                                0856a0a8b44bad872c0bcfe55ada2ed3fddceada007a1dcccb1d1123f6c0ec9f2b60543b8cff4ad6b9df087bc1b805065288d0e7da4d6f912db92e0be0dfda21

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                2KB

                                MD5

                                e5ef6b163fad04981acfdb9486cc63d8

                                SHA1

                                4ce9e9ad8a44efd88ac2eb62801d6014965e4bf0

                                SHA256

                                f7fa5b7616503d8160d69828338de99a83b98eda16705111a3e7dafffe2c7837

                                SHA512

                                9a72b1e7930ab164e7c8218b3866b50dfea5d23f4f0e730f82030f6c4acfe90a003d527c9b6d37f2d0c53e1ea7b0b8fde51a0d4f7dbd227a47a3d357dc715d60

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                2KB

                                MD5

                                08845ca47efa683c760f5403cac5e527

                                SHA1

                                c62ef4e95c15c3f5717003dd95d5e2a1bf38d8f2

                                SHA256

                                793f9c7cf2369beb7e08511c69ce6efcca7742fa28bfe4ab15a134d8c05448a1

                                SHA512

                                f91459ddb3675dbaafac993ac5553346f4dc4c725effda7ff60762f2316eb9b40212086d0b158149f9b68b9c2088baf6ea887cc80347075292070278c283fd02

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                524B

                                MD5

                                72a34dfe13417464ae49c75004edd463

                                SHA1

                                f0d84a6c835b61bdefefc600a6538987931ac56c

                                SHA256

                                06f046c8497dc5aa9d91155869d6c3be9c6fe88997643c3b25e09d5e321d244a

                                SHA512

                                bda4fc1251a85b16285f501512b252aa12b453cbc55af6aeaeb999323754ae056e46cd0cc408fc35085e47e3f0a2287e30db005f9ed57f9d7b74294117b4d8c1

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                524B

                                MD5

                                a78ae68deb40f018611ee73042f7bdaf

                                SHA1

                                a0ff1493aa2798ed298ae4a44841b70243e8677e

                                SHA256

                                984235e1d504a07a4236468850e3e7e7a8407cc860721774e4947651317ad388

                                SHA512

                                53b4bf06e3818b4e916d3833e2d79c2014af059322b0b6fe29f20336bb1306178031c103745fba5fa7f2c2373a40779b30d4e3eda2272e85639307d4d859a501

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                7KB

                                MD5

                                55d85a0ccb2f663a3d1c58bb947fde19

                                SHA1

                                511d62e90b56f18495ec3200b79773c4de9de53e

                                SHA256

                                3a8334f05c83d425b1bde59d07b2eb5210ac16282a559275f5419844f4277dd5

                                SHA512

                                5e1fc0ad8963f1f6ee0a4d64d26d739225e6c4aa9b7e7125aa14830a80ffb2953151fd78e86e9ab4bb832bc647eedf1f75ce0011615a77bb4c46d6ae700df0d0

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                16KB

                                MD5

                                efc99fecd3778fb86a888822e23750e9

                                SHA1

                                e81b4c2227ee91d31d3dad819c127b64286e7cef

                                SHA256

                                a5ba7c98d99a4b1e35c3e35ae679dc4874f4b1bb5bf92716044e17adb31357b7

                                SHA512

                                4a651d7627698c8b7de5c0c3facd90d9524c3b7a830ccf76a0249d8551a64294321dd8be9546c712e86cad8d6c007565297db1629eeefd308cb65bf7c606dc34

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                252KB

                                MD5

                                31e7aa875f77fd1e15379c18111a0ec4

                                SHA1

                                9736a727b3b8f48d398cea0189657266a13c25be

                                SHA256

                                b91603db297e423406427f27d343c730868370694372d69a624de064f14a3fec

                                SHA512

                                d86f4aba9b2ceeb89773a851af1db074dc1d381a9e0d8eb0db1591eabe7766fbd8577a3670ef73b74c886ea31c17afbd1efc72fde9ee3a6f113cc3b6345e70df

                              • C:\Users\Admin\AppData\Local\Temp\1000009001\0f99a58c5a.exe

                                Filesize

                                2.3MB

                                MD5

                                0286032b26c7a079fea08e19293d99bd

                                SHA1

                                15d0391efcc49ecdade1bada595d8bebdafea4ef

                                SHA256

                                17ead72811224d62a0132d741e23c1cdb1541371dbc12aee151ebad40235c67c

                                SHA512

                                aa1ca7346c6a10e77e000ee48acb07543506cdac890719856b6bf74662b8ee8a7b3c899aa2521bd1b1d24073f7efd2a571299f38ee014cb58749c210dc8f298f

                              • C:\Users\Admin\AppData\Local\Temp\1000012001\amert.exe

                                Filesize

                                1.8MB

                                MD5

                                835a5a8fe8a9af07418b87cf3d3b2de9

                                SHA1

                                f7383fce0f86f3b368589bddf163576c1277987f

                                SHA256

                                ef0bff6a01433d87f35c08cb28e03c11b5694ccc916e9c0ceeffdde6aab1391e

                                SHA512

                                74ec8f2dc12ceceb6e160136731cba52b470525b3dc91f3ea46e29278da38f788ea854518c7de8d4004e3adaef222a023edbc1f54466c40f8e74ae8944b27561

                              • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

                                Filesize

                                1.8MB

                                MD5

                                9afd11e0ec6b6d2b686fb038a4a6c42e

                                SHA1

                                fdadef19c9cf1a88317f6d4122b9c15b504bfe13

                                SHA256

                                223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a

                                SHA512

                                fd37c0eb60ec27f6fd892f0c748f04a4cd334fbd4b287891654f014510da11c433151ea8341dda9ce2fec1c4f76342524557883e678a8c6be8765dd0d4495fd0

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4sxr5ybs.nhk.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                Filesize

                                109KB

                                MD5

                                154c3f1334dd435f562672f2664fea6b

                                SHA1

                                51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                SHA256

                                5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                SHA512

                                1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                              • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                Filesize

                                1.2MB

                                MD5

                                f35b671fda2603ec30ace10946f11a90

                                SHA1

                                059ad6b06559d4db581b1879e709f32f80850872

                                SHA256

                                83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                SHA512

                                b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                              • memory/3116-321-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-380-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-29-0x0000000005550000-0x0000000005551000-memory.dmp

                                Filesize

                                4KB

                              • memory/3116-30-0x00000000055A0000-0x00000000055A1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3116-31-0x00000000055D0000-0x00000000055D1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3116-32-0x00000000055C0000-0x00000000055C1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3116-27-0x00000000055B0000-0x00000000055B1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3116-154-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-216-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-109-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-243-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-269-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-296-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-337-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-349-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-28-0x0000000005540000-0x0000000005541000-memory.dmp

                                Filesize

                                4KB

                              • memory/3116-23-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-24-0x0000000005570000-0x0000000005571000-memory.dmp

                                Filesize

                                4KB

                              • memory/3116-25-0x0000000005580000-0x0000000005581000-memory.dmp

                                Filesize

                                4KB

                              • memory/3116-365-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3116-26-0x0000000005560000-0x0000000005561000-memory.dmp

                                Filesize

                                4KB

                              • memory/3116-378-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3520-59-0x0000000004F80000-0x0000000004F81000-memory.dmp

                                Filesize

                                4KB

                              • memory/3520-57-0x0000000004F40000-0x0000000004F41000-memory.dmp

                                Filesize

                                4KB

                              • memory/3520-382-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-367-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-156-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-62-0x0000000004FA0000-0x0000000004FA2000-memory.dmp

                                Filesize

                                8KB

                              • memory/3520-355-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-61-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3520-60-0x0000000004F20000-0x0000000004F21000-memory.dmp

                                Filesize

                                4KB

                              • memory/3520-58-0x0000000004F70000-0x0000000004F71000-memory.dmp

                                Filesize

                                4KB

                              • memory/3520-338-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-56-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3520-334-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-51-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-208-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-319-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-53-0x0000000004F00000-0x0000000004F01000-memory.dmp

                                Filesize

                                4KB

                              • memory/3520-379-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-232-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-272-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-55-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3520-249-0x0000000000530000-0x0000000000B1F000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/3520-52-0x0000000004F30000-0x0000000004F31000-memory.dmp

                                Filesize

                                4KB

                              • memory/3520-54-0x0000000004F60000-0x0000000004F61000-memory.dmp

                                Filesize

                                4KB

                              • memory/3840-6-0x0000000005640000-0x0000000005641000-memory.dmp

                                Filesize

                                4KB

                              • memory/3840-7-0x0000000005650000-0x0000000005651000-memory.dmp

                                Filesize

                                4KB

                              • memory/3840-8-0x00000000056A0000-0x00000000056A1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3840-5-0x00000000056B0000-0x00000000056B1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3840-4-0x0000000005660000-0x0000000005661000-memory.dmp

                                Filesize

                                4KB

                              • memory/3840-3-0x0000000005680000-0x0000000005681000-memory.dmp

                                Filesize

                                4KB

                              • memory/3840-9-0x00000000056D0000-0x00000000056D1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3840-10-0x00000000056C0000-0x00000000056C1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3840-2-0x0000000005670000-0x0000000005671000-memory.dmp

                                Filesize

                                4KB

                              • memory/3840-1-0x00000000777D4000-0x00000000777D6000-memory.dmp

                                Filesize

                                8KB

                              • memory/3840-22-0x0000000000F50000-0x0000000001412000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/3840-0-0x0000000000F50000-0x0000000001412000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/4088-65-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-118-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-110-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-68-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/4088-131-0x00000000054D0000-0x00000000054D1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4088-132-0x00000000054A0000-0x00000000054A1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4088-136-0x0000000005490000-0x0000000005491000-memory.dmp

                                Filesize

                                4KB

                              • memory/4088-143-0x0000000005480000-0x0000000005481000-memory.dmp

                                Filesize

                                4KB

                              • memory/4088-146-0x00000000054F0000-0x00000000054F1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4088-149-0x00000000054E0000-0x00000000054E1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4088-150-0x0000000005520000-0x0000000005521000-memory.dmp

                                Filesize

                                4KB

                              • memory/4088-148-0x0000000005510000-0x0000000005511000-memory.dmp

                                Filesize

                                4KB

                              • memory/4088-135-0x0000000005500000-0x0000000005501000-memory.dmp

                                Filesize

                                4KB

                              • memory/4088-151-0x00000000054C0000-0x00000000054C1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4088-152-0x0000000005470000-0x0000000005471000-memory.dmp

                                Filesize

                                4KB

                              • memory/4088-153-0x0000000005540000-0x0000000005542000-memory.dmp

                                Filesize

                                8KB

                              • memory/4088-69-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-70-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-112-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-71-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-72-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-122-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-120-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-99-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-73-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-117-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-74-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-75-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-77-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-233-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-108-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-107-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-106-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-105-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-76-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-86-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-87-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-88-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-91-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-104-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-103-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-94-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-102-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-96-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4088-101-0x0000000000400000-0x00000000009DF000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4140-115-0x0000000004B90000-0x0000000004B91000-memory.dmp

                                Filesize

                                4KB

                              • memory/4140-114-0x0000000004B50000-0x0000000004B51000-memory.dmp

                                Filesize

                                4KB

                              • memory/4140-113-0x0000000004B70000-0x0000000004B71000-memory.dmp

                                Filesize

                                4KB

                              • memory/4140-155-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4140-157-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4140-121-0x0000000000300000-0x00000000007C4000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/4140-100-0x0000000000300000-0x00000000007C4000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/4140-162-0x0000000000300000-0x00000000007C4000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/4140-119-0x0000000004B40000-0x0000000004B41000-memory.dmp

                                Filesize

                                4KB

                              • memory/4140-116-0x0000000004B30000-0x0000000004B31000-memory.dmp

                                Filesize

                                4KB

                              • memory/4140-111-0x0000000004B60000-0x0000000004B61000-memory.dmp

                                Filesize

                                4KB

                              • memory/5172-377-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/6028-256-0x0000000005680000-0x0000000005681000-memory.dmp

                                Filesize

                                4KB

                              • memory/6028-253-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/6028-255-0x0000000005670000-0x0000000005671000-memory.dmp

                                Filesize

                                4KB

                              • memory/6028-268-0x0000000000DF0000-0x00000000012B2000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/6048-254-0x00000000006E0000-0x0000000000BA4000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/6048-366-0x00000000006E0000-0x0000000000BA4000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/6048-369-0x00000000006E0000-0x0000000000BA4000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/6048-339-0x00000000006E0000-0x0000000000BA4000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/6048-335-0x00000000006E0000-0x0000000000BA4000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/6048-381-0x00000000006E0000-0x0000000000BA4000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/6048-273-0x00000000006E0000-0x0000000000BA4000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/6048-322-0x00000000006E0000-0x0000000000BA4000-memory.dmp

                                Filesize

                                4.8MB