Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-05-2024 08:57

General

  • Target

    e2a3d840a125e2dab1180582617f1b57668d3dbf18714a5238ad02f033926df5.exe

  • Size

    1.7MB

  • MD5

    915e900fe07c8710345b45399e7ff4f1

  • SHA1

    57f675eccfef49697287db01b5b351f09c909b8c

  • SHA256

    e2a3d840a125e2dab1180582617f1b57668d3dbf18714a5238ad02f033926df5

  • SHA512

    d51498e6c548a718f8acb2a861e0bdc30a7048d6942dc66dce6b45fb75aa5d7d255d7445776951643845ccf96efbe940e59abc935a2c50dd61c6b51451d61883

  • SSDEEP

    49152:HVeqEHsGYlJ/eOWU5H7sL9HDUUUIqmxmbUTTHQ8:HMqEMGo/eOWU5bsL9HDTzqXwQ8

Malware Config

Extracted

Family

amadey

Version

4.20

C2

http://193.233.132.139

Attributes
  • install_dir

    5454e6f062

  • install_file

    explorta.exe

  • strings_key

    c7a869c5ba1d72480093ec207994e2bf

  • url_paths

    /sev56rkm/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

risepro

C2

147.45.47.93:58709

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 52 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 62 IoCs
  • Suspicious use of SendNotifyMessage 47 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2a3d840a125e2dab1180582617f1b57668d3dbf18714a5238ad02f033926df5.exe
    "C:\Users\Admin\AppData\Local\Temp\e2a3d840a125e2dab1180582617f1b57668d3dbf18714a5238ad02f033926df5.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
      "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
        "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
        3⤵
          PID:2244
        • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe
          "C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2468
          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:4616
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
              5⤵
              • Loads dropped DLL
              PID:2220
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                6⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                PID:764
                • C:\Windows\system32\netsh.exe
                  netsh wlan show profiles
                  7⤵
                    PID:1648
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\878097196921_Desktop.zip' -CompressionLevel Optimal
                    7⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:228
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                5⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                PID:3484
          • C:\Users\Admin\AppData\Local\Temp\1000020001\11567788a1.exe
            "C:\Users\Admin\AppData\Local\Temp\1000020001\11567788a1.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            PID:4448
          • C:\Users\Admin\1000021002\966345a3c0.exe
            "C:\Users\Admin\1000021002\966345a3c0.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3376
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
              4⤵
              • Drops file in Windows directory
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2788
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbbef1cc40,0x7ffbbef1cc4c,0x7ffbbef1cc58
                5⤵
                  PID:4860
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1820,i,10350181356968889151,18365872739638157675,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1816 /prefetch:2
                  5⤵
                    PID:4996
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2128,i,10350181356968889151,18365872739638157675,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2136 /prefetch:3
                    5⤵
                      PID:3732
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,10350181356968889151,18365872739638157675,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2424 /prefetch:8
                      5⤵
                        PID:2760
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,10350181356968889151,18365872739638157675,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3140 /prefetch:1
                        5⤵
                          PID:4596
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,10350181356968889151,18365872739638157675,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3176 /prefetch:1
                          5⤵
                            PID:5016
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4536,i,10350181356968889151,18365872739638157675,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4548 /prefetch:8
                            5⤵
                              PID:3480
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4632,i,10350181356968889151,18365872739638157675,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4540 /prefetch:8
                              5⤵
                                PID:1888
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=868,i,10350181356968889151,18365872739638157675,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4572 /prefetch:8
                                5⤵
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3564
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                        1⤵
                          PID:4880
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:4712
                          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                            C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1164
                          • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                            C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Checks whether UAC is enabled
                            PID:3660
                          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                            C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4500
                          • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                            C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Checks whether UAC is enabled
                            PID:956
                          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                            C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2428
                          • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                            C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Checks whether UAC is enabled
                            PID:2152

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\1000021002\966345a3c0.exe

                            Filesize

                            1.1MB

                            MD5

                            f360421249f118bd40d40132dc639cef

                            SHA1

                            b0918433a1590163541b2b40bf8751335f25aca0

                            SHA256

                            9c583141f173682e64e743f4dddcc05fa0f590d48177ad1b7ab4d42c950be045

                            SHA512

                            ab47fe3a7697cdd33c4ebcd0c67c8c038a70064bc7d635a47a4c2af469d8890076384e5cf33d5d013ff524313051d2d02ab991be9440bbbd6dd4e5a568fc9795

                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                            Filesize

                            64KB

                            MD5

                            b5ad5caaaee00cb8cf445427975ae66c

                            SHA1

                            dcde6527290a326e048f9c3a85280d3fa71e1e22

                            SHA256

                            b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8

                            SHA512

                            92f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f

                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                            Filesize

                            4B

                            MD5

                            f49655f856acb8884cc0ace29216f511

                            SHA1

                            cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                            SHA256

                            7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                            SHA512

                            599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                            Filesize

                            1008B

                            MD5

                            d222b77a61527f2c177b0869e7babc24

                            SHA1

                            3f23acb984307a4aeba41ebbb70439c97ad1f268

                            SHA256

                            80dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747

                            SHA512

                            d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                            Filesize

                            649B

                            MD5

                            526d7b0db5df7867b3b7f14bd97a11d1

                            SHA1

                            da3049f8fe2f4fd03545383c7fda67bcef5b29f0

                            SHA256

                            27b11ee6f095d7fc9fc0538b29f7876e1002d7a91f86fe7aa00ef557a7c74be5

                            SHA512

                            4912a13f4a18c24f8b0f0f1fa6827af46a4b95f2a9e888a76b2b6321839b8528b919f0aef5ef7af360a2fa2d166716f16bdeeccb986be1ae04f89bb295e8224a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            264B

                            MD5

                            91380bba9f7e4752465439544bb53f09

                            SHA1

                            a13a0586d50295f6ac3333f80792d4772fa010e3

                            SHA256

                            73f2e1bb64d52ae535daf8fdff20b93eb2c8c1681bca90d28ef116f1069e002b

                            SHA512

                            c79ba9dd340e69aab43a51c3c27c42136529fd9b3e5fac31c0e87a1a7902bf33aad158eb9bdccf30397f50abb95a6fb60ec41b6e926d3943c228ec16384ee2fe

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            3KB

                            MD5

                            a068295b8332f259e6b06fc29d6e541b

                            SHA1

                            033830a5611d05cedd53d8d7527cdaab57155c07

                            SHA256

                            eef75a5b2212f26304aed3cc7f67af2d50038ea2e85338f43cd975fd2fe0d596

                            SHA512

                            6bc919d2b7687ee82a3d0717eb65bae3451aaf20bd3c9aa5ca0a7643c17a78ffec661f3290590c39190b1802f67e745468ef82c927ac8f33a1c0c650827d8048

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            692B

                            MD5

                            6ae931f4dd5927f7048c7753f445fe10

                            SHA1

                            18f20414d3a2f4cd5c1a095fb84ef6b0b7b6a4c5

                            SHA256

                            f8c149859472242c136bc749fc597c049a211af5b78c4880d9faa30b82fccd0a

                            SHA512

                            4e9641af316895c67c54966d517d37e707bc5116ec96869dc253ee29f5cdcb0e54130bd429ace395df45cebdd6c23d74235e3eac3ea2a0b378cba77fcc77b2f8

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            6483010be132d85148c5792f056d68d7

                            SHA1

                            67a247bc98286655e9df95c421fce2b6c5df1b2f

                            SHA256

                            ab968807f5ceb353d6ad788b451dfc1743046a9670ee13c16689ef0936b9ebdf

                            SHA512

                            3c4602afc56c5d32c5bf896504c5b3e3d2321d9b0055aceaff06105c65e8e83f3e5dc7d60f0e271f9ad50a6b49f8e1de29ce758bc68b175622607fa30c527e9f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            71e38f56002da53e5530eb0d678dd4ee

                            SHA1

                            012f2a046687521b53bc29e8744c4fa4b89dfb76

                            SHA256

                            7bbd64b76fff830a6d9bd2b8ee03d5c5a60b4228bda7cf7d348e859a1eecb1cb

                            SHA512

                            99f1aba1066fa26d3c6d4e3bd0a4b6c708efefab23362924dd0bb32bd430cb1ce3b7e3b07a11e7c1cb16ea7541e8581ad90b710739cb4a4162068be65e23894b

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            2e787500ac7d6c21928dbe79afe7fc8d

                            SHA1

                            59e320749cbb7af8e79fa4496751aec222055a46

                            SHA256

                            6d94e0f8ac8318592fd0401c6a94a778a784ed6aef82d86d6df04c2ebcbaf919

                            SHA512

                            a49e314b27720d4ef41ee4aa64edaed1af007f9c49971795a99949a51a3da956be8cb7f138df3a979655714f462ac628121bad1723ce0960c3b3dd5b1f83e9f9

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            547d83609a2ce36ab7e50b2bfefe73a7

                            SHA1

                            48e93ec8a2c6f5c9ec16af40613559b0c16cb93d

                            SHA256

                            3810e866b8263b5f93c5177877333d20faa3223b670e9a711df9ff6a8e9546f6

                            SHA512

                            5e009d7f2306bac89954432e3da1e9228a88427ac53e4d09a46e2c5380c8ab4e546e10538a46901fdad8ab4fdaa7c845dc7417b09763f06b399205fbe9ebc8f4

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            3c557f869636725d983292e6ff600104

                            SHA1

                            f3f1b61785d7d0a85ffb6683c4869919b19e25df

                            SHA256

                            4b28531510efd9c29c501d0d7db4cee6ed75a1fac348903d42a6a79c31aef69f

                            SHA512

                            d1311edf35f8dfe9a59ae72dc7d2017edff48d940902fda54e8856ff7806d6f9782bc65e9d04a95a5c42ad5b18ec4e0fcf89e9677b6ae788d94276ebf90c76cb

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            8444f859e7158ae43ea034bce889d6ce

                            SHA1

                            e5d51560e4bf4d88a435cfc849b339cf513a41eb

                            SHA256

                            3c4e2280a0698ceb8495ad01cdc3416544096ddba9d034af83decf4ead4c2730

                            SHA512

                            f2cfed51a728ed59e7704f3d6b901295bfac8616237665da816e0e65d1355f7c3e5564bda86dedf0ea986cc6b1406c571954d8a67ad0e3823b360e5c3cdfea11

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            740320e490233362eae0f002d2170a34

                            SHA1

                            eba92aa63cf8b095a4febe46783520fdc14e967d

                            SHA256

                            4a9714a2532c2367548ff70e8662b85ff1aa97763ed8974d43aa242916567c7b

                            SHA512

                            0b33b72ba46acab57673db4122a6716e75454b3fc46c860b5db9da7a48774b14818e1e575bd3e9cdb00cbb2676b8672700ab0fc71d8c68ab69a83b6856667cae

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            3b818924752c9171b46070f2bd8a13d2

                            SHA1

                            562906c67efd49933df4ce6249acea35015f40c1

                            SHA256

                            ea6732a4f44bc28ba507e44eacf452e1797a909bda005e4de937119d6f3588fa

                            SHA512

                            f9ccfae85df47cb487b64490ebe65b607f8b74b6f27b32832818d558d579fe190e00b9d8d28724d96244d89e5562f8513071d007bce2b8070f224014fcab8dee

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                            Filesize

                            15KB

                            MD5

                            6b69a58d5937cd78eb8e120d1729264b

                            SHA1

                            425426350a56961aa0caef914eda67d49067db2a

                            SHA256

                            b328e033ca16f4e642307dee51c0e1068ff23131f5cfcf55c84a67bef6007418

                            SHA512

                            542ba9f58493a299df0c28250d4fab508735ed4246033da8722bddab5294b0af599455d3a74ea70aedc51487c5ef183d7d8db7ce09cd3eb01b628267f6329b9b

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            152KB

                            MD5

                            314874a673de91ac43a7562c8945d7b5

                            SHA1

                            9efab18c29321579ab6c2264ddeb6bf712cdce64

                            SHA256

                            f62db482ef53d2bc8d527619d185b3127f26af6f508d8e65b440cc6a082f5d8c

                            SHA512

                            ac035dda3559e7b2295dd35115516658e7411afa13283e8ebc19ec37695bb7f0b826069e143ee473a34df77c54053b978fa9bcaca43844da160295c81bde2079

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            152KB

                            MD5

                            24b0dd1d5d14c383851bd5ae96440dc0

                            SHA1

                            9f924e97c3aff114c4ffee763929f1ad0ec7da29

                            SHA256

                            ff236633a515dd61a0f394df5a40971e4a828c2b7c77c9765d6ec8034879eca6

                            SHA512

                            a5f402fe141d6418b36aefb2b8bd7ee40d38962c722a6bca61162b16ff3dccf5bdc85a23d0ec090b77ae43fec5e5e231a9bac13b76ad0693b9a08808d3357655

                          • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe

                            Filesize

                            1.8MB

                            MD5

                            deaf78ca95d0c4ac897783a5fcd6e7f5

                            SHA1

                            6673fb62ebf0d156e536de597391b1b6b2e7a542

                            SHA256

                            c50a6a102fce39809c7b57c4ea4aed7df514fe98d514ee106f0312f51197827c

                            SHA512

                            77b118d55683e00dfdcc0cc7da3378c314536acf8b684fdf9d612b53b2230a3046f97bf235855b6bcc7107410ff35bd0dd24d3d6d094786d0189b9a3c2ca2573

                          • C:\Users\Admin\AppData\Local\Temp\1000020001\11567788a1.exe

                            Filesize

                            2.1MB

                            MD5

                            54763bb5a0e384fa3f253e9d175fbc60

                            SHA1

                            b1f5da49c14fae4aabd42ce6169aab30fa9dd94f

                            SHA256

                            b4980cf355475d0879d2bac69fe4aacf7176c404da18ed6457756860428f406c

                            SHA512

                            da16db4b05b42c57e511c53128d0b14e3b64745f55a34520e3f6b344e2850d8ddfc7855f7c62ace1ef3eb3fb27b5442913d90e73342a6a7adee13c924462bafb

                          • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

                            Filesize

                            1.7MB

                            MD5

                            915e900fe07c8710345b45399e7ff4f1

                            SHA1

                            57f675eccfef49697287db01b5b351f09c909b8c

                            SHA256

                            e2a3d840a125e2dab1180582617f1b57668d3dbf18714a5238ad02f033926df5

                            SHA512

                            d51498e6c548a718f8acb2a861e0bdc30a7048d6942dc66dce6b45fb75aa5d7d255d7445776951643845ccf96efbe940e59abc935a2c50dd61c6b51451d61883

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vd5s5tdw.dxv.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                            Filesize

                            109KB

                            MD5

                            726cd06231883a159ec1ce28dd538699

                            SHA1

                            404897e6a133d255ad5a9c26ac6414d7134285a2

                            SHA256

                            12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                            SHA512

                            9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                            Filesize

                            1.2MB

                            MD5

                            15a42d3e4579da615a384c717ab2109b

                            SHA1

                            22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                            SHA256

                            3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                            SHA512

                            1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                          • memory/228-198-0x000001F6BE6E0000-0x000001F6BE6F2000-memory.dmp

                            Filesize

                            72KB

                          • memory/228-199-0x000001F6BE530000-0x000001F6BE53A000-memory.dmp

                            Filesize

                            40KB

                          • memory/228-193-0x000001F6BE4F0000-0x000001F6BE512000-memory.dmp

                            Filesize

                            136KB

                          • memory/956-308-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/956-309-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/956-310-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/956-311-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/956-314-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/956-313-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/956-312-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/956-307-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/956-316-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1164-223-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1164-206-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/1856-24-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1856-25-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1856-23-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1856-29-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1856-27-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1856-28-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1856-30-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1856-26-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1856-22-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1856-150-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/2152-392-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/2152-401-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/2428-390-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2428-403-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2468-62-0x0000000000CE0000-0x0000000001185000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2468-48-0x0000000000CE0000-0x0000000001185000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2468-49-0x00000000775F6000-0x00000000775F8000-memory.dmp

                            Filesize

                            8KB

                          • memory/3660-217-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/3660-215-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/3660-214-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/3660-222-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/3660-219-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/3660-218-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/3660-220-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/3660-216-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/3660-213-0x0000000000B10000-0x000000000105C000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/4412-5-0x0000000000FA0000-0x00000000014EC000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/4412-8-0x0000000000FA0000-0x00000000014EC000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/4412-7-0x0000000000FA0000-0x00000000014EC000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/4412-4-0x0000000000FA0000-0x00000000014EC000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/4412-0-0x0000000000FA0000-0x00000000014EC000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/4412-1-0x0000000000FA0000-0x00000000014EC000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/4412-21-0x0000000000FA0000-0x00000000014EC000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/4412-6-0x0000000000FA0000-0x00000000014EC000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/4412-2-0x0000000000FA0000-0x00000000014EC000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/4412-3-0x0000000000FA0000-0x00000000014EC000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/4448-90-0x00000000006E0000-0x0000000000D61000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4448-83-0x00000000006E0000-0x0000000000D61000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4448-86-0x00000000006E0000-0x0000000000D61000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4448-84-0x00000000006E0000-0x0000000000D61000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4448-85-0x00000000006E0000-0x0000000000D61000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4448-82-0x00000000006E0000-0x0000000000D61000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4448-160-0x00000000006E0000-0x0000000000D61000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4448-89-0x00000000006E0000-0x0000000000D61000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4448-88-0x00000000006E0000-0x0000000000D61000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4448-87-0x00000000006E0000-0x0000000000D61000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4500-305-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4500-318-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4616-287-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4616-283-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4616-271-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4616-159-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4616-63-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4616-254-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4616-251-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4616-224-0x0000000000440000-0x00000000008E5000-memory.dmp

                            Filesize

                            4.6MB