Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 12:25

General

  • Target

    7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe

  • Size

    1.8MB

  • MD5

    d8b22fea1211eb693868d08d3db4935d

  • SHA1

    4facbc997e375b483d2291b1c832e4ed58e7a9e7

  • SHA256

    7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469

  • SHA512

    3dd114e2eda5885a17402970425aff5997feb96d6344de77c3b90d8f306af4ad95772826c3536491782fd74e8c3298a85096613abd3684e768aea6236b127712

  • SSDEEP

    49152:pPJX3MJzQEitae+XoJcakPZ423i7URS7yYi1BU2CS6o3Yfp5:ZR3kzTitB+XIcd4ACUs+Y8BU9o3gp5

Malware Config

Extracted

Family

amadey

Version

4.20

C2

http://5.42.96.7

Attributes
  • install_dir

    7af68cdb52

  • install_file

    axplons.exe

  • strings_key

    e2ce58e78f631ed97d01fe7b70e85d5e

  • url_paths

    /zamo7h/index.php

rc4.plain

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 3 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe
    "C:\Users\Admin\AppData\Local\Temp\7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
      "C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
        "C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3884
        • C:\Users\Admin\AppData\Local\Temp\1000254001\ISetup8.exe
          "C:\Users\Admin\AppData\Local\Temp\1000254001\ISetup8.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1336
          • C:\Users\Admin\AppData\Local\Temp\u114.0.exe
            "C:\Users\Admin\AppData\Local\Temp\u114.0.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:5088
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 1988
              6⤵
              • Program crash
              PID:4744
          • C:\Users\Admin\AppData\Local\Temp\u114.1.exe
            "C:\Users\Admin\AppData\Local\Temp\u114.1.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4508
            • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
              "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1252
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 1592
            5⤵
            • Program crash
            PID:1956
        • C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe
          "C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe"
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          PID:696
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 268
            5⤵
            • Program crash
            PID:1364
        • C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe
          "C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4704
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:852
          • C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe
            "C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3340
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              6⤵
              • Drops file in System32 directory
              • Command and Scripting Interpreter: PowerShell
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1360
            • C:\Windows\system32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3648
              • C:\Windows\system32\netsh.exe
                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                7⤵
                • Modifies Windows Firewall
                PID:4316
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              6⤵
              • Drops file in System32 directory
              • Command and Scripting Interpreter: PowerShell
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5004
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              6⤵
              • Drops file in System32 directory
              • Command and Scripting Interpreter: PowerShell
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2200
            • C:\Windows\rss\csrss.exe
              C:\Windows\rss\csrss.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Manipulates WinMonFS driver.
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3140
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                7⤵
                • Drops file in System32 directory
                • Command and Scripting Interpreter: PowerShell
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4624
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                7⤵
                • Creates scheduled task(s)
                PID:3536
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /delete /tn ScheduledUpdate /f
                7⤵
                  PID:4576
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  7⤵
                  • Drops file in System32 directory
                  • Command and Scripting Interpreter: PowerShell
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1500
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  7⤵
                  • Drops file in System32 directory
                  • Command and Scripting Interpreter: PowerShell
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:852
                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                  C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1932
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  7⤵
                  • Creates scheduled task(s)
                  PID:1172
                • C:\Windows\windefender.exe
                  "C:\Windows\windefender.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:1364
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4176
                    • C:\Windows\SysWOW64\sc.exe
                      sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      9⤵
                      • Launches sc.exe
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1336 -ip 1336
      1⤵
        PID:4344
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 696 -ip 696
        1⤵
          PID:2028
        • C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
          C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:4352
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5088 -ip 5088
          1⤵
            PID:4496
          • C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
            C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
            1⤵
            • Executes dropped EXE
            PID:3992
          • C:\Windows\windefender.exe
            C:\Windows\windefender.exe
            1⤵
            • Executes dropped EXE
            • Modifies data under HKEY_USERS
            PID:3740
          • C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
            C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            PID:4168
          • C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
            C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
            1⤵
            • Executes dropped EXE
            PID:3640

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Are.docx

            Filesize

            11KB

            MD5

            a33e5b189842c5867f46566bdbf7a095

            SHA1

            e1c06359f6a76da90d19e8fd95e79c832edb3196

            SHA256

            5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

            SHA512

            f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

          • C:\ProgramData\mozglue.dll

            Filesize

            593KB

            MD5

            c8fd9be83bc728cc04beffafc2907fe9

            SHA1

            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

            SHA256

            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

            SHA512

            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

          • C:\ProgramData\nss3.dll

            Filesize

            2.0MB

            MD5

            1cc453cdf74f31e4d913ff9c10acdde2

            SHA1

            6e85eae544d6e965f15fa5c39700fa7202f3aafe

            SHA256

            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

            SHA512

            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

          • C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe

            Filesize

            418KB

            MD5

            0099a99f5ffb3c3ae78af0084136fab3

            SHA1

            0205a065728a9ec1133e8a372b1e3864df776e8c

            SHA256

            919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

            SHA512

            5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

          • C:\Users\Admin\AppData\Local\Temp\1000254001\ISetup8.exe

            Filesize

            386KB

            MD5

            258e2128803910f3b69a21d5bae342c4

            SHA1

            fa9bb27e5804e43b268f063b69d40d8b9d6e05fc

            SHA256

            7954fe796c7bdfd2286b9c29349d8f349f02a0cb53e19bb5bbeaef65108f9e33

            SHA512

            03027a8add75e227870f8db62472807709c7343be3376b8791c38c94a2f6a22859da21c6c2672e65a6ca1e9e697a6c63d094b1d03ff7ad150c1f52ff31cbcd42

          • C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe

            Filesize

            240KB

            MD5

            6bcbbfac4eb7dbecb5a44983645a75db

            SHA1

            06335c12d2dc398efa4956674628debaf8a22b39

            SHA256

            f73c2ff7df05fca90c08e6ac7a30b97f56a5f62ddc1aed09e0970dc416f995aa

            SHA512

            550b13098d9842bc79b441721b6a93f085d75c274d7b5e0387fae87f9cf5a3566fb13694b5369149e093cb41a109fa015a9698f0553827c8c46c864083a54a33

          • C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe

            Filesize

            4.1MB

            MD5

            3be36f6f21f6e93a2499c382b8939aa2

            SHA1

            2f97f9808218f11bbe2d355863dd176c3b9f4111

            SHA256

            5a5ac28472ecf1827e143781289e800b82e9a860e0fb578df7dda99b989db32c

            SHA512

            908569a24b17e57097f5da5acce7c52a7531605d43d4566e5af1309c9ceb81d4466a8f3f4586f6bc5b8e5e204f72a478b3ee0e2d42b707ac1ea305a63d710cea

          • C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe

            Filesize

            1.8MB

            MD5

            d8b22fea1211eb693868d08d3db4935d

            SHA1

            4facbc997e375b483d2291b1c832e4ed58e7a9e7

            SHA256

            7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469

            SHA512

            3dd114e2eda5885a17402970425aff5997feb96d6344de77c3b90d8f306af4ad95772826c3536491782fd74e8c3298a85096613abd3684e768aea6236b127712

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y0oxhcxo.bk1.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

            Filesize

            281KB

            MD5

            d98e33b66343e7c96158444127a117f6

            SHA1

            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

            SHA256

            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

            SHA512

            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

            Filesize

            2KB

            MD5

            830a37f4acd8b91d7ead3f99cba2d1ca

            SHA1

            990ae9ee258555e9305ccc76b7346ebc1e3a2a3c

            SHA256

            2b52d8a288768b1a4104dde2f280e22fc48269c3e30a8946b12d68c3eeb56327

            SHA512

            bf4386c762e47e3050bce2d5a208f14dea1210644b79903cd496c9325626986807ddfbd97628041693c7335c9a513240bb756a9dae582814fadf6b4aab92fdf5

          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

            Filesize

            3KB

            MD5

            3523895da37c0bc66bd0fdb9c75113c1

            SHA1

            e7449101c305bf466e8386ee52dfedf4bfe6550f

            SHA256

            b84ee50fee63f0893829a62672b5f157a4d71a22cf05a2498da16c4af2ef6e54

            SHA512

            008539bc6c2bfb3a2c7251bf0fd2e2e33753b6b00f7c1ddb0d34bbab14162ff969ce554c36125e1ca4252c6100aada05e9f30ce30d19cd0fc4bc519cc34d8827

          • C:\Users\Admin\AppData\Local\Temp\u114.0.exe

            Filesize

            239KB

            MD5

            431c601846123a7b4aa67d75e31a3dfd

            SHA1

            0704a6551c01b3b5744e7b743b33ffa5be2b4ced

            SHA256

            0a9eab89753e07a01b1c5e0197acefea9cc05e5f7829823f811e7aa1d7b817b7

            SHA512

            87a0f6eb99baf620b25216ba491f4891154224ad44ecbbe209c5189585d4cc8abea25ef7b34d78608f074c00ce76374fe49252d76b693521363aced52e4cda27

          • C:\Users\Admin\AppData\Local\Temp\u114.1.exe

            Filesize

            4.6MB

            MD5

            397926927bca55be4a77839b1c44de6e

            SHA1

            e10f3434ef3021c399dbba047832f02b3c898dbd

            SHA256

            4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

            SHA512

            cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            968cb9309758126772781b83adb8a28f

            SHA1

            8da30e71accf186b2ba11da1797cf67f8f78b47c

            SHA256

            92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

            SHA512

            4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            632628e81ff14e5df640ce80c54b750e

            SHA1

            3e51c6f3e6d944973a274ee2befbb533ac06a639

            SHA256

            4831fbd7fafea4a824d6084d4a8b471624d5ca9445ac073899868c3364ba13ae

            SHA512

            e7dd8a8ad3cafe8b052fa3f9a90d17d18b98c23d5ab7ae2e93f0b853b73f64a2679775faac0fe9b828bae8086863214c480bb010224584654fa4903008bacfb8

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            a6f04f977f6cd2d8158a312c486387f4

            SHA1

            441520329afaf3566da38ed853ccbceab2574bcc

            SHA256

            f12e885423d5dde2b556cc9b86875a79f856c966dcf3743099ddba845d1daab9

            SHA512

            d9dd798eb15c9556a6b8f6089f4b4ea27b28a308544076512ee437598ca4c7414757dde50c4799f8f93a149f9121242c5fe8a7ff435238451b9c3d485431fcb9

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            972527454f8255da196f6b8a1bddc2c8

            SHA1

            b0ed491b1d7d6e99593ac74fd63d175fa99f1bfb

            SHA256

            677fa25f638f3c4fdfcd5d357d3eda864abe5c46a403cc02f4e84ec08f733956

            SHA512

            78f98aa6b4488bf75a225018b9d2bece4c19b6dd93e89476f94091b1755ac6cadee0ae792a4942536f0392a6b832b6ead374cfc4ecaf19da46768918172756de

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            9c3b21d3f8c36b68ef8244c59e049dd6

            SHA1

            e7c4ff827c94abf9e23f90ecec18133cf0b06e8b

            SHA256

            17fd7726b5bf64b7f95a7a44079ae850661e6580787d68a67d7ad15eaa808547

            SHA512

            5a34000568a01237f18aead812c998107170a17ffe6f7089a0f855cf042abcc993f71edb203e35a56465763504ee059927cf653ae6e98812802cde0e4db7493d

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            170125585158c430c56c08ce8a5fa7c6

            SHA1

            2ed31bee05ec7e61bd3dfeee60f7ae8d6f22aa26

            SHA256

            c81e688e087dbc6a43a71748106a6a191c9cea2865edfb825fd83fe80ce057e4

            SHA512

            0d0c0f7e283cbb09fcfb2645f4caad768972ed59ea9431862c5e715a51ee7b471edb062c257275c6659cd36a821ac855540646b35b501a19f6362ec0fd80c71c

          • C:\Windows\windefender.exe

            Filesize

            2.0MB

            MD5

            8e67f58837092385dcf01e8a2b4f5783

            SHA1

            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

            SHA256

            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

            SHA512

            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

          • memory/696-121-0x0000000000400000-0x0000000000793000-memory.dmp

            Filesize

            3.6MB

          • memory/852-243-0x00000000073E0000-0x00000000073F1000-memory.dmp

            Filesize

            68KB

          • memory/852-247-0x0000000007470000-0x0000000007478000-memory.dmp

            Filesize

            32KB

          • memory/852-143-0x0000000005590000-0x00000000055B2000-memory.dmp

            Filesize

            136KB

          • memory/852-152-0x00000000056A0000-0x0000000005706000-memory.dmp

            Filesize

            408KB

          • memory/852-162-0x0000000005810000-0x0000000005B64000-memory.dmp

            Filesize

            3.3MB

          • memory/852-176-0x0000000005CF0000-0x0000000005D0E000-memory.dmp

            Filesize

            120KB

          • memory/852-177-0x0000000005D30000-0x0000000005D7C000-memory.dmp

            Filesize

            304KB

          • memory/852-146-0x0000000005630000-0x0000000005696000-memory.dmp

            Filesize

            408KB

          • memory/852-185-0x0000000006100000-0x0000000006144000-memory.dmp

            Filesize

            272KB

          • memory/852-126-0x0000000004EF0000-0x0000000005518000-memory.dmp

            Filesize

            6.2MB

          • memory/852-125-0x0000000002720000-0x0000000002756000-memory.dmp

            Filesize

            216KB

          • memory/852-209-0x0000000006E90000-0x0000000006F06000-memory.dmp

            Filesize

            472KB

          • memory/852-467-0x0000000072780000-0x00000000727CC000-memory.dmp

            Filesize

            304KB

          • memory/852-225-0x0000000007790000-0x0000000007E0A000-memory.dmp

            Filesize

            6.5MB

          • memory/852-226-0x0000000006E30000-0x0000000006E4A000-memory.dmp

            Filesize

            104KB

          • memory/852-227-0x0000000007270000-0x00000000072A2000-memory.dmp

            Filesize

            200KB

          • memory/852-228-0x000000006E6E0000-0x000000006E72C000-memory.dmp

            Filesize

            304KB

          • memory/852-229-0x000000006E840000-0x000000006EB94000-memory.dmp

            Filesize

            3.3MB

          • memory/852-241-0x00000000073C0000-0x00000000073CA000-memory.dmp

            Filesize

            40KB

          • memory/852-240-0x00000000072D0000-0x0000000007373000-memory.dmp

            Filesize

            652KB

          • memory/852-239-0x00000000072B0000-0x00000000072CE000-memory.dmp

            Filesize

            120KB

          • memory/852-242-0x0000000007480000-0x0000000007516000-memory.dmp

            Filesize

            600KB

          • memory/852-468-0x000000006ED90000-0x000000006F0E4000-memory.dmp

            Filesize

            3.3MB

          • memory/852-244-0x0000000007420000-0x000000000742E000-memory.dmp

            Filesize

            56KB

          • memory/852-245-0x0000000007430000-0x0000000007444000-memory.dmp

            Filesize

            80KB

          • memory/852-246-0x0000000007520000-0x000000000753A000-memory.dmp

            Filesize

            104KB

          • memory/1084-500-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-18-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-486-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-20-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-19-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-525-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-519-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-122-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-493-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-330-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-328-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-510-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-390-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-410-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-505-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1084-250-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/1252-294-0x000001DAECA40000-0x000001DAECD40000-memory.dmp

            Filesize

            3.0MB

          • memory/1252-317-0x000001DAF1F50000-0x000001DAF1FB2000-memory.dmp

            Filesize

            392KB

          • memory/1252-287-0x000001DAEC940000-0x000001DAEC96A000-memory.dmp

            Filesize

            168KB

          • memory/1252-289-0x000001DAECA10000-0x000001DAECA32000-memory.dmp

            Filesize

            136KB

          • memory/1252-290-0x000001DAEABB0000-0x000001DAEABBA000-memory.dmp

            Filesize

            40KB

          • memory/1252-286-0x000001DAEC870000-0x000001DAEC922000-memory.dmp

            Filesize

            712KB

          • memory/1252-285-0x000001DAEABA0000-0x000001DAEABAA000-memory.dmp

            Filesize

            40KB

          • memory/1252-283-0x000001DAEC5F0000-0x000001DAEC614000-memory.dmp

            Filesize

            144KB

          • memory/1252-282-0x000001DAEABD0000-0x000001DAEABE4000-memory.dmp

            Filesize

            80KB

          • memory/1252-312-0x000001DAF1450000-0x000001DAF1458000-memory.dmp

            Filesize

            32KB

          • memory/1252-314-0x000001DAF0D60000-0x000001DAF0D6E000-memory.dmp

            Filesize

            56KB

          • memory/1252-313-0x000001DAF0D90000-0x000001DAF0DC8000-memory.dmp

            Filesize

            224KB

          • memory/1252-315-0x000001DAF0D80000-0x000001DAF0D88000-memory.dmp

            Filesize

            32KB

          • memory/1252-288-0x000001DAEC9C0000-0x000001DAECA10000-memory.dmp

            Filesize

            320KB

          • memory/1252-316-0x000001DAF0E00000-0x000001DAF0E0A000-memory.dmp

            Filesize

            40KB

          • memory/1252-318-0x000001DAF1C90000-0x000001DAF1CB2000-memory.dmp

            Filesize

            136KB

          • memory/1252-280-0x000001DAEABC0000-0x000001DAEABD0000-memory.dmp

            Filesize

            64KB

          • memory/1252-320-0x000001DAF24E0000-0x000001DAF2A08000-memory.dmp

            Filesize

            5.2MB

          • memory/1252-323-0x000001DAF1C70000-0x000001DAF1C7C000-memory.dmp

            Filesize

            48KB

          • memory/1252-359-0x000001DAECD60000-0x000001DAECD7E000-memory.dmp

            Filesize

            120KB

          • memory/1252-325-0x000001DAF2070000-0x000001DAF20E6000-memory.dmp

            Filesize

            472KB

          • memory/1252-281-0x000001DAEABE0000-0x000001DAEABEC000-memory.dmp

            Filesize

            48KB

          • memory/1252-279-0x000001DAEC4E0000-0x000001DAEC5EA000-memory.dmp

            Filesize

            1.0MB

          • memory/1252-267-0x000001DACCEB0000-0x000001DAD06E4000-memory.dmp

            Filesize

            56.2MB

          • memory/1336-120-0x0000000000400000-0x000000000259D000-memory.dmp

            Filesize

            33.6MB

          • memory/1360-300-0x00000000728C0000-0x000000007290C000-memory.dmp

            Filesize

            304KB

          • memory/1360-319-0x0000000007110000-0x0000000007121000-memory.dmp

            Filesize

            68KB

          • memory/1360-274-0x0000000005660000-0x00000000059B4000-memory.dmp

            Filesize

            3.3MB

          • memory/1360-284-0x0000000005C60000-0x0000000005CAC000-memory.dmp

            Filesize

            304KB

          • memory/1360-324-0x0000000007160000-0x0000000007174000-memory.dmp

            Filesize

            80KB

          • memory/1360-301-0x000000006EC20000-0x000000006EF74000-memory.dmp

            Filesize

            3.3MB

          • memory/1360-311-0x0000000006DE0000-0x0000000006E83000-memory.dmp

            Filesize

            652KB

          • memory/1364-497-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/1364-494-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/1500-445-0x0000000072780000-0x00000000727CC000-memory.dmp

            Filesize

            304KB

          • memory/1500-446-0x000000006ED90000-0x000000006F0E4000-memory.dmp

            Filesize

            3.3MB

          • memory/2200-377-0x00000000061B0000-0x0000000006504000-memory.dmp

            Filesize

            3.3MB

          • memory/2200-391-0x0000000072780000-0x00000000727CC000-memory.dmp

            Filesize

            304KB

          • memory/2200-404-0x0000000006750000-0x0000000006764000-memory.dmp

            Filesize

            80KB

          • memory/2200-403-0x0000000007EB0000-0x0000000007EC1000-memory.dmp

            Filesize

            68KB

          • memory/2200-402-0x0000000007BC0000-0x0000000007C63000-memory.dmp

            Filesize

            652KB

          • memory/2200-388-0x0000000006E90000-0x0000000006EDC000-memory.dmp

            Filesize

            304KB

          • memory/2200-392-0x000000006ED90000-0x000000006F0E4000-memory.dmp

            Filesize

            3.3MB

          • memory/2392-5-0x0000000000C90000-0x000000000112F000-memory.dmp

            Filesize

            4.6MB

          • memory/2392-17-0x0000000000C90000-0x000000000112F000-memory.dmp

            Filesize

            4.6MB

          • memory/2392-1-0x0000000076FA4000-0x0000000076FA6000-memory.dmp

            Filesize

            8KB

          • memory/2392-2-0x0000000000C91000-0x0000000000CBF000-memory.dmp

            Filesize

            184KB

          • memory/2392-3-0x0000000000C90000-0x000000000112F000-memory.dmp

            Filesize

            4.6MB

          • memory/2392-0-0x0000000000C90000-0x000000000112F000-memory.dmp

            Filesize

            4.6MB

          • memory/3140-506-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/3140-489-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/3140-501-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/3140-524-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/3140-520-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/3140-511-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/3140-479-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/3340-411-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/3340-333-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/3740-503-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/3740-513-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/4168-514-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/4168-516-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/4352-342-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/4352-355-0x00000000008F0000-0x0000000000D8F000-memory.dmp

            Filesize

            4.6MB

          • memory/4508-252-0x0000000000400000-0x00000000008AD000-memory.dmp

            Filesize

            4.7MB

          • memory/4508-265-0x0000000000400000-0x00000000008AD000-memory.dmp

            Filesize

            4.7MB

          • memory/4624-424-0x000000006ED90000-0x000000006F0E4000-memory.dmp

            Filesize

            3.3MB

          • memory/4624-423-0x0000000072780000-0x00000000727CC000-memory.dmp

            Filesize

            304KB

          • memory/4704-181-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4704-268-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/5004-372-0x0000000006CE0000-0x0000000006D83000-memory.dmp

            Filesize

            652KB

          • memory/5004-361-0x000000006E250000-0x000000006E29C000-memory.dmp

            Filesize

            304KB

          • memory/5004-375-0x00000000058A0000-0x00000000058B4000-memory.dmp

            Filesize

            80KB

          • memory/5004-374-0x0000000007000000-0x0000000007011000-memory.dmp

            Filesize

            68KB

          • memory/5004-344-0x00000000053E0000-0x0000000005734000-memory.dmp

            Filesize

            3.3MB

          • memory/5004-357-0x0000000005CD0000-0x0000000005D1C000-memory.dmp

            Filesize

            304KB

          • memory/5004-362-0x000000006EBA0000-0x000000006EEF4000-memory.dmp

            Filesize

            3.3MB

          • memory/5088-127-0x0000000061E00000-0x0000000061EF3000-memory.dmp

            Filesize

            972KB

          • memory/5088-251-0x0000000000400000-0x0000000000793000-memory.dmp

            Filesize

            3.6MB

          • memory/5088-329-0x0000000000400000-0x0000000000793000-memory.dmp

            Filesize

            3.6MB

          • memory/5088-358-0x0000000000400000-0x0000000000793000-memory.dmp

            Filesize

            3.6MB