Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 16:30

General

  • Target

    141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe

  • Size

    1.8MB

  • MD5

    46446c63c5d32d2157a4a6977b0e30c2

  • SHA1

    cc7df76a3b496b7f37dc7f97dd486e42b0a888af

  • SHA256

    141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9

  • SHA512

    58e2f3ede95800ef5938585c9928f7aedccd895b606ac2c1a7b020511899ede811fa31d5080e39ccce03bf2a33961ffef307a27cd9f0fd25b08d77f0d325a079

  • SSDEEP

    24576:gbog96Qggz2b+gtbrUzh+m2FFGioyoY9MHDow15R3Pxy62cTcZsC+RxiEOzOIJfN:gbpex30wFFfoBMAPM6aJT27O0B5dJi

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Extracted

Family

amadey

Version

4.21

Botnet

49e482

C2

http://147.45.47.70

Attributes
  • install_dir

    1b29d73536

  • install_file

    axplont.exe

  • strings_key

    4d31dd1a190d9879c21fac6d87dc0043

  • url_paths

    /tr8nomy/index.php

rc4.plain

Extracted

Family

redline

Botnet

@LOGSCLOUDYT_BOT

C2

185.172.128.33:8970

Extracted

Family

redline

Botnet

1

C2

185.215.113.67:40960

Extracted

Family

stealc

Botnet

zzvv

C2

http://23.88.106.134

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

risepro

C2

147.45.47.126:58709

Extracted

Family

lumma

C2

https://roomabolishsnifftwk.shop/api

https://museumtespaceorsp.shop/api

https://buttockdecarderwiso.shop/api

https://averageaattractiionsl.shop/api

https://femininiespywageg.shop/api

https://detailbaconroollyws.shop/api

https://employhabragaomlsp.shop/api

https://stalfbaclcalorieeis.shop/api

https://horsedwollfedrwos.shop/api

https://civilianurinedtsraov.shop/api

https://patternapplauderw.shop/api

https://understanndtytonyguw.shop/api

https://considerrycurrentyws.shop/api

https://messtimetabledkolvk.shop/api

https://deprivedrinkyfaiir.shop/api

https://relaxtionflouwerwi.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Stealc

    Stealc is an infostealer written in C++.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe
    "C:\Users\Admin\AppData\Local\Temp\141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4844
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
          PID:3408
        • C:\Users\Admin\1000004002\426ae2511d.exe
          "C:\Users\Admin\1000004002\426ae2511d.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4820
          • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
            "C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4744
            • C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe
              "C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2008
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                6⤵
                  PID:1408
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  6⤵
                  • Checks computer location settings
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4344
                  • C:\Users\Admin\AppData\Roaming\configurationValue\One.exe
                    "C:\Users\Admin\AppData\Roaming\configurationValue\One.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:952
                  • C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe
                    "C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe"
                    7⤵
                    • Executes dropped EXE
                    • Modifies system certificate store
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4512
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                    7⤵
                      PID:5588
                      • C:\Windows\SysWOW64\choice.exe
                        choice /C Y /N /D Y /T 3
                        8⤵
                          PID:5864
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 288
                      6⤵
                      • Program crash
                      PID:5628
                  • C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:2608
                  • C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:5420
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      6⤵
                        PID:5528
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        6⤵
                          PID:5536
                      • C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:5744
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          6⤵
                            PID:5784
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            6⤵
                              PID:5796
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 288
                              6⤵
                              • Program crash
                              PID:5320
                          • C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:5916
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              6⤵
                              • Checks computer location settings
                              • Checks processor information in registry
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5956
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & del "C:\ProgramData\*.dll"" & exit
                                7⤵
                                  PID:432
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 5
                                    8⤵
                                    • Delays execution with timeout.exe
                                    PID:5428
                            • C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe"
                              5⤵
                              • UAC bypass
                              • Windows security bypass
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Windows security modification
                              • Checks whether UAC is enabled
                              • Suspicious use of SetThreadContext
                              • Suspicious use of AdjustPrivilegeToken
                              • System policy modification
                              PID:4044
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe" -Force
                                6⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5708
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                6⤵
                                  PID:5700
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5700 -s 152
                                    7⤵
                                    • Program crash
                                    PID:5816
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                  6⤵
                                    PID:5736
                            • C:\Users\Admin\AppData\Local\Temp\1000005001\f34da4e680.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000005001\f34da4e680.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3876
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4172,i,5047420736443372512,9747851268033796534,262144 --variations-seed-version --mojo-platform-channel-handle=4420 /prefetch:8
                          1⤵
                            PID:4332
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2008 -ip 2008
                            1⤵
                              PID:5604
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5744 -ip 5744
                              1⤵
                                PID:5344
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5700 -ip 5700
                                1⤵
                                  PID:5612
                                • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                  C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4592
                                • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                                  C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5436
                                • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                                  C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5144
                                • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                  C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5124

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\1000004002\426ae2511d.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  346c787bf4f6e58ccd256fc3706e575f

                                  SHA1

                                  9a17a474339d4ca391a8770ac1e9dbca1bf20be3

                                  SHA256

                                  7378549f353a1b4c1c4592fa9752498d7b176d9da6f904d0b06aeeebc2b4a6ab

                                  SHA512

                                  ea0d61140cd3abcb497807c30da69e0db0803e2c481f7f45268fb08445062b78c63c26fb4bf4708e29e0f97aa8a9228317946a2db0fa6b5dbd372835c379b5a9

                                • C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe

                                  Filesize

                                  2.1MB

                                  MD5

                                  208bd37e8ead92ed1b933239fb3c7079

                                  SHA1

                                  941191eed14fce000cfedbae9acfcb8761eb3492

                                  SHA256

                                  e1fd277ffc74d67554adce94366e6fa5ebc81f8c4999634bcc3396164ba38494

                                  SHA512

                                  a9c3c32573a16b7ca71a12af6e8c8e88502b66bae2465a82dd921fbc6e0c833b9b1c2d436963df189dd9d68568e1be9128826a2e59f1d5fe066b637d2d866715

                                • C:\Users\Admin\AppData\Local\Temp\1000005001\f34da4e680.exe

                                  Filesize

                                  2.3MB

                                  MD5

                                  a3726bf86b193f1b87325ac61f66ce02

                                  SHA1

                                  af3311c8c3e2f5b3c65371ffa71a3e40f00540bd

                                  SHA256

                                  4b5fe6f9527f032aea75af730100d7eafaaadffd5132a5970e3f7596f49da11e

                                  SHA512

                                  91f5864253d0b493bcf4d8d7c51f05d955a515f0d6efa498231a7ff8c2d244aa5911f42f4a3f29844629da34c2702654e1eda9ae3ead2b50006b50b2408cf77c

                                • C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe

                                  Filesize

                                  304KB

                                  MD5

                                  84bf36993bdd61d216e83fe391fcc7fd

                                  SHA1

                                  e023212e847a54328aaea05fbe41eb4828855ce6

                                  SHA256

                                  8e6d8b5a004c8f21bee1bbe4213c6d78cf80e439b38f587e963e9bb4569aaffa

                                  SHA512

                                  bb3241949618ad2d39057e085e150f43b4d41d74efc4658d9c27f8c0ec80420191517a2c0b6b7e225c4e50e02cd031cdfd178e05b9a869847a3c27b210d09caf

                                • C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe

                                  Filesize

                                  518KB

                                  MD5

                                  c4ffab152141150528716daa608d5b92

                                  SHA1

                                  a48d3aecc0e986b6c4369b9d4cfffb08b53aed89

                                  SHA256

                                  c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475

                                  SHA512

                                  a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9

                                • C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe

                                  Filesize

                                  1.2MB

                                  MD5

                                  0b7e08a8268a6d413a322ff62d389bf9

                                  SHA1

                                  e04b849cc01779fe256744ad31562aca833a82c1

                                  SHA256

                                  d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65

                                  SHA512

                                  3d226673e30bbbc27e0a5a6c64bf81eca475c697486b20141df7975bef97901d4865b88f41937f5e3dd00b437f24f91493f80cb69aa366b7a49cd17b26197ba4

                                • C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe

                                  Filesize

                                  778KB

                                  MD5

                                  05b11e7b711b4aaa512029ffcb529b5a

                                  SHA1

                                  a8074cf8a13f21617632951e008cdfdace73bb83

                                  SHA256

                                  2aab2ca39749b21877d1c52526009f9f5d251d934205e9f671a9e84cecd55afa

                                  SHA512

                                  dde7b561ffb3b9fe71827be9313cd3b83900c3ce76b053d028e84223fba1b06035437b3860a74de7dc2f5d40f0b90bd7d60139701d752c803eb08f362a5d57ff

                                • C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe

                                  Filesize

                                  579KB

                                  MD5

                                  a991da123f34074f2ee8ea0d798990f9

                                  SHA1

                                  3988195503348626e8f9185747a216c8e7839130

                                  SHA256

                                  fd42e618223f510d694c5fb2f8ecbc1a88cabf003bcf20da6227da30a1352a0f

                                  SHA512

                                  1f958cacb820833ea8b5ac2d9ca7f596625e688f8f6b6e3ab6f27aa3b25b8c9e5b57e1eed532a8d2519da6c1b41492eb8ac930fc25eaf2be2f344c2f32e81a49

                                • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  46446c63c5d32d2157a4a6977b0e30c2

                                  SHA1

                                  cc7df76a3b496b7f37dc7f97dd486e42b0a888af

                                  SHA256

                                  141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9

                                  SHA512

                                  58e2f3ede95800ef5938585c9928f7aedccd895b606ac2c1a7b020511899ede811fa31d5080e39ccce03bf2a33961ffef307a27cd9f0fd25b08d77f0d325a079

                                • C:\Users\Admin\AppData\Local\Temp\Tmp3B7D.tmp

                                  Filesize

                                  2KB

                                  MD5

                                  1420d30f964eac2c85b2ccfe968eebce

                                  SHA1

                                  bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                  SHA256

                                  f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                  SHA512

                                  6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vdojqmty.wnw.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Local\Temp\tmp6AC0.tmp

                                  Filesize

                                  56KB

                                  MD5

                                  5be7f6f434724dfcc01e8b2b0e753bbe

                                  SHA1

                                  ef1078290de6b5700ff6e804a79beba16c99ba3e

                                  SHA256

                                  4064b300ca1a67a3086e1adb18001c0017384b8f84ff4c0e693858889cef2196

                                  SHA512

                                  3b470c3ad5be3dd7721548021a818034584bbd88237b1710ce52ac67e04126fff4592c02f5868ebda72f662ec8c5f7fc4d0a458f49fe5eb47e024a5c50935ee2

                                • C:\Users\Admin\AppData\Local\Temp\tmp6B11.tmp

                                  Filesize

                                  228KB

                                  MD5

                                  b12d25b13f81e881f7afd9a5799c6413

                                  SHA1

                                  9ec508839d9b58a98b379978e5b9c6338e945247

                                  SHA256

                                  a6aa57d304f15562b5a198a5731d5031bb2c3d2da15c07a1947729570a5c9b3b

                                  SHA512

                                  6ba66222405edbb404edd653a59b4dc48827cb3ea527872d10a2aeb2aceb82060464ea4187a61cb86a11b19392ccec34fc433f0c4686e3a36764523b21e9aad5

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1181767204-2009306918-3718769404-1000\76b53b3ec448f7ccdda2063b15d2bfc3_d2547453-e731-4fdf-8f92-95f955a44aca

                                  Filesize

                                  2KB

                                  MD5

                                  e6bd51fa0c8c89af24e415d86f840ba5

                                  SHA1

                                  7c64302b521824466a3195704513223a27d006b6

                                  SHA256

                                  7c9361d56346f9542e44788df882c6cf51e408b95809fd6c3addb74318059e57

                                  SHA512

                                  cab1f02f6c7c26876f31c5b0e2695f179752dfd0430cc337582b820d5114f4a200541c9b0b29a1a53cc2dff12849332c78b1509b1c8121cffc11ea6d074ffcfd

                                • C:\Users\Admin\AppData\Roaming\configurationValue\One.exe

                                  Filesize

                                  408KB

                                  MD5

                                  816df4ac8c796b73a28159a0b17369b6

                                  SHA1

                                  db8bbb6f73fab9875de4aaa489c03665d2611558

                                  SHA256

                                  7843255bc50ddda8c651f51347313daf07e53a745d39cc61d708c6e7d79b3647

                                  SHA512

                                  7dd155346acf611ffaf6399408f6409146fd724d7d382c7e143e3921e3d109563c314a0367a378b0965e427470f36bf6d70e1586d695a266f34aebd789965285

                                • C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe

                                  Filesize

                                  304KB

                                  MD5

                                  15a7cae61788e4718d3c33abb7be6436

                                  SHA1

                                  62dac3a5d50c93c51f2ab4a5ebf78837dc7d3a9f

                                  SHA256

                                  bed71147aa297d95d2e2c67352fc06f7f631af3b7871ea148638ae66fc41e200

                                  SHA512

                                  5b3e3028523e95452be169bdfb966cd03ea5dbe34b7b98cf7482ca91b8317a0f4de224751d5a530ec23e72cbd6cc8e414d2d3726fefee9c30feab69dc348fa45

                                • C:\Users\Public\Desktop\Google Chrome.lnk

                                  Filesize

                                  2KB

                                  MD5

                                  e47dece3a32a672b8452c28900afd2ff

                                  SHA1

                                  18842f1b4ebb4577718917c0571876609bf9957b

                                  SHA256

                                  5dc83497862b4e9ec12de9f57e59bdf890bf3899cd94a87b87fefa45f6227d27

                                  SHA512

                                  72b7e3ca45f11b827b9bd509843100173d5d9775b9a82c3b517db0a98418fba6ca9389b65187b2c22a983bc32492159b4498d41d5c7858069324877e7c1cb8f1

                                • C:\Users\Public\Desktop\Microsoft Edge.lnk

                                  Filesize

                                  2KB

                                  MD5

                                  7275ec0a9703dd4d50333311e3c849f1

                                  SHA1

                                  4a307bc489f05fe6c195f5216b48478301209065

                                  SHA256

                                  682f3a49a5b307faa05e34eea661a3af4a535b4fd89325d7c5daf51316c5c262

                                  SHA512

                                  e172c600a29a8f6737654bd7c0fc562cd5c395a55adfc7beace9ab31feaf9d647f41906d09244b139aae1765a031f0bcf6a57c2ff2b847b5437a651231e56132

                                • memory/952-269-0x000000001B3B0000-0x000000001B3EC000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/952-171-0x0000000000480000-0x00000000004EC000-memory.dmp

                                  Filesize

                                  432KB

                                • memory/952-274-0x000000001B300000-0x000000001B31E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/952-273-0x000000001C280000-0x000000001C2F6000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/952-268-0x000000001B350000-0x000000001B362000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/952-267-0x000000001E080000-0x000000001E18A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/952-288-0x000000001EA90000-0x000000001EC52000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/952-289-0x000000001F190000-0x000000001F6B8000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/2008-91-0x0000000000F50000-0x0000000000F51000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2008-89-0x0000000000F50000-0x0000000000F51000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2608-132-0x0000000005D70000-0x0000000006314000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/2608-134-0x0000000005860000-0x00000000058F2000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/2608-131-0x0000000000F00000-0x0000000000F52000-memory.dmp

                                  Filesize

                                  328KB

                                • memory/3876-347-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-376-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-337-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-326-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-359-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-356-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-59-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-382-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-379-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-331-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-242-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-353-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-373-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-350-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/3876-362-0x0000000000560000-0x0000000000B5C000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/4044-266-0x000002045EB00000-0x000002045EB3C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/4044-276-0x0000020478F90000-0x0000020478FEC000-memory.dmp

                                  Filesize

                                  368KB

                                • memory/4044-275-0x000002045EEE0000-0x000002045EEE6000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/4344-90-0x0000000000400000-0x0000000000592000-memory.dmp

                                  Filesize

                                  1.6MB

                                • memory/4512-253-0x0000000006FD0000-0x0000000007036000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/4512-183-0x0000000006E90000-0x0000000006EDC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/4512-167-0x00000000061D0000-0x0000000006246000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/4512-172-0x00000000069B0000-0x00000000069CE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/4512-175-0x0000000007230000-0x0000000007848000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/4512-181-0x0000000006CC0000-0x0000000006CD2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/4512-135-0x0000000005580000-0x000000000558A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/4512-133-0x0000000000C50000-0x0000000000CA2000-memory.dmp

                                  Filesize

                                  328KB

                                • memory/4512-272-0x0000000008E30000-0x000000000935C000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/4512-271-0x0000000008730000-0x00000000088F2000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4512-182-0x0000000006D20000-0x0000000006D5C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/4512-270-0x0000000007AA0000-0x0000000007AF0000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/4512-180-0x0000000006D80000-0x0000000006E8A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/4592-345-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4592-342-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4712-2-0x0000000000F11000-0x0000000000F3F000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/4712-5-0x0000000000F10000-0x00000000013BB000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4712-1-0x0000000077834000-0x0000000077836000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/4712-3-0x0000000000F10000-0x00000000013BB000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4712-0-0x0000000000F10000-0x00000000013BB000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4712-17-0x0000000000F10000-0x00000000013BB000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4744-351-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-348-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-383-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-243-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-380-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-377-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-374-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-327-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-365-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-360-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-71-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-332-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-357-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-336-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-354-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4744-340-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4820-39-0x0000000001000000-0x00000000014C2000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4820-70-0x0000000001000000-0x00000000014C2000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4844-361-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-355-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-346-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-375-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-241-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-349-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-19-0x0000000000191000-0x00000000001BF000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/4844-372-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-352-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-330-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-73-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-378-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-18-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-335-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-358-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-381-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-244-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-21-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4844-20-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/5124-371-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/5124-367-0x0000000000190000-0x000000000063B000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/5144-366-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5144-370-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5420-201-0x00000000002C0000-0x00000000002C1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5436-343-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5436-341-0x00000000008B0000-0x0000000000D72000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5536-200-0x0000000000400000-0x0000000000455000-memory.dmp

                                  Filesize

                                  340KB

                                • memory/5536-202-0x0000000000400000-0x0000000000455000-memory.dmp

                                  Filesize

                                  340KB

                                • memory/5700-277-0x0000000000400000-0x0000000000408000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/5708-287-0x000002709C7B0000-0x000002709C7D2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/5744-220-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5796-219-0x0000000000400000-0x0000000000459000-memory.dmp

                                  Filesize

                                  356KB

                                • memory/5796-221-0x0000000000400000-0x0000000000459000-memory.dmp

                                  Filesize

                                  356KB

                                • memory/5916-239-0x00000000012A0000-0x00000000012A1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5956-240-0x0000000000400000-0x000000000063B000-memory.dmp

                                  Filesize

                                  2.2MB

                                • memory/5956-238-0x0000000000400000-0x000000000063B000-memory.dmp

                                  Filesize

                                  2.2MB