Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/12/2024, 14:18

General

  • Target

    5f3cd8392c045a321ccf0ede6f38a4016a236f257d0a6ab897bf7f3e21868135.exe

  • Size

    302KB

  • MD5

    a9502d407c7a3e0c43ad669c27638793

  • SHA1

    bf0b7815c6dac82643a5bf7bd397a6aa58a9e803

  • SHA256

    5f3cd8392c045a321ccf0ede6f38a4016a236f257d0a6ab897bf7f3e21868135

  • SHA512

    0dbe8772ded05ba2c67ea7a7e9bc291b76d8b73dbab86a35fca5b1138be41c2ee7a54333fcd7bf58823ab3b5f1f6250b98b829ca0c367cafb2176350f5454d25

  • SSDEEP

    6144:mJNMAvoYumDMaLVA/HmH6iWmL/M+VK0lNSOBYJ0tYRVxGGPTY:HAvoYumDHVA/m9WmLlVK0lNQHPTY

Malware Config

Extracted

Family

redline

Botnet

fvcxcx

C2

185.81.68.147:1912

Extracted

Family

redline

Botnet

eewx

C2

185.81.68.147:1912

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Redline family
  • Blocklisted process makes network request 8 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 54 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Enumerates connected drives
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Users\Admin\AppData\Local\Temp\5f3cd8392c045a321ccf0ede6f38a4016a236f257d0a6ab897bf7f3e21868135.exe
      "C:\Users\Admin\AppData\Local\Temp\5f3cd8392c045a321ccf0ede6f38a4016a236f257d0a6ab897bf7f3e21868135.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4020
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2300
      • C:\Windows\system32\msiexec.exe
        "C:\Windows\system32\msiexec.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1664
      • C:\Windows\system32\audiodg.exe
        "C:\Windows\system32\audiodg.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
    • C:\Users\Admin\AppData\Local\Temp\B6FC.tmp.fcxcx.exe
      "C:\Users\Admin\AppData\Local\Temp\B6FC.tmp.fcxcx.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3352
    • C:\Users\Admin\AppData\Local\Temp\B96E.tmp.ctx.exe
      "C:\Users\Admin\AppData\Local\Temp\B96E.tmp.ctx.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3848
      • C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe
        "C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:264
        • C:\Users\Admin\AppData\Local\Temp\10000880101\ssg.exe
          "C:\Users\Admin\AppData\Local\Temp\10000880101\ssg.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4224
        • C:\Users\Admin\AppData\Local\Temp\10000880101\ssg.exe
          "C:\Users\Admin\AppData\Local\Temp\10000880101\ssg.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3060
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:4220
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main
            5⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:864
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              6⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Network Configuration Discovery: Wi-Fi Discovery
              PID:3452
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\437139445115_Desktop.zip' -CompressionLevel Optimal
              6⤵
              • Command and Scripting Interpreter: PowerShell
              PID:3164
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:3356
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main
            5⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:2500
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              6⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Network Configuration Discovery: Wi-Fi Discovery
              PID:2924
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\437139445115_Desktop.zip' -CompressionLevel Optimal
              6⤵
              • Command and Scripting Interpreter: PowerShell
              PID:5008
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\clip64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:5088
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\clip64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:4712
    • C:\Users\Admin\AppData\Local\Temp\BC6C.tmp.Build.exe
      "C:\Users\Admin\AppData\Local\Temp\BC6C.tmp.Build.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:432
      • C:\Users\Admin\AppData\Local\Temp\BC6C.tmp.Build.exe
        "C:\Users\Admin\AppData\Local\Temp\BC6C.tmp.Build.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4868
    • C:\Users\Admin\AppData\Local\Temp\C4F9.tmp.cc.exe
      "C:\Users\Admin\AppData\Local\Temp\C4F9.tmp.cc.exe"
      2⤵
      • Executes dropped EXE
      PID:4672
    • C:\Users\Admin\AppData\Local\Temp\CFC8.tmp.vvv.exe
      "C:\Users\Admin\AppData\Local\Temp\CFC8.tmp.vvv.exe"
      2⤵
      • Executes dropped EXE
      PID:2424
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3196
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:372
  • C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe
    C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe
    1⤵
    • Executes dropped EXE
    PID:668
  • C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe
    C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe
    1⤵
    • Executes dropped EXE
    PID:3676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    fe3aab3ae544a134b68e881b82b70169

    SHA1

    926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

    SHA256

    bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

    SHA512

    3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BC6C.tmp.Build.exe.log

    Filesize

    1KB

    MD5

    8ec831f3e3a3f77e4a7b9cd32b48384c

    SHA1

    d83f09fd87c5bd86e045873c231c14836e76a05c

    SHA256

    7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

    SHA512

    26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ssg.exe.log

    Filesize

    2KB

    MD5

    27f9957b6b7eda7e37370ada8492cd22

    SHA1

    e56c55f7b12991487a22049af44d8f2b5bb4863d

    SHA256

    dae2036e3b25cc633cf1041dc841232a0d7f8ab6500d0ad529b84d20412c8696

    SHA512

    6476406acc66ca8f4c81bb60e8788596e0b144db4352f35978237b19ff9591f37dd3a993c5bd77d76eadad32217a7bf5361420cc6f7f88c11992b26abeb072e1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    fd252dc779057e73982ed35b2bd253da

    SHA1

    6c3bf7b1dedf640fc90de7bdf3b456d1ffdb1e8c

    SHA256

    372e07ccd9023096ccdff5c060084973b7c21f41179ec95cef0514854fbf05bd

    SHA512

    e2cdd4c229e3a543409db13bb0b40b0e00f642edb2ad50a9108662937ea190ce1212c165dfafdbd0ad2a58b83836afc8e289bd52f3381deffb66caa3b38c68f0

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133788323125994351.txt

    Filesize

    75KB

    MD5

    7667503b601e77c8de094e85843183a1

    SHA1

    7f5bd6ac1fb9e4c860a60df918ddd96d3e9d2b3a

    SHA256

    06ad59a15551f1efcb3b9b0a3bedd2551d2573ceddcdfc6952d5127c87073052

    SHA512

    8242dcdf1160e81b5b86525a52a4bd5e1e5a249af9bc1331373795aa02c0cac7c686e518294be9afb2d06a59e5ff4bb3adfc96f341d1b25fac0123b49eb67dbc

  • C:\Users\Admin\AppData\Local\Temp\10000880101\ssg.exe

    Filesize

    300KB

    MD5

    7b6730ca4da283a35c41b831b9567f15

    SHA1

    92ef2fd33f713d72207209ec65f0de6eef395af5

    SHA256

    94d7d12ae53ce97f38d8890383c2317ce03d45bd6ecaf0e0b9165c7066cd300c

    SHA512

    ae2d10f9895e5f2af10b4fa87cdb7c930a531e910b55cd752b15dac77a432cc28eca6e5b32b95eeb21e238aaf2eb57e29474660cae93e734d0b6543c1d462ace

  • C:\Users\Admin\AppData\Local\Temp\437139445115

    Filesize

    84KB

    MD5

    611dcdf0e6dd8b840f07bb07afd0efe0

    SHA1

    de464bbd52dbb0bb1cc300d0532d2ae9db1e996a

    SHA256

    7258dae49f4e1ea41c8d80bb662a2095b11f176b450e1d866316b478e918d944

    SHA512

    188861ed160c0b308dbd84f859df626ca100bb882d32eb03eb13306430fa9d41ea0739f2d0f8d297a17cb7a993a587f7dddc15125ca278e5e61c8d2796d964b8

  • C:\Users\Admin\AppData\Local\Temp\437139445115_Desktop.zip

    Filesize

    56KB

    MD5

    c24f2db1975b62f8b554b8894c574d7e

    SHA1

    48bdaa442d38604261385eb34e9e804dec243491

    SHA256

    c3820858e6be8b29694dc9fa596fc0eff0ba90d2b31fc1a9e25697d85b2b898f

    SHA512

    543b7afa56aeb85f07329880628d9dacbe409c62bdb507e8011854bb2bbd21e4d1e0cea3067033b44473952a24fc304ff9a6b947d04f694401106a0a9c22b678

  • C:\Users\Admin\AppData\Local\Temp\B6FC.tmp.fcxcx.exe

    Filesize

    300KB

    MD5

    f0aaf1b673a9316c4b899ccc4e12d33e

    SHA1

    294b9c038264d052b3c1c6c80e8f1b109590cf36

    SHA256

    fcc616ecbe31fadf9c30a9baedde66d2ce7ff10c369979fe9c4f8c5f1bff3fc2

    SHA512

    97d149658e9e7a576dfb095d5f6d8956cb185d35f07dd8e769b3b957f92260b5de727eb2685522923d15cd70c16c596aa6354452ac851b985ab44407734b6f21

  • C:\Users\Admin\AppData\Local\Temp\B96E.tmp.ctx.exe

    Filesize

    431KB

    MD5

    4962575a2378d5c72e7a836ea766e2ad

    SHA1

    549964178b12017622d3cbdda6dbfdef0904e7e2

    SHA256

    eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676

    SHA512

    911a59f7a6785dd09a57dcd6d977b8abd5e160bd613786e871a1e92377c9e6f3b85fe3037431754bbdb1212e153776efca5fadac1de6b2ad474253da176e8e53

  • C:\Users\Admin\AppData\Local\Temp\BC6C.tmp.Build.exe

    Filesize

    701KB

    MD5

    5890798f97f9144206499433a5db3011

    SHA1

    1c9c488123a81bf8d2216ac57c089e056f899433

    SHA256

    69be5428a0e939a5bf4453b34aad1a86791ab75411b6a339d727197f82bc8411

    SHA512

    964f340060a67abed11d06ac40cb8cb2577f985e8815cc12f306e37a716792ae8edac02645d0cddeea5d81f72ef402363c909b6f510eb2a37c76f1cf56caada9

  • C:\Users\Admin\AppData\Local\Temp\C4F9.tmp.cc.exe

    Filesize

    2.9MB

    MD5

    99f996079094ad472d9720b2abd57291

    SHA1

    1ff6e7cafeaf71a5debbc0bb4db9118a9d9de945

    SHA256

    833fd615ec3e7576960a872fff5a4459b0c756338068f87341655849d1f7e1af

    SHA512

    6a6d4034b37f9bb3b4a0b455de7485b990bf3bd3042316d7261bd2973dbe522490654045d579a6df58a4b834e04c377897eea41798e6b1f5fdbc45a2bb0d127f

  • C:\Users\Admin\AppData\Local\Temp\C75B.tmp.update.exe

    Filesize

    302KB

    MD5

    02701f8d91714c583decdd43635ff407

    SHA1

    855b8eeffcd217735d1ba6395bbb6647140ecca4

    SHA256

    41ba86941c72b5e160359e4b851251350958ca56e1d5aa897f0917eb51c5bd2e

    SHA512

    42930c89943297413933857c8ceac9eec924ce3093fd78da8f75930abdda540407781caf2fe32d4e7019cbd20171485a9d6389b4c03b0600edbaac597577c599

  • C:\Users\Admin\AppData\Local\Temp\_Files_\CompressConnect.docx

    Filesize

    19KB

    MD5

    c635cbeb2db82d693a49c383693814cb

    SHA1

    fba468de005cbbb84b156700b8e419a335b28b32

    SHA256

    ad99a631a3c42857e09bc1cdb14c8cc094fd9d3f939f4e61e6c59e55cc3a29e0

    SHA512

    256c11908b8348c1bedb854c9e90f269dda2ade568e757057eebbde7091340a44e1ca1b19bdcc95ac9132589ee6e077f9c8210e3ec5fafb3313701db220be06d

  • C:\Users\Admin\AppData\Local\Temp\_Files_\FormatInitialize.xlsx

    Filesize

    13KB

    MD5

    b623d2527e865281cd42c2b7ed41ecca

    SHA1

    27a18ebd653b6a987442977a8a52fa91e353fcab

    SHA256

    2977f418449e8928ed6c6f11ac9af07155d24179eacc1a8335c0dc96f7742344

    SHA512

    4f498f9ada930998f6c3f3ad51005582152412134e7cf6cc98a51e364fe862d273f673bb743e58b7de9a32e84bb7b66a409a733bc7e875f738a6356c4c9c44b5

  • C:\Users\Admin\AppData\Local\Temp\_Files_\SearchTest.xlsx

    Filesize

    11KB

    MD5

    e73257820a3f605cbb9809159277a71c

    SHA1

    664aed4cdca597eb71560ed298831e7acb3a73eb

    SHA256

    988158331c06be339e5e8e8531bf023429461f0fb8d54cbf37143fc4b568dcd8

    SHA512

    278715041e7b575788e44b7cb12de93b743ea7c5d1ed56800a9892afdb9b5f7ee757781eb04bf603a29d5fd38970ec2ee6a7a9fed7920cd4f98959340f7d4955

  • C:\Users\Admin\AppData\Local\Temp\_Files_\SubmitBlock.xlsx

    Filesize

    9KB

    MD5

    882c64e01db011f22d5b9fd09201b5c6

    SHA1

    70c6599fdee1f2e1b8a22e0b65d22123fa2ab15b

    SHA256

    f2af742d33e4f4f1c955efe26d7af77a3824faa4b9d22af3f8c572fdd26c5182

    SHA512

    d83f5422f3e2c9eaab1ce216fda8335ddfd585f8d3eadd2ab8591f73a7d57b2572cdecbd381f61341ed86e1e378dd5be71ae7c7f21bbae283e7b8d7c382b1052

  • C:\Users\Admin\AppData\Local\Temp\_Files_\UnprotectUndo.docx

    Filesize

    15KB

    MD5

    035e7ad4afdcbdf26f6c91989f8281c1

    SHA1

    6224952e5f17c1699fea269f8ffc6c112147359d

    SHA256

    aa0927ef2e8de727ab4245881f6cc8b9ece2443ef9528fbbb742c687c78ee91c

    SHA512

    28f664c25f7929a3ba4e03fd7bbd290d7a914e339c44660f16d3df5054192a3f281ac6df96fafa1873ad3c907e651ece58f24109e28393087223a65ed4b6e071

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rfm1iuxu.c3s.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\43266f2abbf198\clip64.dll

    Filesize

    124KB

    MD5

    c2f3fbbbe6d5f48a71b6b168b1485866

    SHA1

    1cd56cfc2dc07880b65bd8a1f5b7147633f5d553

    SHA256

    c7ed512058bc924045144daa16701da10f244ac12a5ea2de901e59dce6470839

    SHA512

    e211f18c2850987529336e0d20aa894533c1f6a8ae6745e320fd394a9481d3a956c719ac29627afd783e36e5429c0325b98e60aee2a830e75323c276c72f845a

  • C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll

    Filesize

    1.2MB

    MD5

    c6aabb27450f1a9939a417e86bf53217

    SHA1

    b8ef3bb7575139fd6997379415d7119e452b5fc4

    SHA256

    b91a3743c7399aee454491862e015ef6fc668a25d1aa2816e065a86a03f6be35

    SHA512

    e5fe205cb0f419e0a320488d6fa4a70e5ed58f25b570b41412ebd4f32bbe504ff75acb20bfea22513102630cf653a41e5090051f20af2ed3aadb53ce16a05944

  • C:\Users\Admin\AppData\Roaming\CFBDACBC0A101291311131\CFBDACBC0A101291311131.exe

    Filesize

    302KB

    MD5

    a9502d407c7a3e0c43ad669c27638793

    SHA1

    bf0b7815c6dac82643a5bf7bd397a6aa58a9e803

    SHA256

    5f3cd8392c045a321ccf0ede6f38a4016a236f257d0a6ab897bf7f3e21868135

    SHA512

    0dbe8772ded05ba2c67ea7a7e9bc291b76d8b73dbab86a35fca5b1138be41c2ee7a54333fcd7bf58823ab3b5f1f6250b98b829ca0c367cafb2176350f5454d25

  • memory/372-148-0x000001C161FB0000-0x000001C161FD0000-memory.dmp

    Filesize

    128KB

  • memory/372-128-0x000001C1619A0000-0x000001C1619C0000-memory.dmp

    Filesize

    128KB

  • memory/372-117-0x000001C1619E0000-0x000001C161A00000-memory.dmp

    Filesize

    128KB

  • memory/432-110-0x00000000030D0000-0x00000000030D1000-memory.dmp

    Filesize

    4KB

  • memory/1368-37-0x00007FF688200000-0x00007FF688250000-memory.dmp

    Filesize

    320KB

  • memory/1664-25-0x00007FF604B40000-0x00007FF604B90000-memory.dmp

    Filesize

    320KB

  • memory/1908-80-0x0000000000B00000-0x0000000000BB6000-memory.dmp

    Filesize

    728KB

  • memory/1908-91-0x0000000006DF0000-0x0000000006E8C000-memory.dmp

    Filesize

    624KB

  • memory/2300-283-0x00007FF7F9480000-0x00007FF7F94D0000-memory.dmp

    Filesize

    320KB

  • memory/2300-11-0x00007FF7F9480000-0x00007FF7F94D0000-memory.dmp

    Filesize

    320KB

  • memory/2300-2-0x00007FF7F9480000-0x00007FF7F94D0000-memory.dmp

    Filesize

    320KB

  • memory/2424-242-0x0000000000AE0000-0x0000000001433000-memory.dmp

    Filesize

    9.3MB

  • memory/2424-274-0x0000000000AE0000-0x0000000001433000-memory.dmp

    Filesize

    9.3MB

  • memory/3164-373-0x0000020929870000-0x000002092987A000-memory.dmp

    Filesize

    40KB

  • memory/3164-372-0x0000020929890000-0x00000209298A2000-memory.dmp

    Filesize

    72KB

  • memory/3164-363-0x00000209294D0000-0x00000209294F2000-memory.dmp

    Filesize

    136KB

  • memory/3352-66-0x0000000005720000-0x000000000575C000-memory.dmp

    Filesize

    240KB

  • memory/3352-51-0x0000000005920000-0x0000000005EC4000-memory.dmp

    Filesize

    5.6MB

  • memory/3352-286-0x0000000007120000-0x0000000007170000-memory.dmp

    Filesize

    320KB

  • memory/3352-281-0x0000000007180000-0x0000000007342000-memory.dmp

    Filesize

    1.8MB

  • memory/3352-282-0x0000000007880000-0x0000000007DAC000-memory.dmp

    Filesize

    5.2MB

  • memory/3352-65-0x00000000056C0000-0x00000000056D2000-memory.dmp

    Filesize

    72KB

  • memory/3352-63-0x00000000057D0000-0x00000000058DA000-memory.dmp

    Filesize

    1.0MB

  • memory/3352-62-0x00000000064F0000-0x0000000006B08000-memory.dmp

    Filesize

    6.1MB

  • memory/3352-56-0x00000000054C0000-0x00000000054CA000-memory.dmp

    Filesize

    40KB

  • memory/3352-67-0x0000000005760000-0x00000000057AC000-memory.dmp

    Filesize

    304KB

  • memory/3352-272-0x00000000060B0000-0x0000000006116000-memory.dmp

    Filesize

    408KB

  • memory/3352-50-0x00000000009B0000-0x0000000000A02000-memory.dmp

    Filesize

    328KB

  • memory/3352-52-0x0000000005410000-0x00000000054A2000-memory.dmp

    Filesize

    584KB

  • memory/3424-23-0x0000000002DE0000-0x0000000002E33000-memory.dmp

    Filesize

    332KB

  • memory/3424-46-0x00007FFCDC920000-0x00007FFCDC921000-memory.dmp

    Filesize

    4KB

  • memory/3424-240-0x0000000002DE0000-0x0000000002E33000-memory.dmp

    Filesize

    332KB

  • memory/3424-36-0x0000000002DE0000-0x0000000002E33000-memory.dmp

    Filesize

    332KB

  • memory/3424-22-0x0000000002BE0000-0x0000000002C26000-memory.dmp

    Filesize

    280KB

  • memory/4224-310-0x0000000000850000-0x00000000008A2000-memory.dmp

    Filesize

    328KB

  • memory/4672-109-0x0000000000920000-0x0000000001273000-memory.dmp

    Filesize

    9.3MB

  • memory/4672-101-0x0000000000920000-0x0000000001273000-memory.dmp

    Filesize

    9.3MB

  • memory/4868-251-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB