Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 04:08
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20220414-en
General
-
Target
1.exe
-
Size
360KB
-
MD5
b441579edee209535eca6408d91a9be1
-
SHA1
460c5cb8d760dfc21d01184a3bf2de63a4d0d802
-
SHA256
3927d5f26c91ddb637336063ef3a8c744ff1a65bdff6a92b2632e3f2fc2f75e3
-
SHA512
32214c73cf475f342edfbe3aab68ad09afe4db8885d4a9d56e4e8a7ab2492225916c6a890e322e58d5a7314537d2f919bf08492e23a98c7368fc1f41cf17f1a7
Malware Config
Extracted
smokeloader
2020
http://hydroxychl0roquine.xyz/
https://hydroxychl0roquine.xyz/
Extracted
redline
@ChelnEvreya
46.8.220.88:65531
-
auth_value
d24bb0cd8742d0e0fba1abfab06e4005
Extracted
redline
install
193.150.103.38:40169
-
auth_value
7b121606198c8456e17d49ab8c2d0e42
Extracted
arkei
Default
http://92.119.160.244/Biasdmxit.php
Extracted
redline
test run
2.58.56.219:39064
-
auth_value
8d3e3da14c8032e314235e1d040823c7
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\qrbwrwqwx.exe\"," 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3668-148-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/3352-300-0x0000000000400000-0x0000000000424000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA Environment Variable M4
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA Environment Variable M4
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE 23 IoCs
Processes:
79A4.exe7DDC.exe835B.exe8CA3.exe90DA.exe9540.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exehire.exefl.exeservices32.exe8CA3.exesihost32.exe9540.exepid process 3680 79A4.exe 2904 7DDC.exe 5084 835B.exe 1896 8CA3.exe 2564 90DA.exe 1692 9540.exe 2024 7z.exe 2832 7z.exe 3200 7z.exe 2096 7z.exe 2268 7z.exe 4288 7z.exe 2816 7z.exe 2508 7z.exe 3512 7z.exe 3192 7z.exe 4428 7z.exe 2764 hire.exe 4628 fl.exe 2260 services32.exe 3756 8CA3.exe 2380 sihost32.exe 3352 9540.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\fl.exe vmprotect C:\Users\Admin\AppData\Local\Temp\fl.exe vmprotect behavioral2/memory/4628-261-0x0000000000750000-0x0000000000F6A000-memory.dmp vmprotect C:\Windows\System32\services32.exe vmprotect C:\Windows\system32\services32.exe vmprotect -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
90DA.exeservices32.exe8CA3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 90DA.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation services32.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 8CA3.exe -
Loads dropped DLL 13 IoCs
Processes:
7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe8CA3.exepid process 2024 7z.exe 2832 7z.exe 3200 7z.exe 2096 7z.exe 2268 7z.exe 4288 7z.exe 2816 7z.exe 2508 7z.exe 3512 7z.exe 3192 7z.exe 4428 7z.exe 3756 8CA3.exe 3756 8CA3.exe -
Obfuscated with Agile.Net obfuscator 4 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\8CA3.exe agile_net C:\Users\Admin\AppData\Local\Temp\8CA3.exe agile_net behavioral2/memory/1896-179-0x00000000005C0000-0x00000000006A8000-memory.dmp agile_net C:\Users\Admin\AppData\Local\Temp\8CA3.exe agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 3 IoCs
Processes:
fl.exeservices32.exedescription ioc process File created C:\Windows\system32\services32.exe fl.exe File opened for modification C:\Windows\system32\services32.exe fl.exe File created C:\Windows\system32\Microsoft\Telemetry\sihost32.exe services32.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
1.exe79A4.exe7DDC.exe835B.exe8CA3.exe9540.exedescription pid process target process PID 4628 set thread context of 3876 4628 1.exe 1.exe PID 3680 set thread context of 3668 3680 79A4.exe AppLaunch.exe PID 2904 set thread context of 4896 2904 7DDC.exe AppLaunch.exe PID 5084 set thread context of 2236 5084 835B.exe AppLaunch.exe PID 1896 set thread context of 3756 1896 8CA3.exe 8CA3.exe PID 1692 set thread context of 3352 1692 9540.exe 9540.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
8CA3.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8CA3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8CA3.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2248 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1.exe1.exepid process 4628 1.exe 4628 1.exe 3876 1.exe 3876 1.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3032 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
1.exepid process 3876 1.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
1.exe9540.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exedescription pid process Token: SeDebugPrivilege 4628 1.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeDebugPrivilege 1692 9540.exe Token: SeRestorePrivilege 2024 7z.exe Token: 35 2024 7z.exe Token: SeSecurityPrivilege 2024 7z.exe Token: SeSecurityPrivilege 2024 7z.exe Token: SeRestorePrivilege 2832 7z.exe Token: 35 2832 7z.exe Token: SeSecurityPrivilege 2832 7z.exe Token: SeSecurityPrivilege 2832 7z.exe Token: SeRestorePrivilege 3200 7z.exe Token: 35 3200 7z.exe Token: SeSecurityPrivilege 3200 7z.exe Token: SeSecurityPrivilege 3200 7z.exe Token: SeRestorePrivilege 2096 7z.exe Token: 35 2096 7z.exe Token: SeSecurityPrivilege 2096 7z.exe Token: SeSecurityPrivilege 2096 7z.exe Token: SeRestorePrivilege 2268 7z.exe Token: 35 2268 7z.exe Token: SeSecurityPrivilege 2268 7z.exe Token: SeSecurityPrivilege 2268 7z.exe Token: SeRestorePrivilege 4288 7z.exe Token: 35 4288 7z.exe Token: SeSecurityPrivilege 4288 7z.exe Token: SeSecurityPrivilege 4288 7z.exe Token: SeRestorePrivilege 2816 7z.exe Token: 35 2816 7z.exe Token: SeSecurityPrivilege 2816 7z.exe Token: SeSecurityPrivilege 2816 7z.exe Token: SeRestorePrivilege 2508 7z.exe Token: 35 2508 7z.exe Token: SeSecurityPrivilege 2508 7z.exe Token: SeSecurityPrivilege 2508 7z.exe Token: SeRestorePrivilege 3512 7z.exe Token: 35 3512 7z.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1.exe79A4.exe7DDC.exe835B.exe90DA.execmd.exedescription pid process target process PID 4628 wrote to memory of 3876 4628 1.exe 1.exe PID 4628 wrote to memory of 3876 4628 1.exe 1.exe PID 4628 wrote to memory of 3876 4628 1.exe 1.exe PID 4628 wrote to memory of 3876 4628 1.exe 1.exe PID 4628 wrote to memory of 3876 4628 1.exe 1.exe PID 4628 wrote to memory of 3876 4628 1.exe 1.exe PID 3032 wrote to memory of 3680 3032 79A4.exe PID 3032 wrote to memory of 3680 3032 79A4.exe PID 3032 wrote to memory of 3680 3032 79A4.exe PID 3032 wrote to memory of 2904 3032 7DDC.exe PID 3032 wrote to memory of 2904 3032 7DDC.exe PID 3032 wrote to memory of 2904 3032 7DDC.exe PID 3680 wrote to memory of 3668 3680 79A4.exe AppLaunch.exe PID 3680 wrote to memory of 3668 3680 79A4.exe AppLaunch.exe PID 3680 wrote to memory of 3668 3680 79A4.exe AppLaunch.exe PID 3680 wrote to memory of 3668 3680 79A4.exe AppLaunch.exe PID 3680 wrote to memory of 3668 3680 79A4.exe AppLaunch.exe PID 3032 wrote to memory of 5084 3032 835B.exe PID 3032 wrote to memory of 5084 3032 835B.exe PID 3032 wrote to memory of 5084 3032 835B.exe PID 2904 wrote to memory of 4896 2904 7DDC.exe AppLaunch.exe PID 2904 wrote to memory of 4896 2904 7DDC.exe AppLaunch.exe PID 2904 wrote to memory of 4896 2904 7DDC.exe AppLaunch.exe PID 2904 wrote to memory of 4896 2904 7DDC.exe AppLaunch.exe PID 2904 wrote to memory of 4896 2904 7DDC.exe AppLaunch.exe PID 5084 wrote to memory of 2236 5084 835B.exe AppLaunch.exe PID 5084 wrote to memory of 2236 5084 835B.exe AppLaunch.exe PID 5084 wrote to memory of 2236 5084 835B.exe AppLaunch.exe PID 5084 wrote to memory of 2236 5084 835B.exe AppLaunch.exe PID 5084 wrote to memory of 2236 5084 835B.exe AppLaunch.exe PID 3032 wrote to memory of 1896 3032 8CA3.exe PID 3032 wrote to memory of 1896 3032 8CA3.exe PID 3032 wrote to memory of 1896 3032 8CA3.exe PID 3032 wrote to memory of 2564 3032 90DA.exe PID 3032 wrote to memory of 2564 3032 90DA.exe PID 3032 wrote to memory of 2564 3032 90DA.exe PID 3032 wrote to memory of 1692 3032 9540.exe PID 3032 wrote to memory of 1692 3032 9540.exe PID 3032 wrote to memory of 1692 3032 9540.exe PID 3032 wrote to memory of 4824 3032 explorer.exe PID 3032 wrote to memory of 4824 3032 explorer.exe PID 3032 wrote to memory of 4824 3032 explorer.exe PID 3032 wrote to memory of 4824 3032 explorer.exe PID 2564 wrote to memory of 4552 2564 90DA.exe cmd.exe PID 2564 wrote to memory of 4552 2564 90DA.exe cmd.exe PID 3032 wrote to memory of 1776 3032 explorer.exe PID 3032 wrote to memory of 1776 3032 explorer.exe PID 3032 wrote to memory of 1776 3032 explorer.exe PID 4552 wrote to memory of 3176 4552 cmd.exe mode.com PID 4552 wrote to memory of 3176 4552 cmd.exe mode.com PID 4552 wrote to memory of 2024 4552 cmd.exe 7z.exe PID 4552 wrote to memory of 2024 4552 cmd.exe 7z.exe PID 4552 wrote to memory of 2832 4552 cmd.exe 7z.exe PID 4552 wrote to memory of 2832 4552 cmd.exe 7z.exe PID 3032 wrote to memory of 5016 3032 explorer.exe PID 3032 wrote to memory of 5016 3032 explorer.exe PID 3032 wrote to memory of 5016 3032 explorer.exe PID 3032 wrote to memory of 5016 3032 explorer.exe PID 4552 wrote to memory of 3200 4552 cmd.exe 7z.exe PID 4552 wrote to memory of 3200 4552 cmd.exe 7z.exe PID 4552 wrote to memory of 2096 4552 cmd.exe 7z.exe PID 4552 wrote to memory of 2096 4552 cmd.exe 7z.exe PID 4552 wrote to memory of 2268 4552 cmd.exe 7z.exe PID 4552 wrote to memory of 2268 4552 cmd.exe 7z.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1.exeC:\Users\Admin\AppData\Local\Temp\1.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\79A4.exeC:\Users\Admin\AppData\Local\Temp\79A4.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\7DDC.exeC:\Users\Admin\AppData\Local\Temp\7DDC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\fl.exe"C:\Users\Admin\AppData\Local\Temp\fl.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"5⤵
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"4⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"5⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c "C:\Windows\system32\services32.exe"4⤵
-
C:\Windows\system32\services32.exeC:\Windows\system32\services32.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
-
C:\Windows\system32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"7⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"7⤵
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\835B.exeC:\Users\Admin\AppData\Local\Temp\835B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\8CA3.exeC:\Users\Admin\AppData\Local\Temp\8CA3.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\8CA3.exe"C:\Users\Admin\AppData\Local\Temp\8CA3.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\8CA3.exe" & exit3⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\90DA.exeC:\Users\Admin\AppData\Local\Temp\90DA.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode 65,103⤵
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p96837877381925591435828468 -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_10.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_9.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_8.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\attrib.exeattrib +H "hire.exe"3⤵
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\main\hire.exe"hire.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\9540.exeC:\Users\Admin\AppData\Local\Temp\9540.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\9540.exe"C:\Users\Admin\AppData\Local\Temp\9540.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9540.exe.logFilesize
1KB
MD5d95b93a855f3e54144996d8161bf8d24
SHA12ffa482f6b897d8b52218b7f16fd9ece35592ef9
SHA2564f7982843d7a822ce15cf5fe8fd3cb39fdcce3660f2bba0cda1e61dc9356cd3b
SHA512967d6643c1ad4e6d266e8c711febbb3dd6123d1c62d8317327c96f71f2cc288dcb4bc812cbfdb6ef4e5aaaaa042666c429815eb759629e0e542b213dec27f233
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.logFilesize
2KB
MD50f83894121cb6a3d365b95a503e80ed9
SHA1cd740a5b7125eb905de5fad818b199e1a3109aa1
SHA25620055507b28f40d276c9b720848c5a29b2a7adc8128941cd5e344a7c71b7e273
SHA5121e56c49c3f0173954421a9adebd1cb1d18dc1bcf7381f1f3e5bf487f9639cdffdb0a9be34354b0ec229369a351ba52efc96f3566b7d64ddea8462e5e67932651
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD560945d1a2e48da37d4ce8d9c56b6845a
SHA183e80a6acbeb44b68b0da00b139471f428a9d6c1
SHA256314b91c00997034d6e015f40230d90ebbf57de5dc938b62c1a214d591793dbe3
SHA5125d068f1d6443e26ae3cad1c80f969e50e5860967b314153c4d3b6efd1cfa39f0907c6427bec7fa43db079f258b6357e4e9a1b0b1a36b1481d2049ea0e67909ed
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD52a4825f4f95c5d3d72911c6e7eb902ca
SHA14c22133f24e77211313beb0831980029a53e7dde
SHA25659eecad327a693c8b2e3a5932238cda2141c6a0afbba6a5587933c9f2c1025e0
SHA5128e09a61c62a4b83f4f323b5b74f89cc26d708fd1fe646317f5f404af8d4d3fcf327f20f5e4a3b310786c0f639df2d17e1a51def08c95fa964928ad6c08c81386
-
C:\Users\Admin\AppData\Local\Temp\79A4.exeFilesize
1.8MB
MD5da31f971f1f97923faf839a21b97c77e
SHA1605a73437a1ef081a1896f39abb47435b4db55bd
SHA25636f3b0d4c59f613a9590f90ff0cfea3281e7edcd69f25a82acef9b460fa5ce2f
SHA512dd5c326bb7bb594fa0745cd3b60cd301c1357fd740c5b7e45392beba6005c7b09b4838adb5849749777efee70e99b69437e4ab6d6b04b4d6d813793b0282a858
-
C:\Users\Admin\AppData\Local\Temp\79A4.exeFilesize
1.8MB
MD5da31f971f1f97923faf839a21b97c77e
SHA1605a73437a1ef081a1896f39abb47435b4db55bd
SHA25636f3b0d4c59f613a9590f90ff0cfea3281e7edcd69f25a82acef9b460fa5ce2f
SHA512dd5c326bb7bb594fa0745cd3b60cd301c1357fd740c5b7e45392beba6005c7b09b4838adb5849749777efee70e99b69437e4ab6d6b04b4d6d813793b0282a858
-
C:\Users\Admin\AppData\Local\Temp\7DDC.exeFilesize
1.8MB
MD5da31f971f1f97923faf839a21b97c77e
SHA1605a73437a1ef081a1896f39abb47435b4db55bd
SHA25636f3b0d4c59f613a9590f90ff0cfea3281e7edcd69f25a82acef9b460fa5ce2f
SHA512dd5c326bb7bb594fa0745cd3b60cd301c1357fd740c5b7e45392beba6005c7b09b4838adb5849749777efee70e99b69437e4ab6d6b04b4d6d813793b0282a858
-
C:\Users\Admin\AppData\Local\Temp\7DDC.exeFilesize
1.8MB
MD5da31f971f1f97923faf839a21b97c77e
SHA1605a73437a1ef081a1896f39abb47435b4db55bd
SHA25636f3b0d4c59f613a9590f90ff0cfea3281e7edcd69f25a82acef9b460fa5ce2f
SHA512dd5c326bb7bb594fa0745cd3b60cd301c1357fd740c5b7e45392beba6005c7b09b4838adb5849749777efee70e99b69437e4ab6d6b04b4d6d813793b0282a858
-
C:\Users\Admin\AppData\Local\Temp\835B.exeFilesize
1.8MB
MD5da31f971f1f97923faf839a21b97c77e
SHA1605a73437a1ef081a1896f39abb47435b4db55bd
SHA25636f3b0d4c59f613a9590f90ff0cfea3281e7edcd69f25a82acef9b460fa5ce2f
SHA512dd5c326bb7bb594fa0745cd3b60cd301c1357fd740c5b7e45392beba6005c7b09b4838adb5849749777efee70e99b69437e4ab6d6b04b4d6d813793b0282a858
-
C:\Users\Admin\AppData\Local\Temp\835B.exeFilesize
1.8MB
MD5da31f971f1f97923faf839a21b97c77e
SHA1605a73437a1ef081a1896f39abb47435b4db55bd
SHA25636f3b0d4c59f613a9590f90ff0cfea3281e7edcd69f25a82acef9b460fa5ce2f
SHA512dd5c326bb7bb594fa0745cd3b60cd301c1357fd740c5b7e45392beba6005c7b09b4838adb5849749777efee70e99b69437e4ab6d6b04b4d6d813793b0282a858
-
C:\Users\Admin\AppData\Local\Temp\8CA3.exeFilesize
905KB
MD5bb4ce5daeb417b865c58aee98da5b5b8
SHA12c956c78187157cf9b846af318c1f9ee2dca7b2a
SHA256185016d4e5de1f766803ab7c5a5d05475ea38484551f3d500f6074883823d2b2
SHA512a8c2563875c71f644a453bbf860e8d2ee9778de3c45e664c43fb2a77ff56934f153e5a39bf08d02f8a5a1b4a7594d75a75ab795fd1e49402f8b9b8ed0c77a58a
-
C:\Users\Admin\AppData\Local\Temp\8CA3.exeFilesize
905KB
MD5bb4ce5daeb417b865c58aee98da5b5b8
SHA12c956c78187157cf9b846af318c1f9ee2dca7b2a
SHA256185016d4e5de1f766803ab7c5a5d05475ea38484551f3d500f6074883823d2b2
SHA512a8c2563875c71f644a453bbf860e8d2ee9778de3c45e664c43fb2a77ff56934f153e5a39bf08d02f8a5a1b4a7594d75a75ab795fd1e49402f8b9b8ed0c77a58a
-
C:\Users\Admin\AppData\Local\Temp\8CA3.exeFilesize
905KB
MD5bb4ce5daeb417b865c58aee98da5b5b8
SHA12c956c78187157cf9b846af318c1f9ee2dca7b2a
SHA256185016d4e5de1f766803ab7c5a5d05475ea38484551f3d500f6074883823d2b2
SHA512a8c2563875c71f644a453bbf860e8d2ee9778de3c45e664c43fb2a77ff56934f153e5a39bf08d02f8a5a1b4a7594d75a75ab795fd1e49402f8b9b8ed0c77a58a
-
C:\Users\Admin\AppData\Local\Temp\90DA.exeFilesize
2.3MB
MD559fe49e18a0d7e34c341039b9e201a1b
SHA14dcff49906fc3edc5f56597ad5603de95406bd42
SHA2562c03b271f9f6870ba2d36e812d737d841b3fec61d0f1404271af57cfee4610a8
SHA5120f16da2dc9dee0e4779bcfb6cefb06be083ea1cc0c96ae3faa168d3c403f5ebfc8db116159112c25cc491544e355f4c777ff3d9d328794dfc5402e32e1403de5
-
C:\Users\Admin\AppData\Local\Temp\90DA.exeFilesize
2.3MB
MD559fe49e18a0d7e34c341039b9e201a1b
SHA14dcff49906fc3edc5f56597ad5603de95406bd42
SHA2562c03b271f9f6870ba2d36e812d737d841b3fec61d0f1404271af57cfee4610a8
SHA5120f16da2dc9dee0e4779bcfb6cefb06be083ea1cc0c96ae3faa168d3c403f5ebfc8db116159112c25cc491544e355f4c777ff3d9d328794dfc5402e32e1403de5
-
C:\Users\Admin\AppData\Local\Temp\9540.exeFilesize
681KB
MD533064856b502dff3ad77d3efebe3fb7a
SHA10431b2ca039455d2858792b42f73f19972f6c3aa
SHA25684520a2aae782df51d6217b686dabfdde03fca8b0df25099c68cc2c80d7d7f79
SHA512d2b840e571a94aaa1f2908d9b9920c7ea261fc5702cc297dc464b69098667229d7f8e043b2aec2f8e0c063a09462cffec3cbb5112336ead639d3558a82389929
-
C:\Users\Admin\AppData\Local\Temp\9540.exeFilesize
681KB
MD533064856b502dff3ad77d3efebe3fb7a
SHA10431b2ca039455d2858792b42f73f19972f6c3aa
SHA25684520a2aae782df51d6217b686dabfdde03fca8b0df25099c68cc2c80d7d7f79
SHA512d2b840e571a94aaa1f2908d9b9920c7ea261fc5702cc297dc464b69098667229d7f8e043b2aec2f8e0c063a09462cffec3cbb5112336ead639d3558a82389929
-
C:\Users\Admin\AppData\Local\Temp\9540.exeFilesize
681KB
MD533064856b502dff3ad77d3efebe3fb7a
SHA10431b2ca039455d2858792b42f73f19972f6c3aa
SHA25684520a2aae782df51d6217b686dabfdde03fca8b0df25099c68cc2c80d7d7f79
SHA512d2b840e571a94aaa1f2908d9b9920c7ea261fc5702cc297dc464b69098667229d7f8e043b2aec2f8e0c063a09462cffec3cbb5112336ead639d3558a82389929
-
C:\Users\Admin\AppData\Local\Temp\fl.exeFilesize
4.1MB
MD5931d0b427c55a43c305981874d5f988e
SHA1fcee465b79be88818308f6f5adf93767b475919e
SHA256ccb8766fcff473f20faaf8b7896e5fbfd2ee96372d1a5fd9e0f32d3f6f83a021
SHA512b6bb7ca8b6edcd49de5626dbfdc5796e328edaacca19b3963975717f942b1306c852435f29d8849be3f02ef67977c773efcb5a1560cb8ab82833eb5a669a3d95
-
C:\Users\Admin\AppData\Local\Temp\fl.exeFilesize
4.1MB
MD5931d0b427c55a43c305981874d5f988e
SHA1fcee465b79be88818308f6f5adf93767b475919e
SHA256ccb8766fcff473f20faaf8b7896e5fbfd2ee96372d1a5fd9e0f32d3f6f83a021
SHA512b6bb7ca8b6edcd49de5626dbfdc5796e328edaacca19b3963975717f942b1306c852435f29d8849be3f02ef67977c773efcb5a1560cb8ab82833eb5a669a3d95
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DATFilesize
2.0MB
MD5c21255332a07477b3878619d85ae1504
SHA172310b5ef8dce97aa730b95bd8ad1d717720d262
SHA256b48fbb856072b5fe578adc21a99e2d07ee631506e8aa0af7e08a468e50d53701
SHA5126b4b02ee1a8dab23d61ddbc443dcfc66b1e4169bc5a0f9f1bdb617ea56f40473671629cf9229923ae55551f85a84552640af692890f5262133ab6c0aa4424582
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zipFilesize
37KB
MD5dca60c629952ec7a5a4d36965f5b20c6
SHA19d612cca5ba683bf9c8515eab264a38b03403870
SHA256bef44d7d8f627d2ff2e829614b3439cc71be4d18a1760b076f61fd9d2366f3b7
SHA51241a3ef66b0b62ea5678a358628890e9f127181ee6a8ac7895325d305997e3b6c41a1ebef493d895a47e2b60c3b4434d3f22b467c25b8efb444adc0b27f9ab996
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_10.zipFilesize
1.5MB
MD539310851cf735eb4c44bec45e7b52f56
SHA16c252ec2888666fa7291b308b5ca81d671ee8cb2
SHA2561604e7fef8cc5e57b2bd27f157c109d457abb71f83523be6a5d3d52c328a3e22
SHA512efa080e1fb5091904b17c9e26dc9f9659166b53dea38e6c014d951a3f3af3554e86b49d3fec7bdca9890831f64b667f70eb740fffe942fa0644de5966dac6476
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zipFilesize
37KB
MD5c67927df1f6589561a638767efb6dd72
SHA1184cf259595c35ff6a45dc834fce589c1496694c
SHA2567f6445e0c575ef209c4ae787c56fd89806320dc4b0903ea2f1a1c33f6b117f74
SHA512c20cb8a6ad0ac996cd9711bc7acca235a93f63572d1175518057ad243c392dba55661fea6a6318031d5bc9aa23a7406cbcbb4c6a5bd16cf14567ed1be636aa72
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zipFilesize
37KB
MD5f26147e97764126d6e9ba110f95ca85b
SHA1219f2548f4881a81c4ea68c78f7bf10f025a9034
SHA256d61fd6fd4576641a58d86fbbc228367b31ba38631a99ba35d8b3a3c45d8c44a5
SHA512e283e077151d15cd29f198290c423abb4300312134d0057a0b37ea73bc067a6026af01b0d6bbef5c00485d8d4c5c823400ec6ce64047307152a51337a89de80d
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zipFilesize
37KB
MD5101e6ca25c3c06778d7b6ebd1b08a2f9
SHA12721161c15c19a0d95a292b0f1df35a318637619
SHA25633a661b87c7687d558d9f0eb137ee33f45b1a40d4619631c1338358e9fa1e597
SHA5126a30d7ce5c476ddf7df2197ffdebb81a36404bcb84b63ec04605243b9893a7349cf885480ccc70a254a1b2d74f1ed7f158cf0c58f7018c32a13f65d762cde817
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zipFilesize
37KB
MD50cccbed96119ca7d63ddb52bd30d3237
SHA1cb16b5288f7798dcb506c5dfe7ac5b5d163a23ca
SHA25641fb5c18901ea46678070a748bfbd78852ceacc50e8d83f7fcafad5c6a5682f0
SHA512490eedf17541fc4b5f761e3575644c7cb4461b0fd49482020534ceb54d68c62be4a70f897c288a46c6450d4c4b82467fc39130b79c8a6ea2c825ae226cf3887a
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zipFilesize
38KB
MD5d0636c61c69dc5105ff387bce4e94664
SHA1e95ff25907848e380b872defef189670cf887399
SHA256bfaa59e4f3fe92d28c60360a01edc98b65416d799e1c7fcc1704d656c07ae89b
SHA51294efc4b118bb6dbb0d19d436ae5621fa1251e920cda7d0c9c43127d96279656e00403f41e268e3d78c87521f28179ecbf7c318f86ddba071fd0a87e265f2779f
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zipFilesize
38KB
MD5bbae2a6a6e1d982f12ed3e1b07bb853d
SHA1ac4a1312148b15f14f987e73dce9a8d51240ee54
SHA256cc8967c77f6688d5924a4bdf4f6b85a277beabf2d22084eedc10b746475ee816
SHA512e9014c834541b55284ae58f864ad1e5e723c4cc1022a8462affe46bd3b5a5142e656fa30e93d287d3823712c9b25b625ba86fd4cda1c4f90a78983c291a0660d
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_8.zipFilesize
38KB
MD57886946b4ef0e55bd5cc6fbc39ca3155
SHA11a8d82ba47842c038170b8136af62f3591b8ebd9
SHA25626a8c1b5f0165b32a3b64940123913587c8545c085f1742da7569981de96e2a7
SHA5128671edfddd4e1a0948c4e04026a2532ae6319d45c1b58e248f0faf41c96bbdfd4442d01be5a6e20711e817c9dfb5f15cc44de27839754f8803336ee1b00512bb
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_9.zipFilesize
38KB
MD5e099eeccef9a744d937027fff0494bf4
SHA1de556ac552a015dde90391ea36753cd356b9a712
SHA256918af62ee7bfdf7828788247dbec453d91dbefdc0371e2331870fde23b9c1bdb
SHA512321197e937f5ec595af2dcc7344ccb8f10299a0f94408d57a9da0c7f0832f6698d70b375a8da3c4a21c27acd988f2e161d1d92c93aec0c9bbc7ecf86b9660467
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\hire.exeFilesize
88KB
MD5996fdc6ba853d25224d6f608ea28cc15
SHA10a6cdd4c1450ceafd82644b7fbb9aafb845033e4
SHA256cddb3040a3feb3dd11945f4bb2e5ec21754d0f1ac8eb47644f5aaada8136a7d2
SHA5120c720655d076f193d927c54467ce3b4c4942ef705a09fe97055cbc20cf11464437b6a51427ec4872c458096bdb84a82f7e67c8338953a5b27ce7bc779a50b0a2
-
C:\Users\Admin\AppData\Local\Temp\main\file.binFilesize
1.5MB
MD57652cbda786d25849465df3a97c7734c
SHA1c032fa46d521ac3600aecfc0834d5b9e9ee01eb4
SHA2563a36e2a92498bd67a995494a824530bc21af69f12a2096f3936c1690689c9bcc
SHA5120231e513358a448a35f6c20ee2e258f548875fdf96d19b6802cdeaa2e063750a1a336a418a0099747fe6bb9edd21ba00f7d7a08afeacc375ac5eaa82ed11b163
-
C:\Users\Admin\AppData\Local\Temp\main\hire.exeFilesize
88KB
MD5996fdc6ba853d25224d6f608ea28cc15
SHA10a6cdd4c1450ceafd82644b7fbb9aafb845033e4
SHA256cddb3040a3feb3dd11945f4bb2e5ec21754d0f1ac8eb47644f5aaada8136a7d2
SHA5120c720655d076f193d927c54467ce3b4c4942ef705a09fe97055cbc20cf11464437b6a51427ec4872c458096bdb84a82f7e67c8338953a5b27ce7bc779a50b0a2
-
C:\Users\Admin\AppData\Local\Temp\main\main.batFilesize
455B
MD523310452faa9573058dd95589abe54d5
SHA1ca087de5446a1b4829f6b8859a60fd3659acab1b
SHA2560a22af544e8bc2a875a2250aaa7e8e4fa6a80db07ed445a3eae66e139f557e3f
SHA512d7c69f625e1f67fc44701701b4d42dfb438938070906c24ca696f42c750ef56ff8767d13248c09311a3960f443d8e874e38c1e4895ff16ee2ec6dc50db8dc383
-
C:\Windows\System32\Microsoft\Telemetry\sihost32.exeFilesize
9KB
MD5bd21473d17003fa64e3443fda975ee31
SHA1b4fd94112e248ba1d12cdfdd03c3ff2544216031
SHA25602101055d10972173cd1247a298473a4b104a6e4acd2179d3feedc19dd9d599a
SHA5125b6810cd4a2e67b7b66d0a4ce257a957876d546d685d7d866c0ceb93bda99264c50a2b0c28e0de90c57940c169b90e39aa4d5a667801c2a0dacff56f2531d61a
-
C:\Windows\System32\services32.exeFilesize
4.1MB
MD5931d0b427c55a43c305981874d5f988e
SHA1fcee465b79be88818308f6f5adf93767b475919e
SHA256ccb8766fcff473f20faaf8b7896e5fbfd2ee96372d1a5fd9e0f32d3f6f83a021
SHA512b6bb7ca8b6edcd49de5626dbfdc5796e328edaacca19b3963975717f942b1306c852435f29d8849be3f02ef67977c773efcb5a1560cb8ab82833eb5a669a3d95
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exeFilesize
9KB
MD5bd21473d17003fa64e3443fda975ee31
SHA1b4fd94112e248ba1d12cdfdd03c3ff2544216031
SHA25602101055d10972173cd1247a298473a4b104a6e4acd2179d3feedc19dd9d599a
SHA5125b6810cd4a2e67b7b66d0a4ce257a957876d546d685d7d866c0ceb93bda99264c50a2b0c28e0de90c57940c169b90e39aa4d5a667801c2a0dacff56f2531d61a
-
C:\Windows\system32\services32.exeFilesize
4.1MB
MD5931d0b427c55a43c305981874d5f988e
SHA1fcee465b79be88818308f6f5adf93767b475919e
SHA256ccb8766fcff473f20faaf8b7896e5fbfd2ee96372d1a5fd9e0f32d3f6f83a021
SHA512b6bb7ca8b6edcd49de5626dbfdc5796e328edaacca19b3963975717f942b1306c852435f29d8849be3f02ef67977c773efcb5a1560cb8ab82833eb5a669a3d95
-
memory/1692-187-0x0000000000C20000-0x0000000000CD4000-memory.dmpFilesize
720KB
-
memory/1692-184-0x0000000000000000-mapping.dmp
-
memory/1776-190-0x0000000000000000-mapping.dmp
-
memory/1876-283-0x0000000000000000-mapping.dmp
-
memory/1896-179-0x00000000005C0000-0x00000000006A8000-memory.dmpFilesize
928KB
-
memory/1896-176-0x0000000000000000-mapping.dmp
-
memory/1896-180-0x00000000050C0000-0x000000000515C000-memory.dmpFilesize
624KB
-
memory/2024-194-0x0000000000000000-mapping.dmp
-
memory/2040-324-0x0000000000000000-mapping.dmp
-
memory/2060-250-0x0000000000000000-mapping.dmp
-
memory/2084-245-0x0000000000000000-mapping.dmp
-
memory/2096-207-0x0000000000000000-mapping.dmp
-
memory/2236-254-0x0000000007B50000-0x0000000007D12000-memory.dmpFilesize
1.8MB
-
memory/2236-255-0x0000000008250000-0x000000000877C000-memory.dmpFilesize
5.2MB
-
memory/2236-170-0x0000000000000000-mapping.dmp
-
memory/2248-325-0x0000000000000000-mapping.dmp
-
memory/2260-280-0x00007FFE58110000-0x00007FFE58BD1000-memory.dmpFilesize
10.8MB
-
memory/2260-277-0x0000000000000000-mapping.dmp
-
memory/2268-211-0x0000000000000000-mapping.dmp
-
memory/2368-224-0x0000000000000000-mapping.dmp
-
memory/2380-296-0x00007FFE58110000-0x00007FFE58BD1000-memory.dmpFilesize
10.8MB
-
memory/2380-289-0x0000000000000000-mapping.dmp
-
memory/2380-295-0x0000000000DC0000-0x0000000000DC6000-memory.dmpFilesize
24KB
-
memory/2508-225-0x0000000000000000-mapping.dmp
-
memory/2564-181-0x0000000000000000-mapping.dmp
-
memory/2764-247-0x0000000000000000-mapping.dmp
-
memory/2764-249-0x0000000000540000-0x000000000055C000-memory.dmpFilesize
112KB
-
memory/2764-252-0x00000000067D0000-0x0000000006820000-memory.dmpFilesize
320KB
-
memory/2808-246-0x0000000000000000-mapping.dmp
-
memory/2816-219-0x0000000000000000-mapping.dmp
-
memory/2832-198-0x0000000000000000-mapping.dmp
-
memory/2904-168-0x00000000006E3000-0x00000000006E5000-memory.dmpFilesize
8KB
-
memory/2904-142-0x0000000000000000-mapping.dmp
-
memory/2904-146-0x0000000000A80000-0x0000000000C46000-memory.dmpFilesize
1.8MB
-
memory/2904-153-0x0000000000A80000-0x0000000000C46000-memory.dmpFilesize
1.8MB
-
memory/3032-137-0x00000000033D0000-0x00000000033E6000-memory.dmpFilesize
88KB
-
memory/3176-192-0x0000000000000000-mapping.dmp
-
memory/3192-233-0x0000000000000000-mapping.dmp
-
memory/3200-203-0x0000000000000000-mapping.dmp
-
memory/3352-299-0x0000000000000000-mapping.dmp
-
memory/3352-300-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3512-229-0x0000000000000000-mapping.dmp
-
memory/3668-169-0x0000000005600000-0x000000000563C000-memory.dmpFilesize
240KB
-
memory/3668-159-0x00000000055A0000-0x00000000055B2000-memory.dmpFilesize
72KB
-
memory/3668-221-0x0000000005930000-0x0000000005996000-memory.dmpFilesize
408KB
-
memory/3668-148-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3668-162-0x00000000056D0000-0x00000000057DA000-memory.dmpFilesize
1.0MB
-
memory/3668-158-0x0000000005B00000-0x0000000006118000-memory.dmpFilesize
6.1MB
-
memory/3668-147-0x0000000000000000-mapping.dmp
-
memory/3680-144-0x0000000000580000-0x0000000000746000-memory.dmpFilesize
1.8MB
-
memory/3680-141-0x0000000000580000-0x0000000000746000-memory.dmpFilesize
1.8MB
-
memory/3680-138-0x0000000000000000-mapping.dmp
-
memory/3740-272-0x0000000000000000-mapping.dmp
-
memory/3740-275-0x00007FFE58110000-0x00007FFE58BD1000-memory.dmpFilesize
10.8MB
-
memory/3756-287-0x0000000000000000-mapping.dmp
-
memory/3756-288-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3756-294-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3756-297-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3756-305-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/3828-266-0x0000000000000000-mapping.dmp
-
memory/3836-267-0x0000000000000000-mapping.dmp
-
memory/3836-268-0x0000025BE04C0000-0x0000025BE04E2000-memory.dmpFilesize
136KB
-
memory/3836-271-0x00007FFE58110000-0x00007FFE58BD1000-memory.dmpFilesize
10.8MB
-
memory/3876-134-0x0000000000000000-mapping.dmp
-
memory/3876-136-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3876-135-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4052-251-0x0000000000000000-mapping.dmp
-
memory/4116-270-0x0000000000000000-mapping.dmp
-
memory/4152-269-0x0000000000000000-mapping.dmp
-
memory/4288-215-0x0000000000000000-mapping.dmp
-
memory/4428-237-0x0000000000000000-mapping.dmp
-
memory/4456-303-0x00007FFE58110000-0x00007FFE58BD1000-memory.dmpFilesize
10.8MB
-
memory/4456-298-0x0000000000000000-mapping.dmp
-
memory/4480-256-0x0000000000000000-mapping.dmp
-
memory/4552-189-0x0000000000000000-mapping.dmp
-
memory/4628-262-0x00007FFE58110000-0x00007FFE58BD1000-memory.dmpFilesize
10.8MB
-
memory/4628-133-0x0000000005B20000-0x0000000005B2A000-memory.dmpFilesize
40KB
-
memory/4628-131-0x000000000A360000-0x000000000A904000-memory.dmpFilesize
5.6MB
-
memory/4628-132-0x0000000005970000-0x0000000005A02000-memory.dmpFilesize
584KB
-
memory/4628-258-0x0000000000000000-mapping.dmp
-
memory/4628-261-0x0000000000750000-0x0000000000F6A000-memory.dmpFilesize
8.1MB
-
memory/4628-130-0x0000000000F80000-0x0000000000FE6000-memory.dmpFilesize
408KB
-
memory/4628-265-0x0000000001DD0000-0x0000000001DE2000-memory.dmpFilesize
72KB
-
memory/4824-188-0x0000000000000000-mapping.dmp
-
memory/4828-253-0x0000000000000000-mapping.dmp
-
memory/4836-276-0x0000000000000000-mapping.dmp
-
memory/4896-238-0x0000000005D40000-0x0000000005DB6000-memory.dmpFilesize
472KB
-
memory/4896-160-0x0000000000000000-mapping.dmp
-
memory/4896-244-0x0000000006130000-0x000000000614E000-memory.dmpFilesize
120KB
-
memory/5016-202-0x0000000000000000-mapping.dmp
-
memory/5060-284-0x0000000000000000-mapping.dmp
-
memory/5060-286-0x00007FFE58110000-0x00007FFE58BD1000-memory.dmpFilesize
10.8MB
-
memory/5084-157-0x0000000000460000-0x0000000000626000-memory.dmpFilesize
1.8MB
-
memory/5084-166-0x0000000000460000-0x0000000000626000-memory.dmpFilesize
1.8MB
-
memory/5084-154-0x0000000000000000-mapping.dmp