Analysis

  • max time kernel
    153s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2024 15:35

General

  • Target

    dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27.exe

  • Size

    360KB

  • MD5

    3d838159fdfcb5c26cec948f8687a0d1

  • SHA1

    a4d569ebe607a080378401452f3b5855394bd791

  • SHA256

    dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27

  • SHA512

    db35a78f4e5ef9429850a97c65c60a3d1b0db6feea150b2b49a21071e5c2840c2ed79d9deeaffe8ad4cda15bb6d518c4d4387f447b1cc24bbd62fe96394dd219

  • SSDEEP

    6144:a8v9b3uzTMu3PJFrafXjiLQhdYTitPuIjMsUVPbrnjPKohULB9OT:a8vpKTMu3z+fXQQhOT7IjEXmoWN9

Malware Config

Extracted

Family

cobaltstrike

C2

http://update.microsoftwindows.biz:8443/api/2

Attributes
  • user_agent

    Host: update.microsoftwindows.biz User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)

Extracted

Family

cobaltstrike

Botnet

100000

C2

http://update.microsoftwindows.biz:8443/api/3

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    update.microsoftwindows.biz,/api/3

  • http_header1

    AAAAEAAAACFIb3N0OiB1cGRhdGUubWljcm9zb2Z0d2luZG93cy5iaXoAAAAHAAAAAAAAAAMAAAAGAAAABkNvb2tpZQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAAEAAAACFIb3N0OiB1cGRhdGUubWljcm9zb2Z0d2luZG93cy5iaXoAAAAHAAAAAAAAAAwAAAAHAAAAAQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    8443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDfOAvlVEsRCS3UC6+JcnuZD+f2HjE5TMA2p+lWq3cVWz/RlxpBh9PVCQLgrRUSEuQ6cDA0x93WPF3rCrJkOvddDcSdUx/YRhOPY1r+/A4KXMdj70vU0fO/gLFLjbZBMu7xEjopEdOtVq5+T4NFOE4BiwGtGAnGIOQ/zDt2bbahKQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /api/4

  • user_agent

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; SV1)

  • watermark

    100000

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry key 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27.exe
    "C:\Users\Admin\AppData\Local\Temp\dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Windows\system32\cmd.exe
      cmd.exe /c schtasks /create /tn WinUpdate /tr C:\Users\Admin\AppData\Local\Temp\dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27.exe /sc minute /mo 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\system32\schtasks.exe
        schtasks /create /tn WinUpdate /tr C:\Users\Admin\AppData\Local\Temp\dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27.exe /sc minute /mo 1
        3⤵
        • Creates scheduled task(s)
        PID:2796
    • C:\Windows\system32\cmd.exe
      cmd.exe /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V WinUpdate /t REG_SZ /F /D C:\Users\Admin\AppData\Local\Temp\dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Windows\system32\reg.exe
        REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V WinUpdate /t REG_SZ /F /D C:\Users\Admin\AppData\Local\Temp\dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27.exe
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2736
    • C:\Windows\system32\cmd.exe
      cmd.exe /c schtasks /create /tn WindowsDefenderActive /tr C:\Users\Admin\AppData\Local\Temp\WindowsDefenderActive.exe /sc minute /mo 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\system32\schtasks.exe
        schtasks /create /tn WindowsDefenderActive /tr C:\Users\Admin\AppData\Local\Temp\WindowsDefenderActive.exe /sc minute /mo 1
        3⤵
        • Creates scheduled task(s)
        PID:2848
    • C:\Windows\system32\cmd.exe
      cmd.exe /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V WindowsDefenderActive /t REG_SZ /F /D C:\Users\Admin\AppData\Local\Temp\WindowsDefenderActive.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Windows\system32\reg.exe
        REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V WindowsDefenderActive /t REG_SZ /F /D C:\Users\Admin\AppData\Local\Temp\WindowsDefenderActive.exe
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2732
    • C:\Windows\system32\cmd.exe
      cmd.exe /c schtasks /create /tn DefenderActiveProtect /tr C:\Users\Public\DefenderActiveProtect.exe /sc minute /mo 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\system32\schtasks.exe
        schtasks /create /tn DefenderActiveProtect /tr C:\Users\Public\DefenderActiveProtect.exe /sc minute /mo 1
        3⤵
        • Creates scheduled task(s)
        PID:2996
    • C:\Windows\system32\cmd.exe
      cmd.exe /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V DefenderActiveProtect /t REG_SZ /F /D C:\Users\Public\DefenderActiveProtect.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\system32\reg.exe
        REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V DefenderActiveProtect /t REG_SZ /F /D C:\Users\Public\DefenderActiveProtect.exe
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2932
    • C:\Windows\system32\cmd.exe
      cmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27.exe C:\Users\Admin\AppData\Local\Temp\WindowsDefenderActive.exe
      2⤵
        PID:2632
      • C:\Windows\system32\cmd.exe
        cmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27.exe C:\Users\Public\DefenderActiveProtect.exe
        2⤵
          PID:2660
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {FCDB089A-2062-47EA-B2AA-01BF6789AD4D} S-1-5-21-3308111660-3636268597-2291490419-1000:JUBFGPHD\Admin:Interactive:[1]
        1⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1380
        • C:\Users\Admin\AppData\Local\Temp\dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27.exe
          C:\Users\Admin\AppData\Local\Temp\dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27.exe
          2⤵
          • Modifies system certificate store
          PID:2960
        • C:\Users\Admin\AppData\Local\Temp\WindowsDefenderActive.exe
          C:\Users\Admin\AppData\Local\Temp\WindowsDefenderActive.exe
          2⤵
          • Executes dropped EXE
          PID:2952
        • C:\Users\Public\DefenderActiveProtect.exe
          C:\Users\Public\DefenderActiveProtect.exe
          2⤵
          • Executes dropped EXE
          PID:2464

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Scheduled Task/Job

      1
      T1053

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Defense Evasion

      Modify Registry

      3
      T1112

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Discovery

      Query Registry

      1
      T1012

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
        Filesize

        893B

        MD5

        d4ae187b4574036c2d76b6df8a8c1a30

        SHA1

        b06f409fa14bab33cbaf4a37811b8740b624d9e5

        SHA256

        a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

        SHA512

        1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        ffb31b79c37747a9215fa6b47478bc38

        SHA1

        7a5a26b2c8675be01624ebdcb9e9f4c180c56ab0

        SHA256

        d3e56dcb914fc2685f40c51038d58a1c2baf0c74f61259412ece8865062ed632

        SHA512

        b32c3bb8d49d340b78de0c7bd6cb44a7b9b27569a24430ff22f6d98a47f6185aaadb3543608ace2fc86e8899d2c6de0630c7057b58146173be1ecc0b5a5f27f8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        5d7dcd790c4d31de3d2f0fa320959387

        SHA1

        81aece46b616e85c7dbebf54c5326ab8d0361bc9

        SHA256

        1da7bc0af2b395b98390f59dd0055baae0e054fc8a2c77432a28c7bd49c371ba

        SHA512

        b26c0eb0ea6c91e73626ff870690be4a3484e632f44c9d8957c806469e17356946e1751d13512529c7f0275a69decdbf979221e39e1b4da81a7184da1cd82b52

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        c8e87a548f5e46de8fb7c38d02eadeea

        SHA1

        cbd75251b4a626c54c63154eaa91eeb6d9c10e5e

        SHA256

        3b6d687e8bc3e457a60c3c64f13b3b3e2ec8615748b30d36956d21b2bee678c3

        SHA512

        bdb8b281a9baf3f6bf384b29738f3bf53006e195d2b17f32c523880f9f7f6601ed82b178b5af293c8f3a3ee5eabbe393405752f1333026a033f4dd174f69e03c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        ee454eaac501314151a7bf1a1f3b8685

        SHA1

        4a4cd5b937d3f34b1ccccbbbdb4db2fe02590a98

        SHA256

        cc8e5d5c764a566fffb7edba72390c9b815b4aea7ab4756482c1b542ce45387b

        SHA512

        f2f589b9bba3b1ca1dd7ea9b3ba31fd0df8d810665e261ca0a009ddb7a6b60712830cf23ba40106371c179877909d3b9c2ebcaf477903f8fb0171cc160a5a8cf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        8421e593d24b5025f3b8c4c51e8c266b

        SHA1

        54bd6123201076376a4c053e4b7c573ac085e943

        SHA256

        7dbfcd2d789f488c6e853f51947cc35c095c4eb7584c54bc42a89a1c5a76e85e

        SHA512

        f6c8a200044b9fbc06818d3bf0c6bbff8179030e9e702adb1cef906535ba882b1fdafc280de88789cf72b44f4202d8b7899d6270dd1c4264da2ffad8d886c819

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        ec826fd11c35f3f77c72103504ae009b

        SHA1

        751a908bcb49c1969cf8058a87f06829af97f70e

        SHA256

        4cee443c929ccde4094ed0f86ba1817088c6f28283a3c23fc48a0c659f979d44

        SHA512

        f03b68de884c44546b8738089a15f3fcdc501f47cc79972fd08c9944ac7feaa23bd2e34b8b9ed1bda7189a93fd9aae08817003b940f851e2f7dfaea186c8b0d6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        541e8d9760b55a7316cb47db77173f59

        SHA1

        aa4ceada7b61bd4bd2dc2fec089de37ef531cc4d

        SHA256

        3a45f9657054a51f2580da32302e672b866013f44ffbdfd5fb4d860b2ef2d9ba

        SHA512

        fb19c34180d10062d6df7f3afb6688f5b8b1786cbf08a15138873adaf56e189460f20d12ee976f2bc0c9b979d92a163d21d1f2d4535d8492645dd46882f6780b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        e91c4ef2624ac7b12a12498d0bd68130

        SHA1

        9cc3249f5addb2c6f9e4ecf6f3ab081e1ac62f6b

        SHA256

        62f5f1d005fc29b19d7a39c26a988d014bd216d0db912c2d120ec905c10ea7a3

        SHA512

        6d1235dee260ee36decac569a07cd1d39475f866a2a0b2ce10e28def92456fce536f31b4fe46473d1f44b9503540c138ee3ee03bc8110ed8fca86cda72a5d9df

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        4c394ef983849c1d55fe9311ca965c6c

        SHA1

        d9a247025a49bba01a2e4c30df9c75ef7027ab62

        SHA256

        2edb9c21c79799a25e9634ad2249a8c62504edcbf8ad38ade4e683a5115b07af

        SHA512

        42a20ccd2a974823990cada4bec253f893e539963aa69acac75341bc6f49a5a4fc1b50f1de4f2dd4bbbc12fa6f91eaabc3497093b74bc6ea51680b3bc5936ddd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        0f33b6b4be39e3a7e06bca2e31181f3d

        SHA1

        be2b6d9a44864b531003ecde865c306e6e4e7494

        SHA256

        95bd4f705a38d786b7fb4dd23278e29b61442cc383999f45427be617c29876a8

        SHA512

        72d8a5b1d5aa82c868f87e0d6b7db560d3cccd322fdddb7765bfe45e2fcef0f2f0bfc9073a90236451e289121322fe698243463d6c8aa4def6df7a876b59be93

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        88aff2b107c11f70be8f9dd31ae08c39

        SHA1

        542cbc2c17f2cf7830637f03bc8db3438c0fde17

        SHA256

        3b3ec41b0be9a63a4ec8a5ccaa1bd9e7965e6829507d953157d14200b1471f38

        SHA512

        23500de8723c9682e6cb997a96b87199d4146623a08685f1eca9d4b2e3cb31f60882863c52dbea35b69a801ab361c3728e505f73bbe3afe855df09df09072a3c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        ef64f1342ae01be275607d14f58e1f29

        SHA1

        d3fc61b628cd15dc41a7c9a0ceb20d34cadba0ba

        SHA256

        7dc4abca200e530d1adc34f170ec1405f5669011b08ad92318fd74653775a2a2

        SHA512

        cd129cac31a7e25a81da561565a426bacf7861918ac358bed6de1c7fe1ac6f8ce0c669b5d24e58528dbd828753dabd442e3fd1a38088bb2280f3587e9a937959

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        a3ef290edbde0425f187355cd4256654

        SHA1

        7bdf8d0f74e93548197e2b678ca3708965d826a5

        SHA256

        c32b4b396c8931a69319c9682c825fa1b303f7272fc4e64173a31f02e9cd0ce1

        SHA512

        968160787e94d5b16f2334668d33bf38f2916da924d9c60c7ac2497ac1b2542f99aa74a5e3f5473669dbe8a76051df5ac614b061ed6d52412f22649a1cf025b9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        71f0e4fcfba63181754c7b7263b00a7b

        SHA1

        a06015f6f1640c81860adbebc3446d41032160c8

        SHA256

        5d018cec36624f31cd85550639f9f0f7fa41a84d52e9a4de916b3bbfec37eab3

        SHA512

        418fffdef4a59afeaf7b1d9d0cb50fe9d0b235777dabc40fab77aa82d9c1f2c83fc624e0e5bec9ac85f1e86a1970613a573527f1b0b24dc5a7c465915a21147e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
        Filesize

        252B

        MD5

        4910742fdbd01766aec9b2864085b926

        SHA1

        42bb1d4f9facfc5509dcd46dff91764cc3e73324

        SHA256

        0b01472eac83c7cfa82dd552d371718180ffddbfad8e368b04364037967529e1

        SHA512

        43cd7a071f1899032508113197408b20b1f37dae7b453b5285c085a0ca4493c69408c079510f999a16ff537046e5e5216c49f3c9e7c76838aa2677412e68a3e8

      • C:\Users\Admin\AppData\Local\Temp\Cab79E3.tmp
        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar7A30.tmp
        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • \Users\Admin\AppData\Local\Temp\WindowsDefenderActive.exe
        Filesize

        360KB

        MD5

        3d838159fdfcb5c26cec948f8687a0d1

        SHA1

        a4d569ebe607a080378401452f3b5855394bd791

        SHA256

        dfe1914c551e8542e55e7707ea1badd058ac6df4d57636649bd714aaa832ee27

        SHA512

        db35a78f4e5ef9429850a97c65c60a3d1b0db6feea150b2b49a21071e5c2840c2ed79d9deeaffe8ad4cda15bb6d518c4d4387f447b1cc24bbd62fe96394dd219

      • memory/2264-222-0x0000000002150000-0x000000000219F000-memory.dmp
        Filesize

        316KB

      • memory/2264-4-0x0000000000170000-0x0000000000171000-memory.dmp
        Filesize

        4KB

      • memory/2264-132-0x0000000002150000-0x000000000219F000-memory.dmp
        Filesize

        316KB

      • memory/2264-131-0x0000000003870000-0x0000000003C70000-memory.dmp
        Filesize

        4.0MB

      • memory/2464-168-0x0000000001D00000-0x0000000001D4F000-memory.dmp
        Filesize

        316KB

      • memory/2464-224-0x0000000001D00000-0x0000000001D4F000-memory.dmp
        Filesize

        316KB

      • memory/2952-225-0x00000000002D0000-0x000000000031F000-memory.dmp
        Filesize

        316KB

      • memory/2952-203-0x00000000002D0000-0x000000000031F000-memory.dmp
        Filesize

        316KB

      • memory/2960-223-0x0000000002230000-0x000000000227F000-memory.dmp
        Filesize

        316KB

      • memory/2960-150-0x0000000002230000-0x000000000227F000-memory.dmp
        Filesize

        316KB