Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 01:00

General

  • Target

    https://github.com/221alex/Hazard_NukerV1

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/923668417049952277/icSBPGhXV22Eqh4ttuhkVmbX3h03xvm27JzW3nilsZkAcXp0IOd-vUVzCtwnpL87wfzl

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 3 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 61 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Detects Pyinstaller 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 15 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 46 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/221alex/Hazard_NukerV1
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e81346f8,0x7ff9e8134708,0x7ff9e8134718
      2⤵
        PID:1456
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4200
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:2
        2⤵
          PID:4084
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:8
          2⤵
            PID:2368
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
            2⤵
              PID:3008
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
              2⤵
                PID:1428
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:8
                2⤵
                  PID:1912
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3884
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                  2⤵
                    PID:3700
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5640 /prefetch:8
                    2⤵
                      PID:3676
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3692
                    • C:\Program Files\7-Zip\7zFM.exe
                      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Hazard_Nuker.rar"
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      PID:2532
                      • C:\Users\Admin\AppData\Local\Temp\7zO4E9A63A7\HazardNuker.exe
                        "C:\Users\Admin\AppData\Local\Temp\7zO4E9A63A7\HazardNuker.exe"
                        3⤵
                        • Executes dropped EXE
                        PID:1272
                        • C:\Users\Admin\AppData\Local\Temp\7zO4E9A63A7\HazardNuker.exe
                          "C:\Users\Admin\AppData\Local\Temp\7zO4E9A63A7\HazardNuker.exe"
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1848
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "ver"
                            5⤵
                              PID:3208
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c cls
                              5⤵
                                PID:4172
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c cls
                                5⤵
                                  PID:1432
                            • C:\Users\Admin\AppData\Local\Temp\7zO4E9F62C7\Start.exe
                              "C:\Users\Admin\AppData\Local\Temp\7zO4E9F62C7\Start.exe"
                              3⤵
                              • Looks for VirtualBox Guest Additions in registry
                              • Looks for VMWare Tools registry key
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Maps connected drives based on registry
                              • Checks SCSI registry key(s)
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              • Modifies system certificate store
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5392
                            • C:\Users\Admin\AppData\Local\Temp\7zO4E9018C7\Start.exe
                              "C:\Users\Admin\AppData\Local\Temp\7zO4E9018C7\Start.exe"
                              3⤵
                              • Looks for VirtualBox Guest Additions in registry
                              • Looks for VMWare Tools registry key
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Maps connected drives based on registry
                              • Checks SCSI registry key(s)
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              • Modifies system certificate store
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5640
                            • C:\Users\Admin\AppData\Local\Temp\7zO4E9FB5E7\HazardNuker.exe
                              "C:\Users\Admin\AppData\Local\Temp\7zO4E9FB5E7\HazardNuker.exe"
                              3⤵
                              • Executes dropped EXE
                              PID:5988
                              • C:\Users\Admin\AppData\Local\Temp\7zO4E9FB5E7\HazardNuker.exe
                                "C:\Users\Admin\AppData\Local\Temp\7zO4E9FB5E7\HazardNuker.exe"
                                4⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4632
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c "ver"
                                  5⤵
                                    PID:5364
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c cls
                                    5⤵
                                      PID:5384
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c cls
                                      5⤵
                                        PID:5420
                                  • C:\Users\Admin\AppData\Local\Temp\7zO4E9DFD18\Start.exe
                                    "C:\Users\Admin\AppData\Local\Temp\7zO4E9DFD18\Start.exe"
                                    3⤵
                                    • Looks for VirtualBox Guest Additions in registry
                                    • Looks for VMWare Tools registry key
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Maps connected drives based on registry
                                    • Checks SCSI registry key(s)
                                    • Enumerates system info in registry
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4324
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:1
                                  2⤵
                                    PID:4720
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:1
                                    2⤵
                                      PID:1380
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6432 /prefetch:1
                                      2⤵
                                        PID:656
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11748717507833855799,2374808649547969101,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:1
                                        2⤵
                                          PID:1436
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:5028
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:4980

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            1386433ecc349475d39fb1e4f9e149a0

                                            SHA1

                                            f04f71ac77cb30f1d04fd16d42852322a8b2680f

                                            SHA256

                                            a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc

                                            SHA512

                                            fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            2KB

                                            MD5

                                            d3695640e906c569b1b261b63729b750

                                            SHA1

                                            01f2d33292404686656b1deabe0ad509aa4fd389

                                            SHA256

                                            cdb90955752a03fc1743f5e11f2a844d1ffb01c5035ea4a50ac11ca933800358

                                            SHA512

                                            4e6f3accb52eb1e35e3e5a0a2de0845943fbc5054883072b09f869399fdc568b416ed04a7c77953a0e6ece6f4b581280eb7feacfdbe691a33b891c5e53313e5d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            65d78c014af82ceffe537015afca866e

                                            SHA1

                                            25ba7ef05ba6734120cb7ffab7a888c7b7c9091b

                                            SHA256

                                            28ff42bc4b3b00a40c12f567abf1a06e326f293a2ead48c03e7200e7ffb66f05

                                            SHA512

                                            29860b98879dddf818c9c4192ba43ed95f4c5176d465224798dc92224f9ce6372ea4a2e66fd1260c4132c20fe24fd5a6224ae07fdb9099264478484b4797399e

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            4d7b21f5f48041717146bdfedead2fc4

                                            SHA1

                                            ed75083863fe5553bd68f27bf20294b3c55c8559

                                            SHA256

                                            80eb7e719ff5d34a49b30f61593f80da73207c67abe2ef40ce77b00c73e860cf

                                            SHA512

                                            4612ceea06a7fde0318d02c347fe81f725ddb3fa203d308bfd7e67b3dc4d060575c11f10ec47c5245fcb9b0de0116dd446e9878e20ab85ea27ba9747193b4031

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            335779a91fed6ebd7f414cfebc2f8914

                                            SHA1

                                            b81cae28b9ae7350ca75804e1e02d7f5bf1fb385

                                            SHA256

                                            96fd12339cb8b791d553e873d76d1702d66ce041bcd5c6729cb1cc9fcb4f5086

                                            SHA512

                                            f360b3644d29fc624e37ecb6cb57f1df7307d23749b7a0467215e8c4781d6f7a3b2d608b059b69c089edb26f9f6d0bb4f44efb2d0d232da19403a26e8173f1f3

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                            Filesize

                                            24KB

                                            MD5

                                            e664066e3aa135f185ed1c194b9fa1f8

                                            SHA1

                                            358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5

                                            SHA256

                                            86e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617

                                            SHA512

                                            58710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            1d87872bbb9166e4ee0e28eb5a25f5d6

                                            SHA1

                                            dc88b739b52cd3a01bdff79048acce82750388c5

                                            SHA256

                                            17389a1c58225f74b2d2a1069fe5e170f19a506381f4ca26d79e394c105718d1

                                            SHA512

                                            a74e7f85fa7129f2225c78d656418f0f8f02dd73b84f6ed81bd0e28eafa224563569da712e1feb9619a9ccab66c981b959884072c195dc4a906c3eb0850baaa2

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57a856.TMP

                                            Filesize

                                            1KB

                                            MD5

                                            b8e5bec3808ff24ce78dc96017650a6e

                                            SHA1

                                            8594b485b1ab2beeb02de8c142984f0d74dfd9c4

                                            SHA256

                                            47ca4fef5e92b7bb6da33652a7effdc136bab0f3dd36d0a2af561a2e858e31b8

                                            SHA512

                                            54849fe52e4fbece001f923b8bbec0036af861357dd6c51405446ccf15294fc745b76f5fa9ac10406befa15796d1f9445386289fc8bf99efaea9daba566f4368

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            6752a1d65b201c13b62ea44016eb221f

                                            SHA1

                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                            SHA256

                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                            SHA512

                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            77c18f460d157d60b7761e60970d4c93

                                            SHA1

                                            d17f22d6bd02e2b940b08f9bff2cccdf770e5819

                                            SHA256

                                            697869c6deed29af5e3eb6d96cad5a1cc12e78792df5472581f3879f5509fd54

                                            SHA512

                                            6bc884074c03453b157d3d2e4ef32d2454eb6bae7871dbe9e6fc314de7ab63577ab81299c26528191887d20056ec140ceba722c10702df4ff0b38847b08d3a3a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\c5a9be38-34bf-4679-a070-bf43e2964d51.tmp

                                            Filesize

                                            10KB

                                            MD5

                                            b6b31ea5d470e341b19ed11a59f3d7ce

                                            SHA1

                                            c06866b0c830f012c356e741a4ec413aa84f3540

                                            SHA256

                                            1879dcad7d083febe837e6311634c44a5048071318456ae36b123c47124115dd

                                            SHA512

                                            b70384a2f8ec35460ab0eed8bf666300302dad3e1c4c899c6caca680d2a9fb0b968ed5f9afc1ec0d53cc0f391bc2b3b402f8610f9e1eb03e35c11903841f6a71

                                          • C:\Users\Admin\AppData\Local\Temp\7zO4E9A63A7\HazardNuker.exe

                                            Filesize

                                            32.1MB

                                            MD5

                                            7b9c1342abbd8e67f3bd7de722dc6ce3

                                            SHA1

                                            d71e7e8850cb80d75c0b4885bd24a6ffe176c62b

                                            SHA256

                                            acc90ef4169f8322a867e65b420460a56264046a6f412d9d419ddf6a0fa13698

                                            SHA512

                                            2d4677cbca1863e68aef9e4ec3b8fab664f0c1a632a5d8e4faa08f06836902c582c5dd626941fa3d57554bced9781cbf034be88ecf96f6d7dd92ecd089ec8a10

                                          • C:\Users\Admin\AppData\Local\Temp\7zO4E9A63A7\HazardNuker.exe

                                            Filesize

                                            4.3MB

                                            MD5

                                            2dd49e28a870f3e258bba5efc580b08e

                                            SHA1

                                            e5dd5f2e05b33dfcfacfa3819e65dca3a4f9d6f0

                                            SHA256

                                            f7849fa6504718bcb2fa895bb67e914e688a09551c14835836dc86c2aaced94b

                                            SHA512

                                            f971ea9696e65209984606b06d9be874251271048654f56dc951597ef2c29bb189c334626762d25acc6bad70cfd593089dd697a7e1256b2446cbc53b5b875fa9

                                          • C:\Users\Admin\AppData\Local\Temp\7zO4E9F62C7\Start.exe

                                            Filesize

                                            41KB

                                            MD5

                                            ae7b73a0b2a7f6847a5f1ae86be22e4f

                                            SHA1

                                            7eb62d0faaf3b489b9c72a1ad9cba144acb361f8

                                            SHA256

                                            5a89e21d0c4c25978d9a07a91021b57bb06ac1e570f95293c3d8d4e8bf1f629a

                                            SHA512

                                            6d2fbe895a45a1de4e81c5d25deec6290d209228f6403e8c4af750884ea132c02a67a1a142bb319d757ebc5934ac567f3787f589aec5e43643de975911004690

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\VCRUNTIME140.dll

                                            Filesize

                                            94KB

                                            MD5

                                            11d9ac94e8cb17bd23dea89f8e757f18

                                            SHA1

                                            d4fb80a512486821ad320c4fd67abcae63005158

                                            SHA256

                                            e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e

                                            SHA512

                                            aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\_bz2.pyd

                                            Filesize

                                            84KB

                                            MD5

                                            124678d21d4b747ec6f1e77357393dd6

                                            SHA1

                                            dbfb53c40d68eba436934b01ebe4f8ee925e1f8e

                                            SHA256

                                            9483c4853ca1da3c5b2310dbdd3b835a44df6066620278aa96b2e665c4b4e86b

                                            SHA512

                                            2882779b88ed48af1e27c2bc212ddc7e4187d26a28a90655cef98dd44bc07cc93da5bce2442af26d7825639590b1e2b78bf619d50736d67164726a342be348fa

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\_ctypes.pyd

                                            Filesize

                                            123KB

                                            MD5

                                            7ab242d7c026dad5e5837b4579bd4eda

                                            SHA1

                                            b3ff01b8b3da2b3a9c37bfffafc4fb9ee957cc0f

                                            SHA256

                                            1548506345d220d68e9089b9a68b42a9d796141eb6236e600283951cb206eaa1

                                            SHA512

                                            1dd09cf14c87f60b42e5e56d0104154513902c9bfa23eef76a92f4a96c2356b2812dd6eee5e9a74d5ed078ade5f8f6d1f1b01961d7efadfebb543d71c2d31a30

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\_elementtree.pyd

                                            Filesize

                                            184KB

                                            MD5

                                            7e5dac4dfa8bfee245b93d9e662db202

                                            SHA1

                                            3f686c892fbd8038082c9b213734def1ba43264c

                                            SHA256

                                            0a9fd0f123177a8869cf28dc03a10e3717bfe3356bc400fe620267bce8f59dfa

                                            SHA512

                                            672d7ee58b4f3c75ccd27899a34bce716fbab1b691026da4016654bf590b7ad4356223be607f2e59d4b23566f40c9f259aefb93582d15efc68345de67b23f9db

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\_hashlib.pyd

                                            Filesize

                                            64KB

                                            MD5

                                            ae32a39887d7516223c1e7ffdc3b6911

                                            SHA1

                                            94b9055c584df9afb291b3917ff3d972b3cd2492

                                            SHA256

                                            7936413bc24307f01b90cac2d2cc19f38264d396c1ab8eda180abba2f77162eb

                                            SHA512

                                            1f17af61c917fe373f0a40f06ce2b42041447f9e314b2f003b9bd62df87c121467d14ce3f8e778d3447c4869bf381c58600c1e11656ebda6139e6196262ae17e

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\_lzma.pyd

                                            Filesize

                                            159KB

                                            MD5

                                            a77c9a75ed7d9f455e896b8fb09b494c

                                            SHA1

                                            c85d30bf602d8671f6f446cdaba98de99793e481

                                            SHA256

                                            4797aaf192eb56b32ca4febd1fad5be9e01a24e42bf6af2d04fcdf74c8d36fa5

                                            SHA512

                                            4d6d93aa0347c49d3f683ee7bc91a3c570c60126c534060654891fad0391321e09b292c9386fb99f6ea2c2eca032889841fce3cab8957bb489760daac6f79e71

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\_queue.pyd

                                            Filesize

                                            28KB

                                            MD5

                                            e64538868d97697d62862b52df32d81b

                                            SHA1

                                            2279c5430032ad75338bab3aa28eb554ecd4cd45

                                            SHA256

                                            b0bd6330c525b4c64d036d29a3733582928e089d99909500e8564ae139459c5f

                                            SHA512

                                            8544f5df6d621a5ff2ca26da65b49f57e19c60b4177a678a00a5feb130bf0902f780b707845b5a4dd9f12ddb673b462f77190e71cbe358db385941f0f38e4996

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\_socket.pyd

                                            Filesize

                                            78KB

                                            MD5

                                            4b2f1faab9e55a65afa05f407c92cab4

                                            SHA1

                                            1e5091b09fc0305cf29ec2e715088e7f46ccbbd4

                                            SHA256

                                            241db349093604ab25405402ba8c4212016657c7e6a10edd3110abeb1cc2e1ba

                                            SHA512

                                            68070db39cd14841bcd49db1acf19806b0aa4b4ac4c56518b3a3baddaac1cd533f0b3ef70a378f53d65c0d6c0f745a6102b63303ea7978c79f688c787efe9cc3

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\_ssl.pyd

                                            Filesize

                                            151KB

                                            MD5

                                            6f52439450ad38bf940eef2b662e4234

                                            SHA1

                                            3dea643fac7e10cae16c6976982a626dd59ff64a

                                            SHA256

                                            31c95af04a76d3badbdd3970d9b4c6b9a72278e69d0d850a4710f1d9a01618d7

                                            SHA512

                                            fdd97e04f4a7b1814c2f904029dfb5cdfcd8a125fce884dcd6fdb09fb8a691963192192f22cf4e9d79dd2598cf097a8764aeec7a79e70a9795250c8ef0024474

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\base_library.zip

                                            Filesize

                                            764KB

                                            MD5

                                            eb823971afaade3e34cdc94868033c9a

                                            SHA1

                                            044d0b7deac27987e035223e3b792164da96502e

                                            SHA256

                                            b92e28c40e84bd3468a09d9f6d99ac5e91a542423e355d2961daa9fbfb9a0ee7

                                            SHA512

                                            b6149a093aad514b23359d42022bdd2b46491d3bae7460979f3becfc836dfb331826e21977aef9d80bb1ab1b0288ad5b99571820bef37fdd5e2788d26a8a1cec

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\libcrypto-1_1.dll

                                            Filesize

                                            2.2MB

                                            MD5

                                            7fb37dd3bc3c1c4b4e1b3210bffe578e

                                            SHA1

                                            652413ede07c1c2b07b7ed3d524d64b6913ad75d

                                            SHA256

                                            69f6df2ef03f48007fce0ef19a5105afd079eb2df8f793ee09f6c9b0ec268fb2

                                            SHA512

                                            71b333c9f9fa6163b36ad42dadef8b399d0bc67becc4066c0abe7de5b003322ad7ddad5ef853ed03a8afeef34e11b0499eef568cea5cca5aa6b8cd9fabe95d3b

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\libcrypto-1_1.dll

                                            Filesize

                                            2.1MB

                                            MD5

                                            69e2fc66b4da7ab80dfedb65e9350779

                                            SHA1

                                            974363baddca6a62887d6993db4df2a3e978f313

                                            SHA256

                                            c3c221661c0be85031ae9ba9f978c053f59beb87fe3bbc584a27d57529c53698

                                            SHA512

                                            080c8079bee19001356ff6e63e1b0be9ca78a8efc59989334c5ab884e8b37f5a4d1d729511a03887ae3c219d687f74426e04a0eac129c5ed77231affeb8d1ce9

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\libffi-7.dll

                                            Filesize

                                            32KB

                                            MD5

                                            eef7981412be8ea459064d3090f4b3aa

                                            SHA1

                                            c60da4830ce27afc234b3c3014c583f7f0a5a925

                                            SHA256

                                            f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                                            SHA512

                                            dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\libssl-1_1.dll

                                            Filesize

                                            678KB

                                            MD5

                                            bd857f444ebbf147a8fcd1215efe79fc

                                            SHA1

                                            1550e0d241c27f41c63f197b1bd669591a20c15b

                                            SHA256

                                            b7c0e42c1a60a2a062b899c8d4ebd0c50ef956177ba21785ce07c517c143aeaf

                                            SHA512

                                            2b85c1521edeadf7e118610d6546fafbbad43c288a7f0f9d38d97c4423a541dfac686634cde956812916830fbb4aad8351a23d95cd490c4a5c0f628244d30f0a

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\lxml\_elementpath.cp39-win_amd64.pyd

                                            Filesize

                                            141KB

                                            MD5

                                            701e543c4c9d3b42228e9f342d0e8eec

                                            SHA1

                                            9f2d69a5d0174ea4eca3b59bfe41c9d09c94fc8b

                                            SHA256

                                            ec553dec8c3cf836195798198a74911b4d5823a69c0bb4b89336a348255a1313

                                            SHA512

                                            3a88da4931e95cc9d1712fc27f17e9d706a7144cdce4b6380a18286ceaa9976cd5c50d60d143e4e9f11168e217248f1ce7a7d6affb4034c522ebf8132d22e7e9

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\lxml\etree.cp39-win_amd64.pyd

                                            Filesize

                                            1.4MB

                                            MD5

                                            d550d54fc3413c919b7f697d133af7de

                                            SHA1

                                            f70d31c635a9a59cd3f972fdc0dc35ea17a298c7

                                            SHA256

                                            151558671b486193e45238577e2389a813bed3af92b1f8bf1b097596ef8bdb1f

                                            SHA512

                                            799c99bff761ad6d97d27a1e3660d006433c4b8f88c9f1d2d12271d5ec7b0880017f6f256d8bdd39e5ff5974790312319bfe93a5c0b7cea22f5b4e4629d40154

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\lxml\etree.cp39-win_amd64.pyd

                                            Filesize

                                            1.0MB

                                            MD5

                                            306ec76fecbcb513f25065d86f85bec6

                                            SHA1

                                            c9662bd26217afff1b396fc715db020ade26d670

                                            SHA256

                                            4a69cb66841000da1380448677bc9cebe43977e97693d800e96650b134e0b7db

                                            SHA512

                                            9a13e18dc84d2f976dc8179b92960a26e48d64219a077d4088eab44b5e84e7335adea97d58537558e1cc1e07c6e030ac7c9940195328074c787cf0b28fd8be5c

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\psutil\_psutil_windows.cp39-win_amd64.pyd

                                            Filesize

                                            74KB

                                            MD5

                                            789827bcbae298d8d3223f33228b26af

                                            SHA1

                                            29de4ad19963292504414196dd3e353084a0e864

                                            SHA256

                                            f79f6732ea5a3675312ef4b9506bed8e15aa2d9c722d30d0c96274675aa9dc68

                                            SHA512

                                            e4d53c2a31b046862accc33ca1fb3327df10fa92e79556d16ca5dccc132bb0812df9454196554c848644c312c58faa07558382a58b53cf8889e61684cfe14885

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\pyexpat.pyd

                                            Filesize

                                            199KB

                                            MD5

                                            801d35409fec61ce6852e3540889c9c7

                                            SHA1

                                            a3c7e44433ebfef5359d12b9ac2f64782ccff3e9

                                            SHA256

                                            ab0814b19fd6b10d2729a907cf449f8a858a42b3f1288fb1c93b62950059295d

                                            SHA512

                                            d1f81469d1407b42c7aa207013c79d393ed8f598c9cf1f9d2bf3419ff82c2cd4817a5360d0af963bfd45d28f8adcedeb54701d56b06f4c0f96daa92dfec755d0

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\python3.dll

                                            Filesize

                                            58KB

                                            MD5

                                            d188e47657686c51615075f56e7bbb92

                                            SHA1

                                            98dbd7e213fb63e851b76da018f5e4ae114b1a0c

                                            SHA256

                                            84cb29052734ec4ad5d0eac8a9156202a2077ee9bd43cabc68e44ee22a74910a

                                            SHA512

                                            96ca8c589ab5db5fde72d35559170e938ce283559b1b964c860629579d6a231e1c1a1952f3d08a8af35d1790228ac8d97140b25b9c96d43f45e3398459ae51bc

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\python39.dll

                                            Filesize

                                            2.8MB

                                            MD5

                                            0d3946bb9a57b3bdb8d483aa0ac9c065

                                            SHA1

                                            07a4d97353d187f15b5675aded839c25eb50c6c4

                                            SHA256

                                            15f00ac693eb0843f7d4be65e3b09b6c2d6a528840cadd035286a9cf25a3d605

                                            SHA512

                                            c98ce69210ff0eba2ab6f745ef7974483845b9ca05c1b881ebbeec58e7803e8472abf27b4f5bbbc175ee92c1b452858d9d66db51a243723ec6786a7736374040

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\pythoncom39.dll

                                            Filesize

                                            543KB

                                            MD5

                                            26ebff360b70ca5de0a81fccbae0b02c

                                            SHA1

                                            2415d8c46eb188648225f55a26bd19a9fb225749

                                            SHA256

                                            4077005b6ae8272d82892d183cbc972780e3aa80f848c447626761a6c244d3a3

                                            SHA512

                                            09645c61421f245df7a2f62683bc90b5e3d51607b5dd9b1e7af9d54d93bccad132d6ff8aa4ba7d083da443f2b6220302178f9a120fecce661876cbab6d90a3df

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\pywintypes39.dll

                                            Filesize

                                            139KB

                                            MD5

                                            d658ffb571a541e9e21a6b859a67e112

                                            SHA1

                                            d9e7f54eb92ce32ff4d02fedd5c9b738dabbfbdb

                                            SHA256

                                            0cc26e2acaa1933647f885b47ac6da6625be7a4cd93fae220fb172906ff22091

                                            SHA512

                                            0040b19841d2d19ab5506cefc3186813cc92f57144b7b3f0bfec45638eebc053ddb8a40f2843cafe5d0ae5c6dc7f5db646a6441d34e02d749eb9563edbe5c7b9

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\select.pyd

                                            Filesize

                                            28KB

                                            MD5

                                            f8f5a047b98309d425fd06b3b41b16e4

                                            SHA1

                                            2a44819409199b47f11d5d022e6bb1d5d1e77aea

                                            SHA256

                                            5361da714a61f99136737630d50fa4e975d76f5de75e181af73c5a23a2b49012

                                            SHA512

                                            f0a96790fcdabf02b452f5c6b27604f5a10586b4bf759994e6d636cc55335026631fa302e209a53f5e454bea03b958b6d662e0be91fa64ce187a7dc5d35a9aa9

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\ucrtbase.dll

                                            Filesize

                                            1011KB

                                            MD5

                                            42573631d628bcbb003aff58813af95e

                                            SHA1

                                            9644917ed8d1b2a4dae73a68de89bec7de0321ce

                                            SHA256

                                            e188604616dccd066abd675883c8c86a4d2bd6a987c57667de6a644652b63443

                                            SHA512

                                            d5311a560109feca3f22f5df96f203c644926c27f456902c9d7f062da68bcc0dd5735f6872e765cdfa5119374eb5aa40883809a4608b7a3c21e798a38a3fa680

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\unicodedata.pyd

                                            Filesize

                                            1.1MB

                                            MD5

                                            87f3e3cf017614f58c89c087f63a9c95

                                            SHA1

                                            0edc1309e514f8a147d62f7e9561172f3b195cd7

                                            SHA256

                                            ba6606dcdf1db16a1f0ef94c87adf580bb816105d60cf08bc570b17312a849da

                                            SHA512

                                            73f00f44239b2744c37664dbf2b7df9c178a11aa320b9437055901746036003367067f417414382977bf8379df8738c862b69d8d36c6e6aa0b0650833052c85f

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\unicodedata.pyd

                                            Filesize

                                            1.1MB

                                            MD5

                                            ae1dd1b16bafc697b1ea641480582507

                                            SHA1

                                            fcc720ec97de903d454f4734edf193c0939e0b53

                                            SHA256

                                            9983d6e1022e26bd4d2d330bb70142e4cc5a3369148bc58adee01fd7e2f0db27

                                            SHA512

                                            ca8629ef1d0f1b64ebd9ce41c467d0aeb5996b7c9deeeecb96f4c53ae775b396fe420a8bb34954923b70203b317ec91216d743e0de2f5b3fda4f8c73aa98ebcc

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI12722\win32api.pyd

                                            Filesize

                                            131KB

                                            MD5

                                            8ccfec535f312418015bcd067fe32208

                                            SHA1

                                            79aa4bc6d681972afadfa4b2bae230ce06570a56

                                            SHA256

                                            9157829433f0bd8a12b1a1cf2fb90301e20ecf43802eb0ac85525ebcc53d0e30

                                            SHA512

                                            698b3a57338ffa47e2afecf9e8f8f709061e5cb56d82d8e10e48c6d4c8d26d2e0a21f2dcedc599a1b605ee2026dc2af7bd79d9f8b035c5c6fd9bd9fc817673b8

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI59882\altgraph-0.17.2.dist-info\INSTALLER

                                            Filesize

                                            4B

                                            MD5

                                            365c9bfeb7d89244f2ce01c1de44cb85

                                            SHA1

                                            d7a03141d5d6b1e88b6b59ef08b6681df212c599

                                            SHA256

                                            ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

                                            SHA512

                                            d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

                                          • C:\Users\Admin\Downloads\Hazard_Nuker.rar

                                            Filesize

                                            8.1MB

                                            MD5

                                            65cceb312e8ab68afa5b03ae6e786e64

                                            SHA1

                                            d598d0f46c1a84355696da55769c11f6b2cdef7b

                                            SHA256

                                            bccbcc98c8b42b777294b16ef97dbeffc1185c3ee2ad117708a45eb463aa0186

                                            SHA512

                                            4d751809d2ebff805d22dea0761d80276d8d334a5787aeac5b8128f80d9eab8495dec6b607438515e40f29dce85bbac6b19cff8cad9e2bf3dade6457dd25df98

                                          • C:\Users\Admin\Downloads\Hazard_Nuker.rar

                                            Filesize

                                            31.7MB

                                            MD5

                                            ec6732dfdf11fbdde3e965f9b7903b4f

                                            SHA1

                                            db237f6c373226156d4520c1171cfdf39fb165ab

                                            SHA256

                                            34011a5b87fb60d6eb0fc0a4a64e804f8582cca22d17f7d520ef33d146ca97fb

                                            SHA512

                                            06930af569465343e8eb2f29b974a95482cb4814fb4f5b6b7ca318953c9247e41d4492a22eca34062f6464a354f38b2a7099cb26a93e12b22a55b223c89d3cac

                                          • memory/4324-906-0x00007FF9D55E0000-0x00007FF9D60A1000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/5392-588-0x0000000000140000-0x0000000000150000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5392-589-0x00007FF9D55E0000-0x00007FF9D60A1000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/5392-607-0x00007FF9D55E0000-0x00007FF9D60A1000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/5640-605-0x00007FF9D55E0000-0x00007FF9D60A1000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/5640-606-0x000000001B080000-0x000000001B090000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/5640-611-0x00007FF9D55E0000-0x00007FF9D60A1000-memory.dmp

                                            Filesize

                                            10.8MB