Analysis
-
max time kernel
300s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
04-03-2024 04:48
Static task
static1
Behavioral task
behavioral1
Sample
127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe
Resource
win10-20240221-en
General
-
Target
127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe
-
Size
282KB
-
MD5
4a393bdffb87a0892b2df4d326afb5d5
-
SHA1
98a88c61aa3e092527e8b19b976ea2d0f22e9f3f
-
SHA256
127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950
-
SHA512
40ec038c769136a972a182556da8dba8f8c30d54d69a7dd0a1dc7049c1afcd45c18ef10d83dbc38bf0ff58353f3096da1ee7148c0b1985a66b34a1e730ac7efa
-
SSDEEP
3072:F510IF0IdvuvfqnYIe1GGeh0TL2GNxcXkpmHx5jyuQX5at59orrTLAV:7iqdvOqloGGV62yrx5GuEIdorrT
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://kamsmad.com/tmp/index.php
http://souzhensil.ru/tmp/index.php
http://teplokub.com.ua/tmp/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
smokeloader
pub1
Extracted
redline
@logscloudyt_bot
185.172.128.33:8970
Extracted
amadey
4.17
http://185.215.113.32
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
lumma
https://resergvearyinitiani.shop/api
https://technologyenterdo.shop/api
https://detectordiscusser.shop/api
https://turkeyunlikelyofw.shop/api
https://associationokeo.shop/api
https://executivebrakeji.shop/api
Signatures
-
DcRat 6 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exe127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exeBA76.exeschtasks.exepid process 11364 schtasks.exe 5780 schtasks.exe 2832 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" BA76.exe 11044 schtasks.exe -
Detect ZGRat V1 7 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000832001\dais.exe family_zgrat_v1 behavioral2/memory/1436-184-0x0000000000B00000-0x0000000000B54000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000833001\alex12.exe family_zgrat_v1 behavioral2/memory/4712-202-0x0000000000EE0000-0x00000000010A2000-memory.dmp family_zgrat_v1 behavioral2/memory/4116-207-0x0000000000400000-0x0000000000592000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Roaming\configurationValue\olehpsp.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000843001\swizzy.exe family_zgrat_v1 -
Pitou 4 IoCs
Pitou.
Processes:
resource yara_rule behavioral2/memory/348-50-0x0000000000400000-0x0000000001A77000-memory.dmp pitou behavioral2/memory/348-107-0x0000000000400000-0x0000000001A77000-memory.dmp pitou behavioral2/memory/4312-121-0x0000000000400000-0x0000000001A77000-memory.dmp pitou behavioral2/memory/4312-201-0x0000000000400000-0x0000000001A77000-memory.dmp pitou -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000832001\dais.exe family_redline behavioral2/memory/1436-184-0x0000000000B00000-0x0000000000B54000-memory.dmp family_redline C:\Users\Admin\AppData\Roaming\configurationValue\fate.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\olehpsp.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\fate.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000857001\trust12344.exe family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000857001\trust12344.exe family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
288c47bbc1871b439df19ff4df68f076.exe4767d2e713f2021e8fe856e3ea638b58.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\4767d2e713f2021e8fe856e3ea638b58.exe = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000046001\seratwo.exe family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
Processes:
C7F4.exeD5F.exeexplorgu.exerandom.exeamert.exerandom.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C7F4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ D5F.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
Blocklisted process makes network request 9 IoCs
Processes:
RegAsm.exerundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 220 4740 RegAsm.exe 408 4740 RegAsm.exe 423 4740 RegAsm.exe 429 4740 RegAsm.exe 430 4740 RegAsm.exe 438 8780 rundll32.exe 441 780 rundll32.exe 1885 8608 rundll32.exe 1887 9684 rundll32.exe -
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000841001\win.exe dave -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 11712 netsh.exe 11812 netsh.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorgu.exerandom.exerandom.exeamert.exeC7F4.exeD5F.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C7F4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C7F4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion D5F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion D5F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe -
Deletes itself 1 IoCs
Processes:
pid process 3420 -
Executes dropped EXE 49 IoCs
Processes:
BA76.exeBA76.exeC7F4.exeCB03.exeE969.exe3F.exeD5F.exeexplorgu.exe21B3.exedais.exealex12.exe35B9.exeosminog.exefate.exeolehpsp.exeInstallSetup_four.exegoldprime123.exe288c47bbc1871b439df19ff4df68f076.exe47FA.exe47FA.tmpuarfisdjuditttt.exejokerpos.exestub.exewin.exesad182772.exeswizzy.exeAmadeygold.exerandom.exeInstallSetup3.exelumma28282828.exenewsun.exelastrovs.exeu3ps.0.exetrust12344.exeu3ps.1.exe4767d2e713f2021e8fe856e3ea638b58.exensm9DCB.tmp288c47bbc1871b439df19ff4df68f076.exe4767d2e713f2021e8fe856e3ea638b58.execsrss.exechrosha.exenewsun.exeamert.exeinjector.exeseratwo.exerandom.exewindefender.exewindefender.exepid process 4780 BA76.exe 2504 BA76.exe 4468 C7F4.exe 348 CB03.exe 2516 E969.exe 4312 3F.exe 524 D5F.exe 2716 explorgu.exe 1284 21B3.exe 1436 dais.exe 4712 alex12.exe 2252 35B9.exe 2696 osminog.exe 4348 fate.exe 3588 olehpsp.exe 4816 InstallSetup_four.exe 1300 goldprime123.exe 2628 288c47bbc1871b439df19ff4df68f076.exe 1912 47FA.exe 2620 47FA.tmp 2144 uarfisd 8296 juditttt.exe 9104 jokerpos.exe 10408 stub.exe 9744 win.exe 6788 sad182772.exe 9624 swizzy.exe 5520 Amadeygold.exe 3564 random.exe 5352 InstallSetup3.exe 9348 lumma28282828.exe 8756 newsun.exe 9264 lastrovs.exe 9624 u3ps.0.exe 5128 trust12344.exe 1352 u3ps.1.exe 5152 4767d2e713f2021e8fe856e3ea638b58.exe 11988 nsm9DCB.tmp 12272 288c47bbc1871b439df19ff4df68f076.exe 5688 4767d2e713f2021e8fe856e3ea638b58.exe 4800 csrss.exe 928 chrosha.exe 10288 newsun.exe 11756 amert.exe 7484 injector.exe 11352 seratwo.exe 9800 random.exe 11924 windefender.exe 11680 windefender.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
C7F4.exeD5F.exeexplorgu.exerandom.exeamert.exerandom.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Wine C7F4.exe Key opened \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Wine D5F.exe Key opened \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Wine random.exe -
Loads dropped DLL 58 IoCs
Processes:
regsvr32.exerundll32.exerundll32.exe47FA.tmprundll32.exestub.exeInstallSetup3.exeRegAsm.exeRegAsm.exeu3ps.0.exeRegAsm.exerundll32.exerundll32.exerundll32.exepid process 1004 regsvr32.exe 3660 rundll32.exe 780 rundll32.exe 2620 47FA.tmp 2620 47FA.tmp 2620 47FA.tmp 8780 rundll32.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 10408 stub.exe 5352 InstallSetup3.exe 10292 RegAsm.exe 10292 RegAsm.exe 5352 InstallSetup3.exe 5352 InstallSetup3.exe 9120 RegAsm.exe 9120 RegAsm.exe 9624 u3ps.0.exe 9624 u3ps.0.exe 7076 RegAsm.exe 7076 RegAsm.exe 5352 InstallSetup3.exe 5352 InstallSetup3.exe 8676 rundll32.exe 8608 rundll32.exe 9684 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2504-16-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-21-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-22-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-23-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-25-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-24-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-88-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-91-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-140-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-251-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-319-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-321-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-323-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-340-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-338-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-336-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-333-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-326-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-331-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-325-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-345-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-344-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-343-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2504-342-0x0000000000400000-0x0000000000848000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\nsq3F9A.tmp upx -
Processes:
288c47bbc1871b439df19ff4df68f076.exe4767d2e713f2021e8fe856e3ea638b58.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\4767d2e713f2021e8fe856e3ea638b58.exe = "0" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
BA76.exeexplorgu.exe288c47bbc1871b439df19ff4df68f076.exe4767d2e713f2021e8fe856e3ea638b58.exechrosha.execsrss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" BA76.exe Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000851001\\random.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000048001\\random.exe" chrosha.exe Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 474 ip-api.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
CB03.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 CB03.exe -
Drops file in System32 directory 10 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
C7F4.exeD5F.exeexplorgu.exerandom.exeamert.exerandom.exepid process 4468 C7F4.exe 524 D5F.exe 2716 explorgu.exe 3564 random.exe 11756 amert.exe 9800 random.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
BA76.exealex12.exeosminog.exegoldprime123.exejokerpos.exesad182772.exeswizzy.exelumma28282828.exedescription pid process target process PID 4780 set thread context of 2504 4780 BA76.exe BA76.exe PID 4712 set thread context of 4116 4712 alex12.exe RegAsm.exe PID 2696 set thread context of 4740 2696 osminog.exe powershell.exe PID 1300 set thread context of 2796 1300 goldprime123.exe RegAsm.exe PID 9104 set thread context of 10292 9104 jokerpos.exe RegAsm.exe PID 6788 set thread context of 9120 6788 sad182772.exe RegAsm.exe PID 9624 set thread context of 7076 9624 swizzy.exe RegAsm.exe PID 9348 set thread context of 5416 9348 lumma28282828.exe RegAsm.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exe4767d2e713f2021e8fe856e3ea638b58.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe File opened (read-only) \??\VBoxMiniRdrDN 4767d2e713f2021e8fe856e3ea638b58.exe -
Drops file in Windows directory 8 IoCs
Processes:
C7F4.exeAmadeygold.exe288c47bbc1871b439df19ff4df68f076.exe4767d2e713f2021e8fe856e3ea638b58.execsrss.exedescription ioc process File created C:\Windows\Tasks\explorgu.job C7F4.exe File created C:\Windows\Tasks\chrosha.job Amadeygold.exe File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File opened for modification C:\Windows\rss 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\rss\csrss.exe 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 7160 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4464 4312 WerFault.exe 3F.exe 7772 2504 WerFault.exe BA76.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe21B3.exeuarfisddescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21B3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21B3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uarfisd Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uarfisd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21B3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uarfisd -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exeRegAsm.exeRegAsm.exeu3ps.0.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u3ps.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u3ps.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5780 schtasks.exe 2832 schtasks.exe 11044 schtasks.exe 11364 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 11728 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 6496 tasklist.exe 11864 tasklist.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exe288c47bbc1871b439df19ff4df68f076.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exepid process 364 127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe 364 127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3420 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe21B3.exeuarfisdpid process 364 127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe 1284 21B3.exe 2144 uarfisd -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
dais.exeolehpsp.exegoldprime123.exedescription pid process Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 1436 dais.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 3588 olehpsp.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 1300 goldprime123.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
47FA.tmpAmadeygold.exepid process 2620 47FA.tmp 5520 Amadeygold.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
u3ps.1.exepid process 1352 u3ps.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
BA76.exeregsvr32.exeD5F.exeexplorgu.exealex12.exeRegAsm.exe35B9.exedescription pid process target process PID 3420 wrote to memory of 4780 3420 BA76.exe PID 3420 wrote to memory of 4780 3420 BA76.exe PID 3420 wrote to memory of 4780 3420 BA76.exe PID 4780 wrote to memory of 2504 4780 BA76.exe BA76.exe PID 4780 wrote to memory of 2504 4780 BA76.exe BA76.exe PID 4780 wrote to memory of 2504 4780 BA76.exe BA76.exe PID 4780 wrote to memory of 2504 4780 BA76.exe BA76.exe PID 4780 wrote to memory of 2504 4780 BA76.exe BA76.exe PID 4780 wrote to memory of 2504 4780 BA76.exe BA76.exe PID 4780 wrote to memory of 2504 4780 BA76.exe BA76.exe PID 4780 wrote to memory of 2504 4780 BA76.exe BA76.exe PID 3420 wrote to memory of 4468 3420 C7F4.exe PID 3420 wrote to memory of 4468 3420 C7F4.exe PID 3420 wrote to memory of 4468 3420 C7F4.exe PID 3420 wrote to memory of 348 3420 CB03.exe PID 3420 wrote to memory of 348 3420 CB03.exe PID 3420 wrote to memory of 348 3420 CB03.exe PID 3420 wrote to memory of 2516 3420 E969.exe PID 3420 wrote to memory of 2516 3420 E969.exe PID 3420 wrote to memory of 2516 3420 E969.exe PID 3420 wrote to memory of 4656 3420 regsvr32.exe PID 3420 wrote to memory of 4656 3420 regsvr32.exe PID 4656 wrote to memory of 1004 4656 regsvr32.exe regsvr32.exe PID 4656 wrote to memory of 1004 4656 regsvr32.exe regsvr32.exe PID 4656 wrote to memory of 1004 4656 regsvr32.exe regsvr32.exe PID 3420 wrote to memory of 4312 3420 3F.exe PID 3420 wrote to memory of 4312 3420 3F.exe PID 3420 wrote to memory of 4312 3420 3F.exe PID 3420 wrote to memory of 524 3420 D5F.exe PID 3420 wrote to memory of 524 3420 D5F.exe PID 3420 wrote to memory of 524 3420 D5F.exe PID 524 wrote to memory of 2716 524 D5F.exe explorgu.exe PID 524 wrote to memory of 2716 524 D5F.exe explorgu.exe PID 524 wrote to memory of 2716 524 D5F.exe explorgu.exe PID 3420 wrote to memory of 1284 3420 21B3.exe PID 3420 wrote to memory of 1284 3420 21B3.exe PID 3420 wrote to memory of 1284 3420 21B3.exe PID 2716 wrote to memory of 1436 2716 explorgu.exe dais.exe PID 2716 wrote to memory of 1436 2716 explorgu.exe dais.exe PID 2716 wrote to memory of 4712 2716 explorgu.exe alex12.exe PID 2716 wrote to memory of 4712 2716 explorgu.exe alex12.exe PID 2716 wrote to memory of 4712 2716 explorgu.exe alex12.exe PID 4712 wrote to memory of 4116 4712 alex12.exe RegAsm.exe PID 4712 wrote to memory of 4116 4712 alex12.exe RegAsm.exe PID 4712 wrote to memory of 4116 4712 alex12.exe RegAsm.exe PID 4712 wrote to memory of 4116 4712 alex12.exe RegAsm.exe PID 4712 wrote to memory of 4116 4712 alex12.exe RegAsm.exe PID 4712 wrote to memory of 4116 4712 alex12.exe RegAsm.exe PID 4712 wrote to memory of 4116 4712 alex12.exe RegAsm.exe PID 4712 wrote to memory of 4116 4712 alex12.exe RegAsm.exe PID 3420 wrote to memory of 2252 3420 35B9.exe PID 3420 wrote to memory of 2252 3420 35B9.exe PID 3420 wrote to memory of 2252 3420 35B9.exe PID 2716 wrote to memory of 2696 2716 explorgu.exe osminog.exe PID 2716 wrote to memory of 2696 2716 explorgu.exe osminog.exe PID 2716 wrote to memory of 2696 2716 explorgu.exe osminog.exe PID 4116 wrote to memory of 3588 4116 RegAsm.exe olehpsp.exe PID 4116 wrote to memory of 3588 4116 RegAsm.exe olehpsp.exe PID 4116 wrote to memory of 4348 4116 RegAsm.exe fate.exe PID 4116 wrote to memory of 4348 4116 RegAsm.exe fate.exe PID 4116 wrote to memory of 4348 4116 RegAsm.exe fate.exe PID 2252 wrote to memory of 4816 2252 35B9.exe InstallSetup_four.exe PID 2252 wrote to memory of 4816 2252 35B9.exe InstallSetup_four.exe PID 2252 wrote to memory of 4816 2252 35B9.exe InstallSetup_four.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe"C:\Users\Admin\AppData\Local\Temp\127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950.exe"1⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\BA76.exeC:\Users\Admin\AppData\Local\Temp\BA76.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BA76.exeC:\Users\Admin\AppData\Local\Temp\BA76.exe2⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 369563⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\C7F4.exeC:\Users\Admin\AppData\Local\Temp\C7F4.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\CB03.exeC:\Users\Admin\AppData\Local\Temp\CB03.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Local\Temp\E969.exeC:\Users\Admin\AppData\Local\Temp\E969.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\FB8A.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\FB8A.dll2⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3F.exeC:\Users\Admin\AppData\Local\Temp\3F.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 5482⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\D5F.exeC:\Users\Admin\AppData\Local\Temp\D5F.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1000832001\dais.exe"C:\Users\Admin\AppData\Local\Temp\1000832001\dais.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000833001\alex12.exe"C:\Users\Admin\AppData\Local\Temp\1000833001\alex12.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\configurationValue\olehpsp.exe"C:\Users\Admin\AppData\Roaming\configurationValue\olehpsp.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\configurationValue\fate.exe"C:\Users\Admin\AppData\Roaming\configurationValue\fate.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"5⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 36⤵
-
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Blocklisted process makes network request
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\281913400149_Desktop.zip' -CompressionLevel Optimal5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000838001\juditttt.exe"C:\Users\Admin\AppData\Local\Temp\1000838001\juditttt.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\onefile_8296_133540014166631072\stub.exe"C:\Users\Admin\AppData\Local\Temp\1000838001\juditttt.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"5⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name6⤵
- Detects videocard installed
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"5⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"5⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"5⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
-
C:\Users\Admin\AppData\Local\Temp\1000839001\jokerpos.exe"C:\Users\Admin\AppData\Local\Temp\1000839001\jokerpos.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\1000841001\win.exe"C:\Users\Admin\AppData\Local\Temp\1000841001\win.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000842001\sad182772.exe"C:\Users\Admin\AppData\Local\Temp\1000842001\sad182772.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- Checks processor information in registry
-
C:\Users\Admin\AppData\Local\Temp\1000843001\swizzy.exe"C:\Users\Admin\AppData\Local\Temp\1000843001\swizzy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- Checks processor information in registry
-
C:\Users\Admin\AppData\Local\Temp\1000844001\Amadeygold.exe"C:\Users\Admin\AppData\Local\Temp\1000844001\Amadeygold.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\1000851001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000851001\random.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\1000853001\InstallSetup3.exe"C:\Users\Admin\AppData\Local\Temp\1000853001\InstallSetup3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\nsm9DCB.tmpC:\Users\Admin\AppData\Local\Temp\nsm9DCB.tmp4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000854001\lumma28282828.exe"C:\Users\Admin\AppData\Local\Temp\1000854001\lumma28282828.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\1000855001\newsun.exe"C:\Users\Admin\AppData\Local\Temp\1000855001\newsun.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN newsun.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000855001\newsun.exe" /F4⤵
- DcRat
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1000150001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000150001\4767d2e713f2021e8fe856e3ea638b58.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000150001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000150001\4767d2e713f2021e8fe856e3ea638b58.exe"5⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\1000856001\lastrovs.exe"C:\Users\Admin\AppData\Local\Temp\1000856001\lastrovs.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000857001\trust12344.exe"C:\Users\Admin\AppData\Local\Temp\1000857001\trust12344.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\21B3.exeC:\Users\Admin\AppData\Local\Temp\21B3.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\35B9.exeC:\Users\Admin\AppData\Local\Temp\35B9.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\u3ps.0.exe"C:\Users\Admin\AppData\Local\Temp\u3ps.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\u3ps.0.exe" & del "C:\ProgramData\*.dll"" & exit4⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\u3ps.1.exe"C:\Users\Admin\AppData\Local\Temp\u3ps.1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- DcRat
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\47FA.exeC:\Users\Admin\AppData\Local\Temp\47FA.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-Q382L.tmp\47FA.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q382L.tmp\47FA.tmp" /SL5="$B0086,1746226,56832,C:\Users\Admin\AppData\Local\Temp\47FA.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Roaming\uarfisdC:\Users\Admin\AppData\Roaming\uarfisd1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\1000042001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000042001\amert.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\1000046001\seratwo.exe"C:\Users\Admin\AppData\Local\Temp\1000046001\seratwo.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000048001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000048001\random.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\281913400149_Desktop.zip' -CompressionLevel Optimal4⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\1000855001\newsun.exeC:\Users\Admin\AppData\Local\Temp\1000855001\newsun.exe1⤵
- Executes dropped EXE
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Disable or Modify System Firewall
1Modify Registry
3Virtualization/Sandbox Evasion
2Pre-OS Boot
1Bootkit
1Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Are.docxFilesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
C:\ProgramData\FHCAFIDBKEBFCBFIIIIIECGDAEFilesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
C:\ProgramData\freebl3.dllFilesize
669KB
MD5550686c0ee48c386dfcb40199bd076ac
SHA1ee5134da4d3efcb466081fb6197be5e12a5b22ab
SHA256edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa
SHA5120b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e
-
C:\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\ProgramData\msvcp140.dllFilesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
C:\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\ProgramData\softokn3.dllFilesize
251KB
MD54e52d739c324db8225bd9ab2695f262f
SHA171c3da43dc5a0d2a1941e874a6d015a071783889
SHA25674ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
SHA5122d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6
-
C:\ProgramData\vcruntime140.dllFilesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\lumma28282828.exe.logFilesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
C:\Users\Admin\AppData\Local\Temp\1000042001\amert.exeFilesize
1.8MB
MD5a14f89b98eaa6d94dd52a019eb0ba9c2
SHA17091e5fce581ef94ec690a575f4290c0c6b9dc10
SHA2563550241ffdaf4bf08b58ae6f930ddd9ff8dd6d945c682d7f2fdf4a6b80e2810e
SHA5123f29e0d81ae430f616b1715a4a31b800837989cbee251e7e69ed6e91d0f015e5273c4cb6c94950019d41c3826203272c5cb7a6c34e7653d1f267d02e43baac1c
-
C:\Users\Admin\AppData\Local\Temp\1000046001\seratwo.exeFilesize
74KB
MD529f127851fff4d296c91aedc30b1aa4f
SHA16bbf47e4642f83ebe9e40bcffb60925124ca7f43
SHA25628ad6e97a9428581834835d6b18177af24f884aa29b6670b3c8fedd11fc34043
SHA512421f35d9ed1edfe4e331ff9e286584739ce7ba6c88487a890d6a8e325cb3a75baeab4776ac7d2f465bcee38d9e3bcd49b5b9669566fd7f8d7084e07ddcb0ae36
-
C:\Users\Admin\AppData\Local\Temp\1000150001\4767d2e713f2021e8fe856e3ea638b58.exeFilesize
725KB
MD5cb6045a63c2bfa5cc72f5fb53b8b5e8c
SHA16bf0e6c6f57995d8329b246a278f72b80a537d3c
SHA256a0d8e44fded46ea7f69dd4dd9653a03abe7cd30fe75ffdb7830cd95a228ca19a
SHA512540c73d106b8537845ab3ea2f42ea8d2f17d793f03fed617573ad958b410a7b8da8efce773bfc01f243051e0faa736bbd96f69ed07aa66d86424462c52512b3a
-
C:\Users\Admin\AppData\Local\Temp\1000832001\dais.exeFilesize
310KB
MD51f22a7e6656435da34317aa3e7a95f51
SHA18bec84fa7a4a5e4113ea3548eb0c0d95d050f218
SHA25655fbfaaeee07219fa0c1854b2d594a4b334d94fad72e84f9f4b24f367628ca6c
SHA512a263145b00ff21ecaf04214996f1b277db13bdc5013591c3c9cf25e9082fc99bc5e357f56aba4cea4dbcc68f85262fe7bbd7f1cec93cde81c0b30dae77f1b95e
-
C:\Users\Admin\AppData\Local\Temp\1000833001\alex12.exeFilesize
1.7MB
MD5211c3659790c88b15827ec89ffa5898f
SHA1f0ef5847fb9a1db37b3307e3b2b6f90098aa6e65
SHA2560f2f61669d3bc852e0defe69777a70627ae072b167425a64f4c88ac9ca84389c
SHA512a7aa227100c27ba414d53af42c9dbedd3f509fa7b32fc442d2f0ede75292c917e226ec78238a66c6d46531d23856a4d1bcf1ad9567d4c1e75bfdeb975769e708
-
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exeFilesize
318KB
MD569c8535d268d104e0b48f04617980371
SHA1a835c367b6f9b9e63605c6e8aaa742f9db7dcf40
SHA2563c74e8c9c3694e4036fea99eb08ba0d3502ad3fe2158432d0efdfaacd9763c35
SHA51293f35aa818391d06c4662796bec0dced2dc7a28b666c5c4bf6a6f68898ed52b77fa2ac7dd031b701b1ab8ae396e8941ade4ef0159765419788034742534a0c9e
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exeFilesize
555KB
MD5e8947f50909d3fdd0ab558750e139756
SHA1ea4664eb61ddde1b17e3b05e67d5928703a1b6f1
SHA2560b01a984b362772a49cc7e99af1306a2bb00145b03ea8eca7db616c91f6cf445
SHA5127d7f389af526ee2947693983bf4c1cf61064cfe8c75a9708c6e0780b24f5eb261a907eeb6fedfaefcd08d8cddc9afb04c1701b85992456d793b5236a5a981f58
-
C:\Users\Admin\AppData\Local\Temp\1000838001\juditttt.exeFilesize
1.2MB
MD5796c1e56535339839e5685d0b5645bc8
SHA14e2d357e92d28430b066d4c8f94e3b579ea064e6
SHA256cc84ce409b822df11bc96ec7c2461aa33e51d58ab13b69e7381f417d7e0eb069
SHA5129a77291126199fa14bd757ef58b5cfd4d62a3e84ed874ba4c8f73ac1f855bb1998b8a2ddfd8ab45be55963efdef0a30cbda7a039a3eafac85896aff1e27bd232
-
C:\Users\Admin\AppData\Local\Temp\1000838001\juditttt.exeFilesize
1024KB
MD56c52f2cf2d2a649ada0408a3020bfa75
SHA15cd652a7960866f5c80d364940624eace6053d69
SHA256b2c1d51de8559eb33ce8b9114d10d8dfecd7d56b526d7ab6e22a052e82dab6d5
SHA512ece6666acc494bd191cb4d86489fd10d868260d6fc201369267705d8e8a90d9c13b94f307a247bad5439abe5a115df683443659e3f39bb972e85c5832cef2431
-
C:\Users\Admin\AppData\Local\Temp\1000839001\jokerpos.exeFilesize
64KB
MD5bd9c6c8297bdf6f5e0ad094a8e42deff
SHA11fecbf508d53b5de91ed855da6b6ca61c3a13e56
SHA256625d4be77eefcb0395cc815f4e6672f39c0d7501e52a3f4ea6edab94c9e717c1
SHA512d12529164bcba7cb1f34500c62a2ee0d7c3ada1dbc22604eb8ceda558b98dd4eda43b3bd75b6a6f3cec11816ef577b930a461c931a315ba41ba5af40719541e3
-
C:\Users\Admin\AppData\Local\Temp\1000839001\jokerpos.exeFilesize
171KB
MD50b497342a00fced5eb28c7bfc990d02e
SHA14bd969abbb7eab99364a3322ce23da5a5769e28b
SHA2566431a7a099dd778ec7e9c8152db98624b23ed02a237c2fe0920d53424752316a
SHA512eefeec1139d1bfd3c4c5619a38ffa2c73d71c19ac4a1d2553efb272245ca0d764c306a8cb44d16186d69a49fd2bf84b8cc2e32ea1ce738923e4c30230ff96207
-
C:\Users\Admin\AppData\Local\Temp\1000841001\win.exeFilesize
2.0MB
MD584b7ee39002e26757cb4a89c2559c509
SHA19598c8347eab0802f006fee29024518e84ccc2d1
SHA256de21dffbe5db465024c343cfbcb587032210e629d0ca53971e4e66519653c8f5
SHA5125fde2d0fe39033642b20ba93d5b981572f9acf21d0df82b2e8b0dcb29be3de82b71aaf38e84dda371086d0e52d246ff0b59a1cfc04f9e03c8a792ab853612eba
-
C:\Users\Admin\AppData\Local\Temp\1000842001\sad182772.exeFilesize
183KB
MD5306449d4b2569bcc22d31039156f5e91
SHA117956bed4ade6ce3c46a9878d9e619ded80a82b8
SHA2561feff340df2746a8272f3a9eb1cb84866fb5ea032a0e783547e009dfae921e8d
SHA512623eefa73f3c61d437a02ab8b406df82aa764ad5f53ffef0c614c225ce07108a21450de49296c60366577eefd310144ce90db2946fd24a79914dc3fdc9c929c8
-
C:\Users\Admin\AppData\Local\Temp\1000843001\swizzy.exeFilesize
64KB
MD5fee83c1a7cb4be13fb6cc5e85e1af3fc
SHA1ea0b68ab3fd325b67d4a909354a8c43b655661f9
SHA256deda83e3585cc4ecb331e13736b5221a0f1a9cd8c928883c69d97264248bb30b
SHA512bf40bcd59439e2b28d3927623a83283e7ba14e9db2e84f301714c5d300e11c8e2a9c684ad1909e7a548f21400c747d9f182ec009f5bb17745bcbaf36123a128e
-
C:\Users\Admin\AppData\Local\Temp\1000844001\Amadeygold.exeFilesize
128KB
MD5cbc929cb470bad50f7b0ede15a7a85d7
SHA1eb3ad1b2b26a743dfda4e1fda671691ef671573a
SHA256c2039d29d82242e1b864560489403811b37e6f478e4570dde0378c51d74a36e0
SHA512b500b3d8c52bff8b3cccf2f658b567d35f0a5bad0f713b099e34320bd282f7f6e4f79dfdfbbb5609b95abacdb8eced76e7798428f3239de98a3ccb409273ac35
-
C:\Users\Admin\AppData\Local\Temp\1000851001\random.exeFilesize
2.2MB
MD573a29348804d3a41bb5a3b9f5a89242a
SHA1bb13e73b177025186e581bf4fc3794d5afa309e2
SHA256465cdf0eabb9a4deb3a6a8751ac58d3d23b988fb6f2f213a12f7039080f9acd3
SHA512257cc79a52eef7908994dadd7a93bd37fcec91884aa35a4839178d9b0404342affbac113ac9252340d943fb8a768b3c364c922a16c5b07b339701c37a92f1f32
-
C:\Users\Admin\AppData\Local\Temp\1000853001\InstallSetup3.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\1000854001\lumma28282828.exeFilesize
302KB
MD54fb0c50666fb99a23589819bc8d78808
SHA1a811d242925883f2ef87188a902bc629bd927ca2
SHA2561c326787da30edba895b727214671bda8e439dd0bee3584ffc54307c938c9f28
SHA512f53dcb6b7cf8f08dc22f1372c205b8973b927b583624ab8b55697a1d53c475eefe6f1eb6a4b716999cdc7b8d38a45f8cf6ed04e21f9d5530668bbe88ed29c2d3
-
C:\Users\Admin\AppData\Local\Temp\1000855001\newsun.exeFilesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
C:\Users\Admin\AppData\Local\Temp\1000856001\lastrovs.exeFilesize
148KB
MD57789d854c72417f4b49dcae6221348b0
SHA15d4a1f85c12db13735d924d5bee5fd65f88569e2
SHA25667a8db376b3438977898afc7c53a01c041191f7e7631c2f14945d55393286185
SHA51221e27ffed153cd5e70b81cfd69520316d447e91b6a5f33ddc544ed94efe4f3d1724d301335b8045a4e0997d598c02cf849a754a056021fe776893c34367a2cf9
-
C:\Users\Admin\AppData\Local\Temp\1000857001\trust12344.exeFilesize
95KB
MD544b6f48a50be8b19b46773df9b712131
SHA1e0a322b47ec2744abeda531092483f54c038faf9
SHA25638d43a3a1f0bda152fdd683184cbc79aee1ce6f422fe7ac3841a8b8a6cca1b3a
SHA512095f4a5010c003ac657c075232b920e07400291666237027c472369e766c4a2e72a36b11909f2b701fbb6de511cec00912c2fd5741d0e4d28c42b399874c2526
-
C:\Users\Admin\AppData\Local\Temp\21B3.exeFilesize
232KB
MD5224f63c213ef6ae7688e56bde6083df6
SHA166bf0a02196acc02251fc78402c9ad7c93d2f2d2
SHA2566e17bff8b977c77f948c069260b7163713257d0dc77ed11ad4a9228297dcb73e
SHA5127d93acbca3d778c3bdbf0976e44224e930d2166a52ab703235b382f4781d9d9fbe924b5a82e028b497fb41de049daa9a9d53d92f52c7c28ba33782d606892afd
-
C:\Users\Admin\AppData\Local\Temp\21B3.exeFilesize
193KB
MD5ed1b451662d024f3929c9560bac5b790
SHA1651504e0ded19c9a8bbb10d852d65d87408977e8
SHA25656c902d3256fdc1a6a61f56b8f300a44c3dee2fb7e64e436066f9de68bc3936b
SHA5121f01a2c72114aada1afd0d7db36eb07c2daa316d0ac62788d676738878482433bc9f476b3df99608ae7ab4d7dcfea8d84e7a92335692ded0b88213b206e5957b
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exeFilesize
1.8MB
MD55d55e5fbf6b899a84431fd6915e53eca
SHA158bb6e54c033cf452a60af6b24de38a593bdef6d
SHA25614b0921596d901ad9e8fed263c8b3cd2dc4b4bf2c9f187e29d9cadb2be130579
SHA512ecc876d4b9d457f9e6e3f29bc03c5b0bfc7289fe3a6873647f17e784f4c5363ef0cb0440ab3621e59598aba8148c52f74e93e416d789ce08a816c065b126fd7f
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exeFilesize
1.8MB
MD5277d1546b36f954f6e2a2849b42a411c
SHA190a47d719732fd029402e4fa95d664b615a259ff
SHA256c2f32201946d6de15605ba78b7ee026373185839af2421b66e787fe859d8faac
SHA51211ed096c0b1642d7136628e543ee6b89bf023b2b79b51e3b960967ed9595c852291f700676c7a9e3d0966e00c256d796ee6ee07c77c6a363d925ad658b2ec166
-
C:\Users\Admin\AppData\Local\Temp\35B9.exeFilesize
1.6MB
MD58e549c0353f9ddab4e0ab1ee84564952
SHA1ad7d7b5505339e4c3915a641987c7204acea7aab
SHA256eed12a14e078ccdfa6e0bee8ca5df9eab044d3ed3475b07c09abddb617f1a8d7
SHA512ed38db3eb737e043890a02309532bf1aa89a2252a4cc6e9149ec2ebaa47bf1142f4941b6c88b031e18eafe4e432d098cffb236c3431004f89622aa8d4632fc8b
-
C:\Users\Admin\AppData\Local\Temp\35B9.exeFilesize
807KB
MD5b8dd2ea7b4272a17764fda76779f7c6d
SHA12e6229a0d824dbf6ef29537b326b567b515023c3
SHA2566e8caaf5bbcff89e9c228e1c068e974be275c485c6bf4c4325aca2992c9c6952
SHA5121f6ab2f6d26e6de6d99bae32e60061978c19e4fcb3059cc283d4ec7611624f0ca5410b3819d81248ce265a12e6f1376e41267a6e08ee96eec359670d52dad1da
-
C:\Users\Admin\AppData\Local\Temp\47FA.exeFilesize
1.4MB
MD50e2a46e729e3ef6063082f972ae546db
SHA106057c486d32bd6dba638730a66b56930971ab71
SHA25681332f082a2cfe0e5ddbf125a30d49940c3dee63bab66f103efabfd28c1263bc
SHA5124722884bb29f0437653aeec84b3cba524b765e461a2c89a0849f341e6c732835a8dafba258fa8a15a0516c3b80d2fc215f4811ad9e45e53bd9902536d4600f39
-
C:\Users\Admin\AppData\Local\Temp\47FA.exeFilesize
576KB
MD5951fa855869f67eccb16390e804228f5
SHA13c37a7518d934f21ee4ce399433fd94b61783421
SHA25651b6bcd20661dcb8438eb64f948771d013354716cadf5b0dbe88300d8edf33d4
SHA5120cea11f07b9b3d273d6ed739125b4cfd006ac197fd258b23557c5e72776109187aa27ab1d6f91a5b51bc666e53ea4712384b4e70e8908e61347a2a184f8fb303
-
C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdesc-consensus.tmpFilesize
2.6MB
MD5e6da188602c964ce4d406a3a93a4c2d9
SHA1bbd7fcdc38f3a29c372bbcf41e2a590ff9eac3d1
SHA256330a7b523ad57ad797fc522f02cd1de4df499830c8eb1ec792fe5d72c3fbb6ec
SHA5124c5436ce1bedc1037dfb87b26c93771e883db2280f5437c37d683dc0a3e1373191a1043695df73bcd1c149c91d2842e0936a5715549cce0b4aed887dbf687376
-
C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdescs.newFilesize
10.4MB
MD5c097ef169275e9307510e6edfc8c4b4d
SHA154839dd7d22b004ff7f34ab4c25354c99eebb61a
SHA25658cf18cd1f6dbb7e75b70f22a4cc250edab7e352a6a52e9e0c4396cbb137a07d
SHA5122498e107f29a52d29b354a07a5b597f73cec3e27d5b6d810c77062646a9a7b4a8e6904870438f60fcd1c32a26debfc2db5c03bd1d57c3d60d21adce94a151010
-
C:\Users\Admin\AppData\Local\Temp\BA76.exeFilesize
1.8MB
MD524001c12fe58e9b0d169eb051103a0cb
SHA164b2d574a0986f9d3f1333cd830f22f1ffcfa3fc
SHA256f658abefc53e5fa3209378bcdaad75933c355a2f063cd0ed15c8bcdaea5da542
SHA51226b210d0da5808dd61af4a48e0ea79e96c5c08fba4205a510b9489a698c3d0d59610deacba23b8c89a9927093e510c89fe3fc5c9254451bba7c15a24871f3b6b
-
C:\Users\Admin\AppData\Local\Temp\BA76.exeFilesize
1.1MB
MD58a4cd6df101e5bc69232c78b024a5912
SHA1c23ff88e1d64931528af140767a690a253acf06d
SHA2565f9c20d2bd5c6f79a05be1809445a08efc2ea70cfccae66a6d6105e1c61daa7e
SHA51285ac91718ba0fd6da355c4dbf887e665fa8804e02f9af6bb3b24d4f6bee1966efe01ffad6352acb1842e447ca598edaaf2992fc7c1da600aefd25a9a7bff18aa
-
C:\Users\Admin\AppData\Local\Temp\C7F4.exeFilesize
1.9MB
MD5fd00648fbf3526a3cc116da353512c52
SHA1af3d9e32ca5d8e1f09da18cbb2f0caecd0423890
SHA25663af40685c4c50f7de5dd1d95f3e6df42d603f1f18f8d935ec9b81fa728dee7c
SHA5128733b316b0c9a66d2b035c3605e85b031d80baa081e2736ab043f67dbe09f4128170a67a640f2aad7dedef0f868f7665bf33a52613f63a4fe000614faaedf6e0
-
C:\Users\Admin\AppData\Local\Temp\CB03.exeFilesize
554KB
MD5a1b5ee1b9649ab629a7ac257e2392f8d
SHA1dc1b14b6d57589440fb3021c9e06a3e3191968dc
SHA2562bfd95260a4c52d4474cd51e74469fc3de94caed28937ff0ce99ded66af97e65
SHA51250ccbb9fd4ea2da847c6be5988e1e82e28d551b06cc9122b921dbd40eff4b657a81a010cea76f29e88fda06f8c053090b38d04eb89a6d63ec4f42ef68b1cf82b
-
C:\Users\Admin\AppData\Local\Temp\E969.exeFilesize
6.4MB
MD595f692e61e2200a54bb125789929572d
SHA12fbd24be5f6985d225a8cb041005e52817874b4d
SHA2567f0e51fb2beb8442b673b5b73f154f66c3d36ac57d0ce22de482f8c1e7f18bad
SHA5121b1e762fa8c280bdf7ebadb49ee88eab659748ec9e5eb4818bccdd31e126ca1005aeaded39e3d8f04e692f01643c6c97be3921aed7b7eebdf51a23d10da89646
-
C:\Users\Admin\AppData\Local\Temp\FB8A.dllFilesize
2.8MB
MD5a28481707d777ce0dd61a5614f714556
SHA11d92a808a940a7e20ff6a980c1bd9a47d3876ae0
SHA256d72a2a2a13c3fa924d8a41d874392c954043eba3902a4cbba89d00e64bbb301f
SHA512569797914378bb007903976231b8afa2c6f5dd21d9a7d9125bdafb34f2b66e2b800cb11faddbeee32c7432eedcae1966f6f0354c292a490ad7b0746baa668935
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exeFilesize
380KB
MD50564a9bf638169a89ccb3820a6b9a58e
SHA157373f3b58f7cc2b9ea1808bdabb600d580a9ceb
SHA2569e4b0556f698c9bc9a07c07bf13d60908d31995e0bd73510d9dd690b20b11058
SHA51236b81c374529a9ba5fcbc6fcfebf145c27a7c30916814d63612c04372556d47994a8091cdc5f78dab460bb5296466ce0b284659c8b01883f7960ab08a1631ea6
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libffi-7.dllFilesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bnjrlnnv.vgs.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\is-Q382L.tmp\47FA.tmpFilesize
690KB
MD59201595be62396907b01df253d202d3a
SHA1b80fd00d87df9ddbda42b563e2eff93147b2c665
SHA256465be6f86ef67034a31090fafa5a4c19134e8246794b46a0cbb6e49fdf4a50ef
SHA51256c482da990d4e70a22cea125763994160ec85e8dc49c35256260eca493fbf6ac4d1e2f84abeca69a4ff70dcaec70fddd2fe3ea2d6bd5090d4bf83b90d221967
-
C:\Users\Admin\AppData\Local\Temp\is-Q382L.tmp\47FA.tmpFilesize
64KB
MD53f632e368fb2c86defcdebb66abc39eb
SHA1cd515a69cc5f764ef605f4995854754a0eafdb7a
SHA25671d82bd60c77a6939fc311c9dd16209291d5637e5919ce76280be849bc18fcf5
SHA51212349b3407a192f34b15f393030877a98f0cf679522bfc3189af0989707d8dd49a21ed64d4238ab9493466fcbc4d368ccadc657a20aecf9a16404e306a81049f
-
C:\Users\Admin\AppData\Local\Temp\nsm9DCB.tmpFilesize
232KB
MD5c327f3f72a1b6a1b2dcad4cd9b3665d6
SHA15c7f9b924fe5696b3f924b8e866a0de4e4490bc4
SHA256ac1571fa4e863b4b1a78b44b1ff7e83c7ccd85844183fb18fe5d633d7ca05c4b
SHA512ac3b6a017699c204b0d010b1984d1f3887dc4472aa983dd48d782e3ded65841ea81fa2ea179b81e72173be9599170af32a4ff821cea6b66402708145220a1a49
-
C:\Users\Admin\AppData\Local\Temp\nsq3F9A.tmpFilesize
1.7MB
MD5342be75f39e41c52b985b38bc74840c9
SHA13d5ecb6f26de83421ee1aaef3f337edf8df91064
SHA256e1a91b504c9543243a1b754b9dd517a1d5b4764c080253218a9b54b847c548c7
SHA512e05ca180a871afadfc7139e879885ae28a6e5c09dd3a88e96ef0d0d159f06087cb94af1979c35160895082277a4d3dfae45d7be3f743f9a96559ddc24bd522b9
-
C:\Users\Admin\AppData\Local\Temp\nsy5538.tmp\INetC.dllFilesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
C:\Users\Admin\AppData\Local\Temp\onefile_8296_133540014166631072\python310.dllFilesize
192KB
MD5eed13cebc5e2cca0f12186912d96998a
SHA1e851d4fc864af046e2b34516075824bc1dd2d38b
SHA256f93201a37ba4932f34ff066113a14486f9ad8d9761417eb18d2c3bc7ce029d0d
SHA5121f04dcc313504af8726787297ebafd7579ded74cd86725addf31f44eda8b3d37cbd70d72f25e963044b35c11936c447347b7b2623f285f53c5a51d92e8cc0fd3
-
C:\Users\Admin\AppData\Local\Temp\onefile_8296_133540014166631072\stub.exeFilesize
896KB
MD5a5bd8bbaf9b431d63271c06b3ce7dd3b
SHA15e535be006e5ff58d2f1620eadefe1fad72c5307
SHA2564a734bc07a83c6d9ba21a352d4053be239f592f18be050a1379a26be641c0235
SHA512a6ffcf1ebe617711bb4ddbc5da0529a70c2dbad71f8eff5f7a813597e625f5dcd649adfa09a64185f21b0c1681f921c6b8be83e1c685213ff6638938d65b4010
-
C:\Users\Admin\AppData\Local\Temp\onefile_8296_133540014166631072\stub.exeFilesize
128KB
MD51595c04eb233298b5244ab8e6107acb0
SHA10729b4417d9b07c8d57d37d391d00da9fe3952bc
SHA25612f4f7c187a1587b01f041c7883f53ab3e7e780839cb89bb2dc859e41a7842d7
SHA512a1454c23bb13f23f4eeba067906e5005f159542f7006dce6f3d3e175de77a2f79958a5d5e361a40186fb79fed271e2cd6b6cc1b77c6d28ad43ecb845933ed473
-
C:\Users\Admin\AppData\Local\Temp\tmp6610.tmpFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\tmp9ECE.tmpFilesize
92KB
MD57eb210cf81286882a07a9c5079118e3d
SHA119a019f1de9cf94c1f6c68a151c64e4c6bf531ce
SHA256642595c5ae74c2d22bae5699bac63ed1b73943544762897c2a67584043499871
SHA512958709a5e3d551a4d74d86679b7f63f6bc9e90618f2f5f3d84b7e618220773b3a38accab45e7c707607352e19f7c1cb1e8ed3c8743ebda6f197aaf13908f0759
-
C:\Users\Admin\AppData\Local\Temp\tmp9FA5.tmpFilesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
704KB
MD55912b08021e3ec663c4293f1165dae12
SHA140b9f2fbf8877abf9787bed3a3c0e12aa667bd73
SHA256d8754e789362c58117c9df39c61caa78a27c4228dacf016fb2e55924ca330d5a
SHA512d104fd4ab94d664c3c2192d4d6d5aed8739f449897c50e66459fc0fee3da27e9e98c1d36ce81d6f20add527547c89e51173719d8bb6db3ab330435276408fdc8
-
C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dllFilesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dllFilesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
C:\Users\Admin\AppData\Roaming\configurationValue\fate.exeFilesize
256KB
MD513316fb17a6bbe6c85aa456f29085e09
SHA14ad0d8bd6a3f886f8f5ddf99d038100648f54b76
SHA2562ce45a52710b67db67e6116c15b44f41855b57752a4a48f8477da0bb91da40b1
SHA51226ed53cca2398e34ec1e6543d47bcff306316a86976443bfa71cf78ab423fce02358a7e9894ea6c63eccfba464fb2108144c71fa7bbd1baf496a891c05e79e3c
-
C:\Users\Admin\AppData\Roaming\configurationValue\fate.exeFilesize
268KB
MD57231e4d515401681fa553f1a9179c596
SHA1c60d2e101a76ebd2c0db1093601f5cb128b09721
SHA2566c4df6da1a10601a4fe4124090e472230eb2e336f43a30e647a1591c225f4912
SHA5123c14a25a8c54ecaf220feafc2a4294cbf1b6993bc5b622c36e59ce9d7a1499f2e5658838497dfea25b24ab3987e8dd26ad7694d678b6e3bfb8d5350f5faae60e
-
C:\Users\Admin\AppData\Roaming\configurationValue\olehpsp.exeFilesize
310KB
MD5afbc408680d16aa491e10c002dc9c3d0
SHA1272e07bc68d862f65fc2006d9d714ad03cb09086
SHA2567b32e5045377a79d4f7f552d9971022f6883799eebeffa8f48f3c76e66acb80d
SHA51205601f82bc44aaca332b7357b745a5658199c6bb86d26cbf9a110686351717359a6b64f1c713e278a3517b470cf7bc6db48c647f587999931606a137d0040fbb
-
C:\Users\Admin\AppData\Roaming\uarfisdFilesize
282KB
MD54a393bdffb87a0892b2df4d326afb5d5
SHA198a88c61aa3e092527e8b19b976ea2d0f22e9f3f
SHA256127a8a3559d1e3414b4b729b8ba94e4c1da1c4b5712a00c0d9287716962dc950
SHA51240ec038c769136a972a182556da8dba8f8c30d54d69a7dd0a1dc7049c1afcd45c18ef10d83dbc38bf0ff58353f3096da1ee7148c0b1985a66b34a1e730ac7efa
-
C:\Users\Admin\AppData\Roaming\uarfisdFilesize
64KB
MD5b602e9dce0b31357eb5f79faf4c3f2bf
SHA1aa521dde83758c92d6c99a2d5b4a75af39ad6e08
SHA256da852a2880f440b9122cd5b80252e966055a9823fffc20ca20ec1abd17db50fb
SHA512636f760b5ffd09965107164fe40b8a77c237b4b05e70650cf8ab64a21e3a1e2c422dd3e07c7056014497a8549a8292cc06929d7a1f2d1eca58ce3cc61b5e33d5
-
C:\Windows\Tasks\explorgu.jobFilesize
288B
MD5bdee9db9d60dfe3af6ded451ae20d7ff
SHA1527261e8d16310012487840bf32a41e5d929527c
SHA256d6b5bf088e2f55d3d66fdad2287aaec389c8e1c12b52674f18275d7f835bc959
SHA5124bec6d960c6e2058f5696e49f82e123e70911d997dbd2e3ef0fa10d48d7639b6d3e534e53752e514f86e0c472537da9d5b836ce25b862b1aaac234762e385b11
-
C:\Windows\rss\csrss.exeFilesize
896KB
MD5129f07a47dda0eda373fe0b97d3f6d93
SHA1621f2725c11ee9e6bcb2837ebea4e45159a611e4
SHA256e4b41cd7aa1b6a974671892a62e051693129372f16260114fb4df52c72d5a31e
SHA512fb99d47e2f3deab69ddf30cccaa7aeb842692159aa6d0c9e9ab938fb13d827c5e537a56902bb063791269761e31c380084051817d23b94bbcc387d1ec4e026f0
-
\Users\Admin\AppData\Local\Temp\FB8A.dllFilesize
2.0MB
MD5bcfa98083237451ffb61d6717e3d5d91
SHA1864e19a496cec981524022df8d99a60b924e1d42
SHA2567983f8e98da5e46137fa7d4a2b3e565956fb0b1b6d41beaf5be44432223cfab8
SHA51221e766ff3dc845b5a513b997becb8fc19254a07cf882d258b612ea0c5fc21ca10805d0dc4130e295120f250045d323478174ea37f33aaea336397ff12fb8342d
-
\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ctypes.pydFilesize
119KB
MD587596db63925dbfe4d5f0f36394d7ab0
SHA1ad1dd48bbc078fe0a2354c28cb33f92a7e64907e
SHA25692d7954d9099762d81c1ae2836c11b6ba58c1883fde8eeefe387cc93f2f6afb4
SHA512e6d63e6fe1c3bd79f1e39cb09b6f56589f0ee80fd4f4638002fe026752bfa65457982adbef13150fa2f36e68771262d9378971023e07a75d710026ed37e83d7b
-
\Users\Admin\AppData\Local\Temp\is-H661C.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
\Users\Admin\AppData\Local\Temp\is-H661C.tmp\_isetup\_isdecmp.dllFilesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
\Users\Admin\AppData\Local\Temp\onefile_8296_133540014166631072\python310.dllFilesize
1.1MB
MD5eeb4bd9f2f2fd4415b9629ee2fdc6e77
SHA1b16ff6b2edf9b1bb33a9246b63a09e3ac246774b
SHA25600285af45f369050cf7b21b07a5a13f6c4c022633333e803d5f0abf9e5f3f6ff
SHA512ba0dcb5b88915331ac41e3c5a320ecb80ed76b347cf6b83ab1c84bebb5c356ffddef4c7e097e40f3b2205f32ca21a707809c65b30c0f2ff09db4a596e490572e
-
\Users\Admin\AppData\Local\Temp\onefile_8296_133540014166631072\vcruntime140.dllFilesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
448KB
MD50b9fd51c3214dca29e5f2f3d9d78c83a
SHA15cfd912d53a63ce702c2874a9d317e158ec5d751
SHA256af3da92fdc2266cdca76d757ce8e3d3ccdcb232bbead6599b815734bfdd13cb8
SHA51288a0a0df0aca10b2cae34f3f8cefe28450e1d7446b7a7ada3947e332e7d27961979e928a4da4e38c8344642f8aaeb517ba64170c9a27b439414c2fa1b497c691
-
\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
memory/348-49-0x0000000001BB0000-0x0000000001C1B000-memory.dmpFilesize
428KB
-
memory/348-119-0x0000000001D00000-0x0000000001E00000-memory.dmpFilesize
1024KB
-
memory/348-51-0x0000000000400000-0x0000000001A77000-memory.dmpFilesize
22.5MB
-
memory/348-50-0x0000000000400000-0x0000000001A77000-memory.dmpFilesize
22.5MB
-
memory/348-107-0x0000000000400000-0x0000000001A77000-memory.dmpFilesize
22.5MB
-
memory/348-48-0x0000000001D00000-0x0000000001E00000-memory.dmpFilesize
1024KB
-
memory/364-5-0x0000000000400000-0x0000000001A33000-memory.dmpFilesize
22.2MB
-
memory/364-1-0x0000000001AE0000-0x0000000001BE0000-memory.dmpFilesize
1024KB
-
memory/364-3-0x0000000000400000-0x0000000001A33000-memory.dmpFilesize
22.2MB
-
memory/364-2-0x0000000001AB0000-0x0000000001ABB000-memory.dmpFilesize
44KB
-
memory/524-137-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/524-149-0x0000000000DC0000-0x000000000129B000-memory.dmpFilesize
4.9MB
-
memory/524-135-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/524-134-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/524-136-0x0000000005080000-0x0000000005081000-memory.dmpFilesize
4KB
-
memory/524-138-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/524-133-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/524-139-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/524-132-0x0000000000DC0000-0x000000000129B000-memory.dmpFilesize
4.9MB
-
memory/524-131-0x0000000000DC0000-0x000000000129B000-memory.dmpFilesize
4.9MB
-
memory/524-144-0x00000000050A0000-0x00000000050A1000-memory.dmpFilesize
4KB
-
memory/524-145-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/1004-179-0x0000000010000000-0x00000000102C9000-memory.dmpFilesize
2.8MB
-
memory/1004-126-0x0000000004FC0000-0x00000000050C1000-memory.dmpFilesize
1.0MB
-
memory/1004-123-0x0000000004FC0000-0x00000000050C1000-memory.dmpFilesize
1.0MB
-
memory/1004-122-0x0000000004EA0000-0x0000000004FBC000-memory.dmpFilesize
1.1MB
-
memory/1004-111-0x00000000030D0000-0x00000000030D6000-memory.dmpFilesize
24KB
-
memory/1004-112-0x0000000010000000-0x00000000102C9000-memory.dmpFilesize
2.8MB
-
memory/1284-169-0x0000000000400000-0x0000000001A26000-memory.dmpFilesize
22.1MB
-
memory/1284-236-0x0000000000400000-0x0000000001A26000-memory.dmpFilesize
22.1MB
-
memory/1284-167-0x0000000001D50000-0x0000000001E50000-memory.dmpFilesize
1024KB
-
memory/1284-168-0x0000000001B20000-0x0000000001B2B000-memory.dmpFilesize
44KB
-
memory/1436-184-0x0000000000B00000-0x0000000000B54000-memory.dmpFilesize
336KB
-
memory/1436-187-0x000000001B860000-0x000000001B870000-memory.dmpFilesize
64KB
-
memory/1436-185-0x00007FFEE58E0000-0x00007FFEE62CC000-memory.dmpFilesize
9.9MB
-
memory/1912-337-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2504-22-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-340-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-88-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-91-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-24-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-23-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-319-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-321-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-323-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-140-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-21-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-25-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-338-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-336-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-333-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-326-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-331-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-325-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-16-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-345-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-344-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-343-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-342-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-251-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2516-90-0x00000000014C0000-0x00000000014C1000-memory.dmpFilesize
4KB
-
memory/2516-104-0x0000000002EF0000-0x0000000002F30000-memory.dmpFilesize
256KB
-
memory/2516-89-0x0000000001360000-0x0000000001361000-memory.dmpFilesize
4KB
-
memory/2516-92-0x00000000014F0000-0x00000000014F1000-memory.dmpFilesize
4KB
-
memory/2516-93-0x0000000001500000-0x0000000001501000-memory.dmpFilesize
4KB
-
memory/2516-94-0x0000000001520000-0x0000000001521000-memory.dmpFilesize
4KB
-
memory/2516-96-0x0000000002ED0000-0x0000000002ED1000-memory.dmpFilesize
4KB
-
memory/2516-95-0x00000000000B0000-0x0000000000BCF000-memory.dmpFilesize
11.1MB
-
memory/2516-97-0x0000000002EE0000-0x0000000002EE1000-memory.dmpFilesize
4KB
-
memory/2516-100-0x0000000002EF0000-0x0000000002F30000-memory.dmpFilesize
256KB
-
memory/2516-101-0x0000000002EF0000-0x0000000002F30000-memory.dmpFilesize
256KB
-
memory/2516-102-0x0000000002EF0000-0x0000000002F30000-memory.dmpFilesize
256KB
-
memory/2516-103-0x0000000002EF0000-0x0000000002F30000-memory.dmpFilesize
256KB
-
memory/2516-105-0x0000000002EF0000-0x0000000002F30000-memory.dmpFilesize
256KB
-
memory/2516-106-0x00000000000B0000-0x0000000000BCF000-memory.dmpFilesize
11.1MB
-
memory/2716-160-0x0000000004AD0000-0x0000000004AD1000-memory.dmpFilesize
4KB
-
memory/2716-279-0x0000000000BB0000-0x000000000108B000-memory.dmpFilesize
4.9MB
-
memory/2716-155-0x0000000004A70000-0x0000000004A71000-memory.dmpFilesize
4KB
-
memory/2716-154-0x0000000004A90000-0x0000000004A91000-memory.dmpFilesize
4KB
-
memory/2716-151-0x0000000000BB0000-0x000000000108B000-memory.dmpFilesize
4.9MB
-
memory/2716-159-0x0000000004AA0000-0x0000000004AA1000-memory.dmpFilesize
4KB
-
memory/2716-158-0x0000000004A60000-0x0000000004A61000-memory.dmpFilesize
4KB
-
memory/2716-161-0x0000000004AC0000-0x0000000004AC1000-memory.dmpFilesize
4KB
-
memory/2716-156-0x0000000004AB0000-0x0000000004AB1000-memory.dmpFilesize
4KB
-
memory/2716-157-0x0000000004A50000-0x0000000004A51000-memory.dmpFilesize
4KB
-
memory/2716-150-0x0000000000BB0000-0x000000000108B000-memory.dmpFilesize
4.9MB
-
memory/2716-152-0x0000000004A80000-0x0000000004A81000-memory.dmpFilesize
4KB
-
memory/3420-4-0x0000000000F20000-0x0000000000F36000-memory.dmpFilesize
88KB
-
memory/3420-226-0x00000000027F0000-0x0000000002806000-memory.dmpFilesize
88KB
-
memory/4116-207-0x0000000000400000-0x0000000000592000-memory.dmpFilesize
1.6MB
-
memory/4312-186-0x0000000001D60000-0x0000000001E60000-memory.dmpFilesize
1024KB
-
memory/4312-120-0x0000000001D60000-0x0000000001E60000-memory.dmpFilesize
1024KB
-
memory/4312-201-0x0000000000400000-0x0000000001A77000-memory.dmpFilesize
22.5MB
-
memory/4312-121-0x0000000000400000-0x0000000001A77000-memory.dmpFilesize
22.5MB
-
memory/4468-53-0x0000000004B80000-0x0000000004B81000-memory.dmpFilesize
4KB
-
memory/4468-35-0x0000000077814000-0x0000000077815000-memory.dmpFilesize
4KB
-
memory/4468-40-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/4468-41-0x0000000004B20000-0x0000000004B21000-memory.dmpFilesize
4KB
-
memory/4468-42-0x0000000004B10000-0x0000000004B11000-memory.dmpFilesize
4KB
-
memory/4468-38-0x0000000004B40000-0x0000000004B41000-memory.dmpFilesize
4KB
-
memory/4468-36-0x00000000001A0000-0x000000000067B000-memory.dmpFilesize
4.9MB
-
memory/4468-59-0x00000000001A0000-0x000000000067B000-memory.dmpFilesize
4.9MB
-
memory/4468-34-0x00000000001A0000-0x000000000067B000-memory.dmpFilesize
4.9MB
-
memory/4468-39-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/4468-37-0x0000000004B30000-0x0000000004B31000-memory.dmpFilesize
4KB
-
memory/4468-52-0x0000000004B90000-0x0000000004B91000-memory.dmpFilesize
4KB
-
memory/4712-203-0x0000000071A50000-0x000000007213E000-memory.dmpFilesize
6.9MB
-
memory/4712-202-0x0000000000EE0000-0x00000000010A2000-memory.dmpFilesize
1.8MB
-
memory/4740-304-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/4740-294-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/4780-17-0x0000000003EB0000-0x000000000406B000-memory.dmpFilesize
1.7MB
-
memory/4780-20-0x0000000004070000-0x0000000004227000-memory.dmpFilesize
1.7MB