Analysis

  • max time kernel
    1804s
  • max time network
    1704s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 17:52

General

  • Target

    https://cdn.discordapp.com/attachments/1213895613779808328/1213928854133932094/tos_cracked.rar?ex=65f74258&is=65e4cd58&hm=fe7b192cfde2b0027ec544a1bb61c0a1e108dc216fd6b4609c3085c782476709&

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
  • Looks for VMWare drivers on disk 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 35 IoCs
  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1213895613779808328/1213928854133932094/tos_cracked.rar?ex=65f74258&is=65e4cd58&hm=fe7b192cfde2b0027ec544a1bb61c0a1e108dc216fd6b4609c3085c782476709&
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc93d9758,0x7ffcc93d9768,0x7ffcc93d9778
      2⤵
        PID:4372
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:2
        2⤵
          PID:2704
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:8
          2⤵
            PID:4084
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:8
            2⤵
              PID:3344
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:1
              2⤵
                PID:3052
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:1
                2⤵
                  PID:976
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:8
                  2⤵
                    PID:4304
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:8
                    2⤵
                      PID:4256
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:8
                      2⤵
                        PID:1644
                      • C:\Program Files\7-Zip\7zFM.exe
                        "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\tos_cracked.rar"
                        2⤵
                        • Suspicious behavior: GetForegroundWindowSpam
                        • Suspicious use of FindShellTrayWindow
                        PID:1540
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:8
                        2⤵
                          PID:2824
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1860,i,2489698634704597396,17133406173367134247,131072 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1652
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:4632
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:3364
                          • C:\Windows\system32\OpenWith.exe
                            C:\Windows\system32\OpenWith.exe -Embedding
                            1⤵
                            • Modifies registry class
                            • Suspicious use of SetWindowsHookEx
                            PID:2124
                          • C:\Users\Admin\Desktop\esegs\loader.exe
                            "C:\Users\Admin\Desktop\esegs\loader.exe"
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Checks whether UAC is enabled
                            PID:3068
                            • C:\Users\Admin\AppData\Local\Temp\onefile_3068_133542213470093270\loader.exe
                              "C:\Users\Admin\Desktop\esegs\loader.exe"
                              2⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2700
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c "start tos.exe"
                                3⤵
                                  PID:828
                                  • C:\Users\Admin\Desktop\esegs\tos.exe
                                    tos.exe
                                    4⤵
                                    • Executes dropped EXE
                                    PID:3692
                                    • C:\Users\Admin\AppData\Local\Temp\onefile_3692_133542213498708977\main.exe
                                      tos.exe
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Looks for VirtualBox drivers on disk
                                      • Looks for VMWare drivers on disk
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks whether UAC is enabled
                                      PID:3804
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c cls
                                        6⤵
                                          PID:3872
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c title .gg/violators
                                          6⤵
                                            PID:644
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c title .gg/violators
                                            6⤵
                                              PID:2576
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "ver"
                                              6⤵
                                                PID:3304
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "cls"
                                                6⤵
                                                  PID:368

                                      Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                              Filesize

                                              1KB

                                              MD5

                                              c95c46b6a5243f68f9f8ad09e1c2d329

                                              SHA1

                                              40a1fbb74be50ecb37f12062dc95ee6acdc479b2

                                              SHA256

                                              75788a53793ad4de39d8d91fe4d0aa622592df21d06dbebb75de75e0f1299196

                                              SHA512

                                              9ea83fbacf0e8cf29c46a1ca5465cf34321db47086a2962c9644c73e3d77ab5dd68ad152b38761e474bf4c9f251e390e6d5198f68e1f0564363e3094a9fcf5f1

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                              Filesize

                                              1KB

                                              MD5

                                              5c9818d0b69280f65b798b4f3ee1bd67

                                              SHA1

                                              865d4771ef2dfbb934556db8969a3a8dd134de53

                                              SHA256

                                              06bd8b69f7af5b167b3130d05b8f3766f8ca9ddf4c48b3e93a08e15a8a5c9186

                                              SHA512

                                              84dd271d7a267262491bccc12e39a9bcbaf55c8cfef32ed63a0cf843b3490dc0cac070f30e979fc378570622158ea2fad635c613c5bf452ed8317ec2b4e9cdb8

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              ab6349eab93d2f30bcdf19c7c08ed120

                                              SHA1

                                              54ef1baa43f454a624c0e31370246d6931d3c6c5

                                              SHA256

                                              444de6b991dad249fddd12b7cf65e2800a0b727a3dfef58bfd50feac8d657f7b

                                              SHA512

                                              ed32a4bf136a1ef9bc1b4fee09687d59a8760aa1aaffb3a1603af4862e9ecdeee5a8d43c9fb3a73235ba33fd619048e1999a71aa4c81682bdb01e6fd7067c560

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              41420bb3510666b060119374d0932fd1

                                              SHA1

                                              c8890e9f162e11d492a00219dfce158cece0a834

                                              SHA256

                                              7e544a0a9aa2661127cffc98faf808c04a7a8cd2680aa7884384212cfdfeacbb

                                              SHA512

                                              487bff349c97cf3c4cbb394af9478d3707691ab0665bed76ea794cf543a50d209ffc79fb9bc451f29465f7b8562b4b767c9e44455b408cf0d4098e8766cc0e9f

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              75f8042b05f39cc202fc36d297e46281

                                              SHA1

                                              8eaf2d54813fdcd81d37918dcd26b239f145862c

                                              SHA256

                                              360479d43e79a2fd52bf3e7e0446d938db7b50443ff04029d3a19569ee262902

                                              SHA512

                                              9fda07347335476ba9b073e565e6e9f4f8c708a9d491f027c8ab016341acf20e0651a391ecfb7f49958fccb920361ebabbbc77d9027c71598ca3951f6003567e

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              128KB

                                              MD5

                                              beef2ab7a199184b75397b10dc8766b7

                                              SHA1

                                              2fd81de42855e3ccb1eb835f291c719d68ce17d3

                                              SHA256

                                              a903a1162dec4cc3f4318f7418773674fadd23c464792a3ae0712f6914e656d6

                                              SHA512

                                              24ed207a8dec6208c89e5d5a6d50ef84e50acb934e3324f595a21cb3a723922a0def4979b1d502c7cf825f4e80ef3b092d2755eb18f324b40c1f4ffec00b9c5a

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                              Filesize

                                              114KB

                                              MD5

                                              dbac6a83fb2d47074874f8bffaef1a41

                                              SHA1

                                              b17719ab578faf6423dbb58dbc8a1bf6476a2aa2

                                              SHA256

                                              19e4684ee7cb27a60b1a35e770cd5a940d8bbc11f8695ff9b2b7ec4e566dff10

                                              SHA512

                                              08dbda5f6e1d1bf1b969fcecf39c975b97f2128f95c4e415456ea6e2e425f178b1ddc09224d7256ba994c7b4bd9e81693670f09be72d3ff1ae9caf72e679c128

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe589b03.TMP

                                              Filesize

                                              110KB

                                              MD5

                                              4e488525c61ebaf70ef502446febb63f

                                              SHA1

                                              f46468c8c76a7f9a303282350750873a5948b6ec

                                              SHA256

                                              51521538f1a40f01ed9c36b58502e8e5106f03a20f5c7a85ae685f85ceccbba7

                                              SHA512

                                              14010a7ddd74698a43aa1a0fec461c1765a7cf94410d6331c054fb59c56dbcc656e5d9692c2f35d0a50c6ac505b3e246cee16b6792e6c40d35a1d450064ebf46

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                              Filesize

                                              2B

                                              MD5

                                              99914b932bd37a50b983c5e7c90ae93b

                                              SHA1

                                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                              SHA256

                                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                              SHA512

                                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ctypes.pyd

                                              Filesize

                                              120KB

                                              MD5

                                              6a9ca97c039d9bbb7abf40b53c851198

                                              SHA1

                                              01bcbd134a76ccd4f3badb5f4056abedcff60734

                                              SHA256

                                              e662d2b35bb48c5f3432bde79c0d20313238af800968ba0faa6ea7e7e5ef4535

                                              SHA512

                                              dedf7f98afc0a94a248f12e4c4ca01b412da45b926da3f9c4cbc1d2cbb98c8899f43f5884b1bf1f0b941edaeef65612ea17438e67745962ff13761300910960d

                                            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\psutil\_psutil_windows.pyd

                                              Filesize

                                              76KB

                                              MD5

                                              ebefbc98d468560b222f2d2d30ebb95c

                                              SHA1

                                              ee267e3a6e5bed1a15055451efcccac327d2bc43

                                              SHA256

                                              67c17558b635d6027ddbb781ea4e79fc0618bbec7485bd6d84b0ebcd9ef6a478

                                              SHA512

                                              ab9f949adfe9475b0ba8c37fa14b0705923f79c8a10b81446abc448ad38d5d55516f729b570d641926610c99df834223567c1efde166e6a0f805c9e2a35556e3

                                            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~2\_cffi_backend.pyd

                                              Filesize

                                              177KB

                                              MD5

                                              210def84bb2c35115a2b2ac25e3ffd8f

                                              SHA1

                                              0376b275c81c25d4df2be4789c875b31f106bd09

                                              SHA256

                                              59767b0918859beddf28a7d66a50431411ffd940c32b3e8347e6d938b60facdf

                                              SHA512

                                              cd5551eb7afd4645860c7edd7b0abd375ee6e1da934be21a6099879c8ee3812d57f2398cad28fbb6f75bba77471d9b32c96c7c1e9d3b4d26c7fc838745746c7f

                                            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~2\_queue.pyd

                                              Filesize

                                              30KB

                                              MD5

                                              ff8300999335c939fcce94f2e7f039c0

                                              SHA1

                                              4ff3a7a9d9ca005b5659b55d8cd064d2eb708b1a

                                              SHA256

                                              2f71046891ba279b00b70eb031fe90b379dbe84559cf49ce5d1297ea6bf47a78

                                              SHA512

                                              f29b1fd6f52130d69c8bd21a72a71841bf67d54b216febcd4e526e81b499b9b48831bb7cdff0bff6878aab542ca05d6326b8a293f2fb4dd95058461c0fd14017

                                            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~2\_ssl.pyd

                                              Filesize

                                              155KB

                                              MD5

                                              069bccc9f31f57616e88c92650589bdd

                                              SHA1

                                              050fc5ccd92af4fbb3047be40202d062f9958e57

                                              SHA256

                                              cb42e8598e3fa53eeebf63f2af1730b9ec64614bda276ab2cd1f1c196b3d7e32

                                              SHA512

                                              0e5513fbe42987c658dba13da737c547ff0b8006aecf538c2f5cf731c54de83e26889be62e5c8a10d2c91d5ada4d64015b640dab13130039a5a8a5ab33a723dc

                                            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~2\brotli\_brotli.pyd

                                              Filesize

                                              818KB

                                              MD5

                                              5cd8cbde51c687b96a732c6cab46b016

                                              SHA1

                                              9584be1465af75937f9cff3c6609ce2f6228498f

                                              SHA256

                                              9d007f4dd7e138404aa849eb1afa8637b8d28606f7e3349bc99fb9279184319f

                                              SHA512

                                              1f9681c65f8f803d7e150c03a126ccee715e680035b30d0dcdcd538735d2e294ee8766f5afaa4a2d663eb5da13ec85eef01f57d967753f09649017911fdd2d27

                                            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~2\libcrypto-1_1.dll

                                              Filesize

                                              2.2MB

                                              MD5

                                              7085527dc662ae8a458fc41f9d9f6b14

                                              SHA1

                                              65d0696664614c0aad7fec2900132b338f46dd55

                                              SHA256

                                              85e3a3677d14fc301b591e19ff43de4ead89201f2ee464852667b170dbf7779b

                                              SHA512

                                              09161a3d857dbe9b831aae657e43fd3101cac12c76c99e0164387c46c8d17309a1c9b6e73e4658cb50dbe48a4b2f646ce6205c8ed13530e8f4413301c0dd4e3b

                                            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~2\libssl-1_1.dll

                                              Filesize

                                              686KB

                                              MD5

                                              8769adafca3a6fc6ef26f01fd31afa84

                                              SHA1

                                              38baef74bdd2e941ccd321f91bfd49dacc6a3cb6

                                              SHA256

                                              2aebb73530d21a2273692a5a3d57235b770daf1c35f60c74e01754a5dac05071

                                              SHA512

                                              fac22f1a2ffbfb4789bdeed476c8daf42547d40efe3e11b41fadbc4445bb7ca77675a31b5337df55fdeb4d2739e0fb2cbcac2feabfd4cd48201f8ae50a9bd90b

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3068_133542213470093270\VCRUNTIME140.dll

                                              Filesize

                                              96KB

                                              MD5

                                              f12681a472b9dd04a812e16096514974

                                              SHA1

                                              6fd102eb3e0b0e6eef08118d71f28702d1a9067c

                                              SHA256

                                              d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

                                              SHA512

                                              7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3068_133542213470093270\_socket.pyd

                                              Filesize

                                              76KB

                                              MD5

                                              8140bdc5803a4893509f0e39b67158ce

                                              SHA1

                                              653cc1c82ba6240b0186623724aec3287e9bc232

                                              SHA256

                                              39715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769

                                              SHA512

                                              d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3068_133542213470093270\libffi-8.dll

                                              Filesize

                                              34KB

                                              MD5

                                              32d36d2b0719db2b739af803c5e1c2f5

                                              SHA1

                                              023c4f1159a2a05420f68daf939b9ac2b04ab082

                                              SHA256

                                              128a583e821e52b595eb4b3dda17697d3ca456ee72945f7ecce48ededad0e93c

                                              SHA512

                                              a0a68cfc2f96cb1afd29db185c940e9838b6d097d2591b0a2e66830dd500e8b9538d170125a00ee8c22b8251181b73518b73de94beeedd421d3e888564a111c1

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3068_133542213470093270\loader.exe

                                              Filesize

                                              2.3MB

                                              MD5

                                              32c57cae130dbb6e6da0b3ea4b3cf665

                                              SHA1

                                              bfe4bf3c5cd0c998e1457e3a627c18720df5cfb7

                                              SHA256

                                              ed7c2614500c88eb56f6aba483c9b472692b5f2c88f242315ee27763a19dd6be

                                              SHA512

                                              7bf3489271ac471e043e4007de9a6c4084ca33b597dea8fafa50249fbcef4a97688148169d463968a709c7b195a3e5350233b466884a3d545a8afb656138cf9e

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3068_133542213470093270\loader.exe

                                              Filesize

                                              2.3MB

                                              MD5

                                              00b39f0580a0177451226153a9c80aa1

                                              SHA1

                                              2c2a4b84bca9a0426ca6143dfccdef3e48f76f87

                                              SHA256

                                              e8a307634b7bd0ecec08b2b99840b23460dd313205c91f8f8b67260cea3b6901

                                              SHA512

                                              54e7434689d811e9bbfa7a4cf129babfe01425535c081eee26adb553504e7d4e990f07f36518ec5d4e2699c5efee3e60fcaec0953d895458d02598ee45185333

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3068_133542213470093270\python3.dll

                                              Filesize

                                              64KB

                                              MD5

                                              34e49bb1dfddf6037f0001d9aefe7d61

                                              SHA1

                                              a25a39dca11cdc195c9ecd49e95657a3e4fe3215

                                              SHA256

                                              4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281

                                              SHA512

                                              edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3068_133542213470093270\python311.dll

                                              Filesize

                                              1.9MB

                                              MD5

                                              8f11343383a676f4044713e319513119

                                              SHA1

                                              2c0619b8f8186a7150cc673f954dd08bde5cfa87

                                              SHA256

                                              75c8cd336e93a1b9034a9369072e772668535776c594aea6264cab029c0f1b97

                                              SHA512

                                              9dad569e3f278d94ec379c02af1e2f20d51e725df992fbc7ba7b725eaa5c8295d164763bd7a1d5efee10be2f0955539aa3bb51cfa091d591ede8a5e7d7512268

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3068_133542213470093270\python311.dll

                                              Filesize

                                              1.6MB

                                              MD5

                                              a1c4a7b91af71926b8e8923348c35a9c

                                              SHA1

                                              358d47f5b5037d2b45767b8d80d225da3c3d516e

                                              SHA256

                                              ebf730646c27594e8f463816a634f55b671942b3f73b7b38f9a5a158ab515682

                                              SHA512

                                              4f0cb60a2fff4c8b7b5d6107672533a7c853dedbed634064c38bfb4d2af6f28d51534574eccb21ac182455b702957eb5d259be7a460eb5417f0cd42bd859a16b

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3068_133542213470093270\select.pyd

                                              Filesize

                                              28KB

                                              MD5

                                              97ee623f1217a7b4b7de5769b7b665d6

                                              SHA1

                                              95b918f3f4c057fb9c878c8cc5e502c0bd9e54c0

                                              SHA256

                                              0046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790

                                              SHA512

                                              20edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3692_133542213498708977\_hashlib.pyd

                                              Filesize

                                              62KB

                                              MD5

                                              de4d104ea13b70c093b07219d2eff6cb

                                              SHA1

                                              83daf591c049f977879e5114c5fea9bbbfa0ad7b

                                              SHA256

                                              39bc615842a176db72d4e0558f3cdcae23ab0623ad132f815d21dcfbfd4b110e

                                              SHA512

                                              567f703c2e45f13c6107d767597dba762dc5caa86024c87e7b28df2d6c77cd06d3f1f97eed45e6ef127d5346679fea89ac4dc2c453ce366b6233c0fa68d82692

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3692_133542213498708977\libcrypto-1_1.dll

                                              Filesize

                                              2.3MB

                                              MD5

                                              207f40044378e15068ecbee08c21f449

                                              SHA1

                                              0db6abb9eebede035ab0f0b4914556d1f1931033

                                              SHA256

                                              74b28881a46def6f7b7e8de539122ed1c5460da15df638046fb1463e2ed1bd3e

                                              SHA512

                                              cf9e9ece3a411096794426c3e47f5306bb071d203248f093eab224d9365c6277ba65619283baba2734a2790506a08a4d1f33c7f84aa356a7a5663b75134c2522

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3692_133542213498708977\libcrypto-1_1.dll

                                              Filesize

                                              1.7MB

                                              MD5

                                              ed2850cb48ca2ed0b103f9e77b30761a

                                              SHA1

                                              f9a0b9848975494271554d86e89d2250e9c0ddfc

                                              SHA256

                                              5dd58cab32f120d3b06fd9bb5e4860b26e6201591ca25ee7d13161c88db527a9

                                              SHA512

                                              6f51c2d8e04b97aa9911f157215aff06930b7469cd147ff60d567d34a0a2fb95ff30d7d87791354e425c1c90a8c2e15610cf0cab8dae21d41df4f3865badf40f

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3692_133542213498708977\main.exe

                                              Filesize

                                              4.1MB

                                              MD5

                                              d0a2fe0bbe88fbad48319085420d7c1b

                                              SHA1

                                              db289c57ffd5d377e9709885c32aba456b0d415c

                                              SHA256

                                              fb85fceeb41ff217384a645e4412e716a058a94da01245cbc29bada1a3872d99

                                              SHA512

                                              2f41e4f4e94c523add2d9d7d1f8db21a387461af3058093cccadabc52f28396d363ce161b03f0804479d855204f4ac8bd7096a60c66e8c2a6ac76f82abe37541

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3692_133542213498708977\main.exe

                                              Filesize

                                              4.6MB

                                              MD5

                                              c8a633a8a2f5184c5a742a18b50923f2

                                              SHA1

                                              5d00c6d36f9ff9dac24c088b405447468b1526f2

                                              SHA256

                                              32ecd14db1f6a692baa966e16cd04e1bdb07dc48c45c01916847fca615205f02

                                              SHA512

                                              53a21298be3127a385521dd84ff28927d74120428f9ecf701c7e2ceef7ef16d945b86a05982bfde858c72742434bda49a1c1855b37fdff4f5bb5069ac23108ab

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3692_133542213498708977\python311.dll

                                              Filesize

                                              3.5MB

                                              MD5

                                              17bfb932156fa49aecd0965c24257b48

                                              SHA1

                                              d730e7b30fc056441ee86b31176f9fa6a15e0a04

                                              SHA256

                                              94a585d23a2e9c25400a3983506ed6ec502696e297dd54c2e3e8173b7d725d58

                                              SHA512

                                              4dc81bcaf92713d7b2cb6fa967779810a6654d10afdfc68bc7f0418f2a7a35b5599e6bd264de02db652d616bac685d9f38cca1d3c616296b82dd73309e926f21

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3692_133542213498708977\python311.dll

                                              Filesize

                                              3.4MB

                                              MD5

                                              d29db95a91585f9087dc4286f33a656e

                                              SHA1

                                              4683ed4c6b4b8e4e465e118fe7538590990e5e7a

                                              SHA256

                                              0f579f382439681590e2398d4d5ea3c2b612ba3a5221339c99c3be908154aadf

                                              SHA512

                                              d2eba2c47a866ab2020b5e75ada620d55d045fcf6b8d4cfd154d411ce4458c2a4ead9767d596aab86820b676a9a7f511cb868e01739ca9105fac7c7443fcf1b0

                                            • C:\Users\Admin\AppData\Local\Temp\onefile_3692_133542213498708977\zstandard\backend_c.pyd

                                              Filesize

                                              512KB

                                              MD5

                                              dc08f04c9e03452764b4e228fc38c60b

                                              SHA1

                                              317bcc3f9c81e2fc81c86d5a24c59269a77e3824

                                              SHA256

                                              b990efbda8a50c49cd7fde5894f3c8f3715cb850f8cc4c10bc03fd92e310260f

                                              SHA512

                                              fbc24dd36af658cece54be14c1118af5fda4e7c5b99d22f99690a1fd625cc0e8aa41fd9accd1c74bb4b03d494b6c3571b24f2ee423aaae9a5ad50adc583c52f7

                                            • C:\Users\Admin\Desktop\esegs\crack.dll

                                              Filesize

                                              1.1MB

                                              MD5

                                              11d5a2d6d52bec70e6501671321518c7

                                              SHA1

                                              8786dc65c32fd0b0f9d1dfb69cc1d9c4d894b37a

                                              SHA256

                                              fa1e6ac0046a258ed28079c06d88c0c6b1f84bc2054953af559d2a932597edef

                                              SHA512

                                              dac350da40c38a1f95eedf5af9860c7c67cc2817dfb8b7839dc733b03dadf24b50e88714e57d4035c4a1f57d3f30af62d62150b9ec978f1b2bb65547bc59b698

                                            • C:\Users\Admin\Desktop\esegs\crack.dll

                                              Filesize

                                              1.0MB

                                              MD5

                                              13dfa29c7acd7bad15ac86203535e8ca

                                              SHA1

                                              0c6bd3bf5cadf4c69def08a0e768a4f6f9e227e3

                                              SHA256

                                              eeb808a618036d46079004f36fa53df8a75cdd6b8eaae51c9229df8ad0de9dae

                                              SHA512

                                              33bfd8360c10c0690e93cfa8afe07220460f16318cdf0c45f09482bb3f9bddfe7b561c118969fe26f12fbbe127afb95730076bb9f88cdceb69fe0cbf8a7d7658

                                            • C:\Users\Admin\Desktop\esegs\loader.exe

                                              Filesize

                                              8.4MB

                                              MD5

                                              eff47cfab15e9ac668f2be57ab98979f

                                              SHA1

                                              af5f2af097b347b4e117459f0afb376e73eb75dd

                                              SHA256

                                              8319c68438ee46145b593f82c99c9c0c33e4b23fa93e6aaf76510222e87e0fe0

                                              SHA512

                                              1dea787c785a86b51d2bbbc95d41653d60df2bf011371f55b7f221a5c22499831d5f721d816de3a121efde8050f8674f66aa351f2497b89b17655538b544fcb0

                                            • C:\Users\Admin\Desktop\esegs\loader.exe

                                              Filesize

                                              6.3MB

                                              MD5

                                              395080fc24192294e653417dc5248b61

                                              SHA1

                                              4476b88eeb8c9bfd880e021fb8fd54ceae118db5

                                              SHA256

                                              2494c5d5e9876a934856f305df466bb0ba23ae53c1fac2b2f3fbf3981036d92b

                                              SHA512

                                              292b9b19138a4bb0f986009cb166df4db07e034ff4dbb03f77be63ae273f48a93445f3fbf2a2bb16f92b328a89707c631f897e09a62d5f08a0f9825bfca75228

                                            • C:\Users\Admin\Desktop\esegs\tos.exe

                                              Filesize

                                              3.2MB

                                              MD5

                                              d1a27593c82664c07c1a4e6794d7a6f2

                                              SHA1

                                              5b921b59804dcfb9679fe039804f24d806f91ad4

                                              SHA256

                                              020ebbb694042cafa03ec97b0148219f68448a3e5655c872753c467b5725c44a

                                              SHA512

                                              5aa36b71dabc8c8ae2b56ad302930f9e775569b8b3a2d66ce43697775aee1eaa62cb94d302a097b829eb08c2a483f8a41671479297c6d1b8247d570c6c1c80c5

                                            • C:\Users\Admin\Desktop\esegs\tos.exe

                                              Filesize

                                              3.3MB

                                              MD5

                                              10d9c94e654a1d701617ea31830a6a39

                                              SHA1

                                              1ed9b58f0ad3d34830903428a8a87e07f8993d47

                                              SHA256

                                              6fbace1c7377052b9f1510a202a0ccc7e2c8641437bd82a7a80bc7bfe4bd8cd0

                                              SHA512

                                              ba4b7d7b8c3c134f7cd86c474f6e62ad38cfd82e1f377dfb2bd1de295935b3514dabe8f85a45198e1d9493ff556285ddd50400beff00d3504528efe5d3183a36

                                            • C:\Users\Admin\Downloads\tos_cracked.rar

                                              Filesize

                                              8.5MB

                                              MD5

                                              2521b0736eb1a505e6d91f74da75615e

                                              SHA1

                                              21bc0d7a32c6cc89091ef16f1341bddfc95d0e46

                                              SHA256

                                              26a396f3996db0e81fd1cf0e33ad1064a1f849f99b08371333c92b7371862a4f

                                              SHA512

                                              6e3a6c1ed7b1a7cf3be51ff9945060b52fe70915e3bdb43cbd2b68a5795c3f4facbac8057caa2ada7838ff2abd714e93caa09e63c214afaf19f82b65ecb6b4cf

                                            • C:\Users\Admin\Downloads\tos_cracked.rar

                                              Filesize

                                              9.5MB

                                              MD5

                                              272916280a01b2088f5144e2de692769

                                              SHA1

                                              f16ff0ee46131f6ec16b98225cab07b0a00a957e

                                              SHA256

                                              2dd4a024dc6e183eea5ef2dd4ea4eebf2dec9dce04f708056121070d972064e1

                                              SHA512

                                              9cedadd2e1ce58f14830587e9c7d9f58481d92b46d6e4d16d56ccfcd48d5977871591510fb1f7f918dc28cb0b4d437d7b7756438b0cfbaeb54453b837a18eff1

                                            • memory/3068-119-0x00007FF602310000-0x00007FF603153000-memory.dmp

                                              Filesize

                                              14.3MB

                                            • memory/3068-124-0x00007FF602310000-0x00007FF603153000-memory.dmp

                                              Filesize

                                              14.3MB

                                            • memory/3068-120-0x00007FF602310000-0x00007FF603153000-memory.dmp

                                              Filesize

                                              14.3MB

                                            • memory/3068-121-0x00007FF602310000-0x00007FF603153000-memory.dmp

                                              Filesize

                                              14.3MB

                                            • memory/3068-122-0x00007FF602310000-0x00007FF603153000-memory.dmp

                                              Filesize

                                              14.3MB

                                            • memory/3068-123-0x00007FF602310000-0x00007FF603153000-memory.dmp

                                              Filesize

                                              14.3MB

                                            • memory/3068-1084-0x00007FF602310000-0x00007FF603153000-memory.dmp

                                              Filesize

                                              14.3MB

                                            • memory/3068-1035-0x00007FF602310000-0x00007FF603153000-memory.dmp

                                              Filesize

                                              14.3MB

                                            • memory/3068-117-0x00007FF602310000-0x00007FF603153000-memory.dmp

                                              Filesize

                                              14.3MB

                                            • memory/3692-1036-0x00007FF6FD220000-0x00007FF6FF64E000-memory.dmp

                                              Filesize

                                              36.2MB

                                            • memory/3692-1859-0x00007FF6FD220000-0x00007FF6FF64E000-memory.dmp

                                              Filesize

                                              36.2MB

                                            • memory/3804-1030-0x0000000051A20000-0x00000000523FC000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/3804-1031-0x0000000051A20000-0x00000000523FC000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/3804-1032-0x0000000051A20000-0x00000000523FC000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/3804-1033-0x0000000051A20000-0x00000000523FC000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/3804-1029-0x0000000051A20000-0x00000000523FC000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/3804-1028-0x0000000051A20000-0x00000000523FC000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/3804-1074-0x00007FFCB4BB0000-0x00007FFCB5B3C000-memory.dmp

                                              Filesize

                                              15.5MB

                                            • memory/3804-1027-0x0000000051A20000-0x00000000523FC000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/3804-1085-0x00007FFCB4BB0000-0x00007FFCB5B3C000-memory.dmp

                                              Filesize

                                              15.5MB