Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 12:13

General

  • Target

    5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe

  • Size

    1.8MB

  • MD5

    74cd4f517b8acbe4944edea47a1c9071

  • SHA1

    3158bccfb035095c27936239c0d3091d4ad5189b

  • SHA256

    5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09

  • SHA512

    cfe4ecd98854d6af07e663be12e198d2d11e1635ca02905b36f13dc233ade3ca2ff2ca53c4c780a202e3131990a88acb76a1c6811d0409c6c9b407a7b1430786

  • SSDEEP

    49152:CSCEi3mNv++cFSKpnmWvE6BkwCLV+Bhk:CS7Dv+6EnmWvEAkw4V+Bh

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Extracted

Family

amadey

Version

4.21

Botnet

49e482

C2

http://147.45.47.70

Attributes
  • install_dir

    1b29d73536

  • install_file

    axplont.exe

  • strings_key

    4d31dd1a190d9879c21fac6d87dc0043

  • url_paths

    /tr8nomy/index.php

rc4.plain

Extracted

Family

redline

Botnet

1

C2

185.215.113.67:40960

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 36 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe
    "C:\Users\Admin\AppData\Local\Temp\5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2976
      • C:\Users\Admin\1000004002\3a9ed56e27.exe
        "C:\Users\Admin\1000004002\3a9ed56e27.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
          "C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2404
          • C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe
            "C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:888
            • C:\Users\Admin\AppData\Local\Temp\onefile_888_133614584659300000\stub.exe
              "C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2260
          • C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe
            "C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2472
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 72
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2644
          • C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe
            "C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"
            5⤵
            • Executes dropped EXE
            • Modifies system certificate store
            PID:2596
          • C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe
            "C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1188
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 68
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2264
          • C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe
            "C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2084
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Newoff.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:2416
            • C:\Users\Admin\AppData\Local\Temp\1000284001\toolspub1.exe
              "C:\Users\Admin\AppData\Local\Temp\1000284001\toolspub1.exe"
              6⤵
              • Executes dropped EXE
              PID:980
            • C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe
              "C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              PID:1612
              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2920
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                7⤵
                  PID:1708
                  • C:\Windows\system32\wusa.exe
                    wusa /uninstall /kb:890830 /quiet /norestart
                    8⤵
                    • Drops file in Windows directory
                    PID:1436
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop UsoSvc
                  7⤵
                  • Launches sc.exe
                  PID:1580
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop WaaSMedicSvc
                  7⤵
                  • Launches sc.exe
                  PID:2732
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop wuauserv
                  7⤵
                  • Launches sc.exe
                  PID:2772
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop bits
                  7⤵
                  • Launches sc.exe
                  PID:1644
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop dosvc
                  7⤵
                  • Launches sc.exe
                  PID:1028
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                  7⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2280
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                  7⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2204
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                  7⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3008
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                  7⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2476
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe delete "WSNKISKT"
                  7⤵
                  • Launches sc.exe
                  PID:1700
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"
                  7⤵
                  • Launches sc.exe
                  PID:2932
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop eventlog
                  7⤵
                  • Launches sc.exe
                  PID:1516
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe start "WSNKISKT"
                  7⤵
                  • Launches sc.exe
                  PID:2544
            • C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe
              "C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"
              5⤵
              • Executes dropped EXE
              PID:1784
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 72
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1432
            • C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe
              "C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"
              5⤵
              • Executes dropped EXE
              PID:3048
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 96
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2392
        • C:\Users\Admin\AppData\Local\Temp\1000005001\9e831575c4.exe
          "C:\Users\Admin\AppData\Local\Temp\1000005001\9e831575c4.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:1504
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {1962AE41-8BF0-4957-88FC-F3ADF4FC65C6} S-1-5-21-3691908287-3775019229-3534252667-1000:UOTHCPHQ\Admin:Interactive:[1]
      1⤵
        PID:1764
        • C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe
          C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe
          2⤵
          • Executes dropped EXE
          PID:2052
        • C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe
          C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe
          2⤵
          • Executes dropped EXE
          PID:2416
      • C:\ProgramData\wikombernizc\reakuqnanrkn.exe
        C:\ProgramData\wikombernizc\reakuqnanrkn.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        PID:2144
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:628
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
          2⤵
            PID:2200
            • C:\Windows\system32\wusa.exe
              wusa /uninstall /kb:890830 /quiet /norestart
              3⤵
              • Drops file in Windows directory
              PID:1364
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop UsoSvc
            2⤵
            • Launches sc.exe
            PID:1112
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop WaaSMedicSvc
            2⤵
            • Launches sc.exe
            PID:1968
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop wuauserv
            2⤵
            • Launches sc.exe
            PID:2292
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop bits
            2⤵
            • Launches sc.exe
            PID:2224
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop dosvc
            2⤵
            • Launches sc.exe
            PID:3064
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1284
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1608
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2460
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2444
          • C:\Windows\system32\conhost.exe
            C:\Windows\system32\conhost.exe
            2⤵
              PID:1580
            • C:\Windows\explorer.exe
              explorer.exe
              2⤵
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2772

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\1000004002\3a9ed56e27.exe

            Filesize

            1.8MB

            MD5

            c165996ca2a03c5c04a1af3415011f3f

            SHA1

            ed0d3c849cc0319fa5e595464988b1791f98ed73

            SHA256

            2fba8eea1a026e381ab112213f6fe09173ea37b39e9e65bdbf2b5d995dfbfa8c

            SHA512

            0035a59dec68f398edd338d819b79dea1ca5acf6d7658ac2b40b1340324d82c49cc88c75c88d81fa1352937ea4fded1277c741cf09abf70020190af92fc88a08

          • C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe

            Filesize

            10.7MB

            MD5

            cc7933b503e061ddde7158e108f19cc3

            SHA1

            41b74dc86cc1c4dde7010d3f596aacccf00b3133

            SHA256

            049f48024f31d86c5d8bf56c3da1d7be539c877ad189fb0c5aa9a228601d19eb

            SHA512

            87892a6f3e41ea43157cf13cc6402044ce41fd3d7eb7e456fced894c88d33786a80fa626c1b58436eba94997490256d2675598ba2e54b52affa64f5491c880a2

          • C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe

            Filesize

            2.1MB

            MD5

            208bd37e8ead92ed1b933239fb3c7079

            SHA1

            941191eed14fce000cfedbae9acfcb8761eb3492

            SHA256

            e1fd277ffc74d67554adce94366e6fa5ebc81f8c4999634bcc3396164ba38494

            SHA512

            a9c3c32573a16b7ca71a12af6e8c8e88502b66bae2465a82dd921fbc6e0c833b9b1c2d436963df189dd9d68568e1be9128826a2e59f1d5fe066b637d2d866715

          • C:\Users\Admin\AppData\Local\Temp\1000005001\9e831575c4.exe

            Filesize

            2.3MB

            MD5

            7154f7f38c806cfdcf8a593a1a9d29da

            SHA1

            7594597c61090519126c598b29dc3d3c0886c3a9

            SHA256

            3361fe4b6f365b1df2b53472e005ab365ad94be87888f659bdfda3af24dcdf12

            SHA512

            b5acca76aa38024e54a8f78922c160d3c43e53924c26aab81a2627260104ccfedbaf301fcee385d59a15a1bfd3d05b3ac0d3016d8d8b178b23f34e8f2304c6e8

          • C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe

            Filesize

            304KB

            MD5

            84bf36993bdd61d216e83fe391fcc7fd

            SHA1

            e023212e847a54328aaea05fbe41eb4828855ce6

            SHA256

            8e6d8b5a004c8f21bee1bbe4213c6d78cf80e439b38f587e963e9bb4569aaffa

            SHA512

            bb3241949618ad2d39057e085e150f43b4d41d74efc4658d9c27f8c0ec80420191517a2c0b6b7e225c4e50e02cd031cdfd178e05b9a869847a3c27b210d09caf

          • C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe

            Filesize

            518KB

            MD5

            c4ffab152141150528716daa608d5b92

            SHA1

            a48d3aecc0e986b6c4369b9d4cfffb08b53aed89

            SHA256

            c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475

            SHA512

            a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9

          • C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe

            Filesize

            418KB

            MD5

            0099a99f5ffb3c3ae78af0084136fab3

            SHA1

            0205a065728a9ec1133e8a372b1e3864df776e8c

            SHA256

            919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

            SHA512

            5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

          • C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe

            Filesize

            1.2MB

            MD5

            0b7e08a8268a6d413a322ff62d389bf9

            SHA1

            e04b849cc01779fe256744ad31562aca833a82c1

            SHA256

            d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65

            SHA512

            3d226673e30bbbc27e0a5a6c64bf81eca475c697486b20141df7975bef97901d4865b88f41937f5e3dd00b437f24f91493f80cb69aa366b7a49cd17b26197ba4

          • C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe

            Filesize

            778KB

            MD5

            05b11e7b711b4aaa512029ffcb529b5a

            SHA1

            a8074cf8a13f21617632951e008cdfdace73bb83

            SHA256

            2aab2ca39749b21877d1c52526009f9f5d251d934205e9f671a9e84cecd55afa

            SHA512

            dde7b561ffb3b9fe71827be9313cd3b83900c3ce76b053d028e84223fba1b06035437b3860a74de7dc2f5d40f0b90bd7d60139701d752c803eb08f362a5d57ff

          • C:\Users\Admin\AppData\Local\Temp\1000284001\toolspub1.exe

            Filesize

            316KB

            MD5

            90639f893099ececc76450b1f65abd11

            SHA1

            5ae29b4bfdffa6982fd1a70461a46868cc108845

            SHA256

            07440021c21067958af8808c382520d359ba8dd23a39a02892aa1e1cd0fdef1a

            SHA512

            00c83a9bbbe792068f1ae1a9e48da263f492b031d1e73bd73c4d137fbc4497bdcfd562d08f02e31f3e6439840f62d4bab1723976f82c34b37f80bd0f939abc9b

          • C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe

            Filesize

            2.5MB

            MD5

            ffada57f998ed6a72b6ba2f072d2690a

            SHA1

            6857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f

            SHA256

            677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12

            SHA512

            1de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f

          • C:\Users\Admin\AppData\Local\Temp\Tmp81BE.tmp

            Filesize

            2KB

            MD5

            1420d30f964eac2c85b2ccfe968eebce

            SHA1

            bdf9a6876578a3e38079c4f8cf5d6c79687ad750

            SHA256

            f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

            SHA512

            6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

          • C:\Users\Admin\AppData\Local\Temp\onefile_888_133614584659300000\python310.dll

            Filesize

            4.3MB

            MD5

            c80b5cb43e5fe7948c3562c1fff1254e

            SHA1

            f73cb1fb9445c96ecd56b984a1822e502e71ab9d

            SHA256

            058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

            SHA512

            faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

          • \Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe

            Filesize

            1.8MB

            MD5

            74cd4f517b8acbe4944edea47a1c9071

            SHA1

            3158bccfb035095c27936239c0d3091d4ad5189b

            SHA256

            5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09

            SHA512

            cfe4ecd98854d6af07e663be12e198d2d11e1635ca02905b36f13dc233ade3ca2ff2ca53c4c780a202e3131990a88acb76a1c6811d0409c6c9b407a7b1430786

          • \Users\Admin\AppData\Local\Temp\onefile_888_133614584659300000\stub.exe

            Filesize

            17.9MB

            MD5

            5ad46542eebe9910891770d619d7c4fa

            SHA1

            38b3d062740d4a350c3329f4e5d7627e4a980ef3

            SHA256

            6b0281ff5ec47dfabd801ecde7e55513e556ca6763a557bfb8f2c07b0e739bd5

            SHA512

            426aa5a0453dc0ad2494d43fdfa7d6c35f19770026650db413234859c34e9a1371272942e96d8741594a47832c4fb4391c217911bc65c6434d621f01995d1e64

          • memory/628-402-0x0000000019F40000-0x000000001A222000-memory.dmp

            Filesize

            2.9MB

          • memory/628-403-0x0000000000950000-0x0000000000958000-memory.dmp

            Filesize

            32KB

          • memory/888-378-0x000000013FF70000-0x0000000140A45000-memory.dmp

            Filesize

            10.8MB

          • memory/980-282-0x0000000000400000-0x0000000002CAE000-memory.dmp

            Filesize

            40.7MB

          • memory/1504-340-0x0000000001130000-0x0000000001717000-memory.dmp

            Filesize

            5.9MB

          • memory/1504-113-0x0000000001130000-0x0000000001717000-memory.dmp

            Filesize

            5.9MB

          • memory/1504-381-0x0000000001130000-0x0000000001717000-memory.dmp

            Filesize

            5.9MB

          • memory/1504-128-0x0000000001130000-0x0000000001717000-memory.dmp

            Filesize

            5.9MB

          • memory/1504-342-0x0000000001130000-0x0000000001717000-memory.dmp

            Filesize

            5.9MB

          • memory/1652-87-0x0000000000F90000-0x0000000001457000-memory.dmp

            Filesize

            4.8MB

          • memory/1652-118-0x0000000000F90000-0x0000000001457000-memory.dmp

            Filesize

            4.8MB

          • memory/2164-14-0x0000000007060000-0x0000000007527000-memory.dmp

            Filesize

            4.8MB

          • memory/2164-2-0x0000000000D01000-0x0000000000D2F000-memory.dmp

            Filesize

            184KB

          • memory/2164-16-0x0000000000D00000-0x00000000011C7000-memory.dmp

            Filesize

            4.8MB

          • memory/2164-1-0x0000000076F70000-0x0000000076F72000-memory.dmp

            Filesize

            8KB

          • memory/2164-0-0x0000000000D00000-0x00000000011C7000-memory.dmp

            Filesize

            4.8MB

          • memory/2164-3-0x0000000000D00000-0x00000000011C7000-memory.dmp

            Filesize

            4.8MB

          • memory/2164-5-0x0000000000D00000-0x00000000011C7000-memory.dmp

            Filesize

            4.8MB

          • memory/2260-343-0x000000013FE90000-0x00000001410C5000-memory.dmp

            Filesize

            18.2MB

          • memory/2404-129-0x0000000000CE0000-0x00000000011A7000-memory.dmp

            Filesize

            4.8MB

          • memory/2404-341-0x0000000000CE0000-0x00000000011A7000-memory.dmp

            Filesize

            4.8MB

          • memory/2404-379-0x0000000000CE0000-0x00000000011A7000-memory.dmp

            Filesize

            4.8MB

          • memory/2404-382-0x0000000000CE0000-0x00000000011A7000-memory.dmp

            Filesize

            4.8MB

          • memory/2404-121-0x0000000000CE0000-0x00000000011A7000-memory.dmp

            Filesize

            4.8MB

          • memory/2472-198-0x0000000000020000-0x0000000000021000-memory.dmp

            Filesize

            4KB

          • memory/2596-216-0x0000000000DA0000-0x0000000000DF2000-memory.dmp

            Filesize

            328KB

          • memory/2876-19-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-123-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-119-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-18-0x0000000000D51000-0x0000000000D7F000-memory.dmp

            Filesize

            184KB

          • memory/2876-21-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-127-0x000000000A080000-0x000000000A547000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-126-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-125-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-124-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-17-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-380-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-26-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-291-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-86-0x00000000067F0000-0x0000000006CB7000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-94-0x0000000000D50000-0x0000000001217000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-27-0x000000000A080000-0x000000000A547000-memory.dmp

            Filesize

            4.8MB

          • memory/2876-112-0x00000000067F0000-0x0000000006DD7000-memory.dmp

            Filesize

            5.9MB

          • memory/2876-111-0x00000000067F0000-0x0000000006DD7000-memory.dmp

            Filesize

            5.9MB

          • memory/2920-394-0x000000001B440000-0x000000001B722000-memory.dmp

            Filesize

            2.9MB

          • memory/2920-395-0x00000000027D0000-0x00000000027D8000-memory.dmp

            Filesize

            32KB

          • memory/2976-44-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-72-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-46-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-45-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-56-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-64-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-48-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-49-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-50-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-51-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-52-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-53-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-54-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-55-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-57-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-58-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-59-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-60-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-61-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-62-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-63-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-65-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-67-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-69-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-70-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-71-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-68-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-66-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-47-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-38-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2976-43-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-37-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-40-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-36-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-34-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-32-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-30-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-29-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-28-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB

          • memory/2976-25-0x0000000000400000-0x00000000009D7000-memory.dmp

            Filesize

            5.8MB