Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 07:34

General

  • Target

    8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe

  • Size

    1.8MB

  • MD5

    e08b5c71e81d980b66f93d6116480147

  • SHA1

    b13878de6b3cacb041f805ef0a3e2effd29069cb

  • SHA256

    8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126

  • SHA512

    64e52c96b9acda8e0e1a6b74516a0683733f1b2512b46ee692091bc406bdfe1d96141f23ad5148cf386797fc06abdda78d52d7c68b34b0095cf7987070082ab6

  • SSDEEP

    49152:KIsaP+Ln6dzezCcNhUhXJ1r65UQ2svx3b+:Kni+L627NhUtJs5Xk

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Extracted

Family

amadey

Version

4.21

Botnet

49e482

C2

http://147.45.47.70

Attributes
  • install_dir

    1b29d73536

  • install_file

    axplont.exe

  • strings_key

    4d31dd1a190d9879c21fac6d87dc0043

  • url_paths

    /tr8nomy/index.php

rc4.plain

Extracted

Family

redline

Botnet

1

C2

185.215.113.67:40960

Extracted

Family

redline

Botnet

@LOGSCLOUDYT_BOT

C2

185.172.128.33:8970

Extracted

Family

stealc

Botnet

zzvv

C2

http://23.88.106.134

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

risepro

C2

147.45.47.126:58709

Extracted

Family

lumma

C2

https://roomabolishsnifftwk.shop/api

https://museumtespaceorsp.shop/api

https://buttockdecarderwiso.shop/api

https://detailbaconroollyws.shop/api

https://averageaattractiionsl.shop/api

https://horsedwollfedrwos.shop/api

https://femininiespywageg.shop/api

https://patternapplauderw.shop/api

https://employhabragaomlsp.shop/api

https://understanndtytonyguw.shop/api

https://stalfbaclcalorieeis.shop/api

https://civilianurinedtsraov.shop/api

https://considerrycurrentyws.shop/api

https://messtimetabledkolvk.shop/api

https://deprivedrinkyfaiir.shop/api

https://relaxtionflouwerwi.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Stealc

    Stealc is an infostealer written in C++.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 21 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe
    "C:\Users\Admin\AppData\Local\Temp\8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5100
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
          PID:1880
        • C:\Users\Admin\1000004002\d79fa0efe5.exe
          "C:\Users\Admin\1000004002\d79fa0efe5.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1128
          • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
            "C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4568
            • C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe
              "C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3476
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                6⤵
                • Checks computer location settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1448
                • C:\Users\Admin\AppData\Roaming\configurationValue\One.exe
                  "C:\Users\Admin\AppData\Roaming\configurationValue\One.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2724
                • C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe
                  "C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1476
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                  7⤵
                    PID:5528
                    • C:\Windows\SysWOW64\choice.exe
                      choice /C Y /N /D Y /T 3
                      8⤵
                        PID:5660
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 260
                    6⤵
                    • Program crash
                    PID:5172
                • C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"
                  5⤵
                  • Executes dropped EXE
                  • Modifies system certificate store
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4688
                • C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1932
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    6⤵
                      PID:4472
                  • C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:3036
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      6⤵
                        PID:3716
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 284
                        6⤵
                        • Program crash
                        PID:5808
                    • C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:5004
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        6⤵
                          PID:2044
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          6⤵
                          • Checks computer location settings
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4868
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & del "C:\ProgramData\*.dll"" & exit
                            7⤵
                              PID:5564
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 5
                                8⤵
                                • Delays execution with timeout.exe
                                PID:5696
                        • C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe"
                          5⤵
                          • UAC bypass
                          • Windows security bypass
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Windows security modification
                          • Checks whether UAC is enabled
                          • Suspicious use of SetThreadContext
                          • Suspicious use of AdjustPrivilegeToken
                          • System policy modification
                          PID:5356
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe" -Force
                            6⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5728
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                            6⤵
                              PID:5752
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 5752 -s 152
                                7⤵
                                • Program crash
                                PID:5864
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                              6⤵
                                PID:5768
                            • C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe"
                              5⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              PID:4328
                              • C:\Windows\SysWOW64\schtasks.exe
                                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Newoff.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe" /F
                                6⤵
                                • Creates scheduled task(s)
                                PID:4436
                        • C:\Users\Admin\AppData\Local\Temp\1000005001\9d085b1c66.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000005001\9d085b1c66.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5028
                    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1128
                    • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                      C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1408
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3476 -ip 3476
                      1⤵
                        PID:3456
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3036 -ip 3036
                        1⤵
                          PID:5736
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5752 -ip 5752
                          1⤵
                            PID:5780
                          • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                            C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5968
                          • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                            C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5936
                          • C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe
                            C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe
                            1⤵
                            • Executes dropped EXE
                            PID:3716
                          • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                            C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5792
                          • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                            C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5780
                          • C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe
                            C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe
                            1⤵
                            • Executes dropped EXE
                            PID:5852

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\1000004002\d79fa0efe5.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  073fd45ecd71c3248ec538cd734b9a96

                                  SHA1

                                  d0dce79ac861bfd1f2ce917882105ddbee3225a0

                                  SHA256

                                  eae692dd1d86976bc6a0258c237af074f116aed24f81ff9c6fffff9c268447f7

                                  SHA512

                                  4e0c5f0b2bc9704b40bf2b53a79b9071f0e9375e01d8206c01b8fbeebda8b4eebe0941e643150ad1ccc28933867340d0f17e42f61b984b2cb07fc1f55b83b070

                                • C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe

                                  Filesize

                                  2.1MB

                                  MD5

                                  208bd37e8ead92ed1b933239fb3c7079

                                  SHA1

                                  941191eed14fce000cfedbae9acfcb8761eb3492

                                  SHA256

                                  e1fd277ffc74d67554adce94366e6fa5ebc81f8c4999634bcc3396164ba38494

                                  SHA512

                                  a9c3c32573a16b7ca71a12af6e8c8e88502b66bae2465a82dd921fbc6e0c833b9b1c2d436963df189dd9d68568e1be9128826a2e59f1d5fe066b637d2d866715

                                • C:\Users\Admin\AppData\Local\Temp\1000005001\9d085b1c66.exe

                                  Filesize

                                  2.3MB

                                  MD5

                                  6a07f69077745bf14148298fc7cc2355

                                  SHA1

                                  d51ca013607bf547dbf8eed75e735029178275bd

                                  SHA256

                                  e059d2495598f7548c226187891b743798beb46f55cef5f56bcb61b3673864c2

                                  SHA512

                                  2976a3dc386d8003c7c3b0f5a2ee73752ca52f7d69c122e5da9a9855217e68e4c05f7d83999088c18cace8775722534a54bd295f0a7c9cc7f364ca864b621baa

                                • C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe

                                  Filesize

                                  304KB

                                  MD5

                                  84bf36993bdd61d216e83fe391fcc7fd

                                  SHA1

                                  e023212e847a54328aaea05fbe41eb4828855ce6

                                  SHA256

                                  8e6d8b5a004c8f21bee1bbe4213c6d78cf80e439b38f587e963e9bb4569aaffa

                                  SHA512

                                  bb3241949618ad2d39057e085e150f43b4d41d74efc4658d9c27f8c0ec80420191517a2c0b6b7e225c4e50e02cd031cdfd178e05b9a869847a3c27b210d09caf

                                • C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe

                                  Filesize

                                  518KB

                                  MD5

                                  c4ffab152141150528716daa608d5b92

                                  SHA1

                                  a48d3aecc0e986b6c4369b9d4cfffb08b53aed89

                                  SHA256

                                  c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475

                                  SHA512

                                  a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9

                                • C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe

                                  Filesize

                                  1.2MB

                                  MD5

                                  0b7e08a8268a6d413a322ff62d389bf9

                                  SHA1

                                  e04b849cc01779fe256744ad31562aca833a82c1

                                  SHA256

                                  d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65

                                  SHA512

                                  3d226673e30bbbc27e0a5a6c64bf81eca475c697486b20141df7975bef97901d4865b88f41937f5e3dd00b437f24f91493f80cb69aa366b7a49cd17b26197ba4

                                • C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe

                                  Filesize

                                  778KB

                                  MD5

                                  05b11e7b711b4aaa512029ffcb529b5a

                                  SHA1

                                  a8074cf8a13f21617632951e008cdfdace73bb83

                                  SHA256

                                  2aab2ca39749b21877d1c52526009f9f5d251d934205e9f671a9e84cecd55afa

                                  SHA512

                                  dde7b561ffb3b9fe71827be9313cd3b83900c3ce76b053d028e84223fba1b06035437b3860a74de7dc2f5d40f0b90bd7d60139701d752c803eb08f362a5d57ff

                                • C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe

                                  Filesize

                                  579KB

                                  MD5

                                  a991da123f34074f2ee8ea0d798990f9

                                  SHA1

                                  3988195503348626e8f9185747a216c8e7839130

                                  SHA256

                                  fd42e618223f510d694c5fb2f8ecbc1a88cabf003bcf20da6227da30a1352a0f

                                  SHA512

                                  1f958cacb820833ea8b5ac2d9ca7f596625e688f8f6b6e3ab6f27aa3b25b8c9e5b57e1eed532a8d2519da6c1b41492eb8ac930fc25eaf2be2f344c2f32e81a49

                                • C:\Users\Admin\AppData\Local\Temp\1000030001\CoMachina.exe

                                  Filesize

                                  162B

                                  MD5

                                  1b7c22a214949975556626d7217e9a39

                                  SHA1

                                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                  SHA256

                                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                  SHA512

                                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                • C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe

                                  Filesize

                                  418KB

                                  MD5

                                  0099a99f5ffb3c3ae78af0084136fab3

                                  SHA1

                                  0205a065728a9ec1133e8a372b1e3864df776e8c

                                  SHA256

                                  919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                  SHA512

                                  5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  e08b5c71e81d980b66f93d6116480147

                                  SHA1

                                  b13878de6b3cacb041f805ef0a3e2effd29069cb

                                  SHA256

                                  8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126

                                  SHA512

                                  64e52c96b9acda8e0e1a6b74516a0683733f1b2512b46ee692091bc406bdfe1d96141f23ad5148cf386797fc06abdda78d52d7c68b34b0095cf7987070082ab6

                                • C:\Users\Admin\AppData\Local\Temp\Tmp81E2.tmp

                                  Filesize

                                  2KB

                                  MD5

                                  1420d30f964eac2c85b2ccfe968eebce

                                  SHA1

                                  bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                  SHA256

                                  f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                  SHA512

                                  6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1jbmj1vj.ghn.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4124900551-4068476067-3491212533-1000\76b53b3ec448f7ccdda2063b15d2bfc3_310807ab-751f-4d81-ae09-b202eaf21e19

                                  Filesize

                                  2KB

                                  MD5

                                  a16a349bc35874e8eb582eed5bc26692

                                  SHA1

                                  67791774ec70fd7241d6d030bac69a2b82a46632

                                  SHA256

                                  e8cdc44f10c77e268855192e4e0f102c1f24ef87f354516ed962305551e90cf8

                                  SHA512

                                  9f35640242da9297513061364cdc6f0ce4ddf2a2106b16e3b1d36ae060c0a02f5e9feb1088768af064081da126e88541a35b98a1870645ff20c73a6cb23de562

                                • C:\Users\Admin\AppData\Roaming\configurationValue\One.exe

                                  Filesize

                                  408KB

                                  MD5

                                  816df4ac8c796b73a28159a0b17369b6

                                  SHA1

                                  db8bbb6f73fab9875de4aaa489c03665d2611558

                                  SHA256

                                  7843255bc50ddda8c651f51347313daf07e53a745d39cc61d708c6e7d79b3647

                                  SHA512

                                  7dd155346acf611ffaf6399408f6409146fd724d7d382c7e143e3921e3d109563c314a0367a378b0965e427470f36bf6d70e1586d695a266f34aebd789965285

                                • C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe

                                  Filesize

                                  304KB

                                  MD5

                                  15a7cae61788e4718d3c33abb7be6436

                                  SHA1

                                  62dac3a5d50c93c51f2ab4a5ebf78837dc7d3a9f

                                  SHA256

                                  bed71147aa297d95d2e2c67352fc06f7f631af3b7871ea148638ae66fc41e200

                                  SHA512

                                  5b3e3028523e95452be169bdfb966cd03ea5dbe34b7b98cf7482ca91b8317a0f4de224751d5a530ec23e72cbd6cc8e414d2d3726fefee9c30feab69dc348fa45

                                • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                  Filesize

                                  2KB

                                  MD5

                                  425d1698cf2c3d8df8b419ca63ad4773

                                  SHA1

                                  337d26694ab542d4a075d71b4b14bb23d3cd42d9

                                  SHA256

                                  396a476efe715fc3621669f347d7ec6f2a7b2b820dd74bad3bd8a6e973a0911d

                                  SHA512

                                  0542a627290dfba6da25482570d87ab4d2b45f5be9a724f7e1e3ddfd87745e6c2543d4a2e48a9de63e7738d84296ab5dc2cb52108a688243ff9306eb2da36339

                                • memory/1128-52-0x0000000000F70000-0x0000000001431000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1128-39-0x0000000000F70000-0x0000000001431000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1128-222-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1128-244-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1408-223-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1408-246-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1448-90-0x0000000000400000-0x0000000000592000-memory.dmp

                                  Filesize

                                  1.6MB

                                • memory/1476-276-0x0000000006C10000-0x0000000006C76000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/1476-186-0x00000000065F0000-0x000000000660E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/1476-321-0x00000000084B0000-0x00000000089DC000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/1476-320-0x00000000079E0000-0x0000000007BA2000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/1476-135-0x0000000000890000-0x00000000008E2000-memory.dmp

                                  Filesize

                                  328KB

                                • memory/1932-199-0x00000000005F0000-0x00000000005F1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2724-268-0x000000001E5C0000-0x000000001E5FC000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/2724-262-0x000000001E690000-0x000000001E79A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/2724-288-0x000000001F5F0000-0x000000001FB18000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/2724-185-0x00000000008B0000-0x000000000091C000-memory.dmp

                                  Filesize

                                  432KB

                                • memory/2724-287-0x000000001EEF0000-0x000000001F0B2000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2724-282-0x000000001B6F0000-0x000000001B70E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/2724-281-0x000000001EBA0000-0x000000001EC16000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/2724-267-0x000000001C600000-0x000000001C612000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/3036-218-0x0000000000960000-0x0000000000961000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3476-91-0x00000000005E0000-0x00000000005E1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3476-89-0x00000000005E0000-0x00000000005E1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3716-217-0x0000000000400000-0x0000000000459000-memory.dmp

                                  Filesize

                                  356KB

                                • memory/3716-219-0x0000000000400000-0x0000000000459000-memory.dmp

                                  Filesize

                                  356KB

                                • memory/4220-0-0x0000000000DA0000-0x0000000001261000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4220-17-0x0000000000DA0000-0x0000000001261000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4220-5-0x0000000000DA0000-0x0000000001261000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4220-1-0x0000000077BF4000-0x0000000077BF6000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/4220-3-0x0000000000DA0000-0x0000000001261000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4220-2-0x0000000000DA1000-0x0000000000DCF000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/4472-198-0x0000000000400000-0x0000000000455000-memory.dmp

                                  Filesize

                                  340KB

                                • memory/4472-200-0x0000000000400000-0x0000000000455000-memory.dmp

                                  Filesize

                                  340KB

                                • memory/4568-374-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-336-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-322-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-355-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-364-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-361-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-53-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-300-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-333-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-339-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-352-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-329-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-358-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4568-349-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4688-192-0x0000000007060000-0x000000000716A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/4688-114-0x0000000005870000-0x0000000005902000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/4688-188-0x0000000007510000-0x0000000007B28000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/4688-112-0x0000000000F30000-0x0000000000F82000-memory.dmp

                                  Filesize

                                  328KB

                                • memory/4688-193-0x0000000006FA0000-0x0000000006FB2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/4688-194-0x0000000007000000-0x000000000703C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/4688-164-0x00000000064B0000-0x0000000006526000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/4688-283-0x0000000007D30000-0x0000000007D80000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/4688-195-0x0000000007170000-0x00000000071BC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/4688-113-0x0000000005D80000-0x0000000006324000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/4688-133-0x0000000005860000-0x000000000586A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/4868-242-0x0000000000400000-0x000000000063B000-memory.dmp

                                  Filesize

                                  2.2MB

                                • memory/4868-240-0x0000000000400000-0x000000000063B000-memory.dmp

                                  Filesize

                                  2.2MB

                                • memory/5004-241-0x0000000001110000-0x0000000001111000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5028-356-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-353-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-301-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-375-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-323-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-350-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-72-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-330-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-359-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-332-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-362-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-334-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-341-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-365-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5028-337-0x0000000000540000-0x0000000000B0E000-memory.dmp

                                  Filesize

                                  5.8MB

                                • memory/5100-20-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-366-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-340-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-335-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-376-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-81-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-21-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-338-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-331-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-326-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-351-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-324-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-310-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-354-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-299-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-19-0x0000000000301000-0x000000000032F000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/5100-357-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-18-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-363-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5100-360-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5356-284-0x0000028A52EC0000-0x0000028A52EC6000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/5356-266-0x0000028A52AF0000-0x0000028A52B2C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/5356-285-0x0000028A6CFA0000-0x0000028A6CFFC000-memory.dmp

                                  Filesize

                                  368KB

                                • memory/5728-298-0x00000217749B0000-0x00000217749D2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/5752-286-0x0000000000400000-0x0000000000408000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/5780-373-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5780-370-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5792-369-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5792-372-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5936-347-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5936-345-0x0000000000300000-0x00000000007C1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5968-348-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/5968-344-0x00000000004F0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4.8MB