Resubmissions

02-09-2024 02:19

240902-crxs1syfmm 10

07-07-2024 21:02

240707-zvllgsyaqp 10

01-07-2024 21:37

240701-1gjemsverk 10

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 02:19

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://77.91.77.92/

http://91.202.233.141/

Wallets

0xCa90599132C4D88907Bd8E046540284aa468a035

TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6

qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

XryzFMFVpDUvU7famUGf214EXD3xNUSmQf

LLeT2zkStY3cvxMBFhoWXkG5VuZPoezduv

rwc4LVd9ABpULQ1CuCpDkgX2xVB1fUijyb

4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK

15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC

17hgMFyLDwMjxWqw5GhijhnPdJDyFDqecY

ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp

3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc

3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3

DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA

t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh

stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj

bnb1epx67ne4vckqmaj4gwke8m322f4yjr6eh52wqw

bc1qmpkehfffkr6phuklsksnd7nhgx0369sxu772m3

bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3

Attributes
  • mutex

    x66x54x66x

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Signatures

  • Modifies security service 2 TTPs 3 IoCs
  • Phorphiex payload 3 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • Windows security bypass 2 TTPs 18 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 26 IoCs
  • Loads dropped DLL 37 IoCs
  • Windows security modification 2 TTPs 21 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 27 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: SetClipboardViewer 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1288
    • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
      "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Users\Admin\AppData\Local\Temp\Files\11.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\11.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Windows\sysarddrvs.exe
          C:\Windows\sysarddrvs.exe
          4⤵
          • Modifies security service
          • Windows security bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:808
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1092
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2956
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2908
            • C:\Windows\SysWOW64\sc.exe
              sc stop UsoSvc
              6⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:2372
            • C:\Windows\SysWOW64\sc.exe
              sc stop WaaSMedicSvc
              6⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:2040
            • C:\Windows\SysWOW64\sc.exe
              sc stop wuauserv
              6⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:2968
            • C:\Windows\SysWOW64\sc.exe
              sc stop DoSvc
              6⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:2140
            • C:\Windows\SysWOW64\sc.exe
              sc stop BITS
              6⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:2024
          • C:\Users\Admin\AppData\Local\Temp\2099720541.exe
            C:\Users\Admin\AppData\Local\Temp\2099720541.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2532
            • C:\Users\Admin\AppData\Local\Temp\2153218424.exe
              C:\Users\Admin\AppData\Local\Temp\2153218424.exe
              6⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:952
          • C:\Users\Admin\AppData\Local\Temp\2407723126.exe
            C:\Users\Admin\AppData\Local\Temp\2407723126.exe
            5⤵
            • Executes dropped EXE
            PID:1916
      • C:\Users\Admin\AppData\Local\Temp\Files\t2.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\t2.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Windows\sysmablsvr.exe
          C:\Windows\sysmablsvr.exe
          4⤵
          • Modifies security service
          • Windows security bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: SetClipboardViewer
          • Suspicious use of WriteProcessMemory
          PID:2304
          • C:\Users\Admin\AppData\Local\Temp\1043721763.exe
            C:\Users\Admin\AppData\Local\Temp\1043721763.exe
            5⤵
            • Executes dropped EXE
            PID:1048
          • C:\Users\Admin\AppData\Local\Temp\1874524250.exe
            C:\Users\Admin\AppData\Local\Temp\1874524250.exe
            5⤵
            • Executes dropped EXE
            PID:2228
      • C:\Users\Admin\AppData\Local\Temp\Files\2020.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2744
        • C:\Users\Admin\AppData\Local\Temp\Files\2020.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2620
      • C:\Users\Admin\AppData\Local\Temp\Files\t1.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"
        3⤵
        • Executes dropped EXE
        PID:2004
      • C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2916
        • C:\Users\Admin\AppData\Local\Temp\342012984.exe
          C:\Users\Admin\AppData\Local\Temp\342012984.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:1804
          • C:\Windows\syslyqdvr.exe
            C:\Windows\syslyqdvr.exe
            5⤵
            • Modifies security service
            • Windows security bypass
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: SetClipboardViewer
            PID:2200
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:968
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:952
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS
              6⤵
              • System Location Discovery: System Language Discovery
              PID:920
              • C:\Windows\SysWOW64\sc.exe
                sc stop UsoSvc
                7⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:580
              • C:\Windows\SysWOW64\sc.exe
                sc stop WaaSMedicSvc
                7⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:572
              • C:\Windows\SysWOW64\sc.exe
                sc stop wuauserv
                7⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:744
              • C:\Windows\SysWOW64\sc.exe
                sc stop DoSvc
                7⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:1952
              • C:\Windows\SysWOW64\sc.exe
                sc stop BITS
                7⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:2844
            • C:\Users\Admin\AppData\Local\Temp\407416843.exe
              C:\Users\Admin\AppData\Local\Temp\407416843.exe
              6⤵
              • Executes dropped EXE
              PID:2868
            • C:\Users\Admin\AppData\Local\Temp\606615764.exe
              C:\Users\Admin\AppData\Local\Temp\606615764.exe
              6⤵
              • Executes dropped EXE
              PID:848
      • C:\Users\Admin\AppData\Local\Temp\Files\file.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\file.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:2452
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2384
      • C:\Users\Admin\AppData\Local\Temp\Files\winn.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\winn.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2140
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2140 -s 592
          4⤵
          • Loads dropped DLL
          PID:5508
      • C:\Users\Admin\AppData\Local\Temp\Files\1.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\1.exe"
        3⤵
        • Executes dropped EXE
        PID:5468
      • C:\Users\Admin\AppData\Local\Temp\Files\m.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\m.exe"
        3⤵
        • Executes dropped EXE
        PID:5544
      • C:\Users\Admin\AppData\Local\Temp\Files\updater.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\updater.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:5600
        • C:\Users\Admin\AppData\Local\Temp\Files\updater.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\updater.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:5684
      • C:\Users\Admin\AppData\Local\Temp\Files\4434.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\4434.exe"
        3⤵
        • Executes dropped EXE
        PID:5904
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#llzqlmcx#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Windows Upgrade Manager' /tr '''C:\Users\Admin\Windows Upgrade\wupgrdsv.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Windows Upgrade\wupgrdsv.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Windows Upgrade Manager' -RunLevel 'Highest' -Force; }
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1360
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Windows Upgrade Manager" /tr "'C:\Users\Admin\Windows Upgrade\wupgrdsv.exe'"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2092
    • C:\Windows\System32\schtasks.exe
      C:\Windows\System32\schtasks.exe /run /tn "Windows Upgrade Manager"
      2⤵
        PID:2536
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#llzqlmcx#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Windows Upgrade Manager' /tr '''C:\Users\Admin\Windows Upgrade\wupgrdsv.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Windows Upgrade\wupgrdsv.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Windows Upgrade Manager' -RunLevel 'Highest' -Force; }
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2344
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Windows Upgrade Manager" /tr "'C:\Users\Admin\Windows Upgrade\wupgrdsv.exe'"
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2016
      • C:\Windows\System32\notepad.exe
        C:\Windows\System32\notepad.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:292
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {93289C01-0D25-4EA7-BE47-FA944E812C0D} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]
      1⤵
      • Loads dropped DLL
      PID:2232
      • C:\Users\Admin\Windows Upgrade\wupgrdsv.exe
        "C:\Users\Admin\Windows Upgrade\wupgrdsv.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        PID:556

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDDDRHWK\3[1]

      Filesize

      10KB

      MD5

      f0f58ddeeec3c66f0c47e69785560458

      SHA1

      de8fde23c14a98e320bff0b677ba0c0e9f632137

      SHA256

      5656ef015afcd41a93981a7e809d79f1ed69a08e9ae2491cf731176f23532565

      SHA512

      a81acdc27f6c2f89e279665a53df3e5330900937f2943d9264c49b2265a2d563443df5ed130e07181ec7c76376505bedd3ca99b2ea4191669a5fee43a7e995fe

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\1[1]

      Filesize

      10KB

      MD5

      b2584cbd46067f6e7fd1ba8872d9c2d0

      SHA1

      aa90c04e9d9a7cfd4e066fb6043f99ae782b0f08

      SHA256

      21cfa730d3cf7210c2a2ac6a79933f1faccf0c98b72aff8f6b3dd374fead05f4

      SHA512

      8f388b3c4a58340d6e272107fd603d5563a84c0297e5ece921257d673f7af1ca3483457047bb1c437737a4907a6e3964784665a20b0e578a5d2d6022b68341bc

    • C:\Users\Admin\AppData\Local\Temp\342012984.exe

      Filesize

      95KB

      MD5

      f9d5d8b4fbeffbffead34ea87da2d1c9

      SHA1

      d8db7444944e63a485cbb2f1acc86c01cc40150b

      SHA256

      dc69f2b947673cdb4775a4ae081e009f6a713a35000e43e5fa86d5eabe99a7e4

      SHA512

      38ddd39867a0d437e847c29469f3599c7c2f0ca61efebbfbae6d3898e130dd33e57ee2c036847ac0f9e3b1a3fd463d409f7ed3b3f6edeb8202cd10f705079723

    • C:\Users\Admin\AppData\Local\Temp\CabD05B.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Files\4434.exe

      Filesize

      413KB

      MD5

      607c413d4698582cc147d0f0d8ce5ef1

      SHA1

      c422ff50804e4d4e55d372b266b2b9aa02d3cfdd

      SHA256

      46a8a9d9c639503a3c8c9654c18917a9cedbed9c93babd14ef14c1e25282c0d5

      SHA512

      d139f1b76b2fbc68447b03a5ca21065c21786245c8f94137c039d48c74996c10c46ca0bdd7a65cd9ccdc265b5c4ca952be9c2876ced2928c65924ef709678876

    • C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe

      Filesize

      6KB

      MD5

      cfb7fbf1d4b077a0e74ed6e9aab650a8

      SHA1

      a91cfbcc9e67e8f4891dde04e7d003fc63b7d977

      SHA256

      d93add71a451ec7c04c99185ae669e59fb866eb38f463e9425044981ed1bcae0

      SHA512

      b174d0fed1c605decc4e32079a76fbb324088b710ce1a3fe427a9a30c7bdcd6ac1ad223970cdc64061705f9a268afa96463ee73536b46991981d041517b77785

    • C:\Users\Admin\AppData\Local\Temp\TarD07E.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\_MEI27442\python311.dll

      Filesize

      5.5MB

      MD5

      86e0ad6ba8a9052d1729db2c015daf1c

      SHA1

      48112072903fff2ec5726cca19cc09e42d6384c7

      SHA256

      5ecda62f6fd2822355c560412f6d90be46a7f763f0ffeec9854177904632ac2d

      SHA512

      5d6e32f9ff90a9a584183dad1583aea2327b4aea32184b0ebbec3df41b0b833e6bb3cd40822dd64d1033125f52255812b17e4fa0add38fcda6bab1724dfaa2eb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TUD4AB6I7IOZ0LDM637D.temp

      Filesize

      7KB

      MD5

      78f3c16254b94ecd025c8b2f896bc815

      SHA1

      c5996ee4f3b3e07a33b61aa528835fa389dc9067

      SHA256

      98def28a90455a13b9f1dd23aa275401949c4c476a530ddbef20bd2dfce7cf98

      SHA512

      86b0e17d0fba5aede04eb022bbec2c86b891d1bc9e4ccb867561d659ee8bca4d0b9eadd87b3deebe4317a0c88cab89e7df9086e4c2141ad479ccc302ae7947f0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      08601c110132dc0fddbd8268203f70c5

      SHA1

      c3c0d9cb240a87a798fbc0915f87fa301cd404c6

      SHA256

      158ee3be2673b50ea72d62d4168594a998e3ba50522bc30088d8019082634a47

      SHA512

      4383105f06a21145b5c8120968f35342c22b2693b9fc2f13ce69fdbc4f3cf9274d012b9c7e3281d8ccb5faeff3f5b6cd25981fe034aabd5793979674b957b5dd

    • C:\Users\Admin\tbtnds.dat

      Filesize

      4KB

      MD5

      c015864be9d5ec9bad1b593d16b191e5

      SHA1

      407e17c737e9cb881d383a78573bec972600baa7

      SHA256

      c67740c88bc44176a90b9baea491c0c3843877e84ecdc9fdd2508f86b9042321

      SHA512

      77f033ce804bc1691be9d78f85c2eb14255db2ba23021bbc8240e3c3188f700bcf4021e7ebc2c867e18959d7e431cd2667b251480de76249fa21c9f9efff148e

    • \??\PIPE\srvsvc

      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • \Users\Admin\AppData\Local\Temp\2099720541.exe

      Filesize

      10KB

      MD5

      4fe8dc617311f7b6a4b8ebe0b1e24090

      SHA1

      2bd9341f17c8c0c62e56e1863b1d2f9c43cb30e5

      SHA256

      5016e413b0c563efc920165e7235c9f2706808877668bd297b41435acc7aade4

      SHA512

      910a12fbaffd45b0f797a95c6678a32c4a27adbb7d1474f183f8863d310d31fbba17d5d747da87ac4a30dd7cb22c67a4d1c25b302ef0c3f6954d91a459c692db

    • \Users\Admin\AppData\Local\Temp\2153218424.exe

      Filesize

      5.4MB

      MD5

      41ab08c1955fce44bfd0c76a64d1945a

      SHA1

      2b9cb05f4de5d98c541d15175d7f0199cbdd0eea

      SHA256

      dd12cb27b3867341bf6ca48715756500d3ec56c19b21bb1c1290806aa74cb493

      SHA512

      38834ae703a8541b4fec9a1db94cfe296ead58649bb1d4873b517df14d0c6a9d25e49ff04c2bf6bb0188845116a4e894aae930d849f9be8c98d2ce51da1ef116

    • \Users\Admin\AppData\Local\Temp\2407723126.exe

      Filesize

      10KB

      MD5

      83ea65863e6a835bcf1feda2987737ee

      SHA1

      96560e2d97ce8066b72bd456a0bf060245d28ad6

      SHA256

      ab5736fc570a6670674e894da46d87f67ea4622969a2abc9319c4151d910e4aa

      SHA512

      12cc826476208c83a1d5bafc24c12ab6a2239b4d4b4b06117780bcdb4f0cb6799baf57bcc616c5c03111f557d2ce7da9d2ef20871133fa384fb8ce9ca0b6e7cd

    • \Users\Admin\AppData\Local\Temp\Files\11.exe

      Filesize

      79KB

      MD5

      e2e3268f813a0c5128ff8347cbaa58c8

      SHA1

      4952cbfbdec300c048808d79ee431972b8a7ba84

      SHA256

      d8b83f78ed905a7948e2e1e371f0f905bcaaabbb314c692fee408a454f8338a3

      SHA512

      cb5aeda8378a9a5470f33f2b70c22e77d2df97b162ba953eb16da085b3c434be31a5997eac11501db0cb612cdb30fa9045719fcd10c7227c56cc782558e0c3bc

    • \Users\Admin\AppData\Local\Temp\Files\2020.exe

      Filesize

      12.3MB

      MD5

      95606667ac40795394f910864b1f8cc4

      SHA1

      e7de36b5e85369d55a948bedb2391f8fae2da9cf

      SHA256

      6f2964216c81a6f67309680b7590dfd4df31a19c7fc73917fa8057b9a194b617

      SHA512

      fab43d361900a8d7f1a17c51455d4eedbbd3aec23d11cdb92ec1fb339fc018701320f18a2a6b63285aaafafea30fa614777d30cdf410ffd7698a48437760a142

    • \Users\Admin\AppData\Local\Temp\Files\file.exe

      Filesize

      858KB

      MD5

      19e3d9fd4b09a33c2653151601ab548a

      SHA1

      261b77701db6cc7445bf42943bbb595ade26e6f8

      SHA256

      0a93e171d7b5e820be22f5fe1c2e73b23a621f42f52c00afbbd7f19333bdc32f

      SHA512

      81aa0c49f1d793b5b9f171b4e27cdfbe011a49a44e6856047aab7724c432c8d5748ada8e1754f0524fdbdff93b683a78cd3b89eca8939f0f9d73d645efae10b0

    • \Users\Admin\AppData\Local\Temp\Files\t2.exe

      Filesize

      88KB

      MD5

      ababca6d12d96e8dd2f1d7114b406fae

      SHA1

      dcd9798e83ec688aacb3de8911492a232cb41a32

      SHA256

      a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba

      SHA512

      b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f

    • \Users\Admin\AppData\Local\Temp\Files\winn.exe

      Filesize

      1.2MB

      MD5

      5e7c5bff52e54cb9843c7324a574334b

      SHA1

      6e4de10601761ae33cf4de1187b1aefde9fefa66

      SHA256

      32768587423824856dcd6856228544da79f0a2283f822af41b63a92b5259c826

      SHA512

      8b07b8470a8536ca0541672cb8bf5dc5ed7fa124cfc454868564b86474d07c17ef985fc731754e4d37cc5c81f8813f0d2b59223e7b3b6268c10ff2af8f39eaa2

    • memory/292-324-0x0000000140000000-0x00000001407EF000-memory.dmp

      Filesize

      7.9MB

    • memory/292-157-0x00000000000B0000-0x00000000000D0000-memory.dmp

      Filesize

      128KB

    • memory/292-158-0x0000000140000000-0x00000001407EF000-memory.dmp

      Filesize

      7.9MB

    • memory/292-159-0x0000000140000000-0x00000001407EF000-memory.dmp

      Filesize

      7.9MB

    • memory/292-160-0x0000000140000000-0x00000001407EF000-memory.dmp

      Filesize

      7.9MB

    • memory/292-292-0x0000000140000000-0x00000001407EF000-memory.dmp

      Filesize

      7.9MB

    • memory/292-230-0x0000000140000000-0x00000001407EF000-memory.dmp

      Filesize

      7.9MB

    • memory/556-156-0x000000013F5D0000-0x000000013FB46000-memory.dmp

      Filesize

      5.5MB

    • memory/952-143-0x000000013FA90000-0x0000000140006000-memory.dmp

      Filesize

      5.5MB

    • memory/1360-140-0x0000000001D50000-0x0000000001D58000-memory.dmp

      Filesize

      32KB

    • memory/1360-139-0x000000001B560000-0x000000001B842000-memory.dmp

      Filesize

      2.9MB

    • memory/2140-362-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-346-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-1418-0x00000000012B0000-0x0000000001304000-memory.dmp

      Filesize

      336KB

    • memory/2140-1406-0x0000000000C30000-0x0000000000C7C000-memory.dmp

      Filesize

      304KB

    • memory/2140-1405-0x000000001B9F0000-0x000000001BA94000-memory.dmp

      Filesize

      656KB

    • memory/2140-333-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-334-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-336-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-338-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-340-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-342-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-344-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-348-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-350-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-352-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-331-0x0000000001330000-0x0000000001460000-memory.dmp

      Filesize

      1.2MB

    • memory/2140-332-0x000000001B470000-0x000000001B59A000-memory.dmp

      Filesize

      1.2MB

    • memory/2140-374-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-372-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-370-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-368-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-366-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-364-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-354-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-360-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-358-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2140-356-0x000000001B470000-0x000000001B593000-memory.dmp

      Filesize

      1.1MB

    • memory/2344-153-0x0000000001F10000-0x0000000001F18000-memory.dmp

      Filesize

      32KB

    • memory/2344-152-0x000000001B5E0000-0x000000001B8C2000-memory.dmp

      Filesize

      2.9MB

    • memory/2384-315-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2384-316-0x0000000000400000-0x00000000004C8000-memory.dmp

      Filesize

      800KB

    • memory/2384-318-0x0000000000400000-0x00000000004C8000-memory.dmp

      Filesize

      800KB

    • memory/2384-309-0x0000000000400000-0x00000000004C8000-memory.dmp

      Filesize

      800KB

    • memory/2384-311-0x0000000000400000-0x00000000004C8000-memory.dmp

      Filesize

      800KB

    • memory/2384-313-0x0000000000400000-0x00000000004C8000-memory.dmp

      Filesize

      800KB

    • memory/2384-319-0x0000000000400000-0x00000000004C8000-memory.dmp

      Filesize

      800KB

    • memory/2384-307-0x0000000000400000-0x00000000004C8000-memory.dmp

      Filesize

      800KB

    • memory/2452-304-0x0000000001230000-0x000000000130A000-memory.dmp

      Filesize

      872KB

    • memory/2500-0-0x0000000074D3E000-0x0000000074D3F000-memory.dmp

      Filesize

      4KB

    • memory/2500-91-0x0000000074D3E000-0x0000000074D3F000-memory.dmp

      Filesize

      4KB

    • memory/2500-94-0x0000000074D30000-0x000000007541E000-memory.dmp

      Filesize

      6.9MB

    • memory/2500-2-0x0000000074D30000-0x000000007541E000-memory.dmp

      Filesize

      6.9MB

    • memory/2500-1-0x0000000000150000-0x0000000000158000-memory.dmp

      Filesize

      32KB