Analysis

  • max time kernel
    113s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 02:33

General

  • Target

    676e25d623c3d2b454aced0e9f003624a36a75c232b3a8dcef4989837f40f0e6N.exe

  • Size

    2.9MB

  • MD5

    957dff752a1df72e18f5c00f8b8273f0

  • SHA1

    1bcc3cf4835f1c3173592a79810c49d5fcac03df

  • SHA256

    676e25d623c3d2b454aced0e9f003624a36a75c232b3a8dcef4989837f40f0e6

  • SHA512

    d6f627233dd049f3c9d1ce939bb035ba674098726296299ddb54f0b6d0f9196d9b564ecb05a984354e5de35f8ed2333034376d7cd25d688b0cbd6576d40df8df

  • SSDEEP

    49152:6Hy1YILpU6kOeQ3upFO2STAoF9xyhu2UPMVXMwDQzb:6S5aDObupFOfTAKwu2T1MwDQz

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 38 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 51 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2396
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2500
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2164
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3516
        • C:\Users\Admin\AppData\Local\Temp\676e25d623c3d2b454aced0e9f003624a36a75c232b3a8dcef4989837f40f0e6N.exe
          "C:\Users\Admin\AppData\Local\Temp\676e25d623c3d2b454aced0e9f003624a36a75c232b3a8dcef4989837f40f0e6N.exe"
          2⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
            "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2316
            • C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe
              "C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4988
              • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\trunk.exe
                C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:1884
            • C:\Users\Admin\AppData\Local\Temp\1007126001\d4354cd79e.exe
              "C:\Users\Admin\AppData\Local\Temp\1007126001\d4354cd79e.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4276
            • C:\Users\Admin\AppData\Local\Temp\1007127001\3b3ed07be4.exe
              "C:\Users\Admin\AppData\Local\Temp\1007127001\3b3ed07be4.exe"
              4⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3056
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 536
                5⤵
                • Program crash
                PID:1292
            • C:\Users\Admin\AppData\Local\Temp\1007128001\b76a1d7125.exe
              "C:\Users\Admin\AppData\Local\Temp\1007128001\b76a1d7125.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:532
              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                5⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Checks computer location settings
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2956
                • C:\Users\Admin\AppData\Local\Temp\1016757001\bluemail.exe
                  "C:\Users\Admin\AppData\Local\Temp\1016757001\bluemail.exe"
                  6⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Drops startup file
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3592
                • C:\Users\Admin\AppData\Local\Temp\1016799001\3lthFqd.exe
                  "C:\Users\Admin\AppData\Local\Temp\1016799001\3lthFqd.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:3340
                  • C:\Users\Admin\AppData\Local\Temp\1016799001\3lthFqd.exe
                    "C:\Users\Admin\AppData\Local\Temp\1016799001\3lthFqd.exe"
                    7⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3988
                • C:\Users\Admin\AppData\Local\Temp\1016803001\bc5820f2ef.exe
                  "C:\Users\Admin\AppData\Local\Temp\1016803001\bc5820f2ef.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:224
                  • C:\Users\Admin\AppData\Local\Temp\1016803001\bc5820f2ef.exe
                    "C:\Users\Admin\AppData\Local\Temp\1016803001\bc5820f2ef.exe"
                    7⤵
                    • Executes dropped EXE
                    PID:4064
                  • C:\Users\Admin\AppData\Local\Temp\1016803001\bc5820f2ef.exe
                    "C:\Users\Admin\AppData\Local\Temp\1016803001\bc5820f2ef.exe"
                    7⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4912
                • C:\Users\Admin\AppData\Local\Temp\1016804001\3a921a604b.exe
                  "C:\Users\Admin\AppData\Local\Temp\1016804001\3a921a604b.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1608
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3716
                    • C:\Windows\system32\mode.com
                      mode 65,10
                      8⤵
                        PID:3772
                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                        7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                        8⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        PID:596
                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                        7z.exe e extracted/file_7.zip -oextracted
                        8⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3256
                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                        7z.exe e extracted/file_6.zip -oextracted
                        8⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4956
                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                        7z.exe e extracted/file_5.zip -oextracted
                        8⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4856
                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                        7z.exe e extracted/file_4.zip -oextracted
                        8⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5024
                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                        7z.exe e extracted/file_3.zip -oextracted
                        8⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2224
                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                        7z.exe e extracted/file_2.zip -oextracted
                        8⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        PID:952
                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                        7z.exe e extracted/file_1.zip -oextracted
                        8⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3108
                      • C:\Windows\system32\attrib.exe
                        attrib +H "in.exe"
                        8⤵
                        • Views/modifies file attributes
                        PID:4468
                      • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                        "in.exe"
                        8⤵
                        • Executes dropped EXE
                        PID:1328
                        • C:\Windows\SYSTEM32\attrib.exe
                          attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          9⤵
                          • Views/modifies file attributes
                          PID:2108
                        • C:\Windows\SYSTEM32\attrib.exe
                          attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          9⤵
                          • Views/modifies file attributes
                          PID:5032
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                          9⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:3344
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell ping 127.0.0.1; del in.exe
                          9⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2000
                          • C:\Windows\system32\PING.EXE
                            "C:\Windows\system32\PING.EXE" 127.0.0.1
                            10⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:1560
                  • C:\Users\Admin\AppData\Local\Temp\1016805001\26e29ae8d5.exe
                    "C:\Users\Admin\AppData\Local\Temp\1016805001\26e29ae8d5.exe"
                    6⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3968
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 568
                      7⤵
                      • Program crash
                      PID:4440
                  • C:\Users\Admin\AppData\Local\Temp\1016806001\8a19bfe0c9.exe
                    "C:\Users\Admin\AppData\Local\Temp\1016806001\8a19bfe0c9.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:1992
                    • C:\Users\Admin\AppData\Local\Temp\1016806001\8a19bfe0c9.exe
                      "C:\Users\Admin\AppData\Local\Temp\1016806001\8a19bfe0c9.exe"
                      7⤵
                      • Executes dropped EXE
                      PID:1428
                    • C:\Users\Admin\AppData\Local\Temp\1016806001\8a19bfe0c9.exe
                      "C:\Users\Admin\AppData\Local\Temp\1016806001\8a19bfe0c9.exe"
                      7⤵
                      • Executes dropped EXE
                      PID:4104
                    • C:\Users\Admin\AppData\Local\Temp\1016806001\8a19bfe0c9.exe
                      "C:\Users\Admin\AppData\Local\Temp\1016806001\8a19bfe0c9.exe"
                      7⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1808
          • C:\Users\Admin\AppData\Local\Temp\1016757001\bluemail.exe
            "C:\Users\Admin\AppData\Local\Temp\1016757001\bluemail.exe"
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:5996
            • C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe
              "C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe"
              3⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:628
          • C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe
            "C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe"
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5684
          • C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe
            "C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe"
            2⤵
            • Executes dropped EXE
            PID:5128
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3056 -ip 3056
          1⤵
            PID:3956
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:1612
          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
            C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:4828
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3968 -ip 3968
            1⤵
              PID:628
            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
              C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:5384
            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:1520
            • C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe
              C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe
              1⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2072
            • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
              C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              PID:5780
              • C:\Windows\explorer.exe
                explorer.exe
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:5592
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                2⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5836
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.1.10.1
                  3⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:224

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe

              Filesize

              10.2MB

              MD5

              d3b39a6b63c3822be6f8af9b3813bbad

              SHA1

              00b020e5a1c05442612f2cec7950c2814b59b1b6

              SHA256

              786f1331a0618485b31ba763911b14fcec691bf9897bee8f42680076092b7a2f

              SHA512

              a5c7504b29798fdabf610cf65716ec1d7745956f470d86de12a52b3c8731f858764fdf78647e50b3111622e7e65f05f82cd258b98c1a0f45ef7fdc088647d4ff

            • C:\Users\Admin\AppData\Local\Temp\1007126001\d4354cd79e.exe

              Filesize

              2.7MB

              MD5

              56cd1562fdb532d35c2be70cf80ec510

              SHA1

              928eba550430dd1079067f829839e3bbb717bdf3

              SHA256

              5eeeebae74d5ab7e434f924759bb2cd353c9fe0db9e5a46da9bc2caa85141234

              SHA512

              2a8ef4440cf4d605ad6ea8b0992b289697f1387eda77f32bf5f7294ce65f62d2fb4d1a2caece94eaada59a6ca86434e5aa3478ebe66a27070d9ad91a245bee60

            • C:\Users\Admin\AppData\Local\Temp\1007127001\3b3ed07be4.exe

              Filesize

              1.9MB

              MD5

              69f8c74c8df30f4cb24914be23ea0f65

              SHA1

              d3d87f52035a9363fab66cccfc349d31504001d3

              SHA256

              9f62dad7fcef349974cac585e98b4bf2719eaf86f077e42917613aa3763a1c3e

              SHA512

              c5bc99ddebaa02ccffcdc5a62a36e7688cb9994dcdec9fe218cfb596ada671717115403bb5f32de57aba04def8e2f8db30c95079baeb8311626ac29b16db785e

            • C:\Users\Admin\AppData\Local\Temp\1007128001\b76a1d7125.exe

              Filesize

              2.8MB

              MD5

              1c41e3fbe310b66b46388397ab268de2

              SHA1

              a257cb6f67f28c502bb7c72dbdf2a8de61fa6dd5

              SHA256

              476c96f2c3b7810f96b535ae053b2daf1cc1c1154e81959afa01e0fb2a9aed72

              SHA512

              e3c305183d374448857b866c4e922228ae82db416923b5f7db0e9eec4308589e95bd1df3f43183473f164b3c8956a2b2940b19ee7ca7de5a29851123d3dadb9f

            • C:\Users\Admin\AppData\Local\Temp\1016757001\bluemail.exe

              Filesize

              1.6MB

              MD5

              8060f777b0c7b4cd37d3d0e0409c5633

              SHA1

              e13520519a8dec506e5fdd5aeb958e32b0e1f055

              SHA256

              270deb9dea612b34a0ab55325a036b05c7f0275eb7931b8adec777030d51bd51

              SHA512

              0a1fc50f7eed2bd17e52683e590085efabd3a94843a4ae2623075f05ffb26c1b06115fb38a3bc7ad0ae7a88259011ca04eb236c44da622e316cec3dd73e95de7

            • C:\Users\Admin\AppData\Local\Temp\1016799001\3lthFqd.exe

              Filesize

              941KB

              MD5

              541967864e3bbe8c0258186e7f9a7489

              SHA1

              01db1b034184d31c03003ab7f81cf872e68b44d8

              SHA256

              63ff1a1be734e83c37ff7039e8b7a2b303a5e2df7b53ce2158a75c2e26d6906a

              SHA512

              87abbf7afeb4c40926884d346412280883e74ebe1214cd04a9e56ff058f8c2bc183bebf32a0120e10fa75b250659d9da0fa8c2fc4495b970e451330a574fe2ba

            • C:\Users\Admin\AppData\Local\Temp\1016803001\bc5820f2ef.exe

              Filesize

              758KB

              MD5

              afd936e441bf5cbdb858e96833cc6ed3

              SHA1

              3491edd8c7caf9ae169e21fb58bccd29d95aefef

              SHA256

              c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

              SHA512

              928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

            • C:\Users\Admin\AppData\Local\Temp\1016804001\3a921a604b.exe

              Filesize

              4.2MB

              MD5

              3a425626cbd40345f5b8dddd6b2b9efa

              SHA1

              7b50e108e293e54c15dce816552356f424eea97a

              SHA256

              ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

              SHA512

              a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

            • C:\Users\Admin\AppData\Local\Temp\1016806001\8a19bfe0c9.exe

              Filesize

              747KB

              MD5

              8a9cb17c0224a01bd34b46495983c50a

              SHA1

              00296ea6a56f6e10a0f1450a20c5fb329b8856c1

              SHA256

              3d51b9523b387859bc0d94246dfb216cfa82f9d650c8d11be11ed67f70e7440b

              SHA512

              1472e4670f469c43227b965984ecc223a526f6284363d8e08a3b5b55e602ccce62df4bc49939ee5bd7df7b0c26e20da896b084eccab767f8728e6bf14d71c840

            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

              Filesize

              2.9MB

              MD5

              957dff752a1df72e18f5c00f8b8273f0

              SHA1

              1bcc3cf4835f1c3173592a79810c49d5fcac03df

              SHA256

              676e25d623c3d2b454aced0e9f003624a36a75c232b3a8dcef4989837f40f0e6

              SHA512

              d6f627233dd049f3c9d1ce939bb035ba674098726296299ddb54f0b6d0f9196d9b564ecb05a984354e5de35f8ed2333034376d7cd25d688b0cbd6576d40df8df

            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\Crypto\Cipher\_Salsa20.pyd

              Filesize

              13KB

              MD5

              f19cb847e567a31fab97435536c7b783

              SHA1

              4c8bfe404af28c1781740e7767619a5e2d2ff2b7

              SHA256

              1ece1dc94471d6977dbe2ceeba3764adf0625e2203d6257f7c781c619d2a3dad

              SHA512

              382dc205f703fc3e1f072f17f58e321e1a65b86be7d9d6b07f24a02a156308a7fec9b1a621ba1f3428fd6bb413d14ae9ecb2a2c8dd62a7659776cffdebb6374c

            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_lzma.pyd

              Filesize

              156KB

              MD5

              9e94fac072a14ca9ed3f20292169e5b2

              SHA1

              1eeac19715ea32a65641d82a380b9fa624e3cf0d

              SHA256

              a46189c5bd0302029847fed934f481835cb8d06470ea3d6b97ada7d325218a9f

              SHA512

              b7b3d0f737dd3b88794f75a8a6614c6fb6b1a64398c6330a52a2680caf7e558038470f6f3fc024ce691f6f51a852c05f7f431ac2687f4525683ff09132a0decb

            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\certifi\cacert.pem

              Filesize

              292KB

              MD5

              50ea156b773e8803f6c1fe712f746cba

              SHA1

              2c68212e96605210eddf740291862bdf59398aef

              SHA256

              94edeb66e91774fcae93a05650914e29096259a5c7e871a1f65d461ab5201b47

              SHA512

              01ed2e7177a99e6cb3fbef815321b6fa036ad14a3f93499f2cb5b0dae5b713fd2e6955aa05f6bda11d80e9e0275040005e5b7d616959b28efc62abb43a3238f0

            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libssl-3.dll

              Filesize

              774KB

              MD5

              4ff168aaa6a1d68e7957175c8513f3a2

              SHA1

              782f886709febc8c7cebcec4d92c66c4d5dbcf57

              SHA256

              2e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950

              SHA512

              c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3

            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

              Filesize

              30KB

              MD5

              7c14c7bc02e47d5c8158383cb7e14124

              SHA1

              5ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3

              SHA256

              00bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5

              SHA512

              af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c

            • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\unicodedata.pyd

              Filesize

              1.1MB

              MD5

              a8ed52a66731e78b89d3c6c6889c485d

              SHA1

              781e5275695ace4a5c3ad4f2874b5e375b521638

              SHA256

              bf669344d1b1c607d10304be47d2a2fb572e043109181e2c5c1038485af0c3d7

              SHA512

              1c131911f120a4287ebf596c52de047309e3be6d99bc18555bd309a27e057cc895a018376aa134df1dc13569f47c97c1a6e8872acedfa06930bbf2b175af9017

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pviml2vi.peh.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

              Filesize

              458KB

              MD5

              619f7135621b50fd1900ff24aade1524

              SHA1

              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

              SHA256

              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

              SHA512

              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\Crypto\Cipher\_raw_cbc.pyd

              Filesize

              12KB

              MD5

              40390f2113dc2a9d6cfae7127f6ba329

              SHA1

              9c886c33a20b3f76b37aa9b10a6954f3c8981772

              SHA256

              6ba9c910f755885e4d356c798a4dd32d2803ea4cfabb3d56165b3017d0491ae2

              SHA512

              617b963816838d649c212c5021d7d0c58839a85d4d33bbaf72c0ec6ecd98b609080e9e57af06fa558ff302660619be57cc974282826ab9f21ae0d80fbaa831a1

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\Crypto\Cipher\_raw_cfb.pyd

              Filesize

              12KB

              MD5

              899895c0ed6830c4c9a3328cc7df95b6

              SHA1

              c02f14ebda8b631195068266ba20e03210abeabc

              SHA256

              18d568c7be3e04f4e6026d12b09b1fa3fae50ff29ac3deaf861f3c181653e691

              SHA512

              0b4c50e40af92bc9589668e13df417244274f46f5a66e1fc7d1d59bc281969ba319305becea119385f01cc4603439e4b37afa2cf90645425210848a02839e3e7

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\Crypto\Cipher\_raw_ctr.pyd

              Filesize

              14KB

              MD5

              c4c525b081f8a0927091178f5f2ee103

              SHA1

              a1f17b5ea430ade174d02ecc0b3cb79dbf619900

              SHA256

              4d86a90b2e20cde099d6122c49a72bae081f60eb2eea0f76e740be6c41da6749

              SHA512

              7c06e3e6261427bc6e654b2b53518c7eaa5f860a47ae8e80dc3f8f0fed91e122cb2d4632188dc44123fb759749b5425f426cd1153a8f84485ef0491002b26555

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\Crypto\Cipher\_raw_ecb.pyd

              Filesize

              10KB

              MD5

              80bb1e0e06acaf03a0b1d4ef30d14be7

              SHA1

              b20cac0d2f3cd803d98a2e8a25fbf65884b0b619

              SHA256

              5d1c2c60c4e571b88f27d4ae7d22494bed57d5ec91939e5716afa3ea7f6871f6

              SHA512

              2a13ab6715b818ad62267ab51e55cd54714aebf21ec9ea61c2aefd56017dc84a6b360d024f8682a2e105582b9c5fe892ecebd2bef8a492279b19ffd84bc83fa5

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\Crypto\Cipher\_raw_ofb.pyd

              Filesize

              11KB

              MD5

              19e0abf76b274c12ff624a16713f4999

              SHA1

              a4b370f556b925f7126bf87f70263d1705c3a0db

              SHA256

              d9fda05ae16c5387ab46dc728c6edce6a3d0a9e1abdd7acb8b32fc2a17be6f13

              SHA512

              d03033ea5cf37641fbd802ebeb5019caef33c9a78e01519fea88f87e773dca92c80b74ba80429b530694dad0bfa3f043a7104234c7c961e18d48019d90277c8e

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\Crypto\Hash\_BLAKE2s.pyd

              Filesize

              13KB

              MD5

              d54feb9a270b212b0ccb1937c660678a

              SHA1

              224259e5b684c7ac8d79464e51503d302390c5c9

              SHA256

              032b83f1003a796465255d9b246050a196488bac1260f628913e536314afded4

              SHA512

              29955a6569ca6d039b35bb40c56aeeb75fc765600525d0b469f72c97945970a428951bab4af9cd21b3161d5bba932f853778e2674ca83b14f7aba009fa53566f

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\Crypto\Hash\_SHA1.pyd

              Filesize

              17KB

              MD5

              556e6d0e5f8e4da74c2780481105d543

              SHA1

              7a49cdef738e9fe9cd6cd62b0f74ead1a1774a33

              SHA256

              247b0885cf83375211861f37b6dd1376aed5131d621ee0137a60fe7910e40f8b

              SHA512

              28fa0ce6bdbcc5e95b80aadc284c12658ef0c2be63421af5627776a55050ee0ea0345e30a15b744fc2b2f5b1b1bbb61e4881f27f6e3e863ebaaeed1073f4cda1

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\Crypto\Hash\_SHA256.pyd

              Filesize

              21KB

              MD5

              cde035b8ab3d046b1ce37eee7ee91fa0

              SHA1

              4298b62ed67c8d4f731d1b33e68d7dc9a58487ff

              SHA256

              16bea322d994a553b293a724b57293d57da62bc7eaf41f287956b306c13fd972

              SHA512

              c44fdee5a210459ce4557351e56b2d357fd4937f8ec8eaceab842fee29761f66c2262fcbaac837f39c859c67fa0e23d13e0f60b3ae59be29eb9d8abab0a572bb

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\Crypto\Util\_strxor.pyd

              Filesize

              10KB

              MD5

              f24f9356a6bdd29b9ef67509a8bc3a96

              SHA1

              a26946e938304b4e993872c6721eb8cc1dcbe43b

              SHA256

              034bb8efe3068763d32c404c178bd88099192c707a36f5351f7fdb63249c7f81

              SHA512

              c4d3f92d7558be1a714388c72f5992165dd7a9e1b4fa83b882536030542d93fdad9148c981f76fff7868192b301ac9256edb8c3d5ce5a1a2acac183f96c1028b

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\VCRUNTIME140.dll

              Filesize

              116KB

              MD5

              be8dbe2dc77ebe7f88f910c61aec691a

              SHA1

              a19f08bb2b1c1de5bb61daf9f2304531321e0e40

              SHA256

              4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

              SHA512

              0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\_bz2.pyd

              Filesize

              83KB

              MD5

              30f396f8411274f15ac85b14b7b3cd3d

              SHA1

              d3921f39e193d89aa93c2677cbfb47bc1ede949c

              SHA256

              cb15d6cc7268d3a0bd17d9d9cec330a7c1768b1c911553045c73bc6920de987f

              SHA512

              7d997ef18e2cbc5bca20a4730129f69a6d19abdda0261b06ad28ad8a2bddcdecb12e126df9969539216f4f51467c0fe954e4776d842e7b373fe93a8246a5ca3f

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\_ctypes.pyd

              Filesize

              122KB

              MD5

              5377ab365c86bbcdd998580a79be28b4

              SHA1

              b0a6342df76c4da5b1e28a036025e274be322b35

              SHA256

              6c5f31bef3fdbff31beac0b1a477be880dda61346d859cf34ca93b9291594d93

              SHA512

              56f28d431093b9f08606d09b84a392de7ba390e66b7def469b84a21bfc648b2de3839b2eee4fb846bbf8bb6ba505f9d720ccb6bb1a723e78e8e8b59ab940ac26

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\_hashlib.pyd

              Filesize

              64KB

              MD5

              a25bc2b21b555293554d7f611eaa75ea

              SHA1

              a0dfd4fcfae5b94d4471357f60569b0c18b30c17

              SHA256

              43acecdc00dd5f9a19b48ff251106c63c975c732b9a2a7b91714642f76be074d

              SHA512

              b39767c2757c65500fc4f4289cb3825333d43cb659e3b95af4347bd2a277a7f25d18359cedbdde9a020c7ab57b736548c739909867ce9de1dbd3f638f4737dc5

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\_queue.pyd

              Filesize

              31KB

              MD5

              e1c6ff3c48d1ca755fb8a2ba700243b2

              SHA1

              2f2d4c0f429b8a7144d65b179beab2d760396bfb

              SHA256

              0a6acfd24dfbaa777460c6d003f71af473d5415607807973a382512f77d075fa

              SHA512

              55bfd1a848f2a70a7a55626fb84086689f867a79f09726c825522d8530f4e83708eb7caa7f7869155d3ae48f3b6aa583b556f3971a2f3412626ae76680e83ca1

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\_socket.pyd

              Filesize

              81KB

              MD5

              69801d1a0809c52db984602ca2653541

              SHA1

              0f6e77086f049a7c12880829de051dcbe3d66764

              SHA256

              67aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3

              SHA512

              5fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\_ssl.pyd

              Filesize

              174KB

              MD5

              90f080c53a2b7e23a5efd5fd3806f352

              SHA1

              e3b339533bc906688b4d885bdc29626fbb9df2fe

              SHA256

              fa5e6fe9545f83704f78316e27446a0026fbebb9c0c3c63faed73a12d89784d4

              SHA512

              4b9b8899052c1e34675985088d39fe7c95bfd1bbce6fd5cbac8b1e61eda2fbb253eef21f8a5362ea624e8b1696f1e46c366835025aabcb7aa66c1e6709aab58a

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\_wmi.pyd

              Filesize

              36KB

              MD5

              827615eee937880862e2f26548b91e83

              SHA1

              186346b816a9de1ba69e51042faf36f47d768b6c

              SHA256

              73b7ee3156ef63d6eb7df9900ef3d200a276df61a70d08bd96f5906c39a3ac32

              SHA512

              45114caf2b4a7678e6b1e64d84b118fb3437232b4c0add345ddb6fbda87cebd7b5adad11899bdcd95ddfe83fdc3944a93674ca3d1b5f643a2963fbe709e44fb8

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\charset_normalizer\md.pyd

              Filesize

              10KB

              MD5

              71d96f1dbfcd6f767d81f8254e572751

              SHA1

              e70b74430500ed5117547e0cd339d6e6f4613503

              SHA256

              611e1b4b9ed6788640f550771744d83e404432830bb8e3063f0b8ec3b98911af

              SHA512

              7b10e13b3723db0e826b7c7a52090de999626d5fa6c8f9b4630fdeef515a58c40660fa90589532a6d4377f003b3cb5b9851e276a0b3c83b9709e28e6a66a1d32

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\charset_normalizer\md__mypyc.pyd

              Filesize

              122KB

              MD5

              d8f690eae02332a6898e9c8b983c56dd

              SHA1

              112c1fe25e0d948f767e02f291801c0e4ae592f0

              SHA256

              c6bb8cad80b8d7847c52931f11d73ba64f78615218398b2c058f9b218ff21ca9

              SHA512

              e732f79f39ba9721cc59dbe8c4785ffd74df84ca00d13d72afa3f96b97b8c7adf4ea9344d79ee2a1c77d58ef28d3ddcc855f3cb13edda928c17b1158abcc5b4a

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\libcrypto-3.dll

              Filesize

              5.0MB

              MD5

              123ad0908c76ccba4789c084f7a6b8d0

              SHA1

              86de58289c8200ed8c1fc51d5f00e38e32c1aad5

              SHA256

              4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

              SHA512

              80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\libffi-8.dll

              Filesize

              38KB

              MD5

              0f8e4992ca92baaf54cc0b43aaccce21

              SHA1

              c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

              SHA256

              eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

              SHA512

              6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\python312.dll

              Filesize

              6.6MB

              MD5

              166cc2f997cba5fc011820e6b46e8ea7

              SHA1

              d6179213afea084f02566ea190202c752286ca1f

              SHA256

              c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

              SHA512

              49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\trunk.exe

              Filesize

              18.0MB

              MD5

              86ddf66d8651d0baa1cc13d6f8c18dc1

              SHA1

              ee15109134300e555085811f4060048e245269f9

              SHA256

              ee045dffee8b48356106a2105803b73776b73bf7462d364b1f82540fcf72f4cf

              SHA512

              385fce7ded01cba93f842a1b698b78e3eb1d73833c282669ebe6bea22ec6c4957b179325614f17ecb7c7357051fb7381e011cf2ebc0f5ca2f24414f0e23a0c6c

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\vcruntime140_1.dll

              Filesize

              48KB

              MD5

              f8dfa78045620cf8a732e67d1b1eb53d

              SHA1

              ff9a604d8c99405bfdbbf4295825d3fcbc792704

              SHA256

              a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

              SHA512

              ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

            • C:\Users\Admin\AppData\Local\Temp\onefile_4988_133789628300458962\zstandard\backend_c.pyd

              Filesize

              508KB

              MD5

              0fc69d380fadbd787403e03a1539a24a

              SHA1

              77f067f6d50f1ec97dfed6fae31a9b801632ef17

              SHA256

              641e0b0fa75764812fff544c174f7c4838b57f6272eaae246eb7c483a0a35afc

              SHA512

              e63e200baf817717bdcde53ad664296a448123ffd055d477050b8c7efcab8e4403d525ea3c8181a609c00313f7b390edbb754f0a9278232ade7cfb685270aaf0

            • memory/532-214-0x00000000002E0000-0x00000000005F4000-memory.dmp

              Filesize

              3.1MB

            • memory/532-226-0x00000000002E0000-0x00000000005F4000-memory.dmp

              Filesize

              3.1MB

            • memory/1328-1548-0x00007FF6E9670000-0x00007FF6E9B00000-memory.dmp

              Filesize

              4.6MB

            • memory/1328-1551-0x00007FF6E9670000-0x00007FF6E9B00000-memory.dmp

              Filesize

              4.6MB

            • memory/1520-4892-0x00000000006B0000-0x00000000009C4000-memory.dmp

              Filesize

              3.1MB

            • memory/1520-4896-0x00000000006B0000-0x00000000009C4000-memory.dmp

              Filesize

              3.1MB

            • memory/1612-230-0x00000000006B0000-0x00000000009C4000-memory.dmp

              Filesize

              3.1MB

            • memory/1612-233-0x00000000006B0000-0x00000000009C4000-memory.dmp

              Filesize

              3.1MB

            • memory/1628-18-0x0000000000DE0000-0x00000000010F8000-memory.dmp

              Filesize

              3.1MB

            • memory/1628-1-0x0000000077284000-0x0000000077286000-memory.dmp

              Filesize

              8KB

            • memory/1628-2-0x0000000000DE1000-0x0000000000E0F000-memory.dmp

              Filesize

              184KB

            • memory/1628-3-0x0000000000DE0000-0x00000000010F8000-memory.dmp

              Filesize

              3.1MB

            • memory/1628-4-0x0000000000DE0000-0x00000000010F8000-memory.dmp

              Filesize

              3.1MB

            • memory/1628-0-0x0000000000DE0000-0x00000000010F8000-memory.dmp

              Filesize

              3.1MB

            • memory/1884-234-0x00007FF7D2930000-0x00007FF7D3B77000-memory.dmp

              Filesize

              18.3MB

            • memory/2000-1552-0x0000022C7E2A0000-0x0000022C7E2C2000-memory.dmp

              Filesize

              136KB

            • memory/2316-224-0x0000000000410000-0x0000000000728000-memory.dmp

              Filesize

              3.1MB

            • memory/2316-21-0x0000000000410000-0x0000000000728000-memory.dmp

              Filesize

              3.1MB

            • memory/2316-24-0x0000000000410000-0x0000000000728000-memory.dmp

              Filesize

              3.1MB

            • memory/2316-23-0x0000000000410000-0x0000000000728000-memory.dmp

              Filesize

              3.1MB

            • memory/2316-22-0x0000000000410000-0x0000000000728000-memory.dmp

              Filesize

              3.1MB

            • memory/2316-20-0x0000000000410000-0x0000000000728000-memory.dmp

              Filesize

              3.1MB

            • memory/2316-16-0x0000000000410000-0x0000000000728000-memory.dmp

              Filesize

              3.1MB

            • memory/2316-19-0x0000000000411000-0x000000000043F000-memory.dmp

              Filesize

              184KB

            • memory/2500-196-0x0000000000C00000-0x0000000001000000-memory.dmp

              Filesize

              4.0MB

            • memory/2500-194-0x0000000000330000-0x000000000033A000-memory.dmp

              Filesize

              40KB

            • memory/2500-197-0x00007FFB86270000-0x00007FFB86465000-memory.dmp

              Filesize

              2.0MB

            • memory/2500-199-0x00000000764E0000-0x00000000766F5000-memory.dmp

              Filesize

              2.1MB

            • memory/2956-227-0x00000000006B0000-0x00000000009C4000-memory.dmp

              Filesize

              3.1MB

            • memory/2956-1191-0x00000000006B0000-0x00000000009C4000-memory.dmp

              Filesize

              3.1MB

            • memory/3056-193-0x00000000764E0000-0x00000000766F5000-memory.dmp

              Filesize

              2.1MB

            • memory/3056-191-0x00007FFB86270000-0x00007FFB86465000-memory.dmp

              Filesize

              2.0MB

            • memory/3056-190-0x0000000005430000-0x0000000005830000-memory.dmp

              Filesize

              4.0MB

            • memory/3056-200-0x0000000000F80000-0x0000000001459000-memory.dmp

              Filesize

              4.8MB

            • memory/3056-189-0x0000000005430000-0x0000000005830000-memory.dmp

              Filesize

              4.0MB

            • memory/3056-188-0x0000000000F80000-0x0000000001459000-memory.dmp

              Filesize

              4.8MB

            • memory/3340-1575-0x000000000A960000-0x000000000AA08000-memory.dmp

              Filesize

              672KB

            • memory/3340-1452-0x00000000057F0000-0x00000000057FA000-memory.dmp

              Filesize

              40KB

            • memory/3340-1451-0x0000000000DA0000-0x0000000000E92000-memory.dmp

              Filesize

              968KB

            • memory/3340-1453-0x0000000005A20000-0x0000000005ABC000-memory.dmp

              Filesize

              624KB

            • memory/3340-1454-0x0000000005DC0000-0x0000000005DE6000-memory.dmp

              Filesize

              152KB

            • memory/3592-259-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-267-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-283-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-281-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-279-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-273-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-271-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-269-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-265-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-261-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-287-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-257-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-291-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-277-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-275-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-256-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-289-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-1433-0x0000000005210000-0x000000000529A000-memory.dmp

              Filesize

              552KB

            • memory/3592-1434-0x00000000052A0000-0x00000000052EC000-memory.dmp

              Filesize

              304KB

            • memory/3592-295-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-297-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-299-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-293-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-285-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-263-0x0000000004DC0000-0x0000000004ED3000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-2129-0x0000000004EF0000-0x0000000004F44000-memory.dmp

              Filesize

              336KB

            • memory/3592-251-0x0000000000150000-0x00000000002E4000-memory.dmp

              Filesize

              1.6MB

            • memory/3592-252-0x0000000004BF0000-0x0000000004D0A000-memory.dmp

              Filesize

              1.1MB

            • memory/3592-255-0x0000000005120000-0x00000000051B2000-memory.dmp

              Filesize

              584KB

            • memory/3592-254-0x00000000055D0000-0x0000000005B74000-memory.dmp

              Filesize

              5.6MB

            • memory/3592-253-0x0000000004DC0000-0x0000000004ED8000-memory.dmp

              Filesize

              1.1MB

            • memory/3968-1574-0x0000000000370000-0x0000000000849000-memory.dmp

              Filesize

              4.8MB

            • memory/3968-1521-0x0000000000370000-0x0000000000849000-memory.dmp

              Filesize

              4.8MB

            • memory/3988-3691-0x0000000005430000-0x0000000005496000-memory.dmp

              Filesize

              408KB

            • memory/3988-1597-0x0000000000400000-0x0000000000464000-memory.dmp

              Filesize

              400KB

            • memory/3988-1598-0x0000000005110000-0x00000000051A8000-memory.dmp

              Filesize

              608KB

            • memory/3988-3679-0x00000000050B0000-0x00000000050DC000-memory.dmp

              Filesize

              176KB

            • memory/4276-170-0x0000000000E80000-0x0000000001374000-memory.dmp

              Filesize

              5.0MB

            • memory/4276-171-0x0000000000E80000-0x0000000001374000-memory.dmp

              Filesize

              5.0MB

            • memory/4828-231-0x0000000000410000-0x0000000000728000-memory.dmp

              Filesize

              3.1MB

            • memory/4828-229-0x0000000000410000-0x0000000000728000-memory.dmp

              Filesize

              3.1MB

            • memory/4988-228-0x00007FF715EA0000-0x00007FF716907000-memory.dmp

              Filesize

              10.4MB

            • memory/5384-4891-0x0000000000410000-0x0000000000728000-memory.dmp

              Filesize

              3.1MB

            • memory/5384-4894-0x0000000000410000-0x0000000000728000-memory.dmp

              Filesize

              3.1MB

            • memory/5780-4904-0x00007FF68A8E0000-0x00007FF68AD70000-memory.dmp

              Filesize

              4.6MB

            • memory/5780-6088-0x00007FF68A8E0000-0x00007FF68AD70000-memory.dmp

              Filesize

              4.6MB