Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 20:19

General

  • Target

    65502a1c719e5ad252a349d9f5b278a415a61f88e8c049d5ff8dc828da36ad7e.exe

  • Size

    10.6MB

  • MD5

    2d31d4fbad1650ec69c899a5417de3dd

  • SHA1

    621ba6e8907e372798440d711126f0b0a0d8ce2f

  • SHA256

    65502a1c719e5ad252a349d9f5b278a415a61f88e8c049d5ff8dc828da36ad7e

  • SHA512

    ac21c3aac43864449e0c135e9466bd368fe16131ba9bd54e754c22410d2b325f2cc525c33509c7fbab5d480d36833aa3bb08d470dec37444fbad5383e362c361

  • SSDEEP

    196608:xYLUCgA7XFU7WhMld/UnPejgM4YdJUB7vLzaDBuCUfvpQJfB/0Do05kWgX0q:x0dgkXFU7zCnPUgM4WUkBqRQ/BTkq

Malware Config

Extracted

Family

socelars

C2

http://www.ecgbg.com/

Extracted

Family

redline

Botnet

user01new

C2

49.12.219.50:4846

Attributes
  • auth_value

    fcca1ed5af8553053dc74a4c6a9ce601

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Fabookie family
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba family
  • Glupteba payload 15 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • Nullmixer family
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Privateloader family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars family
  • Socelars payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\65502a1c719e5ad252a349d9f5b278a415a61f88e8c049d5ff8dc828da36ad7e.exe
    "C:\Users\Admin\AppData\Local\Temp\65502a1c719e5ad252a349d9f5b278a415a61f88e8c049d5ff8dc828da36ad7e.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\7zS42925387\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS42925387\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3420
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2240
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1328
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2980
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Tue20acc89cbd449e95d.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1540
        • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20acc89cbd449e95d.exe
          Tue20acc89cbd449e95d.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:2456
          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20acc89cbd449e95d.exe
            C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20acc89cbd449e95d.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3964
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Tue20cb62eb1a4cb3a01.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3272
        • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20cb62eb1a4cb3a01.exe
          Tue20cb62eb1a4cb3a01.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1108
          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20cb62eb1a4cb3a01.exe
            "C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20cb62eb1a4cb3a01.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:264
            • C:\Windows\system32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              6⤵
                PID:1608
                • C:\Windows\system32\netsh.exe
                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                  7⤵
                  • Modifies Windows Firewall
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:2676
              • C:\Windows\rss\csrss.exe
                C:\Windows\rss\csrss.exe /306-306
                6⤵
                • Executes dropped EXE
                • Manipulates WinMonFS driver.
                • System Location Discovery: System Language Discovery
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2352
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  7⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:1696
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /delete /tn ScheduledUpdate /f
                  7⤵
                    PID:4916
                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                    C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                    7⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4928
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 728
                  6⤵
                  • Program crash
                  PID:2248
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 784
                5⤵
                • Program crash
                PID:2008
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue2032d2e78e3d4a56.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1548
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue202def121e32deb35.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2320
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue20177cabec2a.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4672
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue205ff5cb98.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:764
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue2069ccb821.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3680
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue207aa8a73892eeac.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3168
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue2089e53e7fc7158da.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3084
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue2042f82e3d3979159.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1092
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue20c64a1a28623ee7.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4312
            • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20c64a1a28623ee7.exe
              Tue20c64a1a28623ee7.exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1396
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue2025487c6c276c3.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3428
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue20c0a313caa25872.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1356
            • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20c0a313caa25872.exe
              Tue20c0a313caa25872.exe
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4232
              • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20c0a313caa25872.exe
                "C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20c0a313caa25872.exe" -u
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2252
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue2066325c078.exe
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3008
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue20cceb49d9a7.exe /mixtwo
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2544
            • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20cceb49d9a7.exe
              Tue20cceb49d9a7.exe /mixtwo
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1108 -ip 1108
        1⤵
          PID:4212
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 264 -ip 264
          1⤵
            PID:2988

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Tue20acc89cbd449e95d.exe.log

            Filesize

            700B

            MD5

            e5352797047ad2c91b83e933b24fbc4f

            SHA1

            9bf8ac99b6cbf7ce86ce69524c25e3df75b4d772

            SHA256

            b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c

            SHA512

            dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            3d086a433708053f9bf9523e1d87a4e8

            SHA1

            b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

            SHA256

            6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

            SHA512

            931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            16KB

            MD5

            b51bf9eca2e7e7d15279ce30db09b753

            SHA1

            a772a72c763836b56bf5f68bf1254a277ab3ff58

            SHA256

            79ebdcae822339e3c92470f3b6b4ffe20ed29418ebe19e1b51d166be1828e59d

            SHA512

            9ac4793686cf567f09e53d36134541b3bb654f630d1844ba07014fffe516eaa45d6842eaca9109e08eaaab6ecd6b9a703bae58fe21343c35af59732bdf617dab

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20177cabec2a.exe

            Filesize

            383KB

            MD5

            5eec35ae4619a7992130f13f66b03002

            SHA1

            47141ead2a1166234970c3dba5821cee57ddbb4d

            SHA256

            947efb32f120d30758ff6801dd1118922cff317411e87906aa9153fe928b1156

            SHA512

            5f8ae8110b7aa626cf1002f1f214ccc2fd09956cb9d2d82d31115adee356ffd529d1eef4f32a2f193fd862029f930ad01f068b22335d61a00ae5b25106c0590a

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue2025487c6c276c3.exe

            Filesize

            1.4MB

            MD5

            18b59e79ac40c081b719c1b8d6c6cf32

            SHA1

            ec01215c5e5eac7149a0777a98d15575df29676c

            SHA256

            7a0fb647c62e46b48095bb37e4a4750288ad5d062f34121769acd94cb864a478

            SHA512

            b491a781b3346eed93ebfe3c7247ef46cdf53a2e6ead6d800c229d4a65cc2a641f15b509560bf58e7f604b1f280159c95787084b8a8defd849ed7d5e4ce2dab2

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue202def121e32deb35.exe

            Filesize

            294KB

            MD5

            5d30047ee5db838529168e7a970d98e2

            SHA1

            864e94db65e6c1c52e063184d2da2b07a3be4a41

            SHA256

            c6cf65fa806ea759cd9141c844815ad45ac6e6b03cb4aa50b2bd8963b19ef161

            SHA512

            88ad9bf1f5ab4dfed6bb3c581df4576841e5bb03cfc8700b6331b49058d39a8a5edc9d9e5efb4ad2b5fbe656de143fd0ee1a27655e3aefb8f0247a96cfecbbd3

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue2032d2e78e3d4a56.exe

            Filesize

            379KB

            MD5

            314e3dc1f42fb9d858d3db84deac9343

            SHA1

            dec9f05c3bcc759b76f4109eb369db9c9666834b

            SHA256

            79133c9e1cdfdfada9bc3d49ba30d872c91383eb7515302cd7bd2e1c5b983b08

            SHA512

            23f6c8f785c6d59d976d437732d1ea5968403239c5f8c3ca83983d1a0b3d9f8426803b7de7c2e819d16a1fb35f9e24461593fdcc75cd81ddc0076c22ed1e45f2

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue2042f82e3d3979159.exe

            Filesize

            1.7MB

            MD5

            8ddac734c2d77bab23f64e46daf14825

            SHA1

            0676db42d4beaf136a86959e25aa7ec0108da1a5

            SHA256

            e9eaff773b37f538b1b8b41a568d045cb510edbf221fead512d765d7df0f9e3a

            SHA512

            ff9f9d9046292e5ba9bd7e4e8433f8d922d839c2d6b007f41a8c81bf3bc0f1980c296870d3dfcce27261589b9d0d6a9b94453055c501d7d759cd04f96d0040c1

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue205ff5cb98.exe

            Filesize

            126KB

            MD5

            cd6d011a663a12f81ba8e4e5407e3a6f

            SHA1

            53c81876f0ff422d41f19c6d2ea0d30548e4e071

            SHA256

            c303cb56a1c37e081b25cfec6b61829205cdd473deafed698bf725ca55a5b7a1

            SHA512

            8b3228f725a3f49ab34bd36f09589ce682d1115acd212f9b6818708d59b263d9b83ec8e475f917df349449d5126a06ac1a55063f2946842639c0194412482738

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue2066325c078.exe

            Filesize

            1.9MB

            MD5

            b84f79adfccd86a27b99918413bb54ba

            SHA1

            06a61ab105da65f78aacdd996801c92d5340b6ca

            SHA256

            6913b6cc93ab1fb509ab7459d6158be6f1b03ab06d2ed41782b86838bd504c49

            SHA512

            99139ce83106810b213e1d89a2d017e824859a48784c9b04adf08314eeacc20b8b22e64349f4609eaf8d47b8a3c35b0fb3b4a270c29f090d2e4d3e3ca3455f38

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue2069ccb821.exe

            Filesize

            625KB

            MD5

            4f11e641d16d9590ac1c9f70d215050a

            SHA1

            75688f56c970cd55876f445c8319d7b91ce556fb

            SHA256

            efbf94261833d1318a16120c706a80c4853697ce85ffa714e7f5afca1d19e1c0

            SHA512

            b7358554587bce2ffe5cf5ac7ea6d590b810db2def56369010a7f10eacc89dd9d4c4c42b5bf113372a146d3a3cc55a1f21f269deadec5d483f51236318404007

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue207aa8a73892eeac.exe

            Filesize

            1.4MB

            MD5

            8268aa1cba3763a79c3dd333ab42c093

            SHA1

            e7d034e6f55bc07b38ad50f5bb2e83f098c60c97

            SHA256

            7f6eef3d7d271decfd078c27b125d8c06dcd3a920f0e9edf8edf229ee1b2012f

            SHA512

            271797ad106169e7bbed9b70187d8b643ed7d164b7ed0049d3656334899ccb1bd19e4a4ec2fab9d5f00cad718a5248cf78ac976d9c032665d6758a2f8dd91195

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue2089e53e7fc7158da.exe

            Filesize

            393KB

            MD5

            d467d372ca2ff1c8dcad54da399c09d9

            SHA1

            79d9769742dc9f52c7623a96aea6560284ee2345

            SHA256

            bcf196a4c0a3c6b1fe697f30c6b33c8215701f2c98deec8e09530c622758b799

            SHA512

            6df383fcc8c3db9f30f78b8f5b0d0bf12097f5807c5b22d4f115137386684a6f0b7ab9c7c4425ddb3ef1146bdfc300a797e4df41632b50acbb620a0f53dfc8f4

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20acc89cbd449e95d.exe

            Filesize

            391KB

            MD5

            c7cd0def6982f7b281c6a61d29eec4be

            SHA1

            f9f600d70d60cf79563e84cec0b883fa3f541690

            SHA256

            b2525fcbe771148a6c9b9db5786b8ab833391684eb1ac6152e0a311b2a7f3ab9

            SHA512

            370c2bde411f188575177ca0821e5920496220785a6aac2e40b2a8d4a0f3151b5bca5e6e90688ba02780bbe1ea0bc1894588b10ff24e2c510254e38c0355b13b

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20c0a313caa25872.exe

            Filesize

            76KB

            MD5

            99471e8043cb5f141962e1cfe12d44f4

            SHA1

            57c6baf415f892dfa82c206c1380a34130dad19d

            SHA256

            1946616cacfd8688bb722a2b1a6a0df117f9d8d877c675704602c2e8301dd509

            SHA512

            a31de569cf29efa20fad89a43ac55e6f93562d2204158d1d48f4c05f047fc59a6869a90a42184442e88d3b0d611e74c82d420eaccf9cfa08c6d4227c568baf41

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20c64a1a28623ee7.exe

            Filesize

            8KB

            MD5

            3476b903e6e6ff5f246460e8749fd232

            SHA1

            3639e6c1f104ad7aa24ab7f72aca5dad686361cf

            SHA256

            25cbf20f43b95afac49543b0dd5378626ab2c78f5edadd781441b335f9fc1002

            SHA512

            ac99a88b90e1396b2a8db98e56eb350ad95a8f8faa5b7b36862f603899aa9a8bd2a69d5abf3346158c6605f3475b4ab3366c644c7ab23dd5e436cc8951d0e026

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20cb62eb1a4cb3a01.exe

            Filesize

            4.3MB

            MD5

            f283ac3ee21ba25e7a192dd89380ec45

            SHA1

            2b286463a55ccec186a2ab17d9d3ee032925eb9f

            SHA256

            1ad65db0dc93eff742bafe3ba4cbd996d0821280be35c44056d38963408f7da2

            SHA512

            df0207c68772378b7271f8ee55a4a0fa8146c04e1eb1d58cfb917b3b34d11ceb6725c4f38afffffe300190a05e0ffa19bd9d0a4c1170d7214111d2aebee5409e

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\Tue20cceb49d9a7.exe

            Filesize

            1.2MB

            MD5

            22c90797f0fcd5308ce9454001263d8d

            SHA1

            1dec527d6f33e583e66459a9f646049bf8bb63b1

            SHA256

            ef13f310e3e72a96feecc6768f5997e5b89651bf56b1958bebcfafb33f0fb036

            SHA512

            37bd42020137134f67e16d2abe9fcbd34d2d9e9dacb914747f67d4add7913f95b3fa6afcb4a93ea68443efecd041c13300a830d06fd2b165ddc69b2c3dd41fbd

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\libcurl.dll

            Filesize

            218KB

            MD5

            d09be1f47fd6b827c81a4812b4f7296f

            SHA1

            028ae3596c0790e6d7f9f2f3c8e9591527d267f7

            SHA256

            0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

            SHA512

            857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\libcurlpp.dll

            Filesize

            54KB

            MD5

            e6e578373c2e416289a8da55f1dc5e8e

            SHA1

            b601a229b66ec3d19c2369b36216c6f6eb1c063e

            SHA256

            43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

            SHA512

            9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\libgcc_s_dw2-1.dll

            Filesize

            113KB

            MD5

            9aec524b616618b0d3d00b27b6f51da1

            SHA1

            64264300801a353db324d11738ffed876550e1d3

            SHA256

            59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

            SHA512

            0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\libstdc++-6.dll

            Filesize

            647KB

            MD5

            5e279950775baae5fea04d2cc4526bcc

            SHA1

            8aef1e10031c3629512c43dd8b0b5d9060878453

            SHA256

            97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

            SHA512

            666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\libwinpthread-1.dll

            Filesize

            69KB

            MD5

            1e0d62c34ff2e649ebc5c372065732ee

            SHA1

            fcfaa36ba456159b26140a43e80fbd7e9d9af2de

            SHA256

            509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

            SHA512

            3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

          • C:\Users\Admin\AppData\Local\Temp\7zS42925387\setup_install.exe

            Filesize

            2.1MB

            MD5

            4a7048fc29b517ffb9f9248a26ac4e84

            SHA1

            308a90114387616d0c7f9e1b8fee1d6010ecc0c9

            SHA256

            368c4fac65894b3a3f277403f81253ed0cfef73645ef61e5915410496cce7021

            SHA512

            f85ebfff6928891c29b137eef65daaa9f1728f88d25226f171e13152cedfbcf280b9dad00b8bfd29a418ef20eecc157b305c31538ad457465bb024c4cba8bf81

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wfvkhfiw.uin.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

            Filesize

            281KB

            MD5

            d98e33b66343e7c96158444127a117f6

            SHA1

            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

            SHA256

            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

            SHA512

            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

          • memory/264-197-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/1108-191-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/1328-75-0x0000000005100000-0x0000000005728000-memory.dmp

            Filesize

            6.2MB

          • memory/1328-179-0x0000000007580000-0x000000000758E000-memory.dmp

            Filesize

            56KB

          • memory/1328-129-0x0000000005B20000-0x0000000005E74000-memory.dmp

            Filesize

            3.3MB

          • memory/1328-152-0x0000000070250000-0x000000007029C000-memory.dmp

            Filesize

            304KB

          • memory/1328-151-0x00000000071B0000-0x00000000071E2000-memory.dmp

            Filesize

            200KB

          • memory/1328-139-0x00000000060C0000-0x000000000610C000-memory.dmp

            Filesize

            304KB

          • memory/1328-178-0x0000000007550000-0x0000000007561000-memory.dmp

            Filesize

            68KB

          • memory/1328-138-0x0000000006030000-0x000000000604E000-memory.dmp

            Filesize

            120KB

          • memory/1328-73-0x000000007356E000-0x000000007356F000-memory.dmp

            Filesize

            4KB

          • memory/1328-180-0x0000000007590000-0x00000000075A4000-memory.dmp

            Filesize

            80KB

          • memory/1328-182-0x0000000007670000-0x0000000007678000-memory.dmp

            Filesize

            32KB

          • memory/1328-188-0x0000000073560000-0x0000000073D10000-memory.dmp

            Filesize

            7.7MB

          • memory/1328-104-0x0000000073560000-0x0000000073D10000-memory.dmp

            Filesize

            7.7MB

          • memory/1328-107-0x0000000073560000-0x0000000073D10000-memory.dmp

            Filesize

            7.7MB

          • memory/1396-132-0x0000000000390000-0x0000000000398000-memory.dmp

            Filesize

            32KB

          • memory/2352-213-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-210-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-216-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-208-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-215-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-209-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-206-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-205-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-199-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-207-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-214-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-211-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2352-212-0x0000000000400000-0x00000000023CF000-memory.dmp

            Filesize

            31.8MB

          • memory/2456-105-0x0000000000640000-0x00000000006A8000-memory.dmp

            Filesize

            416KB

          • memory/2456-130-0x0000000005580000-0x0000000005B24000-memory.dmp

            Filesize

            5.6MB

          • memory/2456-106-0x0000000004D50000-0x0000000004DC6000-memory.dmp

            Filesize

            472KB

          • memory/2456-109-0x0000000004EF0000-0x0000000004F0E000-memory.dmp

            Filesize

            120KB

          • memory/2980-189-0x0000000073560000-0x0000000073D10000-memory.dmp

            Filesize

            7.7MB

          • memory/2980-181-0x0000000007B20000-0x0000000007B3A000-memory.dmp

            Filesize

            104KB

          • memory/2980-122-0x0000000005DF0000-0x0000000005E56000-memory.dmp

            Filesize

            408KB

          • memory/2980-121-0x0000000005D50000-0x0000000005D72000-memory.dmp

            Filesize

            136KB

          • memory/2980-108-0x0000000073560000-0x0000000073D10000-memory.dmp

            Filesize

            7.7MB

          • memory/2980-91-0x0000000073560000-0x0000000073D10000-memory.dmp

            Filesize

            7.7MB

          • memory/2980-123-0x0000000005E60000-0x0000000005EC6000-memory.dmp

            Filesize

            408KB

          • memory/2980-162-0x0000000070250000-0x000000007029C000-memory.dmp

            Filesize

            304KB

          • memory/2980-172-0x0000000007420000-0x000000000743E000-memory.dmp

            Filesize

            120KB

          • memory/2980-173-0x0000000007490000-0x0000000007533000-memory.dmp

            Filesize

            652KB

          • memory/2980-74-0x0000000004F10000-0x0000000004F46000-memory.dmp

            Filesize

            216KB

          • memory/2980-76-0x0000000073560000-0x0000000073D10000-memory.dmp

            Filesize

            7.7MB

          • memory/2980-174-0x0000000007E40000-0x00000000084BA000-memory.dmp

            Filesize

            6.5MB

          • memory/2980-175-0x00000000077F0000-0x000000000780A000-memory.dmp

            Filesize

            104KB

          • memory/2980-176-0x0000000007870000-0x000000000787A000-memory.dmp

            Filesize

            40KB

          • memory/2980-177-0x0000000007A60000-0x0000000007AF6000-memory.dmp

            Filesize

            600KB

          • memory/3420-59-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/3420-70-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3420-64-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/3420-60-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/3420-65-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/3420-72-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/3420-69-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3420-67-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3420-68-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3420-66-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/3420-62-0x0000000064940000-0x0000000064959000-memory.dmp

            Filesize

            100KB

          • memory/3420-71-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/3420-63-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3420-61-0x0000000064941000-0x000000006494F000-memory.dmp

            Filesize

            56KB

          • memory/3420-97-0x000000006EB40000-0x000000006EB63000-memory.dmp

            Filesize

            140KB

          • memory/3420-102-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/3420-101-0x0000000064940000-0x0000000064959000-memory.dmp

            Filesize

            100KB

          • memory/3420-93-0x0000000000400000-0x000000000051C000-memory.dmp

            Filesize

            1.1MB

          • memory/3420-99-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3420-100-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/3964-146-0x0000000005340000-0x0000000005958000-memory.dmp

            Filesize

            6.1MB

          • memory/3964-149-0x0000000004F80000-0x0000000004FBC000-memory.dmp

            Filesize

            240KB

          • memory/3964-148-0x0000000004E30000-0x0000000004F3A000-memory.dmp

            Filesize

            1.0MB

          • memory/3964-147-0x0000000002860000-0x0000000002872000-memory.dmp

            Filesize

            72KB

          • memory/3964-145-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB