Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 09:18

General

  • Target

    6d13d147a209e3be044035f0c03b7bde.exe

  • Size

    47KB

  • MD5

    6d13d147a209e3be044035f0c03b7bde

  • SHA1

    1eb5fb487ea7742ff1766ca5bf1b7191cfcf6283

  • SHA256

    9c457b1cd061ae951fbed7841149b247e085befa6e2c5170058ce35cdebce548

  • SHA512

    a159d09265fa833afddce5fe7fab6d4be0fc37fd4c2e0d1a15851427764ad3c068249ba28d000a076209d017cb65e4320752ac7a3a0314239d836f1e15ae39a9

  • SSDEEP

    768:IuyxNTAoZjRWUJd9bmo2qL2TJ4+3Qk8sna9lzPIaj9vtqb5HTKsvWy0oKCnX5Eev:IuyxNTAGL2Mk839lcaj9vIbJWsZoWFnt

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

94.232.249.111:6606

94.232.249.111:7707

94.232.249.111:8808

Mutex

o6tEeoRxJb0n

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7379351260:AAGqtKlpHd72GFMRON17QY1OA6l1sR7mBik/sendMessage?chat_id=5795480469

https://api.telegram.org/bot6766280506:AAHjuzaB1sSnpQb9lxJpGx01sFybzgTuJ7U/sendMessage?chat_id=5795480469

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 4 IoCs
  • Async RAT payload 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 12 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Start PowerShell.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d13d147a209e3be044035f0c03b7bde.exe
    "C:\Users\Admin\AppData\Local\Temp\6d13d147a209e3be044035f0c03b7bde.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2568
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpFC9.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2752
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\pymvyg.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2344
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\pymvyg.exe"'
            5⤵
            • Loads dropped DLL
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1716
            • C:\Users\Admin\AppData\Local\Temp\pymvyg.exe
              "C:\Users\Admin\AppData\Local\Temp\pymvyg.exe"
              6⤵
              • Executes dropped EXE
              • Drops desktop.ini file(s)
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1608
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2784
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  8⤵
                    PID:1004
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh wlan show profile
                    8⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:3064
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr All
                    8⤵
                      PID:2952
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2780
                    • C:\Windows\SysWOW64\chcp.com
                      chcp 65001
                      8⤵
                        PID:1720
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh wlan show networks mode=bssid
                        8⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        PID:1484
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\fzxuwp.exe"' & exit
                4⤵
                  PID:2852
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\fzxuwp.exe"'
                    5⤵
                    • Loads dropped DLL
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2136
                    • C:\Users\Admin\AppData\Local\Temp\fzxuwp.exe
                      "C:\Users\Admin\AppData\Local\Temp\fzxuwp.exe"
                      6⤵
                      • Executes dropped EXE
                      • Drops desktop.ini file(s)
                      • Checks processor information in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1908
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                        7⤵
                          PID:2132
                          • C:\Windows\SysWOW64\chcp.com
                            chcp 65001
                            8⤵
                              PID:1056
                            • C:\Windows\SysWOW64\netsh.exe
                              netsh wlan show profile
                              8⤵
                              • Event Triggered Execution: Netsh Helper DLL
                              PID:1176
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr All
                              8⤵
                                PID:848
                            • C:\Windows\SysWOW64\cmd.exe
                              "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                              7⤵
                                PID:2808
                                • C:\Windows\SysWOW64\chcp.com
                                  chcp 65001
                                  8⤵
                                    PID:2644
                                  • C:\Windows\SysWOW64\netsh.exe
                                    netsh wlan show networks mode=bssid
                                    8⤵
                                    • Event Triggered Execution: Netsh Helper DLL
                                    PID:2516

                    Network

                    MITRE ATT&CK Matrix ATT&CK v13

                    Execution

                    Command and Scripting Interpreter

                    1
                    T1059

                    PowerShell

                    1
                    T1059.001

                    Scheduled Task/Job

                    1
                    T1053

                    Scheduled Task

                    1
                    T1053.005

                    Persistence

                    Event Triggered Execution

                    1
                    T1546

                    Netsh Helper DLL

                    1
                    T1546.007

                    Scheduled Task/Job

                    1
                    T1053

                    Scheduled Task

                    1
                    T1053.005

                    Privilege Escalation

                    Event Triggered Execution

                    1
                    T1546

                    Netsh Helper DLL

                    1
                    T1546.007

                    Scheduled Task/Job

                    1
                    T1053

                    Scheduled Task

                    1
                    T1053.005

                    Credential Access

                    Unsecured Credentials

                    1
                    T1552

                    Credentials In Files

                    1
                    T1552.001

                    Discovery

                    System Information Discovery

                    2
                    T1082

                    Query Registry

                    1
                    T1012

                    Collection

                    Data from Local System

                    1
                    T1005

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                      Filesize

                      70KB

                      MD5

                      49aebf8cbd62d92ac215b2923fb1b9f5

                      SHA1

                      1723be06719828dda65ad804298d0431f6aff976

                      SHA256

                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                      SHA512

                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                    • C:\Users\Admin\AppData\Local\Temp\Tar3663.tmp
                      Filesize

                      181KB

                      MD5

                      4ea6026cf93ec6338144661bf1202cd1

                      SHA1

                      a1dec9044f750ad887935a01430bf49322fbdcb7

                      SHA256

                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                      SHA512

                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                    • C:\Users\Admin\AppData\Local\Temp\fzxuwp.exe
                      Filesize

                      175KB

                      MD5

                      ff895d93516828450e0c0dd0e467e1d0

                      SHA1

                      a19edaa4b1fbfb8b3c8fe61d4cac894beb921b39

                      SHA256

                      24c4301e81d0f742d7470fdaae62499b9793265f2e78d77c71e8b84bf1718cca

                      SHA512

                      c3758aa89990653619c4803122fd0761e1c2709fea0dd9b89317ac4627d4e73e54a15397f121716b1dd48fb180fbbd2ed4a3c7b799b11743b2f9079cd1b9f75e

                    • C:\Users\Admin\AppData\Local\Temp\places.raw
                      Filesize

                      5.0MB

                      MD5

                      5abefffbcfcb833e098dff88ca9c2cf2

                      SHA1

                      00c13b1547bf540e7106742f45e6d55f01e8dcf0

                      SHA256

                      679c618e9cb42323cd0be32e9a9a55649e1700efa0a862a0d4a05b78e4dffdb6

                      SHA512

                      3404324afa33be247f6b402703ce2f45af174e6faaff2aaa35b6b01b77b5fcc68454acc61399bc197fa4e3942e0d044f7ecaaa73aa7403d1bc2fea04bdad201a

                    • C:\Users\Admin\AppData\Local\Temp\pymvyg.exe
                      Filesize

                      175KB

                      MD5

                      da34ea26ddfedfd7966e8aedf0bb93e6

                      SHA1

                      ba30bde364d564268d175090364158cb66c165a9

                      SHA256

                      817940c9dd88c9d185f58532e2027e9df7bfaca8249ec96ae055da03c8750f20

                      SHA512

                      fbf634fd22ec37a65540c6ad1968b53666308d4d31a151c26b1444e242de40c95c0f48f96010bc72e5e0e9a10982b4f56590e96aded12015de915d7d86af8dff

                    • C:\Users\Admin\AppData\Local\Temp\tmp8833.tmp.dat
                      Filesize

                      92KB

                      MD5

                      18e04095708297d6889a6962f81e8d8f

                      SHA1

                      9a25645db1da0217092c06579599b04982192124

                      SHA256

                      4ed16c019fe50bb4ab1c9dcedf0e52f93454b5dbaf18615d60761e7927b69fb7

                      SHA512

                      45ec57bddeeb8bca05babcf8da83bf9db630819b23076a1cf79f2e54b3e88e14cd7db650332554026ab5e8634061dd699f322bcba6683765063e67ac47ea1caf

                    • C:\Users\Admin\AppData\Local\Temp\tmp8845.tmp.dat
                      Filesize

                      148KB

                      MD5

                      90a1d4b55edf36fa8b4cc6974ed7d4c4

                      SHA1

                      aba1b8d0e05421e7df5982899f626211c3c4b5c1

                      SHA256

                      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                      SHA512

                      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                    • C:\Users\Admin\AppData\Local\Temp\tmpFC9.tmp.bat
                      Filesize

                      150B

                      MD5

                      144627706fd33295ade7369a14480f05

                      SHA1

                      0f1f961a99219433fb8bb36544521372db6384fb

                      SHA256

                      11f5a9cc9b80325c6c9eb0d18040f91216d7e8d0b8bb85cb13238d4e54de38de

                      SHA512

                      e72072fb3177e4c3bce298653888665496ca7112042d360b60cb09241da714a6da2fb0c670414d248a2845d11970fe68a1dd2da62bd8a394e06901a098223428

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Browsers\Firefox\Bookmarks.txt
                      Filesize

                      105B

                      MD5

                      2e9d094dda5cdc3ce6519f75943a4ff4

                      SHA1

                      5d989b4ac8b699781681fe75ed9ef98191a5096c

                      SHA256

                      c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                      SHA512

                      d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Directories\Desktop.txt
                      Filesize

                      451B

                      MD5

                      6ad1051148e16229143dbc977b368a62

                      SHA1

                      31ea9ac82317189b7f03a52fd69d301bac93dd4e

                      SHA256

                      52b48a0d1af939a4c5e88888641e4dcf45128675bec28605a9a1020b521476b0

                      SHA512

                      60b2e2b9008c56a67b02aab75e1a73d4a5d9f5628aaa1bd3535e39cb8c8b1fb589e2d9e95c6ecac060d6df9179baef2449c8f40bb5c0121299c661948e8d7693

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Directories\Documents.txt
                      Filesize

                      337B

                      MD5

                      5dfc33ef6a4d4e65f574256cab9fa233

                      SHA1

                      725028e623b2bd4d9fcd7174ad17cfc6713db9ad

                      SHA256

                      1101e77cc25e9601ed0ee39c6f339cfcf37017f477796502b98390fa6f140fb3

                      SHA512

                      69bc28f9a36e9af0720373ad2a0dbddc3515eb4413b842c9a097813a862b110c38659d93eb29ce3165dec06a0b0579c712b06b7f6db1c9210615b70ebec71ec3

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Directories\Downloads.txt
                      Filesize

                      646B

                      MD5

                      0f1f33363a62ec05502feadd8d63b4f2

                      SHA1

                      ccb3639c3419d0c1af880d215055917bb7792cd0

                      SHA256

                      591ebd650c6706c6bc71a595318f4921a8071b61f36740538dbb835f1ae26e53

                      SHA512

                      fd95c5622b79618d4e001146fc8c760c25e2f277c2b07678dd85fe277dfb8d05b010c5755f4bc4f7fb35b002d2e10a50bb7755d8463f77d41cc203c6fdccc2a4

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Directories\Pictures.txt
                      Filesize

                      309B

                      MD5

                      9f18ac86728e9866aa9e5c9974139536

                      SHA1

                      0d14e792840c55c0b5dff62879061828eaba14b3

                      SHA256

                      e040f5ad99ac0e3c7d3f4c17a0af4ec59d0a5ca40609ffcdfa872012e9e106c9

                      SHA512

                      60cee17fb9cd8a3888ff86fd22ad21fd267783e1c03b56d6ef7283d66a4885651de3c3e357543fe2f4751f3101626098465a5ab44705da36e679138c6c78d5bd

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Directories\Startup.txt
                      Filesize

                      24B

                      MD5

                      68c93da4981d591704cea7b71cebfb97

                      SHA1

                      fd0f8d97463cd33892cc828b4ad04e03fc014fa6

                      SHA256

                      889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483

                      SHA512

                      63455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Directories\Temp.txt
                      Filesize

                      1KB

                      MD5

                      b34cb7a207081e4eac875c90f197f4c4

                      SHA1

                      069b7b46a430b3178eca02c4c6de28d368ba5f81

                      SHA256

                      c313bb6a5ae5c87ed64b072c7a00b188b9900c46fe389113d46f0b5b0a4f2946

                      SHA512

                      b325c22d3106f633efd7cb478700086c8a4c227e536fc7dffcfab7ef666dc5534e986b55a1f2ece860769561d7781d2f02ab203a89c7c288ed0b5f8c4dfdc7d9

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Directories\Videos.txt
                      Filesize

                      23B

                      MD5

                      1fddbf1169b6c75898b86e7e24bc7c1f

                      SHA1

                      d2091060cb5191ff70eb99c0088c182e80c20f8c

                      SHA256

                      a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733

                      SHA512

                      20bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini
                      Filesize

                      282B

                      MD5

                      9e36cc3537ee9ee1e3b10fa4e761045b

                      SHA1

                      7726f55012e1e26cc762c9982e7c6c54ca7bb303

                      SHA256

                      4b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026

                      SHA512

                      5f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini
                      Filesize

                      402B

                      MD5

                      ecf88f261853fe08d58e2e903220da14

                      SHA1

                      f72807a9e081906654ae196605e681d5938a2e6c

                      SHA256

                      cafec240d998e4b6e92ad1329cd417e8e9cbd73157488889fd93a542de4a4844

                      SHA512

                      82c1c3dd163fbf7111c7ef5043b009dafc320c0c5e088dec16c835352c5ffb7d03c5829f65a9ff1dc357bae97e8d2f9c3fc1e531fe193e84811fb8c62888a36b

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini
                      Filesize

                      282B

                      MD5

                      3a37312509712d4e12d27240137ff377

                      SHA1

                      30ced927e23b584725cf16351394175a6d2a9577

                      SHA256

                      b029393ea7b7cf644fb1c9f984f57c1980077562ee2e15d0ffd049c4c48098d3

                      SHA512

                      dbb9abe70f8a781d141a71651a62a3a743c71a75a8305e9d23af92f7307fb639dc4a85499115885e2a781b040cbb7613f582544c2d6de521e588531e9c294b05

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini
                      Filesize

                      504B

                      MD5

                      29eae335b77f438e05594d86a6ca22ff

                      SHA1

                      d62ccc830c249de6b6532381b4c16a5f17f95d89

                      SHA256

                      88856962cef670c087eda4e07d8f78465beeabb6143b96bd90f884a80af925b4

                      SHA512

                      5d2d05403b39675b9a751c8eed4f86be58cb12431afec56946581cb116b9ae1014ab9334082740be5b4de4a25e190fe76de071ef1b9074186781477919eb3c17

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\System\Process.txt
                      Filesize

                      1KB

                      MD5

                      938e288585d14cd4b4cd1d9123d2099c

                      SHA1

                      b8c90dbf2adaa7c049223c1ea9ca913dbff22827

                      SHA256

                      b458df87e73300409763c75404e6365c28b45871c25d73521b42dca1ab35287e

                      SHA512

                      bc0695a0b6e804028783d98078e2553f434d08ad363f5960488456684c4fb035d2ddf6cffcbc1266204977f75a8baa593f78ce34f41c28d5971f6d4d53cb067a

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\System\ProductKey.txt
                      Filesize

                      29B

                      MD5

                      cad6c6bee6c11c88f5e2f69f0be6deb7

                      SHA1

                      289d74c3bebe6cca4e1d2e084482ad6d21316c84

                      SHA256

                      dc288491fadc4a85e71085890e3d6a7746e99a317cd5ef09a30272dfb10398c0

                      SHA512

                      e02cf6bff8b4ebd7a1346ecb1667be36c3ef7415fff77c3b9cfb370f3d0dc861f74d3e0e49065699850ba6cc025cd68d14ceb73f3b512c2a9b28873a69aff097

                    • C:\Users\Admin\AppData\Local\bbe4d32d3a8785275f217713963c932e\Admin@BISMIZHX_en-US\System\ScanningNetworks.txt
                      Filesize

                      118B

                      MD5

                      2a5b1b68e8c60a7bbc64ccbdab5c059b

                      SHA1

                      9ed50f7bdc446b08407a43ea4144ed3d7062c3bb

                      SHA256

                      1dbd461d3e88a299f97ae8779e98a20f20f906fbbc7c6f61f2ca1b663b997189

                      SHA512

                      d13f54fa81639cef910a0406372bf5bb190bfe7cecb7b6ab045d2939c323e29dd2893f3c20e2ffd15ea452dafdbf94320b15b8cac47791f00d545c862a17a930

                    • C:\Users\Admin\AppData\Local\e969a13c26976db0d9f61051b972460e\msgid.dat
                      Filesize

                      1B

                      MD5

                      cfcd208495d565ef66e7dff9f98764da

                      SHA1

                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                      SHA256

                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                      SHA512

                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                      Filesize

                      7KB

                      MD5

                      c82e73038c9113f96b1a4bab757fe0d0

                      SHA1

                      9c3e755d8cf1b7a94a3af3600e2d970683675153

                      SHA256

                      93abead3914dd79b01f1290a03be7af2825d9da30ace99d3ff0084049952e6cd

                      SHA512

                      437641bb52a310d5598b20f1529be6b4916e9b8a5180f6b481c0cbd31092745b62cc1fb2cc81274cf7d8160cec40e1383c063c448c9b526036fc100d2b75bf49

                    • \??\PIPE\srvsvc
                      MD5

                      d41d8cd98f00b204e9800998ecf8427e

                      SHA1

                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                      SHA256

                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                      SHA512

                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                    • \Users\Admin\AppData\Roaming\svchost.exe
                      Filesize

                      47KB

                      MD5

                      6d13d147a209e3be044035f0c03b7bde

                      SHA1

                      1eb5fb487ea7742ff1766ca5bf1b7191cfcf6283

                      SHA256

                      9c457b1cd061ae951fbed7841149b247e085befa6e2c5170058ce35cdebce548

                      SHA512

                      a159d09265fa833afddce5fe7fab6d4be0fc37fd4c2e0d1a15851427764ad3c068249ba28d000a076209d017cb65e4320752ac7a3a0314239d836f1e15ae39a9

                    • memory/1608-61-0x0000000000120000-0x0000000000152000-memory.dmp
                      Filesize

                      200KB

                    • memory/1740-1-0x0000000000E70000-0x0000000000E82000-memory.dmp
                      Filesize

                      72KB

                    • memory/1740-2-0x0000000074010000-0x00000000746FE000-memory.dmp
                      Filesize

                      6.9MB

                    • memory/1740-12-0x0000000074010000-0x00000000746FE000-memory.dmp
                      Filesize

                      6.9MB

                    • memory/1740-0-0x000000007401E000-0x000000007401F000-memory.dmp
                      Filesize

                      4KB

                    • memory/1908-163-0x0000000000900000-0x0000000000932000-memory.dmp
                      Filesize

                      200KB

                    • memory/2656-132-0x0000000005140000-0x00000000051A2000-memory.dmp
                      Filesize

                      392KB

                    • memory/2656-16-0x0000000000030000-0x0000000000042000-memory.dmp
                      Filesize

                      72KB

                    • memory/2656-34-0x0000000005530000-0x0000000005592000-memory.dmp
                      Filesize

                      392KB