Analysis
-
max time kernel
159s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe
Resource
win10v2004-20240226-en
General
-
Target
5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe
-
Size
12.5MB
-
MD5
3ba515e7df4c8918a967f4043cd8c72b
-
SHA1
3659a765f502297fb92a9d14b08e5b8d91bc8603
-
SHA256
5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482
-
SHA512
010d639a231724425e791afccc7fabacd9b20269665706434c28eba6192af5b424a792755ff1503c0e0afcdd05c5b470d59f57f706f843157c42212e0bb40d8c
-
SSDEEP
393216:Y9XWBQ/bXZmSUGkVAqYwm9MlpcghwvWLT0Z:Y9GBmZkVAqYweMbIWfo
Malware Config
Extracted
redline
telegramone
163.5.160.27:51523
Extracted
redline
MergedALL
51.195.206.227:38719
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\mergedALL.exe family_redline C:\Users\Admin\AppData\Local\Temp\fix.exe family_redline behavioral2/memory/4664-81-0x0000000000A40000-0x0000000000A5E000-memory.dmp family_redline behavioral2/memory/324-80-0x0000000000830000-0x0000000000880000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\fix.exe family_sectoprat behavioral2/memory/4664-81-0x0000000000A40000-0x0000000000A5E000-memory.dmp family_sectoprat -
XMRig Miner payload 9 IoCs
Processes:
resource yara_rule behavioral2/memory/5020-270-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5020-271-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5020-273-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5020-274-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5020-277-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5020-276-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5020-275-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5020-473-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5020-474-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4032 powershell.exe 1844 powershell.exe 4580 powershell.exe 5076 powershell.exe 2644 powershell.exe -
Creates new service(s) 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe -
Executes dropped EXE 10 IoCs
Processes:
hamburger.exeNotepad.exemergedALL.exeetc test.exefix.exeNotepad.exeNotepad.exeNotepad.exetubpxzvwmyfr.exeesfowblknspo.exepid process 2040 hamburger.exe 3528 Notepad.exe 324 mergedALL.exe 860 etc test.exe 4664 fix.exe 1392 Notepad.exe 5016 Notepad.exe 4540 Notepad.exe 1984 tubpxzvwmyfr.exe 2804 esfowblknspo.exe -
Loads dropped DLL 16 IoCs
Processes:
Notepad.exeNotepad.exepid process 1392 Notepad.exe 1392 Notepad.exe 1392 Notepad.exe 1392 Notepad.exe 1392 Notepad.exe 1392 Notepad.exe 1392 Notepad.exe 4540 Notepad.exe 4540 Notepad.exe 4540 Notepad.exe 4540 Notepad.exe 4540 Notepad.exe 4540 Notepad.exe 4540 Notepad.exe 4540 Notepad.exe 4540 Notepad.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/5020-264-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-266-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-269-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-270-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-271-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-267-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-268-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-273-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-274-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-277-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-276-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-275-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-473-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5020-474-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Notepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Update64 = "C:\\Users\\Admin\\Notepad.exe" Notepad.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 10 IoCs
Processes:
powershell.exeetc test.exepowershell.exetubpxzvwmyfr.exeesfowblknspo.exehamburger.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe etc test.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe tubpxzvwmyfr.exe File opened for modification C:\Windows\system32\MRT.exe esfowblknspo.exe File opened for modification C:\Windows\system32\MRT.exe hamburger.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
tubpxzvwmyfr.exeesfowblknspo.exedescription pid process target process PID 1984 set thread context of 3592 1984 tubpxzvwmyfr.exe conhost.exe PID 2804 set thread context of 3836 2804 esfowblknspo.exe conhost.exe PID 1984 set thread context of 5020 1984 tubpxzvwmyfr.exe conhost.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 4028 sc.exe 644 sc.exe 3972 sc.exe 3744 sc.exe 2532 sc.exe 2424 sc.exe 2316 sc.exe 2008 sc.exe -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Notepad.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3880 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
hamburger.exepowershell.exeetc test.exepowershell.exetubpxzvwmyfr.exepowershell.exeesfowblknspo.exepowershell.exepowershell.execonhost.exefix.exepid process 2040 hamburger.exe 1844 powershell.exe 1844 powershell.exe 1844 powershell.exe 860 etc test.exe 4580 powershell.exe 4580 powershell.exe 4580 powershell.exe 2040 hamburger.exe 2040 hamburger.exe 860 etc test.exe 860 etc test.exe 2040 hamburger.exe 860 etc test.exe 2040 hamburger.exe 2040 hamburger.exe 860 etc test.exe 860 etc test.exe 1984 tubpxzvwmyfr.exe 4032 powershell.exe 4032 powershell.exe 2804 esfowblknspo.exe 5076 powershell.exe 5076 powershell.exe 5076 powershell.exe 2644 powershell.exe 2644 powershell.exe 2644 powershell.exe 4032 powershell.exe 1984 tubpxzvwmyfr.exe 1984 tubpxzvwmyfr.exe 2804 esfowblknspo.exe 2804 esfowblknspo.exe 1984 tubpxzvwmyfr.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 5020 conhost.exe 4664 fix.exe 4664 fix.exe 5020 conhost.exe 5020 conhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 672 -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
taskkill.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exefix.execonhost.exemergedALL.exedescription pid process Token: SeDebugPrivilege 3880 taskkill.exe Token: SeDebugPrivilege 1844 powershell.exe Token: SeDebugPrivilege 4580 powershell.exe Token: SeDebugPrivilege 4032 powershell.exe Token: SeDebugPrivilege 5076 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 4664 fix.exe Token: SeLockMemoryPrivilege 5020 conhost.exe Token: SeDebugPrivilege 324 mergedALL.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exeNotepad.exeNotepad.execmd.exeNotepad.execmd.execmd.exetubpxzvwmyfr.exeesfowblknspo.execmd.execmd.exedescription pid process target process PID 784 wrote to memory of 4032 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe powershell.exe PID 784 wrote to memory of 4032 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe powershell.exe PID 784 wrote to memory of 4032 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe powershell.exe PID 784 wrote to memory of 2040 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe hamburger.exe PID 784 wrote to memory of 2040 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe hamburger.exe PID 784 wrote to memory of 3528 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe Notepad.exe PID 784 wrote to memory of 3528 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe Notepad.exe PID 784 wrote to memory of 324 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe mergedALL.exe PID 784 wrote to memory of 324 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe mergedALL.exe PID 784 wrote to memory of 324 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe mergedALL.exe PID 784 wrote to memory of 860 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe etc test.exe PID 784 wrote to memory of 860 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe etc test.exe PID 784 wrote to memory of 4664 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe fix.exe PID 784 wrote to memory of 4664 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe fix.exe PID 784 wrote to memory of 4664 784 5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe fix.exe PID 3528 wrote to memory of 1392 3528 Notepad.exe Notepad.exe PID 3528 wrote to memory of 1392 3528 Notepad.exe Notepad.exe PID 1392 wrote to memory of 3912 1392 Notepad.exe Conhost.exe PID 1392 wrote to memory of 3912 1392 Notepad.exe Conhost.exe PID 3912 wrote to memory of 3880 3912 cmd.exe taskkill.exe PID 3912 wrote to memory of 3880 3912 cmd.exe taskkill.exe PID 3912 wrote to memory of 5016 3912 cmd.exe Notepad.exe PID 3912 wrote to memory of 5016 3912 cmd.exe Notepad.exe PID 5016 wrote to memory of 4540 5016 Notepad.exe Notepad.exe PID 5016 wrote to memory of 4540 5016 Notepad.exe Notepad.exe PID 3248 wrote to memory of 764 3248 cmd.exe wusa.exe PID 3248 wrote to memory of 764 3248 cmd.exe wusa.exe PID 1460 wrote to memory of 1584 1460 cmd.exe wusa.exe PID 1460 wrote to memory of 1584 1460 cmd.exe wusa.exe PID 1984 wrote to memory of 3592 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 3592 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 3592 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 3592 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 3592 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 3592 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 3592 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 3592 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 3592 1984 tubpxzvwmyfr.exe conhost.exe PID 2804 wrote to memory of 3836 2804 esfowblknspo.exe conhost.exe PID 2804 wrote to memory of 3836 2804 esfowblknspo.exe conhost.exe PID 2804 wrote to memory of 3836 2804 esfowblknspo.exe conhost.exe PID 2804 wrote to memory of 3836 2804 esfowblknspo.exe conhost.exe PID 2804 wrote to memory of 3836 2804 esfowblknspo.exe conhost.exe PID 2804 wrote to memory of 3836 2804 esfowblknspo.exe conhost.exe PID 2804 wrote to memory of 3836 2804 esfowblknspo.exe conhost.exe PID 2804 wrote to memory of 3836 2804 esfowblknspo.exe conhost.exe PID 2804 wrote to memory of 3836 2804 esfowblknspo.exe conhost.exe PID 1984 wrote to memory of 5020 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 5020 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 5020 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 5020 1984 tubpxzvwmyfr.exe conhost.exe PID 1984 wrote to memory of 5020 1984 tubpxzvwmyfr.exe conhost.exe PID 4320 wrote to memory of 4236 4320 cmd.exe wusa.exe PID 4320 wrote to memory of 4236 4320 cmd.exe wusa.exe PID 1452 wrote to memory of 4064 1452 cmd.exe wusa.exe PID 1452 wrote to memory of 4064 1452 cmd.exe wusa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe"C:\Users\Admin\AppData\Local\Temp\5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAcQByACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHMAYgBtACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGgAegBiACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAagBuACMAPgA="2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\hamburger.exe"C:\Users\Admin\AppData\Local\Temp\hamburger.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "UPFRTHSI"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "UPFRTHSI" binpath= "C:\ProgramData\pehgyntafdrm\tubpxzvwmyfr.exe" start= "auto"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "UPFRTHSI"3⤵
- Launches sc.exe
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
-
C:\Users\Admin\AppData\Local\Temp\Notepad.exe"C:\Users\Admin\AppData\Local\Temp\Notepad.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Notepad.exe"C:\Users\Admin\AppData\Local\Temp\Notepad.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\activate.bat4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /im "Notepad.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Notepad.exe"Notepad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Notepad.exe"Notepad.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\mergedALL.exe"C:\Users\Admin\AppData\Local\Temp\mergedALL.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\etc test.exe"C:\Users\Admin\AppData\Local\Temp\etc test.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "OBKZWAPS"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "OBKZWAPS" binpath= "C:\ProgramData\rstywrmdprzs\esfowblknspo.exe" start= "auto"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "OBKZWAPS"3⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\fix.exe"C:\Users\Admin\AppData\Local\Temp\fix.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\pehgyntafdrm\tubpxzvwmyfr.exeC:\ProgramData\pehgyntafdrm\tubpxzvwmyfr.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
-
C:\Windows\system32\conhost.execonhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\rstywrmdprzs\esfowblknspo.exeC:\ProgramData\rstywrmdprzs\esfowblknspo.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3816 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
C:\Users\Admin\AppData\Local\Temp\Notepad.exeFilesize
7.0MB
MD5150f7378fd18d19ecc002761fa112de5
SHA1a5ef247183d14dcd0d9b112306c1965c38720a1e
SHA256b3bfd7d408a13096897fe8cbaff158cb8ff34f6d2d2269b25a1a268daeef387c
SHA512dd3739f3e7736c6d6319dbf71346addfdab60d668c84b91d9c87bdf5ee7c6ea085b49a314c52338cb196cceb212067fdbf804da91d9f517a34e1b0978ceebb6d
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\VCRUNTIME140.dllFilesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\_bz2.pydFilesize
82KB
MD559d60a559c23202beb622021af29e8a9
SHA1a405f23916833f1b882f37bdbba2dd799f93ea32
SHA256706d4a0c26dd454538926cbb2ff6c64257c3d9bd48c956f7cabd6def36ffd13e
SHA5122f60e79603cf456b2a14b8254cec75ce8be0a28d55a874d4fb23d92d63bbe781ed823ab0f4d13a23dc60c4df505cbf1dbe1a0a2049b02e4bdec8d374898002b1
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\_ctypes.pydFilesize
122KB
MD52a834c3738742d45c0a06d40221cc588
SHA1606705a593631d6767467fb38f9300d7cd04ab3e
SHA256f20dfa748b878751ea1c4fe77a230d65212720652b99c4e5577bce461bbd9089
SHA512924235a506ce4d635fa7c2b34e5d8e77eff73f963e58e29c6ef89db157bf7bab587678bb2120d09da70594926d82d87dbaa5d247e861e331cf591d45ea19a117
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\_decimal.pydFilesize
246KB
MD5f930b7550574446a015bc602d59b0948
SHA14ee6ff8019c6c540525bdd2790fc76385cdd6186
SHA2563b9ad1d2bc9ec03d37da86135853dac73b3fe851b164fe52265564a81eb8c544
SHA51210b864975945d6504433554f9ff11b47218caa00f809c6bce00f9e4089b862190a4219f659697a4ba5e5c21edbe1d8d325950921e09371acc4410469bd9189ee
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\_hashlib.pydFilesize
64KB
MD5b0262bd89a59a3699bfa75c4dcc3ee06
SHA1eb658849c646a26572dea7f6bfc042cb62fb49dc
SHA2564adfbbd6366d9b55d902fc54d2b42e7c8c989a83016ed707bd7a302fc3fc7b67
SHA5122e4b214de3b306e3a16124af434ff8f5ab832aa3eeb1aa0aa9b49b0ada0928dcbb05c57909292fbe3b01126f4cd3fe0dac9cc15eaea5f3844d6e267865b9f7b1
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\_lzma.pydFilesize
155KB
MD5b71dbe0f137ffbda6c3a89d5bcbf1017
SHA1a2e2bdc40fdb83cc625c5b5e8a336ca3f0c29c5f
SHA2566216173194b29875e84963cd4dc4752f7ca9493f5b1fd7e4130ca0e411c8ac6a
SHA5129a5c7b1e25d8e1b5738f01aedfd468c1837f1ac8dd4a5b1d24ce86dcae0db1c5b20f2ff4280960bc523aee70b71db54fd515047cdaf10d21a8bec3ebd6663358
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\_socket.pydFilesize
81KB
MD59c6283cc17f9d86106b706ec4ea77356
SHA1af4f2f52ce6122f340e5ea1f021f98b1ffd6d5b6
SHA2565cc62aac52edf87916deb4ebbad9abb58a6a3565b32e7544f672aca305c38027
SHA51211fd6f570dd78f8ff00be645e47472a96daffa3253e8bd29183bccde3f0746f7e436a106e9a68c57cc05b80a112365441d06cc719d51c906703b428a32c93124
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\_wmi.pydFilesize
35KB
MD5c1654ebebfeeda425eade8b77ca96de5
SHA1a4a150f1c810077b6e762f689c657227cc4fd257
SHA256aa1443a715fbf84a84f39bd89707271fc11a77b597d7324ce86fc5cfa56a63a9
SHA51221705b991e75efd5e59b8431a3b19ae5fcc38a3e7f137a9d52acd24e7f67d61758e48abc1c9c0d4314fa02010a1886c15ead5bca8dca1b1d4ccbfc3c589d342e
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\base_library.zipFilesize
1.3MB
MD5630153ac2b37b16b8c5b0dbb69a3b9d6
SHA1f901cd701fe081489b45d18157b4a15c83943d9d
SHA256ec4e6b8e9f6f1f4b525af72d3a6827807c7a81978cb03db5767028ebea283be2
SHA5127e3a434c8df80d32e66036d831cbd6661641c0898bd0838a07038b460261bf25b72a626def06d0faa692caf64412ca699b1fa7a848fe9d969756e097cba39e41
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\libcrypto-3.dllFilesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\libffi-8.dllFilesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\python312.dllFilesize
6.7MB
MD5550288a078dffc3430c08da888e70810
SHA101b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA5127244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\select.pydFilesize
29KB
MD58a273f518973801f3c63d92ad726ec03
SHA1069fc26b9bd0f6ea3f9b3821ad7c812fd94b021f
SHA256af358285a7450de6e2e5e7ff074f964d6a257fb41d9eb750146e03c7dda503ca
SHA5127fedae0573ecb3946ede7d0b809a98acad3d4c95d6c531a40e51a31bdb035badc9f416d8aaa26463784ff2c5e7a0cc2c793d62b5fdb2b8e9fad357f93d3a65f8
-
C:\Users\Admin\AppData\Local\Temp\_MEI35282\unicodedata.pydFilesize
1.1MB
MD504f35d7eec1f6b72bab9daf330fd0d6b
SHA1ecf0c25ba7adf7624109e2720f2b5930cd2dba65
SHA256be942308d99cc954931fe6f48ed8cc7a57891ccbe99aae728121bcda1fd929ab
SHA5123da405e4c1371f4b265e744229dcc149491a112a2b7ea8e518d5945f8c259cad15583f25592b35ec8a344e43007ae00da9673822635ee734d32664f65c9c8d9b
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_diuoxkbb.api.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\etc test.exeFilesize
2.5MB
MD5e4e8f85ee773cd79bd76dd7798baf957
SHA1112f53467d2946f2bcf4c55bb4177f25120cda13
SHA256a0a9aa62080c1a543e11e5853fcd6964e598b59a0a7c24de7a7f1d951177e564
SHA51299a1dd206181ef20c572a1a1ed9354cc2f70424a4493cd2e67648b54483f90e0bf291764e4731943c6ed73ab872b3fa8410c0368295d5a025330792a17f19dad
-
C:\Users\Admin\AppData\Local\Temp\fix.exeFilesize
95KB
MD51f327a277466f1bb04aa5cfcd279c0f7
SHA19bcb7bbac28992b9c7c35ba0573dce7db32ca18f
SHA256e8432406bc918c6ce0d245a3bc5bb8c021b218593f94b5d09ebcda7e549f1fc0
SHA51282c750475dc42d974c3fd33a4329bce7e99a5c15bf88fe4e802627b321b6c91f78e8be4b82e72380ee34c4de407878d17b18af26d7f5667104fdc55020f68a9d
-
C:\Users\Admin\AppData\Local\Temp\hamburger.exeFilesize
2.5MB
MD509af9e57d30e6929c115811dfa9c3b7e
SHA1caf9281f7001f92524005c60a34f33543315df52
SHA2563b031ddbb05570ca3ffefa93abbd1cb2891897a34ea9b4a29612858b66a146f2
SHA512023849985162db69160f559002586dbdb4148747f13fa1ff617e75b0f972c778f9f3d6a033dd3fb429d78aa3c20b264d83dc44274d6c0743a3ed1cf88fb045f8
-
C:\Users\Admin\AppData\Local\Temp\mergedALL.exeFilesize
297KB
MD52359b2a186e08a38296305861dea4231
SHA141716e2710daaebba6f03d009064a149da90c526
SHA256f36f4c7bfb509bcfc5cdfb6eb28149bfca1b6ab3eb001bf74ef1e35f5edce9d6
SHA5126ebcb5f9c3b6d76c59221d1442d4c39cc7a1108ae7ef63f3173cff0fcb5356e622369d2925c0d1992aec3a2605641a69e44891c804d320cbe36e164705d19c54
-
C:\Users\Admin\AppData\Local\Temp\tmp3995.tmpFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\tmp3BAF.tmpFilesize
92KB
MD54c2e2189b87f507edc2e72d7d55583a0
SHA11f06e340f76d41ea0d1e8560acd380a901b2a5bd
SHA25699a5f8dea08b5cf512ed888b3e533cc77c08dc644078793dc870abd8828c1bca
SHA5128b6b49e55afe8a697aaf71d975fab9e906143339827f75a57876a540d0d7b9e3cbbcdd8b5435d6198900a73895cc52d2082e66ee8cec342e72f2e427dde71600
-
C:\Users\Admin\AppData\Local\Temp\tmp3C09.tmpFilesize
56KB
MD5d444c807029c83b8a892ac0c4971f955
SHA1fa58ce7588513519dc8fed939b26b05dc25e53b5
SHA2568297a7698f19bb81539a18363db100c55e357fa73f773c2b883d2c4161f6a259
SHA512b7958b843639d4223bef65cdc6c664d7d15b76ac4e0a8b1575201dd47a32899feff32389dcc047314f47944ebe7b774cd59e51d49202f49541bbd70ecbb31a2e
-
C:\Users\Admin\AppData\Local\Temp\tmp3C1E.tmpFilesize
220KB
MD543c7e87864b5879d8a2c65fa481ae254
SHA15ed8730b1f60ee860c81fdf5b38cd847b373244b
SHA256ef0d67625677871def496c4dab215014b4343fde14cc22cf64fb030066ec83b3
SHA51230e6bd68fdda8486ee3ff1ece76caee16111d6182fab46239b727e0985460c02a05dbc221b7841d81e0e5ade37c9824b1242af0e1f1278de5073431234030995
-
C:\Users\Admin\AppData\Local\Temp\tmp3CA7.tmpFilesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
C:\Users\Admin\activate.batFilesize
89B
MD5d58c7fcb7af4dba94dd8918ef29d5ec3
SHA19671c90d94b89d1845c3710d2d5435cdf08ba249
SHA25644d51facca088638f287e709658abaf3f96e0ae25c0c61c47a9af85e764a29b1
SHA5123294add7249a6c12ab192d5236060364f1e57c1d093b469530fe793403646e6dc2d5b9afe4032745019ba62902803cf91c8ce894b6795e4f7e5fe9d654790edb
-
memory/324-188-0x0000000002C00000-0x0000000002C0A000-memory.dmpFilesize
40KB
-
memory/324-109-0x0000000005200000-0x0000000005292000-memory.dmpFilesize
584KB
-
memory/324-88-0x0000000005710000-0x0000000005CB4000-memory.dmpFilesize
5.6MB
-
memory/324-80-0x0000000000830000-0x0000000000880000-memory.dmpFilesize
320KB
-
memory/324-422-0x0000000007F00000-0x0000000007F50000-memory.dmpFilesize
320KB
-
memory/1844-145-0x00000290BC0C0000-0x00000290BC0E2000-memory.dmpFilesize
136KB
-
memory/1844-161-0x00000290BC1F0000-0x00000290BC33E000-memory.dmpFilesize
1.3MB
-
memory/2644-220-0x00000245FF050000-0x00000245FF05A000-memory.dmpFilesize
40KB
-
memory/2644-214-0x00000245FEF90000-0x00000245FF045000-memory.dmpFilesize
724KB
-
memory/2644-238-0x00000245FF1A0000-0x00000245FF1AA000-memory.dmpFilesize
40KB
-
memory/2644-241-0x00000245FF1E0000-0x00000245FF1E6000-memory.dmpFilesize
24KB
-
memory/2644-239-0x00000245FF200000-0x00000245FF21A000-memory.dmpFilesize
104KB
-
memory/3592-254-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3592-257-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3592-251-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3592-252-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3592-253-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3592-250-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3836-265-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3836-262-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3836-261-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3836-258-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3836-260-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/3836-259-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/4032-236-0x0000000006890000-0x00000000068AE000-memory.dmpFilesize
120KB
-
memory/4032-278-0x0000000007900000-0x0000000007996000-memory.dmpFilesize
600KB
-
memory/4032-237-0x0000000006900000-0x00000000069A3000-memory.dmpFilesize
652KB
-
memory/4032-89-0x0000000004CD0000-0x0000000004D06000-memory.dmpFilesize
216KB
-
memory/4032-243-0x0000000007D10000-0x000000000838A000-memory.dmpFilesize
6.5MB
-
memory/4032-244-0x0000000007660000-0x000000000767A000-memory.dmpFilesize
104KB
-
memory/4032-110-0x00000000053D0000-0x00000000059F8000-memory.dmpFilesize
6.2MB
-
memory/4032-246-0x00000000076E0000-0x00000000076EA000-memory.dmpFilesize
40KB
-
memory/4032-285-0x00000000009C0000-0x00000000009C8000-memory.dmpFilesize
32KB
-
memory/4032-225-0x00000000068B0000-0x00000000068E2000-memory.dmpFilesize
200KB
-
memory/4032-226-0x0000000074A60000-0x0000000074AAC000-memory.dmpFilesize
304KB
-
memory/4032-284-0x00000000079A0000-0x00000000079BA000-memory.dmpFilesize
104KB
-
memory/4032-222-0x00000000062C0000-0x00000000062DE000-memory.dmpFilesize
120KB
-
memory/4032-283-0x00000000078C0000-0x00000000078D4000-memory.dmpFilesize
80KB
-
memory/4032-219-0x0000000005DE0000-0x0000000006134000-memory.dmpFilesize
3.3MB
-
memory/4032-282-0x00000000078B0000-0x00000000078BE000-memory.dmpFilesize
56KB
-
memory/4032-189-0x0000000005BE0000-0x0000000005C46000-memory.dmpFilesize
408KB
-
memory/4032-186-0x0000000005B00000-0x0000000005B66000-memory.dmpFilesize
408KB
-
memory/4032-279-0x0000000007870000-0x0000000007881000-memory.dmpFilesize
68KB
-
memory/4032-185-0x00000000052E0000-0x0000000005302000-memory.dmpFilesize
136KB
-
memory/4580-160-0x000001E09C400000-0x000001E09C54E000-memory.dmpFilesize
1.3MB
-
memory/4664-281-0x0000000006ED0000-0x0000000006EEE000-memory.dmpFilesize
120KB
-
memory/4664-112-0x00000000052C0000-0x00000000052D2000-memory.dmpFilesize
72KB
-
memory/4664-81-0x0000000000A40000-0x0000000000A5E000-memory.dmpFilesize
120KB
-
memory/4664-242-0x00000000069F0000-0x0000000006BB2000-memory.dmpFilesize
1.8MB
-
memory/4664-111-0x0000000005920000-0x0000000005F38000-memory.dmpFilesize
6.1MB
-
memory/4664-135-0x0000000005340000-0x000000000537C000-memory.dmpFilesize
240KB
-
memory/4664-247-0x00000000070F0000-0x000000000761C000-memory.dmpFilesize
5.2MB
-
memory/4664-221-0x00000000055D0000-0x00000000056DA000-memory.dmpFilesize
1.0MB
-
memory/4664-280-0x0000000006DB0000-0x0000000006E26000-memory.dmpFilesize
472KB
-
memory/4664-187-0x0000000005380000-0x00000000053CC000-memory.dmpFilesize
304KB
-
memory/5020-268-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-474-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-277-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-264-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-274-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-273-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-473-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-269-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-275-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-276-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-271-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-267-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-266-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-270-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/5020-272-0x000001DBE5EC0000-0x000001DBE5EE0000-memory.dmpFilesize
128KB
-
memory/5076-245-0x000001F4A6020000-0x000001F4A602A000-memory.dmpFilesize
40KB
-
memory/5076-213-0x000001F4A5DB0000-0x000001F4A5DCC000-memory.dmpFilesize
112KB
-
memory/5076-240-0x000001F4A5FE0000-0x000001F4A5FE8000-memory.dmpFilesize
32KB
-
memory/5076-223-0x000001F4A5FF0000-0x000001F4A600C000-memory.dmpFilesize
112KB