Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 01:22

General

  • Target

    41b271f1e5ec5cf3ee214bcfe5611d1f11242e1018823f097fa9a102c25a19f9.exe

  • Size

    1.8MB

  • MD5

    55b19090d710a3dcf61a66dfcc77e4c0

  • SHA1

    91e38117b109fe49cb2a47d4e93940d4ac3bda9f

  • SHA256

    41b271f1e5ec5cf3ee214bcfe5611d1f11242e1018823f097fa9a102c25a19f9

  • SHA512

    bbd119d358b72ac0c19a24c9b727c579d02b4175a978060d775cedd47d0053287045d3ec482bfc08e7730e477c5c54d962a9e09ab01429136b1f93608c68f5a9

  • SSDEEP

    49152:/m7bTJzq9DKcvMdcqh1v1hC78EnLXtgNFZ:/uJevPo1v1hs8WX

Malware Config

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Extracted

Family

redline

Botnet

newlogs

C2

85.28.47.7:17210

Extracted

Family

stealc

Botnet

ZOV

C2

http://40.86.87.10

Attributes
  • url_path

    /108e010e8f91c38c.php

Extracted

Family

redline

Botnet

newbuild

C2

185.215.113.67:40960

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Vidar Stealer 1 IoCs
  • Detects Monster Stealer. 2 IoCs
  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 29 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41b271f1e5ec5cf3ee214bcfe5611d1f11242e1018823f097fa9a102c25a19f9.exe
    "C:\Users\Admin\AppData\Local\Temp\41b271f1e5ec5cf3ee214bcfe5611d1f11242e1018823f097fa9a102c25a19f9.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe
        "C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:644
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          4⤵
            PID:2096
        • C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
          "C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:628
        • C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe
          "C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1816
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 96
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:284
        • C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe
          "C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe"
          3⤵
          • Executes dropped EXE
          PID:2956
        • C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe
          "C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:3028
        • C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe
          "C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2732
        • C:\Users\Admin\AppData\Local\Temp\1000153001\Freshbuild.exe
          "C:\Users\Admin\AppData\Local\Temp\1000153001\Freshbuild.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3044
          • C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
            "C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            • Suspicious use of WriteProcessMemory
            PID:544
            • C:\Users\Admin\AppData\Local\Temp\1000034001\1.exe
              "C:\Users\Admin\AppData\Local\Temp\1000034001\1.exe"
              5⤵
              • Executes dropped EXE
              PID:772
            • C:\Users\Admin\AppData\Local\Temp\1000035001\Bitwarden-Installer-2024.exe
              "C:\Users\Admin\AppData\Local\Temp\1000035001\Bitwarden-Installer-2024.exe"
              5⤵
              • Executes dropped EXE
              • Checks processor information in registry
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:2364
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\IDBFHJDAAFBA" & exit
                6⤵
                  PID:2896
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 10
                    7⤵
                    • Delays execution with timeout.exe
                    PID:2736
          • C:\Users\Admin\AppData\Local\Temp\1000160001\leg222.exe
            "C:\Users\Admin\AppData\Local\Temp\1000160001\leg222.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2932
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 96
              4⤵
              • Loads dropped DLL
              • Program crash
              PID:2036
          • C:\Users\Admin\AppData\Local\Temp\1000161001\build1555.exe
            "C:\Users\Admin\AppData\Local\Temp\1000161001\build1555.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1092
            • C:\Users\Admin\AppData\Local\Temp\onefile_1092_133645297665400000\stub.exe
              "C:\Users\Admin\AppData\Local\Temp\1000161001\build1555.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1036
          • C:\Users\Admin\AppData\Local\Temp\1000164001\surfshark.exe
            "C:\Users\Admin\AppData\Local\Temp\1000164001\surfshark.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2728

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Virtualization/Sandbox Evasion

      2
      T1497

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Modify Registry

      1
      T1112

      Credential Access

      Unsecured Credentials

      3
      T1552

      Credentials In Files

      3
      T1552.001

      Discovery

      Query Registry

      5
      T1012

      Virtualization/Sandbox Evasion

      2
      T1497

      System Information Discovery

      3
      T1082

      Collection

      Data from Local System

      3
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\IDBFHJDAAFBA\KFIJEG
        Filesize

        6KB

        MD5

        edb266f41b834bf6b14df0f86bc6f440

        SHA1

        9a8191c2d1c98803aa7679e0db9d73c9dad0967b

        SHA256

        fae7e22425697b055f35edf1623f096e16eb5524e936ae6de970e3d8f83ad135

        SHA512

        ca121c496cd084e427a3ca045a477278ee39fbb96432f84f423de6328d4bbd96d7be7ce8015e514d1684504d0cc384b967f33cdaa580a9662a5999509384bad4

      • C:\ProgramData\IDBFHJDAAFBA\KJEGCF
        Filesize

        92KB

        MD5

        3a2feb999ad792e015e25e8c38908eab

        SHA1

        c85cc871fa901f173c9a47219cd637af24580916

        SHA256

        f82d27cccefad6d38fe3943e61f6f5dd926348adf6bba720e58a1b1f9b66ca6b

        SHA512

        b34ce1bd162fc8e9c61dbb92f3d208d1236bfff7b53cecf62b2fc581d09ab8e544687de95aeff2de7ef9e8896353c57238725069c0b6ee979146dd0e497dce16

      • C:\ProgramData\freebl3.dll
        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
        Filesize

        471B

        MD5

        07171e55903089795b7dcb44d4cfa530

        SHA1

        e7c21d281725972fe2540f5ba9bd74327b8db293

        SHA256

        ed42022229b5b40c251f18acaa9554d9979958617a403c5e2be6989dff0fc0e0

        SHA512

        7ef17e467d308d59ff8bc5ad07fbe29a34c678e2bd0a31ff41245e48a7b46bf7e9174362d8ebedf45f4d002c6e67abab818d0d29f41edcb587d33764cc035e81

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        986e0c8c4335c9eae07b0407aa26089e

        SHA1

        6f28c43bd37d05a6b0a457e48c5baeaac4d07430

        SHA256

        301a714f6301733601393ef7c2e2187de89c97987e90c54664b59f376de0e090

        SHA512

        e2de7f83b3bce8747a21873820f78185f7fffd410e214501c83e835f28d879340df12e3c69d1fa224abeca910894c78aedf536f08d2fac92469caaf362fbef1a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        8b7b3b8d34ce4db10aeed8ec33f7b8b0

        SHA1

        8f685e2d6ee26caa59ab03d7e7c5f54923bd04ac

        SHA256

        4848de4d46411747d470ed69badd6be26f9196890ad01fd0769606cda29600ed

        SHA512

        67e11fa55d2bbad3f9241444a1aef085d3b884c02a6fcc0cf508b9a9f6707af8541e532333e2f26e9bf7f5e914f46a829694f429428f9473fd9d92c8efa09e31

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
        Filesize

        400B

        MD5

        7d9afc477355c2c2220bb45354e83988

        SHA1

        bf1bd3d95124c69bb7ae5c79af4a038c460ba5a1

        SHA256

        874f140846417443dad25d1635a3df823ab1accab2deaabd7fcc4c8a8d54f6cc

        SHA512

        d935c581940bf0a06100f41125acb345d8985db8afcd51652098ecddecb35357cac09226b3878073353232e457fea9e152cf8bbc23b74238b6e5b012589468a2

      • C:\Users\Admin\AppData\Local\Temp\1000034001\1.exe
        Filesize

        220KB

        MD5

        990159d65a7268e9f9da50e115e7fcec

        SHA1

        ce4ef81f35dae8b12628d6588534a4510c429776

        SHA256

        9b5bb6664b66132e313e9f3e6bf35452008d2e47a91913918a633b348133b617

        SHA512

        50e1c5ccdf2630abdc8896190cfdda54316a343e7ac245ae77490acefd13cd1634786099eb7b1e0cc4c4a676a0eac70c2126670638af79710f204e34b3c3d4f2

      • C:\Users\Admin\AppData\Local\Temp\1000035001\Bitwarden-Installer-2024.exe
        Filesize

        4.9MB

        MD5

        06e9439beabd1813ff13295adbba48ff

        SHA1

        f70c1c806fcb2fbbd97d4c9ecf7c473b3dc957da

        SHA256

        47eb2e1f94933fc6da9cf436804c0a303c539de3ce93c7dfaa6b427625447a22

        SHA512

        3143051b25bce1e2a80dc11006398309d09308ae6542e0e20c1c3e95947ea798d176ea75c8a53265846a902b2d0f9e81dc315e1343ec7d5b7fd4e16d77d7d118

      • C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe
        Filesize

        4.9MB

        MD5

        2502f2fb88c1ea569c0b4287ae0613f3

        SHA1

        aae526d8ce17f59366b57d5d00ab5d14140cd6b5

        SHA256

        6c3496832cdffffedde13f9c75138ee62dd968eaa26bc23e1cbc082e638c3513

        SHA512

        7c0e3a6f8322aafa90533bcd2ff5ab2b167ef7c1c8412710c4b3a3b4643cdb0412cf93c561ce1c01a1057643bda336fd3fa64e3a7373d41cc25319d5190ca2d2

      • C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
        Filesize

        1.2MB

        MD5

        242214131486132e33ceda794d66ca1f

        SHA1

        4ce34fd91f5c9e35b8694007b286635663ef9bf2

        SHA256

        bac402b5749b2da2211db6d2404c1c621ccd0c2e5d492eb6f973b3e2d38dd361

        SHA512

        031e0904d949cec515f2d6f2b5e4b9c0df03637787ff14f20c58e711c54eec77d1f22aa0cf0f6efd65362c1fc0066645d5d005c6a77fe5b169427cdd42555d29

      • C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe
        Filesize

        512KB

        MD5

        a957dc16d684fbd7e12fc87e8ee12fea

        SHA1

        20c73ccfdba13fd9b79c9e02432be39e48e4b37d

        SHA256

        071b6c448d2546dea8caed872fca0d002f59a6b9849f0de2a565fc74b487fa37

        SHA512

        fd6982587fba779d6febb84dfa65ec3e048e17733c2f01b61996bedb170bb4bb1cbb822c0dd2cf44a7e601373abaf499885b13b7957dd2a307bbd8f2120e9b3b

      • C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe
        Filesize

        297KB

        MD5

        0970456d2e2bcb36f49d23f5f2eec4ce

        SHA1

        1e427bbeb209b636371d17801b14fabff87921be

        SHA256

        264db4d677606c95912a93a457675d5ebaa24dc886da8bbcb800fe831c540a54

        SHA512

        43c233e6c6fb20ee5830672f68eec2a1930aff6c3da185b7af56ede90970041157755b8893a86336711c8ba8cbe3f22818de8ddc1789ed65a7aacd596771909e

      • C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe
        Filesize

        158KB

        MD5

        253ccac8a47b80287f651987c0c779ea

        SHA1

        11db405849dbaa9b3759de921835df20fab35bc3

        SHA256

        262a400b339deea5089433709ce559d23253e23d23c07595b515755114147e2f

        SHA512

        af40e01bc3d36baf47eba1d5d6406220dfbcc52c6123dd8450e709fed3e72bed82aac6257fa7bdf7dd774f182919a5051e9712b2e7f1329defd0b159cb08385d

      • C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe
        Filesize

        297KB

        MD5

        9ab4de8b2f2b99f009d32aa790cd091b

        SHA1

        a86b16ee4676850bac14c50ee698a39454d0231e

        SHA256

        8a254344702dc6560312a8028e08f844b16804b1fbf4c438c3ca5058d7b65ea1

        SHA512

        a79341ec3407529daa0384de4cac25b665d3b0cb81e52ecada0ebfe37d7616b16da96b47b04f50ce0a6e46d5fced3298a459f78a087c6b6eac4ed444434c5fbe

      • C:\Users\Admin\AppData\Local\Temp\1000153001\Freshbuild.exe
        Filesize

        415KB

        MD5

        07101cac5b9477ba636cd8ca7b9932cb

        SHA1

        59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1

        SHA256

        488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77

        SHA512

        02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887

      • C:\Users\Admin\AppData\Local\Temp\1000160001\leg222.exe
        Filesize

        1.1MB

        MD5

        5486fd5b8200f34b23f23a21f8912ade

        SHA1

        379f7b095751116c9a6c56d0945ca12ae122d253

        SHA256

        1ecf603a32b23fdf06e0260f314f5390e9c062d74fa2fe65b05754e83c41df46

        SHA512

        e9ad33509efc7303b09a9633f9f6136bba807deca3b9032a91475a66c038b4a1df44e036d9f7acae63f1854df65d47c00c59e6e3d79e7c44a5a6ae631c512f3f

      • C:\Users\Admin\AppData\Local\Temp\1000161001\build1555.exe
        Filesize

        10.7MB

        MD5

        6b1eb54b0153066ddbe5595a58e40536

        SHA1

        adf81c3104e5d62853fa82c2bd9b0a5becb4589a

        SHA256

        d39627a497bf5f7e89642ef14bb0134193bc12ad18a2eadddf305c4f8d69b0b8

        SHA512

        104faaa4085c9173274d4e0e468eaf75fb22c4cfe38226e4594e6aa0a1dcb148bde7e5e0756b664f14b680872d2476340ebd69fac883d8e99b20acfb5f5dbf04

      • C:\Users\Admin\AppData\Local\Temp\1000164001\surfshark.exe
        Filesize

        1.1MB

        MD5

        8569ef968c0c4045782e1ef4ecc96fec

        SHA1

        6f59472c780116468aa2953f8286c89c3188457e

        SHA256

        1c0a4193bf77b9a8dbd00f6078392899b6defa434f20c008e4ea9e20b301c334

        SHA512

        4c9be25acce42fd404ad213cacc823d927e7c3249613771c1644a9054ff49e3edc0f4695240d067af49baf049546a2014fbe7966a37950c6d68d9f5c740e8af9

      • C:\Users\Admin\AppData\Local\Temp\Cab29F0.tmp
        Filesize

        67KB

        MD5

        2d3dcf90f6c99f47e7593ea250c9e749

        SHA1

        51be82be4a272669983313565b4940d4b1385237

        SHA256

        8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

        SHA512

        9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

      • C:\Users\Admin\AppData\Local\Temp\Tar2B2F.tmp
        Filesize

        160KB

        MD5

        7186ad693b8ad9444401bd9bcd2217c2

        SHA1

        5c28ca10a650f6026b0df4737078fa4197f3bac1

        SHA256

        9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

        SHA512

        135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

      • C:\Users\Admin\AppData\Local\Temp\onefile_1092_133645297665400000\python310.dll
        Filesize

        4.3MB

        MD5

        c80b5cb43e5fe7948c3562c1fff1254e

        SHA1

        f73cb1fb9445c96ecd56b984a1822e502e71ab9d

        SHA256

        058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

        SHA512

        faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

      • C:\Users\Admin\AppData\Local\Temp\onefile_1092_133645297665400000\stub.exe
        Filesize

        18.0MB

        MD5

        f0587004f479243c18d0ccff0665d7f6

        SHA1

        b3014badadfffdd6be2931a77a9df4673750fee7

        SHA256

        8ce148c264ce50e64ab866e34759de81b816a3f54b21c3426513bed3f239649a

        SHA512

        6dedaa729ee93520907ce46054f0573fb887ac0890bea9d1d22382e9d05f8c14a8c151fe2061a0ec1dae791b13752e0fbc00ccc85838caa7524edba35d469434

      • \ProgramData\mozglue.dll
        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • \ProgramData\nss3.dll
        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • \Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
        Filesize

        1.8MB

        MD5

        55b19090d710a3dcf61a66dfcc77e4c0

        SHA1

        91e38117b109fe49cb2a47d4e93940d4ac3bda9f

        SHA256

        41b271f1e5ec5cf3ee214bcfe5611d1f11242e1018823f097fa9a102c25a19f9

        SHA512

        bbd119d358b72ac0c19a24c9b727c579d02b4175a978060d775cedd47d0053287045d3ec482bfc08e7730e477c5c54d962a9e09ab01429136b1f93608c68f5a9

      • \Users\Admin\AppData\Roaming\d3d9.dll
        Filesize

        279KB

        MD5

        8fa26f1e37d3ff7f736fc93d520bc8ab

        SHA1

        ad532e1cb4a1b3cd82c7a85647f8f6dd99833bb1

        SHA256

        6c47da8fbd12f22d7272fbf223e054bf5093c0922d0e8fb7d6289a5913c2e45d

        SHA512

        8a0b53cbc3a20e2f0fd41c486b1af1fbbcf7f2fed9f7368b672a07f25faaa2568bbdbcf0841233ac8c473a4d1dee099e90bf6098a6fa15e44b8526efdafc1287

      • memory/628-169-0x0000000000B80000-0x0000000000CB2000-memory.dmp
        Filesize

        1.2MB

      • memory/644-301-0x000000013FAA0000-0x000000013FFEB000-memory.dmp
        Filesize

        5.3MB

      • memory/644-329-0x000000013FAA0000-0x000000013FFEB000-memory.dmp
        Filesize

        5.3MB

      • memory/772-356-0x0000000000400000-0x0000000002BF0000-memory.dmp
        Filesize

        39.9MB

      • memory/1036-450-0x000000013FF40000-0x000000014117E000-memory.dmp
        Filesize

        18.2MB

      • memory/1092-487-0x000000013F690000-0x0000000140168000-memory.dmp
        Filesize

        10.8MB

      • memory/2020-0-0x0000000000B20000-0x0000000000FE8000-memory.dmp
        Filesize

        4.8MB

      • memory/2020-1-0x0000000077500000-0x0000000077502000-memory.dmp
        Filesize

        8KB

      • memory/2020-2-0x0000000000B21000-0x0000000000B4F000-memory.dmp
        Filesize

        184KB

      • memory/2020-3-0x0000000000B20000-0x0000000000FE8000-memory.dmp
        Filesize

        4.8MB

      • memory/2020-5-0x0000000000B20000-0x0000000000FE8000-memory.dmp
        Filesize

        4.8MB

      • memory/2020-16-0x0000000007210000-0x00000000076D8000-memory.dmp
        Filesize

        4.8MB

      • memory/2020-15-0x0000000000B20000-0x0000000000FE8000-memory.dmp
        Filesize

        4.8MB

      • memory/2096-324-0x0000000000110000-0x0000000000167000-memory.dmp
        Filesize

        348KB

      • memory/2096-327-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
        Filesize

        4KB

      • memory/2096-328-0x0000000000110000-0x0000000000167000-memory.dmp
        Filesize

        348KB

      • memory/2096-326-0x0000000000110000-0x0000000000167000-memory.dmp
        Filesize

        348KB

      • memory/2364-451-0x0000000000110000-0x000000000014A000-memory.dmp
        Filesize

        232KB

      • memory/2364-626-0x0000000010F80000-0x00000000111DF000-memory.dmp
        Filesize

        2.4MB

      • memory/2732-242-0x00000000000A0000-0x00000000000F0000-memory.dmp
        Filesize

        320KB

      • memory/2816-889-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-895-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-21-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-19-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-448-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-335-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-896-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-18-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-225-0x0000000006E80000-0x00000000070BC000-memory.dmp
        Filesize

        2.2MB

      • memory/2816-608-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-17-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-894-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-897-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-182-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-258-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-334-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-333-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-781-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-226-0x0000000006E80000-0x00000000070BC000-memory.dmp
        Filesize

        2.2MB

      • memory/2816-410-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-890-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-891-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-892-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2816-893-0x0000000000B00000-0x0000000000FC8000-memory.dmp
        Filesize

        4.8MB

      • memory/2956-208-0x0000000000E20000-0x0000000000E70000-memory.dmp
        Filesize

        320KB

      • memory/3028-227-0x0000000001280000-0x00000000014BC000-memory.dmp
        Filesize

        2.2MB

      • memory/3028-287-0x0000000061E00000-0x0000000061EF3000-memory.dmp
        Filesize

        972KB

      • memory/3028-449-0x0000000001280000-0x00000000014BC000-memory.dmp
        Filesize

        2.2MB