Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 08:16

General

  • Target

    51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe

  • Size

    1.8MB

  • MD5

    0b20eccc24df80884571a59d9baa22e6

  • SHA1

    7e7d09c55a0c5dedc8025711062fb7928f63ad3a

  • SHA256

    51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7

  • SHA512

    0313eb3f8ecab91c16fb0437abbd22c895d4d50686fa66f3c07262a1c7062de2ae6d8e905df3f8cd9129d682c5a600ae57a0dcbcb680e1e6affe89ba6a1cb650

  • SSDEEP

    24576:6+NRtAUxQrMZk3S/LFn+VPUkNgAIdqSMUKMvpHdcPWhAHwf5yPovMH1s964reC9x:62wr5CJn1ke/dqSj9c+Dyz1s9QOxqk

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 5 IoCs
  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe
        "C:\Users\Admin\AppData\Local\Temp\51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5088
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2248
          • C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe
            "C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3524
            • C:\Windows\System32\certutil.exe
              "C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\Admin\AppData\Local\Temp\tmpC621.tmp"
              5⤵
                PID:3076
            • C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe
              "C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4076
              • C:\Users\Admin\AppData\Local\Temp\onefile_4076_133784652947683270\l4.exe
                C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe
                5⤵
                • Drops startup file
                • Executes dropped EXE
                • Loads dropped DLL
                PID:3664
            • C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe
              "C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"
              4⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Drops startup file
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1804
            • C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe
              "C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"
              4⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Drops startup file
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2944
            • C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe
              "C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"
              4⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:5712
            • C:\Users\Admin\AppData\Local\Temp\1006184001\3d1dfa9e65.exe
              "C:\Users\Admin\AppData\Local\Temp\1006184001\3d1dfa9e65.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5840
            • C:\Users\Admin\AppData\Local\Temp\1006185001\d20ce05a9d.exe
              "C:\Users\Admin\AppData\Local\Temp\1006185001\d20ce05a9d.exe"
              4⤵
              • Modifies Windows Defender Real-time Protection settings
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Windows security modification
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:6088
        • C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe
          "C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:808
          • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
            "C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"
            3⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Drops startup file
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3416
        • C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe
          "C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:424
          • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
            "C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"
            3⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:872
        • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
          "C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:512
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\10000470111\123719821238.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:3876
        • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
          "C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"
          2⤵
          • Executes dropped EXE
          PID:4944
        • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
          "C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"
          2⤵
          • Executes dropped EXE
          PID:2888
      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
        C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3972
      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
        C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:5348
      • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
        C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
        1⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1612

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\10000470111\123719821238.dll

        Filesize

        13KB

        MD5

        44163d81bb5710839fb9ba265de2c942

        SHA1

        a7497d6085ed8ce25e9728a0af7e989e026eaf04

        SHA256

        de4e3ff7f7da5d5561e384585a9d0cb66f2c51ea324c184848d125d8792bf666

        SHA512

        97ef4974f41affd04eb960fa873cd9754f31007c3d7239a7fb5b17cc152c01f2050c3b25d107e36ab5c65010610624e773f726de7d39255bb2c0ad5d8b9929a4

      • C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe

        Filesize

        4.5MB

        MD5

        5b39766f490f17925defaee5de2f9861

        SHA1

        9c89f2951c255117eb3eebcd61dbecf019a4c186

        SHA256

        de615656d7f80b5e01bc6a604a780245ca0ccefd920a6e2f1439bf27c02b7b7a

        SHA512

        d216fa45c98e423f15c2b52f980fc1c439d365b9799e5063e6b09837b419d197ba68d52ea7facf469eae38e531f17bd19eaf25d170465dc41217ca6ab9eb30bf

      • C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe

        Filesize

        5.9MB

        MD5

        d68f79c459ee4ae03b76fa5ba151a41f

        SHA1

        bfa641085d59d58993ba98ac9ee376f898ee5f7b

        SHA256

        aa50c900e210abb6be7d2420d9d5ae34c66818e0491aabd141421d175211fed6

        SHA512

        bd4ef3e3708df81d53b2e9050447032e8dcdcc776cf0353077310f208a30dab8f31d6ec6769d47fb6c05c642bdd7a58fb4f93d9d28e2de0efc01312fbc5e391e

      • C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe

        Filesize

        1.4MB

        MD5

        338cbbffa6028ee1a0beb3e7e6c4abd9

        SHA1

        bd008e415d2d85a124d33d455a2e2b0a0312be39

        SHA256

        1af9406ad522df70d8b59054cbdbef1a267fe199ab0ec1369523cdce9884bea6

        SHA512

        a8bb96d8ab47a3f57d5f1fc48c61392e9b28b379517cd12a468044d42a7ecdf9c099244d94784ff2411b358ea2272f8069a2fee2ea952b693ee460de0f689215

      • C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe

        Filesize

        1.4MB

        MD5

        6e7ffd057086e44e4fcc01846cd2b152

        SHA1

        05712e7e7b8429b2dd201ea504dc32fefe5795da

        SHA256

        fbc587e990949e428e8ce7a2c74dbf85cd63ffa07370756ad854595fea0033d7

        SHA512

        8cab1824b32c54273658d28738109c8a1ef3170c1fbe02deeee40d40990acb6d45431bfb65a3facebee9a919bd972734012b1e8de035b9c1329f1bd0e709ecd2

      • C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe

        Filesize

        2.1MB

        MD5

        f8d528a37993ed91d2496bab9fc734d3

        SHA1

        4b66b225298f776e21f566b758f3897d20b23cad

        SHA256

        bc8458a8d78cf91129c84b153aafe8319410aacb8e14aec506897c8e0793ba02

        SHA512

        75dc1bbb1388f68d121bab26fc7f6bf9dc1226417ad7ed4a7b9718999aa0f9c891fed0db3c9ea6d6ccb34288cc848dc44b20ea83a30afd4ea2e99cff51f30f5a

      • C:\Users\Admin\AppData\Local\Temp\1006184001\3d1dfa9e65.exe

        Filesize

        1.7MB

        MD5

        fa8bc0aa526b9961adf9260dc7ec9399

        SHA1

        044527ce83eb090a0c1ec2cdaddedc5f5405bf2d

        SHA256

        1722fc2ecb85459ab3e76adc12f5c29d3e3ee2b4b18dd48c5ef0e5d79b77330e

        SHA512

        2f0244f7f3cf90b0dd1e5d04db4e4d443a16e7779bf791dc68ed54f6d734e1d620193967e96ee881b03e5b6ef6a8609efdb890f5345db340d94fe70c2807c31b

      • C:\Users\Admin\AppData\Local\Temp\1006185001\d20ce05a9d.exe

        Filesize

        2.7MB

        MD5

        f150e060b781896b4e6e1029ee1f5b74

        SHA1

        ef52c884174df898a956d9a40304e586e2382e2d

        SHA256

        0316ba41b0629155197d29677225f77581c470a5f91aea8dd6a38850cd510516

        SHA512

        40dc0453b3feece1d0ad5ed8de9cfd45465347190c1031791c6a035dc0e74bd842fa21e56b86feebe89892dfbd8bcdbf8d44bc658c0afcfb6deb6d0b5e18c18f

      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

        Filesize

        1.8MB

        MD5

        0b20eccc24df80884571a59d9baa22e6

        SHA1

        7e7d09c55a0c5dedc8025711062fb7928f63ad3a

        SHA256

        51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7

        SHA512

        0313eb3f8ecab91c16fb0437abbd22c895d4d50686fa66f3c07262a1c7062de2ae6d8e905df3f8cd9129d682c5a600ae57a0dcbcb680e1e6affe89ba6a1cb650

      • C:\Users\Admin\AppData\Local\Temp\TmpC5E0.tmp

        Filesize

        2KB

        MD5

        bce100d8e667631a6ee1789990308837

        SHA1

        446de8271466d8256fccc31fab2702ea6d82acbb

        SHA256

        11969983a7365183aafab3d9a15605453bfa6b55f200ba3f4f348f3d2d6d3af7

        SHA512

        4e3996e5266547976f84990ea47319ee2b59f6dc3d3f45af1cca80365deb5f66d4cc2a3a3149f76784fa836c5b4f335f9a0e668f9c232765f8e1a93bbe487734

      • C:\Users\Admin\AppData\Local\Temp\onefile_4076_133784652947683270\_bz2.pyd

        Filesize

        83KB

        MD5

        30f396f8411274f15ac85b14b7b3cd3d

        SHA1

        d3921f39e193d89aa93c2677cbfb47bc1ede949c

        SHA256

        cb15d6cc7268d3a0bd17d9d9cec330a7c1768b1c911553045c73bc6920de987f

        SHA512

        7d997ef18e2cbc5bca20a4730129f69a6d19abdda0261b06ad28ad8a2bddcdecb12e126df9969539216f4f51467c0fe954e4776d842e7b373fe93a8246a5ca3f

      • C:\Users\Admin\AppData\Local\Temp\onefile_4076_133784652947683270\_lzma.pyd

        Filesize

        156KB

        MD5

        9e94fac072a14ca9ed3f20292169e5b2

        SHA1

        1eeac19715ea32a65641d82a380b9fa624e3cf0d

        SHA256

        a46189c5bd0302029847fed934f481835cb8d06470ea3d6b97ada7d325218a9f

        SHA512

        b7b3d0f737dd3b88794f75a8a6614c6fb6b1a64398c6330a52a2680caf7e558038470f6f3fc024ce691f6f51a852c05f7f431ac2687f4525683ff09132a0decb

      • C:\Users\Admin\AppData\Local\Temp\onefile_4076_133784652947683270\_socket.pyd

        Filesize

        81KB

        MD5

        69801d1a0809c52db984602ca2653541

        SHA1

        0f6e77086f049a7c12880829de051dcbe3d66764

        SHA256

        67aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3

        SHA512

        5fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb

      • C:\Users\Admin\AppData\Local\Temp\onefile_4076_133784652947683270\l4.exe

        Filesize

        5.9MB

        MD5

        63c4e3f9c7383d039ab4af449372c17f

        SHA1

        f52ff760a098a006c41269ff73abb633b811f18e

        SHA256

        151524f6c1d1aeac530cfd69de15c3336043dc8eb3f5aeaa31513e24bfd7acdd

        SHA512

        dcfb4804c5569ad13e752270d13320f8769601b7092544741e35bc62a22af363b7a5ea7c5a65132c9575540a3e689a6946110502bd0f046385b8739e81761fbf

      • C:\Users\Admin\AppData\Local\Temp\onefile_4076_133784652947683270\python312.dll

        Filesize

        6.6MB

        MD5

        166cc2f997cba5fc011820e6b46e8ea7

        SHA1

        d6179213afea084f02566ea190202c752286ca1f

        SHA256

        c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

        SHA512

        49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

      • C:\Users\Admin\AppData\Local\Temp\onefile_4076_133784652947683270\select.pyd

        Filesize

        30KB

        MD5

        7c14c7bc02e47d5c8158383cb7e14124

        SHA1

        5ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3

        SHA256

        00bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5

        SHA512

        af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c

      • C:\Users\Admin\AppData\Local\Temp\onefile_4076_133784652947683270\vcruntime140.dll

        Filesize

        116KB

        MD5

        be8dbe2dc77ebe7f88f910c61aec691a

        SHA1

        a19f08bb2b1c1de5bb61daf9f2304531321e0e40

        SHA256

        4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

        SHA512

        0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

      • C:\Users\Admin\AppData\Local\Temp\tmpC621.tmp

        Filesize

        2KB

        MD5

        2a3e46130d5e55b58deefa67008231b6

        SHA1

        555fc8028e9b2ae49ae92e611a814d6ce785c24d

        SHA256

        42f2dc96c5b93f6c19980bf3fa99f3d9ecea2fbf36a5074a71e64e080a7463be

        SHA512

        60d6064169f1beec166b2535e445cc9fb0dcc6b652047734fd9c66bbbb88704f0b20b666da0bb4903917736e25f1eabba9bcf08afa462963112e071d1699b91d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs

        Filesize

        82B

        MD5

        107a610c004bfc1ebb8b87365b2c4600

        SHA1

        04695e838daaaf45d91f0b51868c8995b80d3392

        SHA256

        3a5be027d623c694cc4874fbb6cd2f434bbaf65033607f6d2acfc1d05c3f6fdc

        SHA512

        4b26a04ec889e149bf4fb974178990804d371d72b239c1d55c5acc32636cfd7ad02f8d21ed9e289358873242493303de25f2a0bca7d1b5da9b0426854ff4a2d2

      • C:\Windows\Tasks\Gxtuum.job

        Filesize

        284B

        MD5

        0676ac554315aadee8035ee8f8f13a6e

        SHA1

        abbdd4272353246d395d780861c289281d2d06d5

        SHA256

        5a305bf821081ce8a92f9935777776ad8042aa84c18c179105aee5377a368490

        SHA512

        0c2da54838ff9afccfcfb4249bb801b4986fcd3a29abd549d8d06fa03821afdf6bdb4a75a481aef81c8ecc0bb933e5338e643020a7cdc647b9bdb3a34dc73809

      • \??\c:\users\admin\appdata\roaming\lbroker.exe

        Filesize

        1.4MB

        MD5

        64d0be834d990e953cb0f56e273f4d64

        SHA1

        5b180b5ec4f2aa6a622b182d480900b39b4dd69a

        SHA256

        1ed0ecce8143e459813a01c1195fc9dcbb1239e6d346050b00bb02797a49a924

        SHA512

        96113edb2006f8e81e6496a9a5c5b4dd00e10cedcf22044589bc19e7d71a2510691c9db01e790546ec3d1a5a03c238434f95699f064514cb3cda5adeb681a370

      • memory/1804-201-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-181-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-2607-0x0000000005AE0000-0x0000000005B34000-memory.dmp

        Filesize

        336KB

      • memory/1804-2606-0x0000000006370000-0x0000000006914000-memory.dmp

        Filesize

        5.6MB

      • memory/1804-1524-0x00000000059B0000-0x0000000005A3A000-memory.dmp

        Filesize

        552KB

      • memory/1804-1525-0x0000000005A40000-0x0000000005A8C000-memory.dmp

        Filesize

        304KB

      • memory/1804-164-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-165-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-169-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-171-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-162-0x0000000000C90000-0x0000000000DFA000-memory.dmp

        Filesize

        1.4MB

      • memory/1804-163-0x0000000005760000-0x0000000005878000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-175-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-167-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-189-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-213-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-223-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-221-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-219-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-217-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-215-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-209-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-207-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-203-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-173-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-195-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-211-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-205-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-199-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-197-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-193-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-191-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-187-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-185-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-183-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-178-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/1804-179-0x0000000005760000-0x0000000005872000-memory.dmp

        Filesize

        1.1MB

      • memory/2248-20-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/2248-19-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/2248-21-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/2248-22-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/2248-23-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/2248-24-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/2248-93-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/2248-102-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/2248-17-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/2944-1358-0x0000000000D10000-0x0000000000E7A000-memory.dmp

        Filesize

        1.4MB

      • memory/2944-2553-0x0000000005910000-0x000000000599A000-memory.dmp

        Filesize

        552KB

      • memory/2944-1359-0x0000000005640000-0x0000000005758000-memory.dmp

        Filesize

        1.1MB

      • memory/3524-44-0x0000018EE24C0000-0x0000018EE2950000-memory.dmp

        Filesize

        4.6MB

      • memory/3524-43-0x00007FF8E38A3000-0x00007FF8E38A5000-memory.dmp

        Filesize

        8KB

      • memory/3524-46-0x0000018EFD2F0000-0x0000018EFD4B2000-memory.dmp

        Filesize

        1.8MB

      • memory/3972-2605-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/5088-3-0x0000000000680000-0x0000000000B3A000-memory.dmp

        Filesize

        4.7MB

      • memory/5088-4-0x0000000000680000-0x0000000000B3A000-memory.dmp

        Filesize

        4.7MB

      • memory/5088-16-0x0000000000680000-0x0000000000B3A000-memory.dmp

        Filesize

        4.7MB

      • memory/5088-1-0x0000000077B74000-0x0000000077B76000-memory.dmp

        Filesize

        8KB

      • memory/5088-2-0x0000000000681000-0x00000000006AF000-memory.dmp

        Filesize

        184KB

      • memory/5088-0-0x0000000000680000-0x0000000000B3A000-memory.dmp

        Filesize

        4.7MB

      • memory/5348-5045-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/5348-5043-0x0000000000500000-0x00000000009BA000-memory.dmp

        Filesize

        4.7MB

      • memory/5712-2595-0x0000000000D40000-0x00000000014BB000-memory.dmp

        Filesize

        7.5MB

      • memory/5712-2554-0x0000000000D40000-0x00000000014BB000-memory.dmp

        Filesize

        7.5MB

      • memory/5840-2573-0x00000000006D0000-0x0000000000D5E000-memory.dmp

        Filesize

        6.6MB

      • memory/5840-2571-0x00000000006D0000-0x0000000000D5E000-memory.dmp

        Filesize

        6.6MB

      • memory/6088-2593-0x0000000000840000-0x0000000000AFC000-memory.dmp

        Filesize

        2.7MB

      • memory/6088-2602-0x0000000000840000-0x0000000000AFC000-memory.dmp

        Filesize

        2.7MB

      • memory/6088-2592-0x0000000000840000-0x0000000000AFC000-memory.dmp

        Filesize

        2.7MB

      • memory/6088-2599-0x0000000000840000-0x0000000000AFC000-memory.dmp

        Filesize

        2.7MB

      • memory/6088-2594-0x0000000000840000-0x0000000000AFC000-memory.dmp

        Filesize

        2.7MB