Malware Analysis Report

2025-05-28 15:16

Sample ID 250514-2m6ykaan9z
Target 2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza
SHA256 89b7b060048934570d3352b2620d48243143352d7d44f9b1a1ee5b50f192c2b9
Tags
phorphiex xmrig defense_evasion discovery execution loader miner persistence spyware stealer trojan upx worm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V16

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

89b7b060048934570d3352b2620d48243143352d7d44f9b1a1ee5b50f192c2b9

Threat Level: Known bad

The file 2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza was found to be: Known bad.

Malicious Activity Summary

phorphiex xmrig defense_evasion discovery execution loader miner persistence spyware stealer trojan upx worm

Phorphiex, Phorpiex

xmrig

Phorphiex payload

Xmrig family

Phorphiex family

XMRig Miner payload

Downloads MZ/PE file

Stops running service(s)

Creates new service(s)

Reads user/profile data of web browsers

Checks computer location settings

Executes dropped EXE

Adds Run key to start application

Suspicious use of SetThreadContext

UPX packed file

Drops file in Windows directory

Launches sc.exe

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-05-14 22:42

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-05-14 22:42

Reported

2025-05-14 22:45

Platform

win10v2004-20250502-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza.exe"

Signatures

Phorphiex family

phorphiex

Phorphiex payload

Description Indicator Process Target
N/A N/A N/A N/A

Phorphiex, Phorpiex

worm trojan loader phorphiex

Xmrig family

xmrig

xmrig

miner xmrig

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Creates new service(s)

persistence execution

Stops running service(s)

defense_evasion execution

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3690492401-2005096563-3427069815-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\1523829134.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3690492401-2005096563-3427069815-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\1321212298.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3690492401-2005096563-3427069815-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2359731308.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\79C4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\191651837.exe N/A
N/A N/A C:\Windows\syscrondvr.exe N/A
N/A N/A C:\Windows\syscrondvr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1523829134.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1080920398.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1451411713.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\830810174.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1321212298.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3241129746.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\659025094.exe N/A
N/A N/A C:\Users\Admin\syscrondvr.exe N/A
N/A N/A C:\Users\Admin\syscrondvr.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2359731308.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2730322623.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\44334389.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\147893154.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\syscrondvr.exe" C:\Users\Admin\AppData\Local\Temp\191651837.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3690492401-2005096563-3427069815-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\syscrondvr.exe" C:\Users\Admin\AppData\Local\Temp\659025094.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1488 set thread context of 4472 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 1488 set thread context of 1408 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2108 set thread context of 3672 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 4844 set thread context of 2352 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 4552 set thread context of 1744 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2328 set thread context of 4584 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 4284 set thread context of 3060 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 1596 set thread context of 2288 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2164 set thread context of 4600 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 4564 set thread context of 372 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 1996 set thread context of 4736 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 4612 set thread context of 2776 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 3904 set thread context of 820 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 1972 set thread context of 4400 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\191651837.exe N/A
File opened for modification C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\191651837.exe N/A
File created C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\659025094.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\79C4.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\191651837.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\syscrondvr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\659025094.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\syscrondvr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\147893154.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1080920398.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1451411713.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\830810174.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2730322623.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\44334389.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1523829134.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1321212298.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3241129746.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3241129746.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3241129746.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3241129746.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2359731308.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A
N/A N/A C:\Windows\system32\conhost.exe N/A
N/A N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1523829134.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1321212298.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2359731308.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2872 wrote to memory of 1224 N/A C:\Users\Admin\AppData\Local\Temp\2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza.exe C:\Users\Admin\AppData\Local\Temp\79C4.exe
PID 2872 wrote to memory of 1224 N/A C:\Users\Admin\AppData\Local\Temp\2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza.exe C:\Users\Admin\AppData\Local\Temp\79C4.exe
PID 2872 wrote to memory of 1224 N/A C:\Users\Admin\AppData\Local\Temp\2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza.exe C:\Users\Admin\AppData\Local\Temp\79C4.exe
PID 1224 wrote to memory of 4104 N/A C:\Users\Admin\AppData\Local\Temp\79C4.exe C:\Users\Admin\AppData\Local\Temp\191651837.exe
PID 1224 wrote to memory of 4104 N/A C:\Users\Admin\AppData\Local\Temp\79C4.exe C:\Users\Admin\AppData\Local\Temp\191651837.exe
PID 1224 wrote to memory of 4104 N/A C:\Users\Admin\AppData\Local\Temp\79C4.exe C:\Users\Admin\AppData\Local\Temp\191651837.exe
PID 4104 wrote to memory of 3908 N/A C:\Users\Admin\AppData\Local\Temp\191651837.exe C:\Windows\syscrondvr.exe
PID 4104 wrote to memory of 3908 N/A C:\Users\Admin\AppData\Local\Temp\191651837.exe C:\Windows\syscrondvr.exe
PID 4104 wrote to memory of 3908 N/A C:\Users\Admin\AppData\Local\Temp\191651837.exe C:\Windows\syscrondvr.exe
PID 3496 wrote to memory of 2004 N/A C:\Windows\system32\cmd.exe C:\Windows\syscrondvr.exe
PID 3496 wrote to memory of 2004 N/A C:\Windows\system32\cmd.exe C:\Windows\syscrondvr.exe
PID 3496 wrote to memory of 2004 N/A C:\Windows\system32\cmd.exe C:\Windows\syscrondvr.exe
PID 3908 wrote to memory of 4868 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\1523829134.exe
PID 3908 wrote to memory of 4868 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\1523829134.exe
PID 4868 wrote to memory of 4304 N/A C:\Users\Admin\AppData\Local\Temp\1523829134.exe C:\Windows\System32\cmd.exe
PID 4868 wrote to memory of 4304 N/A C:\Users\Admin\AppData\Local\Temp\1523829134.exe C:\Windows\System32\cmd.exe
PID 4304 wrote to memory of 2480 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\sc.exe
PID 4304 wrote to memory of 2480 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\sc.exe
PID 4304 wrote to memory of 1216 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\reg.exe
PID 4304 wrote to memory of 1216 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\reg.exe
PID 3908 wrote to memory of 4564 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\1080920398.exe
PID 3908 wrote to memory of 4564 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\1080920398.exe
PID 3908 wrote to memory of 4564 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\1080920398.exe
PID 3908 wrote to memory of 4716 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\1451411713.exe
PID 3908 wrote to memory of 4716 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\1451411713.exe
PID 3908 wrote to memory of 4716 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\1451411713.exe
PID 3908 wrote to memory of 940 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\830810174.exe
PID 3908 wrote to memory of 940 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\830810174.exe
PID 3908 wrote to memory of 940 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\830810174.exe
PID 3908 wrote to memory of 2984 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\1321212298.exe
PID 3908 wrote to memory of 2984 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\1321212298.exe
PID 2984 wrote to memory of 4584 N/A C:\Users\Admin\AppData\Local\Temp\1321212298.exe C:\Windows\System32\cmd.exe
PID 2984 wrote to memory of 4584 N/A C:\Users\Admin\AppData\Local\Temp\1321212298.exe C:\Windows\System32\cmd.exe
PID 4584 wrote to memory of 3840 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\sc.exe
PID 4584 wrote to memory of 3840 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\sc.exe
PID 4584 wrote to memory of 2016 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\reg.exe
PID 4584 wrote to memory of 2016 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\reg.exe
PID 4564 wrote to memory of 1244 N/A C:\Users\Admin\AppData\Local\Temp\1080920398.exe C:\Users\Admin\AppData\Local\Temp\3241129746.exe
PID 4564 wrote to memory of 1244 N/A C:\Users\Admin\AppData\Local\Temp\1080920398.exe C:\Users\Admin\AppData\Local\Temp\3241129746.exe
PID 1488 wrote to memory of 4472 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 1488 wrote to memory of 4472 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 1488 wrote to memory of 4472 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 1488 wrote to memory of 4472 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 1488 wrote to memory of 4472 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 1488 wrote to memory of 4472 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 1488 wrote to memory of 4472 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 1488 wrote to memory of 4472 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 1488 wrote to memory of 4472 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 1488 wrote to memory of 1408 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 1488 wrote to memory of 1408 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 1488 wrote to memory of 1408 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 1488 wrote to memory of 1408 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 1488 wrote to memory of 1408 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2108 wrote to memory of 3672 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2108 wrote to memory of 3672 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2108 wrote to memory of 3672 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2108 wrote to memory of 3672 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2108 wrote to memory of 3672 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 3908 wrote to memory of 2708 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\659025094.exe
PID 3908 wrote to memory of 2708 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\659025094.exe
PID 3908 wrote to memory of 2708 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\659025094.exe
PID 2708 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\659025094.exe C:\Users\Admin\syscrondvr.exe
PID 2708 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\659025094.exe C:\Users\Admin\syscrondvr.exe
PID 2708 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\659025094.exe C:\Users\Admin\syscrondvr.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza.exe

"C:\Users\Admin\AppData\Local\Temp\2025-05-14_a1d0ba147423292206f74e6e69d8272a_black-basta_darkgate_elex_luca-stealer_mespinoza.exe"

C:\Users\Admin\AppData\Local\Temp\79C4.exe

"C:\Users\Admin\AppData\Local\Temp\79C4.exe"

C:\Users\Admin\AppData\Local\Temp\191651837.exe

C:\Users\Admin\AppData\Local\Temp\191651837.exe

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Users\Admin\AppData\Local\Temp\1523829134.exe

C:\Users\Admin\AppData\Local\Temp\1523829134.exe

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /c sc delete "DrvTcfgsvc" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\DrvTcfgsvc" /f

C:\Windows\system32\sc.exe

sc delete "DrvTcfgsvc"

C:\Windows\system32\reg.exe

reg delete "HKLM\SYSTEM\CurrentControlSet\Services\DrvTcfgsvc" /f

C:\Users\Admin\AppData\Local\Temp\1080920398.exe

C:\Users\Admin\AppData\Local\Temp\1080920398.exe

C:\Users\Admin\AppData\Local\Temp\1451411713.exe

C:\Users\Admin\AppData\Local\Temp\1451411713.exe

C:\Users\Admin\AppData\Local\Temp\830810174.exe

C:\Users\Admin\AppData\Local\Temp\830810174.exe

C:\Users\Admin\AppData\Local\Temp\1321212298.exe

C:\Users\Admin\AppData\Local\Temp\1321212298.exe

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /c sc delete "DrvCfgSvcs" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\DrvCfgSvcs" /f

C:\Windows\system32\sc.exe

sc delete "DrvCfgSvcs"

C:\Windows\system32\reg.exe

reg delete "HKLM\SYSTEM\CurrentControlSet\Services\DrvCfgSvcs" /f

C:\Users\Admin\AppData\Local\Temp\3241129746.exe

C:\Users\Admin\AppData\Local\Temp\3241129746.exe

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe delete "MgrSrvdrvcs"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe create "MgrSrvdrvcs" binpath= "C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe" start= "auto"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop eventlog

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe start "MgrSrvdrvcs"

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

C:\Windows\system32\conhost.exe

C:\Windows\system32\conhost.exe

C:\Windows\system32\dwm.exe

dwm.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

C:\Users\Admin\AppData\Local\Temp\659025094.exe

C:\Users\Admin\AppData\Local\Temp\659025094.exe

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\syscrondvr.exe

C:\Users\Admin\syscrondvr.exe

C:\Users\Admin\syscrondvr.exe

C:\Users\Admin\syscrondvr.exe

C:\Users\Admin\syscrondvr.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

C:\Users\Admin\AppData\Local\Temp\2359731308.exe

C:\Users\Admin\AppData\Local\Temp\2359731308.exe

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /c sc delete "DrvTcfgsvc" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\DrvTcfgsvc" /f

C:\Windows\system32\sc.exe

sc delete "DrvTcfgsvc"

C:\Windows\system32\reg.exe

reg delete "HKLM\SYSTEM\CurrentControlSet\Services\DrvTcfgsvc" /f

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

C:\Users\Admin\AppData\Local\Temp\2730322623.exe

C:\Users\Admin\AppData\Local\Temp\2730322623.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

C:\Users\Admin\AppData\Local\Temp\44334389.exe

C:\Users\Admin\AppData\Local\Temp\44334389.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

C:\Users\Admin\AppData\Local\Temp\147893154.exe

C:\Users\Admin\AppData\Local\Temp\147893154.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

"C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe"

C:\Windows\system32\dwm.exe

dwm.exe

Network

Country Destination Domain Proto
UA 185.156.72.39:80 185.156.72.39 tcp
NL 95.101.136.223:443 www.bing.com tcp
NL 95.101.136.223:443 www.bing.com tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
NL 45.141.233.6:80 45.141.233.6 tcp
US 8.8.8.8:53 c.pki.goog udp
DE 172.217.16.195:80 c.pki.goog tcp
US 8.8.8.8:53 www.update.microsoft.com udp
US 20.109.209.108:80 www.update.microsoft.com tcp
IR 151.232.150.246:40500 udp
DE 159.100.18.229:40500 tcp
NL 45.141.233.6:80 45.141.233.6 tcp
UZ 93.188.83.236:40500 udp
UA 185.156.72.39:80 185.156.72.39 tcp
IR 2.185.151.75:40500 udp
UZ 86.62.3.154:40500 udp
IR 5.236.218.220:40500 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:5151 tcp
UA 185.156.72.39:5151 tcp
UA 185.156.72.39:5151 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:5151 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:5151 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:5151 tcp
UA 185.156.72.39:5151 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:5151 tcp
UA 185.156.72.39:5151 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:5151 tcp
US 20.109.209.108:80 www.update.microsoft.com tcp
UA 185.156.72.39:5151 tcp
NL 45.141.233.6:80 45.141.233.6 tcp
IR 176.102.246.17:40500 udp
RU 78.106.44.104:40500 tcp
UA 185.156.72.39:5151 tcp
IR 212.120.199.18:40500 udp
UA 185.156.72.39:5151 tcp

Files

C:\Users\Admin\AppData\Local\Temp\79C4.exe

MD5 0ec46393976eb51f307cc11d80bae845
SHA1 69d4cb168f3a1b97c37a0ba1519d0adb1ff7e245
SHA256 252171bdaa35d19f872c165e861b03d347a4afb85d7a03d02f8eae09d191038d
SHA512 803351760e3c422e4825103235e13085004b3418b483a2c646aafaef62b7212a1ba4ed28469134a236c5b6121e6a748ba958bbae2dbe4afe9f9f45704928d31f

C:\Users\Admin\AppData\Local\Temp\191651837.exe

MD5 f30fdbf3448f67cbc3566f31729cb7a6
SHA1 fbf005c38f4a1c2e86817a2cb70406fc241f2c90
SHA256 81783b558904becc5b86553faba9525070de5f43339766eb1c025bcfbfe1eef8
SHA512 b428df2c8f8b4a002c8d7e1bfd9926e5cf95ee998688a2c360b8551e80be5bfbfa17ef210bea35f247da4a5c8a940fb5dba49f4786da9a74e5d001b771c8e9a8

C:\Users\Admin\AppData\Local\Temp\1523829134.exe

MD5 c2252ee01d47f885c466fea46d77b337
SHA1 0e5e5e21dfdd47632831935e98d46fb4c4bf9168
SHA256 7563681ee1464143363b1b7b6d59cef4c2a3b9a431c94feae043465cc7d23be0
SHA512 8e0fdf90fc8c1c014b6c183dafa58ccf18251a3ea2e279c671a35ff702b60a5be3058c2eceac7a00e4b747796b1e1ed10a64abf95f26bd288980592db4e690d7

memory/4868-30-0x0000000000600000-0x0000000000606000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1080920398.exe

MD5 c08cfa523c9377d3ae24fdb373b3ae13
SHA1 5289219770ad28b0fa4f0bdd91817f76bd6be222
SHA256 326c70a965d4e642275c26cd913e268b1db89edd59b31a86ee600a7a9c664eb0
SHA512 c91acd580ac832d5fed363a9a2b98b724a255d82e4fdda6eca62133feb5e60dd79a8caca36597a52bfbfa907a44208c48b15142e2e6020db219d14e970c3f57c

C:\Users\Admin\AppData\Local\Temp\1451411713.exe

MD5 680f371f2918acd9c01ebd9b2624e191
SHA1 2f6d2bc41d8ec3c2cdddeb894f8af082a51acfa9
SHA256 5cf738edd0028523f23a77d7dc02087e6f99cf1110f5b51766bf79f00bff6d09
SHA512 df251b794acf1ede346f0b01bca3fe576b0d36d127f33e4942e8093625a40d6b74ec26fc51111ebba705a1e9c37d923069de98d2658b416d1f7410846f873e40

C:\Users\Admin\AppData\Local\Temp\830810174.exe

MD5 588e67994dd9e1084cbe989ee0d7eecd
SHA1 1a9e7f30d4b14b2054c6947ec7b25024dac5c50e
SHA256 d6a96251f4bd75df5e68bbc2ce0cea37e0c5fadf1bace5b035245832930a4d2c
SHA512 ad9f235b9c03c391d2cd10f1fc0d07d748b305a254dc310da0ad6e1b27160f65a811a1586a632c4f331c5660a2cb77dec8f06b163c6c226f6a2c39b0d13af25e

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\1523829134.exe.log

MD5 fff5cbccb6b31b40f834b8f4778a779a
SHA1 899ed0377e89f1ed434cfeecc5bc0163ebdf0454
SHA256 b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76
SHA512 1a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9

C:\Users\Admin\AppData\Local\Temp\logFile.txt

MD5 4902cdbef8a11f5c853d5ec5e340a1b9
SHA1 d2d2a02764021b6eef2764e9f0d8d286dcb9e75b
SHA256 81d0891bdcde89f69d4621b8ff7618518562e3e0c984881b07549c03278cf6a0
SHA512 e6513c975d799ddc6974ecd7dba7b19e5618245742e5f175de4ab49ea7173edca1a4396671fdfef1bb46e6c85123b08f3e86e0e0318bc394fc7bc7d511f8efa0

C:\Users\Admin\AppData\Local\Temp\1321212298.exe

MD5 0cd27d2aa3bc58e4fc3c6639f4797e55
SHA1 1224947928cbdb0634d3aa7b374825552fe20fde
SHA256 559dfe706ff2f2ce820748d25a91173972c89f6bb9510fba52f40815f018621c
SHA512 9a595bfaa5ed85d895337a488969d75a00f33a6dd4e8759b95179428ea44922cccbef6189f08579ff806fe030e9833506c0aa8fedd1108622ffed3d0815d7d62

memory/2984-71-0x0000000000CC0000-0x0000000000CC6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3241129746.exe

MD5 0000638ebbfe0d620abe6ca32abb1b58
SHA1 ae908681544765eb238e92b4ff7df26884692aa0
SHA256 267ec6176c1111d9ffcf32fcfa6aa65917e64d1556dcbbd8989ee6bbebc2e72f
SHA512 1522ed6c96d0a6699aaf5c1e6e3956742f26e8b46f2c795c0b6cfd3c02421aa6101134ded49c6b97e4085a789056cfb2d0fa09630c1c8796c7fc8d49aef66212

memory/4472-85-0x0000000140000000-0x000000014000D000-memory.dmp

memory/4472-84-0x0000000140000000-0x000000014000D000-memory.dmp

memory/4472-87-0x0000000140000000-0x000000014000D000-memory.dmp

memory/1408-89-0x0000000140000000-0x0000000140835000-memory.dmp

memory/1408-91-0x0000000140000000-0x0000000140835000-memory.dmp

memory/1408-93-0x0000000140000000-0x0000000140835000-memory.dmp

memory/1408-95-0x0000000140000000-0x0000000140835000-memory.dmp

memory/1408-96-0x000001F84CD20000-0x000001F84CD40000-memory.dmp

memory/1408-94-0x0000000140000000-0x0000000140835000-memory.dmp

memory/1408-98-0x0000000140000000-0x0000000140835000-memory.dmp

memory/1408-97-0x0000000140000000-0x0000000140835000-memory.dmp

memory/1408-92-0x0000000140000000-0x0000000140835000-memory.dmp

memory/1408-90-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4472-83-0x0000000140000000-0x000000014000D000-memory.dmp

memory/4472-82-0x0000000140000000-0x000000014000D000-memory.dmp

memory/4472-81-0x0000000140000000-0x000000014000D000-memory.dmp

memory/1408-99-0x0000000140000000-0x0000000140835000-memory.dmp

memory/1408-100-0x0000000140000000-0x0000000140835000-memory.dmp

memory/1408-101-0x0000000140000000-0x0000000140835000-memory.dmp

memory/1408-106-0x0000000140000000-0x0000000140835000-memory.dmp

C:\Windows\TEMP\eoeqfhmzuiny.sys

MD5 0c0195c48b6b8582fa6f6373032118da
SHA1 d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA256 11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512 ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d

memory/3672-123-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3672-124-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3672-125-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3672-126-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3672-127-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3672-128-0x0000000140000000-0x0000000140835000-memory.dmp

memory/2352-157-0x0000000140000000-0x0000000140835000-memory.dmp

memory/2352-158-0x0000000140000000-0x0000000140835000-memory.dmp

memory/2352-156-0x0000000140000000-0x0000000140835000-memory.dmp

memory/2352-154-0x0000000140000000-0x0000000140835000-memory.dmp

memory/2352-155-0x0000000140000000-0x0000000140835000-memory.dmp

memory/2352-160-0x0000000140000000-0x0000000140835000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\2359731308.exe

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Temp\2730322623.exe

MD5 23576c32ea5c1925c8a6bfecbe3d6f0a
SHA1 1ca83777a5a782134a516dbb4c1c9ab6f156b4ef
SHA256 8a191f6fe99beb784be59410d10d13d13bc1930fb9959b03ff0a7d0539d007bc
SHA512 b3f414d4c92a564367eef2d83d0f7646cd627fc3b20415ed9b0abadfdd613aff07735cd215e8b5816dcc8c49812c391180e7edf7a991c90d43724fa6c8040159

C:\Users\Admin\AppData\Local\Temp\44334389.exe

MD5 b1cf906941494f4e6050b2c73ef27314
SHA1 fc8436f66e7d1456e7908f73bce7e3335e7ba58f
SHA256 43379aff5a53efd0becc06ffd1ca8e1d10d1cfbdc6db87bf403797ea4af7de8e
SHA512 1ae90dcab869f727d683ba032164c26b954340bd2f30d3666b2c11b4dbedba2ad0518e533f5c4090452906db4fc7dcb6b9a09e42707dd4b4de06466350b7ef34

C:\Users\Admin\tbtcmds.dat

MD5 a690bb166290b53e7cc3c5cfd6aa9bc2
SHA1 c5f05ee9e303ab56638a890e7da812df3d9d2d68
SHA256 076c85721cf22b0bbe1697387f2e021a4b2921adaf514fd8abf167559c7e7ef2
SHA512 2b7034eec20cd657356fa40c9b2290e33a5b7e39f11cef9ef75f91e047e9960873493a6c033c0de9d0e5e6d303c17f780252bee5d9ca03ec26cbd54a39ba388b

C:\Users\Admin\tbtnds.dat

MD5 ffc4e0c3e7c57560aada7ddad2c7c599
SHA1 4fe9aae26a6ed9754e3f66bf0eecb4b0953634d4
SHA256 1002d7f5f86cc29156db3870e5262e0517023431fd526408d0cd275f982c5e55
SHA512 8ea264d52c315e60ad38004d60705fe636238e95c711abae1a646badb62f39d6e273534ae676448e11c05e63c258305b3139649b66f67c1f90da9650fc63c99b