Analysis
-
max time kernel
117s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2022 07:33
Static task
static1
Behavioral task
behavioral1
Sample
73f075adda1fe81dea4022f4e06fb64a.exe
Resource
win7-20220812-en
General
-
Target
73f075adda1fe81dea4022f4e06fb64a.exe
-
Size
538KB
-
MD5
73f075adda1fe81dea4022f4e06fb64a
-
SHA1
ca241492da03a4d86fd43a5a076e22ac6949505c
-
SHA256
77cb17ef2f4f282f39838e7430bf040c3356e59ae8f13cbd4e670712e9f44a4e
-
SHA512
c3e5b5efd9c7842320657a09770f5f0d75b5143cffbafd179a7fd70bf8d48a8246cee948462d190f9d032599a2f6d5947d9ed694732b2dcb68d5429c4843d010
-
SSDEEP
12288:JaX8kSXZJS+FTH9+3HI6iR8WnDRzMy6NVD8TS6SJuiRxkorXl:TpfFTdEri9sjS1a5tzl
Malware Config
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2824-164-0x00007FF948800000-0x00007FF9492C1000-memory.dmp asyncrat -
Executes dropped EXE 4 IoCs
Processes:
Wzhtwkrl.exePhoenixClientbaluci.exeWzhtwkrl.exeSystem.exepid process 3260 Wzhtwkrl.exe 2388 PhoenixClientbaluci.exe 1328 Wzhtwkrl.exe 1960 System.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
73f075adda1fe81dea4022f4e06fb64a.exePhoenixClientbaluci.exeWzhtwkrl.exeSystem.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 73f075adda1fe81dea4022f4e06fb64a.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation PhoenixClientbaluci.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Wzhtwkrl.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Wzhtwkrl.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Wzhtwkrl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Wzhtwkrl.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3668 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
System.exepid process 1960 System.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exePhoenixClientbaluci.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeWzhtwkrl.exepid process 5080 powershell.exe 5080 powershell.exe 4308 powershell.exe 4308 powershell.exe 1060 powershell.exe 1060 powershell.exe 4504 powershell.exe 4504 powershell.exe 4328 powershell.exe 4328 powershell.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 2388 PhoenixClientbaluci.exe 3024 powershell.exe 3024 powershell.exe 1340 powershell.exe 1340 powershell.exe 2316 powershell.exe 2316 powershell.exe 4716 powershell.exe 4716 powershell.exe 1668 powershell.exe 1668 powershell.exe 1968 powershell.exe 1968 powershell.exe 1328 Wzhtwkrl.exe 1328 Wzhtwkrl.exe 1328 Wzhtwkrl.exe 1328 Wzhtwkrl.exe 1328 Wzhtwkrl.exe 1328 Wzhtwkrl.exe 1328 Wzhtwkrl.exe 1328 Wzhtwkrl.exe 1328 Wzhtwkrl.exe 1328 Wzhtwkrl.exe 1328 Wzhtwkrl.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exePhoenixClientbaluci.exeWzhtwkrl.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeWzhtwkrl.exeSystem.exepowershell.exedescription pid process Token: SeDebugPrivilege 5080 powershell.exe Token: SeDebugPrivilege 4308 powershell.exe Token: SeDebugPrivilege 1060 powershell.exe Token: SeDebugPrivilege 4504 powershell.exe Token: SeDebugPrivilege 4328 powershell.exe Token: SeDebugPrivilege 2388 PhoenixClientbaluci.exe Token: SeDebugPrivilege 3260 Wzhtwkrl.exe Token: SeDebugPrivilege 3024 powershell.exe Token: SeDebugPrivilege 1340 powershell.exe Token: SeDebugPrivilege 2316 powershell.exe Token: SeDebugPrivilege 4716 powershell.exe Token: SeDebugPrivilege 1668 powershell.exe Token: SeDebugPrivilege 1328 Wzhtwkrl.exe Token: SeDebugPrivilege 1960 System.exe Token: SeDebugPrivilege 1960 System.exe Token: SeDebugPrivilege 1968 powershell.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
73f075adda1fe81dea4022f4e06fb64a.exePhoenixClientbaluci.execmd.execmd.execmd.exeWzhtwkrl.exeSystem.execmd.exedescription pid process target process PID 2824 wrote to memory of 5080 2824 73f075adda1fe81dea4022f4e06fb64a.exe powershell.exe PID 2824 wrote to memory of 5080 2824 73f075adda1fe81dea4022f4e06fb64a.exe powershell.exe PID 2824 wrote to memory of 3260 2824 73f075adda1fe81dea4022f4e06fb64a.exe Wzhtwkrl.exe PID 2824 wrote to memory of 3260 2824 73f075adda1fe81dea4022f4e06fb64a.exe Wzhtwkrl.exe PID 2824 wrote to memory of 2388 2824 73f075adda1fe81dea4022f4e06fb64a.exe PhoenixClientbaluci.exe PID 2824 wrote to memory of 2388 2824 73f075adda1fe81dea4022f4e06fb64a.exe PhoenixClientbaluci.exe PID 2388 wrote to memory of 616 2388 PhoenixClientbaluci.exe cmd.exe PID 2388 wrote to memory of 616 2388 PhoenixClientbaluci.exe cmd.exe PID 616 wrote to memory of 4308 616 cmd.exe powershell.exe PID 616 wrote to memory of 4308 616 cmd.exe powershell.exe PID 616 wrote to memory of 1060 616 cmd.exe powershell.exe PID 616 wrote to memory of 1060 616 cmd.exe powershell.exe PID 616 wrote to memory of 4504 616 cmd.exe powershell.exe PID 616 wrote to memory of 4504 616 cmd.exe powershell.exe PID 616 wrote to memory of 4328 616 cmd.exe powershell.exe PID 616 wrote to memory of 4328 616 cmd.exe powershell.exe PID 2388 wrote to memory of 1212 2388 PhoenixClientbaluci.exe cmd.exe PID 2388 wrote to memory of 1212 2388 PhoenixClientbaluci.exe cmd.exe PID 2388 wrote to memory of 3752 2388 PhoenixClientbaluci.exe cmd.exe PID 2388 wrote to memory of 3752 2388 PhoenixClientbaluci.exe cmd.exe PID 3752 wrote to memory of 3668 3752 cmd.exe timeout.exe PID 3752 wrote to memory of 3668 3752 cmd.exe timeout.exe PID 1212 wrote to memory of 3672 1212 cmd.exe schtasks.exe PID 1212 wrote to memory of 3672 1212 cmd.exe schtasks.exe PID 3260 wrote to memory of 3024 3260 Wzhtwkrl.exe powershell.exe PID 3260 wrote to memory of 3024 3260 Wzhtwkrl.exe powershell.exe PID 3752 wrote to memory of 1960 3752 cmd.exe System.exe PID 3752 wrote to memory of 1960 3752 cmd.exe System.exe PID 1960 wrote to memory of 2196 1960 System.exe cmd.exe PID 1960 wrote to memory of 2196 1960 System.exe cmd.exe PID 2196 wrote to memory of 1340 2196 cmd.exe powershell.exe PID 2196 wrote to memory of 1340 2196 cmd.exe powershell.exe PID 2196 wrote to memory of 2316 2196 cmd.exe powershell.exe PID 2196 wrote to memory of 2316 2196 cmd.exe powershell.exe PID 2196 wrote to memory of 4716 2196 cmd.exe powershell.exe PID 2196 wrote to memory of 4716 2196 cmd.exe powershell.exe PID 2196 wrote to memory of 1668 2196 cmd.exe powershell.exe PID 2196 wrote to memory of 1668 2196 cmd.exe powershell.exe PID 1960 wrote to memory of 1968 1960 System.exe powershell.exe PID 1960 wrote to memory of 1968 1960 System.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73f075adda1fe81dea4022f4e06fb64a.exe"C:\Users\Admin\AppData\Local\Temp\73f075adda1fe81dea4022f4e06fb64a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAeAB1ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAcwBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGgAYgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAdABkACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Wzhtwkrl.exe"C:\Users\Admin\AppData\Local\Temp\Wzhtwkrl.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA7ACAAUwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\PhoenixClientbaluci.exe"C:\Users\Admin\AppData\Local\Temp\PhoenixClientbaluci.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command Add-MpPreference -ExclusionPath '%APPDATA%' & powershell -Command Add-MpPreference -ExclusionPath '%TMP%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%'3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System\System.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System\System.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpDE4F.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\System\System.exe"C:\Users\Admin\AppData\Roaming\System\System.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command Add-MpPreference -ExclusionPath '%APPDATA%' & powershell -Command Add-MpPreference -ExclusionPath '%TMP%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%'5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" (Get-ItemProperty -Path 'HKLM:\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0*' -Name HardwareInformation.qwMemorySize -ErrorAction SilentlyContinue).'HardwareInformation.qwMemorySize'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Wzhtwkrl.exeC:\Users\Admin\AppData\Roaming\Wzhtwkrl.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD596d012dd35ee43a23db987854cc9f3eb
SHA168fb6c90ec116b5464c1a1e7764fd17dc043bf5b
SHA2567e35c3ce2380410d8c23b9475a5b9f0f9a9f43002638a41219e4e8023afd0ef2
SHA512c487d1a9eb7b2290cdbfce6d81df3836d22877efc6fa6aa5357c59ae70f3b577ae7094e69bb589d207f7657c2110a65b669880922c56817c055e5addad0daee7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5d8cb3e9459807e35f02130fad3f9860d
SHA15af7f32cb8a30e850892b15e9164030a041f4bd6
SHA2562b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68
SHA512045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5f41f42c322498af0591f396c59dd4304
SHA1e1e5aa68d73d48bc5e743a34f6c0fa8960ff7514
SHA256d8bd9a4a363ff2ac2dc887759ec6ba4215a4ce0925a8fb9c531573458ee4a31c
SHA5122328a1b402b4fb0de9c451fb630eab58549129d3bcfb70b9834cfbd16065ebaadec006b309ea17ac182d34c53e01705cbc9e0196eb0cbd62600c866e79a1844f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5dfbdf22506805546c7b41166c3bee737
SHA198406ff84a30122c31e1724820848b418710b705
SHA2565d2b1d66991eb959a32586fc7f26f4e68f6919c0c060cabf6ff3b622e4a9db7b
SHA512f2049d2da6ca963f21656559c49f4d71a239e5ad9e64355cd70c5ae1de1893a1ebb5ff88947c8110d01493d1c4d1b2fd6b44de83bb7ad69f98397928b811c167
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD53a14d51c4fa33a74752c5ce3278bf31f
SHA1fe3f3e9d8a292ef7e4ca499c1e2312ad0625af5f
SHA2562b29bd3da1415e5d5c46bd00ce3613c771a937c94bb90b535877f482cddf7d48
SHA5121683ae50abe5272664a9fedf2e73bd4a10c238d2f42adb706cbb8308eac52b465d066791e250772c8b3bea084eace7845457c47ed5098423562cb349f61cbb08
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD544c5a91e282eef94914a4b4bc1e182d4
SHA168c8f28bcb16c25554fae2be4bd35af67d5c61ce
SHA25609ca0d98d30d86cdb915600b0e348dd4ea8fdd8c97a5318cd952c1882d068568
SHA512caefd6fe88de53c1bd0d91a9e70b4e2f728120712c183747d450b3610d76c3742b942d6822ea49c2744f7bef9928b19b6d0ebf317671b1f0a2b44824fcf44fc3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55cfe303e798d1cc6c1dab341e7265c15
SHA1cd2834e05191a24e28a100f3f8114d5a7708dc7c
SHA256c4d16552769ca1762f6867bce85589c645ac3dc490b650083d74f853f898cfab
SHA512ef151bbe0033a2caf2d40aff74855a3f42c8171e05a11c8ce93c7039d9430482c43fe93d9164ee94839aff253cad774dbf619dde9a8af38773ca66d59ac3400e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5e3161f4edbc9b963debe22e29658050b
SHA145dbf88dadafe5dd1cfee1e987c8a219d3208cdb
SHA2561359d6daeaed2f254b162914203c891b23139cc236a3bf75c2dfcbe26265c84a
SHA512006ffb8f37d1f77f8ee79b22ffa413819f565d62773c632b70985759572121c6ab4743139d16d885f8c0ff9d0e0b136686741728b3e142ee54aea3bb733dffb2
-
C:\Users\Admin\AppData\Local\Temp\PhoenixClientbaluci.exeFilesize
62KB
MD5d6dda9cb85261b5fdc12eb22c5d3e6da
SHA14dc5ed6cd82eb87dbd0dfca4729871ea16aa143b
SHA2568f50935534bb6cee9b68b515e68dbfb465068ca07def048299b01d42f63550b4
SHA5127948f58de435c125b3dd7eff9e83e6bb1966603efba081a4b93ef4b3fc93c01e0d20175f35520fe479fb6b411d42dcf124dfcfad60d56bf4132acec6c5d2e440
-
C:\Users\Admin\AppData\Local\Temp\PhoenixClientbaluci.exeFilesize
62KB
MD5d6dda9cb85261b5fdc12eb22c5d3e6da
SHA14dc5ed6cd82eb87dbd0dfca4729871ea16aa143b
SHA2568f50935534bb6cee9b68b515e68dbfb465068ca07def048299b01d42f63550b4
SHA5127948f58de435c125b3dd7eff9e83e6bb1966603efba081a4b93ef4b3fc93c01e0d20175f35520fe479fb6b411d42dcf124dfcfad60d56bf4132acec6c5d2e440
-
C:\Users\Admin\AppData\Local\Temp\Wzhtwkrl.exeFilesize
469KB
MD512c686d78a0c45f37fd17b743a0609f0
SHA19febe4209af334f03cae6c16a98abd0b1beafb43
SHA256e96ba96b2e5420983890d82dcb11c75f3ae436559dd9bf8ecda5135a290fc290
SHA512974d87f205d975bcb06f1b201cdc84c05120b74e08f897256ef35a774a3e9d1170ee7ad0d856ef9cbe9600434190c36dbde34177e6b2cf5e5b80595d155adef9
-
C:\Users\Admin\AppData\Local\Temp\Wzhtwkrl.exeFilesize
469KB
MD512c686d78a0c45f37fd17b743a0609f0
SHA19febe4209af334f03cae6c16a98abd0b1beafb43
SHA256e96ba96b2e5420983890d82dcb11c75f3ae436559dd9bf8ecda5135a290fc290
SHA512974d87f205d975bcb06f1b201cdc84c05120b74e08f897256ef35a774a3e9d1170ee7ad0d856ef9cbe9600434190c36dbde34177e6b2cf5e5b80595d155adef9
-
C:\Users\Admin\AppData\Local\Temp\tmpDE4F.tmp.batFilesize
157B
MD53808bb0003ad223e28d75e6f91ed2fb8
SHA12d7959aae9994e4207ec9bd430c4a95941302cee
SHA2566e8705656b4117dd4e6938577c5c2a2b63b1809638165a47ceebcea06e934155
SHA512c2487c763afc612d8e2ccb5b226acd3215a779946148915f57a7eb7a9f521db1db30c4685954b05f2abd1c970af3da0a90f9bddd797362fc2a7ed32826658b03
-
C:\Users\Admin\AppData\Roaming\System\System.exeFilesize
62KB
MD5d6dda9cb85261b5fdc12eb22c5d3e6da
SHA14dc5ed6cd82eb87dbd0dfca4729871ea16aa143b
SHA2568f50935534bb6cee9b68b515e68dbfb465068ca07def048299b01d42f63550b4
SHA5127948f58de435c125b3dd7eff9e83e6bb1966603efba081a4b93ef4b3fc93c01e0d20175f35520fe479fb6b411d42dcf124dfcfad60d56bf4132acec6c5d2e440
-
C:\Users\Admin\AppData\Roaming\System\System.exeFilesize
62KB
MD5d6dda9cb85261b5fdc12eb22c5d3e6da
SHA14dc5ed6cd82eb87dbd0dfca4729871ea16aa143b
SHA2568f50935534bb6cee9b68b515e68dbfb465068ca07def048299b01d42f63550b4
SHA5127948f58de435c125b3dd7eff9e83e6bb1966603efba081a4b93ef4b3fc93c01e0d20175f35520fe479fb6b411d42dcf124dfcfad60d56bf4132acec6c5d2e440
-
C:\Users\Admin\AppData\Roaming\Wzhtwkrl.exeFilesize
469KB
MD512c686d78a0c45f37fd17b743a0609f0
SHA19febe4209af334f03cae6c16a98abd0b1beafb43
SHA256e96ba96b2e5420983890d82dcb11c75f3ae436559dd9bf8ecda5135a290fc290
SHA512974d87f205d975bcb06f1b201cdc84c05120b74e08f897256ef35a774a3e9d1170ee7ad0d856ef9cbe9600434190c36dbde34177e6b2cf5e5b80595d155adef9
-
C:\Users\Admin\AppData\Roaming\Wzhtwkrl.exeFilesize
469KB
MD512c686d78a0c45f37fd17b743a0609f0
SHA19febe4209af334f03cae6c16a98abd0b1beafb43
SHA256e96ba96b2e5420983890d82dcb11c75f3ae436559dd9bf8ecda5135a290fc290
SHA512974d87f205d975bcb06f1b201cdc84c05120b74e08f897256ef35a774a3e9d1170ee7ad0d856ef9cbe9600434190c36dbde34177e6b2cf5e5b80595d155adef9
-
memory/616-148-0x0000000000000000-mapping.dmp
-
memory/1060-153-0x0000000000000000-mapping.dmp
-
memory/1060-155-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/1060-156-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/1212-167-0x0000000000000000-mapping.dmp
-
memory/1328-179-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/1328-199-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/1340-189-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/1340-188-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/1340-186-0x0000000000000000-mapping.dmp
-
memory/1668-202-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/1668-201-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/1668-198-0x0000000000000000-mapping.dmp
-
memory/1960-184-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/1960-180-0x0000000000000000-mapping.dmp
-
memory/1960-203-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/1968-204-0x0000000000000000-mapping.dmp
-
memory/1968-206-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/1968-207-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/2196-185-0x0000000000000000-mapping.dmp
-
memory/2316-191-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/2316-190-0x0000000000000000-mapping.dmp
-
memory/2316-193-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/2388-137-0x0000000000000000-mapping.dmp
-
memory/2388-166-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/2388-147-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/2388-142-0x0000000000FA0000-0x0000000000FB4000-memory.dmpFilesize
80KB
-
memory/2388-169-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/2824-132-0x0000000000F50000-0x0000000000FDC000-memory.dmpFilesize
560KB
-
memory/2824-164-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/2824-143-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/3024-175-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/3024-183-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/3024-173-0x0000000000000000-mapping.dmp
-
memory/3260-134-0x0000000000000000-mapping.dmp
-
memory/3260-165-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/3260-178-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/3260-145-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/3260-138-0x0000000000D80000-0x0000000000DF8000-memory.dmpFilesize
480KB
-
memory/3668-171-0x0000000000000000-mapping.dmp
-
memory/3672-172-0x0000000000000000-mapping.dmp
-
memory/3752-168-0x0000000000000000-mapping.dmp
-
memory/4308-152-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/4308-149-0x0000000000000000-mapping.dmp
-
memory/4328-163-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/4328-160-0x0000000000000000-mapping.dmp
-
memory/4328-162-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/4504-157-0x0000000000000000-mapping.dmp
-
memory/4504-159-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/4716-197-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/4716-195-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/4716-194-0x0000000000000000-mapping.dmp
-
memory/5080-141-0x0000022828C20000-0x0000022828C42000-memory.dmpFilesize
136KB
-
memory/5080-146-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB
-
memory/5080-133-0x0000000000000000-mapping.dmp
-
memory/5080-144-0x00007FF948800000-0x00007FF9492C1000-memory.dmpFilesize
10.8MB