Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2023 00:12

General

  • Target

    file.exe

  • Size

    288KB

  • MD5

    8df50cf52274c76c80901ea6f29ac7f3

  • SHA1

    d95b8221dd9054f36775237f164bfd16bf4a4467

  • SHA256

    190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106

  • SHA512

    527d7c93658fa10a01a8f012ce2f6a83c29509367d14ff4e5fa2b87f41cc3663dac5c2b5ff93a3511ab0fb59e7355364b4589fa4933a860400ad7ec1fd6e32e9

  • SSDEEP

    3072:usxu5M2SGMFJz+M9E251tCyCa4N1xfepQ5mgYXDR5kVyBk3eFx/RiPB:Po5DMzzZ/nCagfex5XD9+

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://onualituyrs.org/

http://sumagulituyo.org/

http://snukerukeutit.org/

http://lightseinsteniki.org/

http://liuliuoumumy.org/

http://stualialuyastrelia.net/

http://kumbuyartyty.net/

http://criogetikfenbut.org/

http://tonimiuyaytre.org/

http://tyiuiunuewqy.org/

http://humydrole.com/tmp/index.php

http://trunk-co.ru/tmp/index.php

http://weareelight.com/tmp/index.php

http://pirateking.online/tmp/index.php

http://piratia.pw/tmp/index.php

http://go-piratia.ru/tmp/index.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

amadey

Version

4.12

C2

http://185.172.128.19

Attributes
  • install_dir

    cd1f156d67

  • install_file

    Utsysc.exe

  • strings_key

    0dd3e5ee91b367c60c9e575983554b30

  • url_paths

    /ghsdh39s/index.php

rc4.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

194.49.94.181:40264

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

djvu

C2

http://zexeq.com/lancer/get.php

Attributes
  • extension

    .gycc

  • offline_id

    nN1rRlTxKTPo66pmJEAHwufZ2Dhz4MsNxIlOk6t1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-CDZ4hMgp2X Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0829ASdw

rsa_pubkey.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat 8 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detected Djvu ransomware 12 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 22 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • DcRat
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1892
  • C:\Users\Admin\AppData\Local\Temp\44B5.exe
    C:\Users\Admin\AppData\Local\Temp\44B5.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Users\Admin\AppData\Local\Temp\44B5.exe
      C:\Users\Admin\AppData\Local\Temp\44B5.exe
      2⤵
      • DcRat
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3112
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\c78d5d42-d8fa-4e57-9c67-357866e6a4be" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:432
      • C:\Users\Admin\AppData\Local\Temp\44B5.exe
        "C:\Users\Admin\AppData\Local\Temp\44B5.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
          PID:2456
          • C:\Users\Admin\AppData\Local\Temp\44B5.exe
            "C:\Users\Admin\AppData\Local\Temp\44B5.exe" --Admin IsNotAutoStart IsNotTask
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:3108
            • C:\Users\Admin\AppData\Local\178461c4-cb82-459a-9783-ec7174311dbf\build2.exe
              "C:\Users\Admin\AppData\Local\178461c4-cb82-459a-9783-ec7174311dbf\build2.exe"
              5⤵
              • Suspicious use of SetThreadContext
              PID:4704
              • C:\Users\Admin\AppData\Local\178461c4-cb82-459a-9783-ec7174311dbf\build2.exe
                "C:\Users\Admin\AppData\Local\178461c4-cb82-459a-9783-ec7174311dbf\build2.exe"
                6⤵
                • Checks processor information in registry
                PID:4768
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\178461c4-cb82-459a-9783-ec7174311dbf\build2.exe" & del "C:\ProgramData\*.dll"" & exit
                  7⤵
                    PID:1540
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 5
                      8⤵
                      • Delays execution with timeout.exe
                      PID:1216
              • C:\Users\Admin\AppData\Local\178461c4-cb82-459a-9783-ec7174311dbf\build3.exe
                "C:\Users\Admin\AppData\Local\178461c4-cb82-459a-9783-ec7174311dbf\build3.exe"
                5⤵
                • Suspicious use of SetThreadContext
                PID:1976
                • C:\Users\Admin\AppData\Local\178461c4-cb82-459a-9783-ec7174311dbf\build3.exe
                  "C:\Users\Admin\AppData\Local\178461c4-cb82-459a-9783-ec7174311dbf\build3.exe"
                  6⤵
                    PID:3432
                    • C:\Windows\SysWOW64\schtasks.exe
                      /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                      7⤵
                      • DcRat
                      • Creates scheduled task(s)
                      PID:4220
        • C:\Windows\system32\regsvr32.exe
          regsvr32 /s C:\Users\Admin\AppData\Local\Temp\46D9.dll
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:4020
          • C:\Windows\SysWOW64\regsvr32.exe
            /s C:\Users\Admin\AppData\Local\Temp\46D9.dll
            2⤵
            • Loads dropped DLL
            PID:4684
        • C:\Users\Admin\AppData\Local\Temp\49E7.exe
          C:\Users\Admin\AppData\Local\Temp\49E7.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          PID:800
        • C:\Users\Admin\AppData\Local\Temp\4B7E.exe
          C:\Users\Admin\AppData\Local\Temp\4B7E.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4092
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1104
        • C:\Users\Admin\AppData\Local\Temp\5449.exe
          C:\Users\Admin\AppData\Local\Temp\5449.exe
          1⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: MapViewOfSection
          PID:4980
        • C:\Users\Admin\AppData\Local\Temp\5E0E.exe
          C:\Users\Admin\AppData\Local\Temp\5E0E.exe
          1⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3680
          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
            "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:632
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:5040
            • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
              "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
              3⤵
              • DcRat
              • Executes dropped EXE
              • Adds Run key to start application
              • Checks for VirtualBox DLLs, possible anti-VM trick
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              PID:4544
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                4⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:3092
                • C:\Windows\System32\Conhost.exe
                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:2456
              • C:\Windows\system32\cmd.exe
                C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                4⤵
                  PID:1888
                  • C:\Windows\system32\netsh.exe
                    netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                    5⤵
                    • Modifies Windows Firewall
                    PID:3852
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  4⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4364
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  4⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:60
                • C:\Windows\rss\csrss.exe
                  C:\Windows\rss\csrss.exe
                  4⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Manipulates WinMonFS driver.
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4856
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1060
                  • C:\Windows\SYSTEM32\schtasks.exe
                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                    5⤵
                    • DcRat
                    • Creates scheduled task(s)
                    PID:3912
                  • C:\Windows\SYSTEM32\schtasks.exe
                    schtasks /delete /tn ScheduledUpdate /f
                    5⤵
                      PID:4788
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      5⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1712
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      5⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2772
                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                      C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                      5⤵
                      • Executes dropped EXE
                      PID:4324
                    • C:\Windows\SYSTEM32\schtasks.exe
                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                      5⤵
                      • DcRat
                      • Creates scheduled task(s)
                      PID:1864
                    • C:\Windows\windefender.exe
                      "C:\Windows\windefender.exe"
                      5⤵
                      • Executes dropped EXE
                      PID:1744
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                        6⤵
                          PID:1060
                          • C:\Windows\SysWOW64\sc.exe
                            sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                            7⤵
                            • Launches sc.exe
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2424
                • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe
                  "C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2696
                  • C:\Users\Admin\AppData\Local\Temp\Broom.exe
                    C:\Users\Admin\AppData\Local\Temp\Broom.exe
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2088
              • C:\Users\Admin\AppData\Local\Temp\61B9.exe
                C:\Users\Admin\AppData\Local\Temp\61B9.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:4016
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  2⤵
                    PID:2236
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    2⤵
                      PID:1592
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      2⤵
                        PID:432
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                        2⤵
                          PID:4060
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                          2⤵
                            PID:4192
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                            2⤵
                            • Loads dropped DLL
                            PID:4256
                        • C:\Users\Admin\AppData\Local\Temp\69E7.exe
                          C:\Users\Admin\AppData\Local\Temp\69E7.exe
                          1⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:440
                          • C:\Windows\SysWOW64\schtasks.exe
                            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN 69E7.exe /TR "C:\Users\Admin\AppData\Local\Temp\69E7.exe" /F
                            2⤵
                            • DcRat
                            • Creates scheduled task(s)
                            PID:4176
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                          • Accesses Microsoft Outlook profiles
                          • outlook_office_path
                          • outlook_win_path
                          PID:4620
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe
                          1⤵
                            PID:4788
                          • C:\Users\Admin\AppData\Local\Temp\69E7.exe
                            C:\Users\Admin\AppData\Local\Temp\69E7.exe
                            1⤵
                            • Executes dropped EXE
                            PID:216
                          • C:\Users\Admin\AppData\Local\Temp\69E7.exe
                            C:\Users\Admin\AppData\Local\Temp\69E7.exe
                            1⤵
                            • Executes dropped EXE
                            PID:4128
                          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                            1⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:980
                            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                              C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                              2⤵
                              • Executes dropped EXE
                              PID:2228
                              • C:\Windows\SysWOW64\schtasks.exe
                                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                3⤵
                                • DcRat
                                • Creates scheduled task(s)
                                PID:1280
                          • C:\Windows\windefender.exe
                            C:\Windows\windefender.exe
                            1⤵
                            • Executes dropped EXE
                            PID:3816

                          Network

                          MITRE ATT&CK Matrix ATT&CK v13

                          Execution

                          Scheduled Task/Job

                          1
                          T1053

                          Persistence

                          Create or Modify System Process

                          1
                          T1543

                          Windows Service

                          1
                          T1543.003

                          Boot or Logon Autostart Execution

                          1
                          T1547

                          Registry Run Keys / Startup Folder

                          1
                          T1547.001

                          Scheduled Task/Job

                          1
                          T1053

                          Privilege Escalation

                          Create or Modify System Process

                          1
                          T1543

                          Windows Service

                          1
                          T1543.003

                          Boot or Logon Autostart Execution

                          1
                          T1547

                          Registry Run Keys / Startup Folder

                          1
                          T1547.001

                          Scheduled Task/Job

                          1
                          T1053

                          Defense Evasion

                          Virtualization/Sandbox Evasion

                          1
                          T1497

                          File and Directory Permissions Modification

                          1
                          T1222

                          Modify Registry

                          1
                          T1112

                          Credential Access

                          Unsecured Credentials

                          2
                          T1552

                          Credentials In Files

                          2
                          T1552.001

                          Discovery

                          Query Registry

                          7
                          T1012

                          Virtualization/Sandbox Evasion

                          1
                          T1497

                          System Information Discovery

                          7
                          T1082

                          Peripheral Device Discovery

                          1
                          T1120

                          Collection

                          Data from Local System

                          2
                          T1005

                          Email Collection

                          1
                          T1114

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\38QC82jWDTPm
                            Filesize

                            92KB

                            MD5

                            985339a523cfa3862ebc174380d3340c

                            SHA1

                            73bf03c8f7bc58b4e28bcbfdd1c2ba52dea5dfb7

                            SHA256

                            57c7f10cd97c8db447281ad0f47d4694035056e050b85b81f5a5124f461621a2

                            SHA512

                            b5d34c43330f8070b3f353c826a54aecd99b7129a214913a365b66009a1a6744093bf085d3f86681ed40c714d6ebdfff40d99d7bd7a3508a0a0caed6304ac27c

                          • C:\Users\Admin\AppData\LocalLow\Z60Ypi5kt4uI
                            Filesize

                            116KB

                            MD5

                            f70aa3fa04f0536280f872ad17973c3d

                            SHA1

                            50a7b889329a92de1b272d0ecf5fce87395d3123

                            SHA256

                            8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                            SHA512

                            30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                          • C:\Users\Admin\AppData\LocalLow\mozglue.dll
                            Filesize

                            612KB

                            MD5

                            f07d9977430e762b563eaadc2b94bbfa

                            SHA1

                            da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

                            SHA256

                            4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

                            SHA512

                            6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

                          • C:\Users\Admin\AppData\LocalLow\nss3.dll
                            Filesize

                            1.9MB

                            MD5

                            f67d08e8c02574cbc2f1122c53bfb976

                            SHA1

                            6522992957e7e4d074947cad63189f308a80fcf2

                            SHA256

                            c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

                            SHA512

                            2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

                          • C:\Users\Admin\AppData\LocalLow\sqlite3.dll
                            Filesize

                            1.0MB

                            MD5

                            dbf4f8dcefb8056dc6bae4b67ff810ce

                            SHA1

                            bbac1dd8a07c6069415c04b62747d794736d0689

                            SHA256

                            47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

                            SHA512

                            b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

                          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                            Filesize

                            4.2MB

                            MD5

                            890bfdf3c7eecbb505c0fdc415f466b3

                            SHA1

                            90889e27be89519f23d85915956d989b75793c8d

                            SHA256

                            e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

                            SHA512

                            e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

                          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                            Filesize

                            4.2MB

                            MD5

                            890bfdf3c7eecbb505c0fdc415f466b3

                            SHA1

                            90889e27be89519f23d85915956d989b75793c8d

                            SHA256

                            e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

                            SHA512

                            e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

                          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                            Filesize

                            4.2MB

                            MD5

                            890bfdf3c7eecbb505c0fdc415f466b3

                            SHA1

                            90889e27be89519f23d85915956d989b75793c8d

                            SHA256

                            e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

                            SHA512

                            e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

                          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                            Filesize

                            4.2MB

                            MD5

                            890bfdf3c7eecbb505c0fdc415f466b3

                            SHA1

                            90889e27be89519f23d85915956d989b75793c8d

                            SHA256

                            e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

                            SHA512

                            e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

                          • C:\Users\Admin\AppData\Local\Temp\44B5.exe
                            Filesize

                            832KB

                            MD5

                            ef4690a39d2df67899b879f38704d0bd

                            SHA1

                            3625f5087fec6b89977f4f49a9cae32d731aaebc

                            SHA256

                            00ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214

                            SHA512

                            283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084

                          • C:\Users\Admin\AppData\Local\Temp\44B5.exe
                            Filesize

                            832KB

                            MD5

                            ef4690a39d2df67899b879f38704d0bd

                            SHA1

                            3625f5087fec6b89977f4f49a9cae32d731aaebc

                            SHA256

                            00ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214

                            SHA512

                            283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084

                          • C:\Users\Admin\AppData\Local\Temp\44B5.exe
                            Filesize

                            832KB

                            MD5

                            ef4690a39d2df67899b879f38704d0bd

                            SHA1

                            3625f5087fec6b89977f4f49a9cae32d731aaebc

                            SHA256

                            00ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214

                            SHA512

                            283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084

                          • C:\Users\Admin\AppData\Local\Temp\44B5.exe
                            Filesize

                            832KB

                            MD5

                            ef4690a39d2df67899b879f38704d0bd

                            SHA1

                            3625f5087fec6b89977f4f49a9cae32d731aaebc

                            SHA256

                            00ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214

                            SHA512

                            283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084

                          • C:\Users\Admin\AppData\Local\Temp\44B5.exe
                            Filesize

                            832KB

                            MD5

                            ef4690a39d2df67899b879f38704d0bd

                            SHA1

                            3625f5087fec6b89977f4f49a9cae32d731aaebc

                            SHA256

                            00ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214

                            SHA512

                            283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084

                          • C:\Users\Admin\AppData\Local\Temp\46D9.dll
                            Filesize

                            1.6MB

                            MD5

                            4164fa66f608eb71f038fa7ee6ece5bc

                            SHA1

                            d879704e3d4f1ddb97cde3100962dfb684458c27

                            SHA256

                            b43fbe5adf27e984234a4abff46adc22241bcb5b894ce7b518aa024a4c6556f8

                            SHA512

                            35dbc13c03cb155ad920fc82de78456cc0aa174671a7ac96953693111596be2bd30e4a0d35e2002f66ddc4e3341f90c3a2d71f35607eaca4673e6a5b6b76edb0

                          • C:\Users\Admin\AppData\Local\Temp\46D9.dll
                            Filesize

                            1.6MB

                            MD5

                            4164fa66f608eb71f038fa7ee6ece5bc

                            SHA1

                            d879704e3d4f1ddb97cde3100962dfb684458c27

                            SHA256

                            b43fbe5adf27e984234a4abff46adc22241bcb5b894ce7b518aa024a4c6556f8

                            SHA512

                            35dbc13c03cb155ad920fc82de78456cc0aa174671a7ac96953693111596be2bd30e4a0d35e2002f66ddc4e3341f90c3a2d71f35607eaca4673e6a5b6b76edb0

                          • C:\Users\Admin\AppData\Local\Temp\49E7.exe
                            Filesize

                            2.9MB

                            MD5

                            2f084751d838cb9bfcc8538401245ca6

                            SHA1

                            6353a9b23d8e4b50e85cd8e352d4f8d33111b9c0

                            SHA256

                            c189f0fb469d1614cabaf2c7ecad116504f2a89da8c51f371dd28571dc45a13c

                            SHA512

                            93b8fc0d072f4c162267dcfe9e25e1ec5fe305f4e6e0a87dd84698ded16089430c2bda52129064efdfe22c8ea66566d85e55829837e044459c0fe7e0be55011d

                          • C:\Users\Admin\AppData\Local\Temp\49E7.exe
                            Filesize

                            2.9MB

                            MD5

                            2f084751d838cb9bfcc8538401245ca6

                            SHA1

                            6353a9b23d8e4b50e85cd8e352d4f8d33111b9c0

                            SHA256

                            c189f0fb469d1614cabaf2c7ecad116504f2a89da8c51f371dd28571dc45a13c

                            SHA512

                            93b8fc0d072f4c162267dcfe9e25e1ec5fe305f4e6e0a87dd84698ded16089430c2bda52129064efdfe22c8ea66566d85e55829837e044459c0fe7e0be55011d

                          • C:\Users\Admin\AppData\Local\Temp\4B7E.exe
                            Filesize

                            1.1MB

                            MD5

                            acfa549f63796da0e45b5d96755c425b

                            SHA1

                            e0b9ab6d6878926c95e7ead1dd5578aec686566a

                            SHA256

                            4d588cff4cf07df5dc8e999f0962c2bfc83f69e8e6ec8df6acb06eb729b26480

                            SHA512

                            95d5f5c71e25aa327b723893a0aefc7545993448d7c7e99fb2aa7dfbf7f699e2e5584ab745dcb1c18867520a0bb558c0a33371709174cf1c80c0be2e7e025743

                          • C:\Users\Admin\AppData\Local\Temp\4B7E.exe
                            Filesize

                            1.1MB

                            MD5

                            acfa549f63796da0e45b5d96755c425b

                            SHA1

                            e0b9ab6d6878926c95e7ead1dd5578aec686566a

                            SHA256

                            4d588cff4cf07df5dc8e999f0962c2bfc83f69e8e6ec8df6acb06eb729b26480

                            SHA512

                            95d5f5c71e25aa327b723893a0aefc7545993448d7c7e99fb2aa7dfbf7f699e2e5584ab745dcb1c18867520a0bb558c0a33371709174cf1c80c0be2e7e025743

                          • C:\Users\Admin\AppData\Local\Temp\5449.exe
                            Filesize

                            288KB

                            MD5

                            e46a2677fe5342b0876181cb1ee3bbed

                            SHA1

                            7e7afea9d5d259a1477b6ebe7bcd7416b315dcc5

                            SHA256

                            d548abf6933d51e8542495a3c7b764316175638a9bd953870459cacc03f17fb4

                            SHA512

                            1c1825a8259613542b92572272863177d46e737a65fa9f93291a47082577b537aa4648f263896ea1ee9c16fa74a777bcb2c16e25172a77117bc02a012f864c5d

                          • C:\Users\Admin\AppData\Local\Temp\5449.exe
                            Filesize

                            288KB

                            MD5

                            e46a2677fe5342b0876181cb1ee3bbed

                            SHA1

                            7e7afea9d5d259a1477b6ebe7bcd7416b315dcc5

                            SHA256

                            d548abf6933d51e8542495a3c7b764316175638a9bd953870459cacc03f17fb4

                            SHA512

                            1c1825a8259613542b92572272863177d46e737a65fa9f93291a47082577b537aa4648f263896ea1ee9c16fa74a777bcb2c16e25172a77117bc02a012f864c5d

                          • C:\Users\Admin\AppData\Local\Temp\5E0E.exe
                            Filesize

                            6.4MB

                            MD5

                            faa78f58b4f091f8c56ea622d8576703

                            SHA1

                            2bd05e7cf298f79bc7408f400e2f2fd37fc8bdf1

                            SHA256

                            464c7ab944886103d617e334c94320344761a543de5395c6b541ae386b448ea0

                            SHA512

                            3037aef0866b9957fd9f56691baa0e6557a9f46cd3695016dc3c829fc270393360b05e39fba19dc10cac06c2f51998716b3c15c57c3f0afe8c11b2a3709d467b

                          • C:\Users\Admin\AppData\Local\Temp\5E0E.exe
                            Filesize

                            6.4MB

                            MD5

                            faa78f58b4f091f8c56ea622d8576703

                            SHA1

                            2bd05e7cf298f79bc7408f400e2f2fd37fc8bdf1

                            SHA256

                            464c7ab944886103d617e334c94320344761a543de5395c6b541ae386b448ea0

                            SHA512

                            3037aef0866b9957fd9f56691baa0e6557a9f46cd3695016dc3c829fc270393360b05e39fba19dc10cac06c2f51998716b3c15c57c3f0afe8c11b2a3709d467b

                          • C:\Users\Admin\AppData\Local\Temp\61B9.exe
                            Filesize

                            1.8MB

                            MD5

                            fac406eb3a620ec45654e087f68ccd9e

                            SHA1

                            02c21bd71ec411685102670cd4342a332ebaade0

                            SHA256

                            de955b499b42824606d86071bdb1f1555df518b3f12b0254d674a20876e9d340

                            SHA512

                            2668c162ccc01f61a1a9ffec6b35a0c2f64b6f0f5a724f1563b3b23460ed17faa7e64d6817f0eaf7f9c38f3a1ac4fb730351d197b9fff051f25d6e1aac4d2b11

                          • C:\Users\Admin\AppData\Local\Temp\61B9.exe
                            Filesize

                            1.8MB

                            MD5

                            fac406eb3a620ec45654e087f68ccd9e

                            SHA1

                            02c21bd71ec411685102670cd4342a332ebaade0

                            SHA256

                            de955b499b42824606d86071bdb1f1555df518b3f12b0254d674a20876e9d340

                            SHA512

                            2668c162ccc01f61a1a9ffec6b35a0c2f64b6f0f5a724f1563b3b23460ed17faa7e64d6817f0eaf7f9c38f3a1ac4fb730351d197b9fff051f25d6e1aac4d2b11

                          • C:\Users\Admin\AppData\Local\Temp\69E7.exe
                            Filesize

                            418KB

                            MD5

                            0099a99f5ffb3c3ae78af0084136fab3

                            SHA1

                            0205a065728a9ec1133e8a372b1e3864df776e8c

                            SHA256

                            919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                            SHA512

                            5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                          • C:\Users\Admin\AppData\Local\Temp\69E7.exe
                            Filesize

                            418KB

                            MD5

                            0099a99f5ffb3c3ae78af0084136fab3

                            SHA1

                            0205a065728a9ec1133e8a372b1e3864df776e8c

                            SHA256

                            919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                            SHA512

                            5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                          • C:\Users\Admin\AppData\Local\Temp\69E7.exe
                            Filesize

                            418KB

                            MD5

                            0099a99f5ffb3c3ae78af0084136fab3

                            SHA1

                            0205a065728a9ec1133e8a372b1e3864df776e8c

                            SHA256

                            919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                            SHA512

                            5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                          • C:\Users\Admin\AppData\Local\Temp\69E7.exe
                            Filesize

                            418KB

                            MD5

                            0099a99f5ffb3c3ae78af0084136fab3

                            SHA1

                            0205a065728a9ec1133e8a372b1e3864df776e8c

                            SHA256

                            919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                            SHA512

                            5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                          • C:\Users\Admin\AppData\Local\Temp\Broom.exe
                            Filesize

                            5.3MB

                            MD5

                            00e93456aa5bcf9f60f84b0c0760a212

                            SHA1

                            6096890893116e75bd46fea0b8c3921ceb33f57d

                            SHA256

                            ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

                            SHA512

                            abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

                          • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe
                            Filesize

                            2.3MB

                            MD5

                            d56df2995b539368495f3300e48d8e18

                            SHA1

                            8d2d02923afb5fb5e09ce1592104db17a3128246

                            SHA256

                            b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6

                            SHA512

                            2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008

                          • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe
                            Filesize

                            2.3MB

                            MD5

                            d56df2995b539368495f3300e48d8e18

                            SHA1

                            8d2d02923afb5fb5e09ce1592104db17a3128246

                            SHA256

                            b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6

                            SHA512

                            2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008

                          • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe
                            Filesize

                            2.3MB

                            MD5

                            d56df2995b539368495f3300e48d8e18

                            SHA1

                            8d2d02923afb5fb5e09ce1592104db17a3128246

                            SHA256

                            b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6

                            SHA512

                            2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kciicr5y.vfp.ps1
                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                            Filesize

                            281KB

                            MD5

                            d98e33b66343e7c96158444127a117f6

                            SHA1

                            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                            SHA256

                            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                            SHA512

                            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                            Filesize

                            281KB

                            MD5

                            d98e33b66343e7c96158444127a117f6

                            SHA1

                            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                            SHA256

                            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                            SHA512

                            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                          • C:\Users\Admin\AppData\Local\c78d5d42-d8fa-4e57-9c67-357866e6a4be\44B5.exe
                            Filesize

                            832KB

                            MD5

                            ef4690a39d2df67899b879f38704d0bd

                            SHA1

                            3625f5087fec6b89977f4f49a9cae32d731aaebc

                            SHA256

                            00ea9e04a21a848eb1751c907bf12a9dfbfe7229499b3e2143dc41e5dda79214

                            SHA512

                            283ba9a22c3916deaecd632c880e47a1092b4ab8f0ccdc7c31ffc55d174dc16bec5e247d5fe93a012bc537e57eefa92b90f424cccb38271efb8a06388bb09084

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                            Filesize

                            299KB

                            MD5

                            41b883a061c95e9b9cb17d4ca50de770

                            SHA1

                            1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

                            SHA256

                            fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

                            SHA512

                            cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                            Filesize

                            299KB

                            MD5

                            41b883a061c95e9b9cb17d4ca50de770

                            SHA1

                            1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

                            SHA256

                            fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

                            SHA512

                            cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                            Filesize

                            299KB

                            MD5

                            41b883a061c95e9b9cb17d4ca50de770

                            SHA1

                            1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

                            SHA256

                            fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

                            SHA512

                            cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

                          • C:\Users\Admin\AppData\Roaming\igiigig
                            Filesize

                            288KB

                            MD5

                            e46a2677fe5342b0876181cb1ee3bbed

                            SHA1

                            7e7afea9d5d259a1477b6ebe7bcd7416b315dcc5

                            SHA256

                            d548abf6933d51e8542495a3c7b764316175638a9bd953870459cacc03f17fb4

                            SHA512

                            1c1825a8259613542b92572272863177d46e737a65fa9f93291a47082577b537aa4648f263896ea1ee9c16fa74a777bcb2c16e25172a77117bc02a012f864c5d

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                            Filesize

                            2KB

                            MD5

                            3d086a433708053f9bf9523e1d87a4e8

                            SHA1

                            b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                            SHA256

                            6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                            SHA512

                            931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                            Filesize

                            19KB

                            MD5

                            28c135dd207acfee2b458aaef30d66f7

                            SHA1

                            1c382049f337417dd908296e6b7f42db3a5788d4

                            SHA256

                            baad40b0c754135a0038696754029efa17cb3098b635ba8b90c45ac208ea3abf

                            SHA512

                            32d92a6df89ee0c555e9395f2df7ce4d6061cadc908c08cf1134af89db23af29ecb82b945e13b08e4348affdf25378f692c34a17813f6dd191d2722d90ab4dd6

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                            Filesize

                            19KB

                            MD5

                            8499ac6447b38456dadf381c25eb6b7d

                            SHA1

                            4d9bbacf59778ac28bce84e113952cad7881acce

                            SHA256

                            516d41014688c8c1e2e235987a7c65f78724d8549ae6dee6c999678c23ae765b

                            SHA512

                            f7902d0afcc6ced9e7aad83bdf60bb99c080d25061a8b044ca813ae41194bd4c6cb16a2de4abacf93a5cf25d3525fa555adf3717222bc57bbc1feab793eb03ef

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                            Filesize

                            19KB

                            MD5

                            9b09b1dff16d6a10f8cafa2b73130b8d

                            SHA1

                            8fa09ea0d3ccfbcee69b93baf992bae7a3ee1007

                            SHA256

                            c04a6f1dd1b35eb5072f9cf8e83d43cd461ab55ec01467aa0cd4e8dc4481e8b0

                            SHA512

                            fffc389f8d8bc54ad844a21bc5c3443a9819ba0f4f51cb3584efe371f57d162cb38032930e5c28f78280f1b714ed67cce67eb592ad1f47ba1cf8ff31550aa668

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                            Filesize

                            19KB

                            MD5

                            6b77d2a4bf9dc1cfc76602719fd3ff41

                            SHA1

                            ff76b1a9a847474d6a016bf3b814275dceb0f962

                            SHA256

                            b0cc691d1ee351a30d273438945ede5f0eff4657042f8797aa4b67d9362073e0

                            SHA512

                            ebd234454641d697c799a01482ea0499921b9777598d5431ed1a39f30b40029b66d6ca0d411068c3e8ad819e3a54a9b2b61e24164d0e394e839f1f92a2d8f4db

                          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                            Filesize

                            19KB

                            MD5

                            4074973d9da5b456cad7cedd73ae15d1

                            SHA1

                            f215f58ad0752e3075f081eab1018e82227df0f4

                            SHA256

                            1ab5dff5df5230aab1c4113c9ab17518ed2a62d0cd1178d713c35e30b3d75260

                            SHA512

                            601848ab02705f7923f6e4c2c71afa440cad15c8f3e2ff77ccd968660238c86ab9271e5c97eabbbb4c33517f8d22b5b343ef62b13f4ea9f97332d0de3ace1f31

                          • C:\Windows\rss\csrss.exe
                            Filesize

                            4.2MB

                            MD5

                            890bfdf3c7eecbb505c0fdc415f466b3

                            SHA1

                            90889e27be89519f23d85915956d989b75793c8d

                            SHA256

                            e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

                            SHA512

                            e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

                          • C:\Windows\rss\csrss.exe
                            Filesize

                            4.2MB

                            MD5

                            890bfdf3c7eecbb505c0fdc415f466b3

                            SHA1

                            90889e27be89519f23d85915956d989b75793c8d

                            SHA256

                            e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

                            SHA512

                            e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

                          • C:\Windows\windefender.exe
                            Filesize

                            2.0MB

                            MD5

                            8e67f58837092385dcf01e8a2b4f5783

                            SHA1

                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                            SHA256

                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                            SHA512

                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                          • C:\Windows\windefender.exe
                            Filesize

                            2.0MB

                            MD5

                            8e67f58837092385dcf01e8a2b4f5783

                            SHA1

                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                            SHA256

                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                            SHA512

                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                          • C:\Windows\windefender.exe
                            Filesize

                            2.0MB

                            MD5

                            8e67f58837092385dcf01e8a2b4f5783

                            SHA1

                            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                            SHA256

                            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                            SHA512

                            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                          • memory/632-183-0x0000000000400000-0x0000000000D1C000-memory.dmp
                            Filesize

                            9.1MB

                          • memory/632-283-0x0000000000400000-0x0000000000D1C000-memory.dmp
                            Filesize

                            9.1MB

                          • memory/632-188-0x0000000000400000-0x0000000000D1C000-memory.dmp
                            Filesize

                            9.1MB

                          • memory/632-234-0x0000000000400000-0x0000000000D1C000-memory.dmp
                            Filesize

                            9.1MB

                          • memory/632-194-0x0000000000400000-0x0000000000D1C000-memory.dmp
                            Filesize

                            9.1MB

                          • memory/632-185-0x0000000002940000-0x0000000002D3E000-memory.dmp
                            Filesize

                            4.0MB

                          • memory/632-186-0x0000000002D40000-0x000000000362B000-memory.dmp
                            Filesize

                            8.9MB

                          • memory/800-42-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-28-0x00000000009C0000-0x00000000011F2000-memory.dmp
                            Filesize

                            8.2MB

                          • memory/800-128-0x00000000009C0000-0x00000000011F2000-memory.dmp
                            Filesize

                            8.2MB

                          • memory/800-130-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-193-0x00000000009C0000-0x00000000011F2000-memory.dmp
                            Filesize

                            8.2MB

                          • memory/800-37-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-134-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-136-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-137-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-138-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-35-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-59-0x0000000007A20000-0x0000000007A5C000-memory.dmp
                            Filesize

                            240KB

                          • memory/800-36-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-133-0x0000000008410000-0x0000000008476000-memory.dmp
                            Filesize

                            408KB

                          • memory/800-62-0x0000000007A60000-0x0000000007AAC000-memory.dmp
                            Filesize

                            304KB

                          • memory/800-57-0x00000000079C0000-0x00000000079D2000-memory.dmp
                            Filesize

                            72KB

                          • memory/800-45-0x0000000077544000-0x0000000077546000-memory.dmp
                            Filesize

                            8KB

                          • memory/800-145-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-40-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-34-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-151-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-153-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-30-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-38-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-47-0x00000000009C0000-0x00000000011F2000-memory.dmp
                            Filesize

                            8.2MB

                          • memory/800-53-0x0000000007770000-0x0000000007802000-memory.dmp
                            Filesize

                            584KB

                          • memory/800-56-0x0000000007AD0000-0x0000000007BDA000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/800-49-0x0000000007C40000-0x00000000081E4000-memory.dmp
                            Filesize

                            5.6MB

                          • memory/800-54-0x0000000007740000-0x000000000774A000-memory.dmp
                            Filesize

                            40KB

                          • memory/800-162-0x0000000009230000-0x0000000009280000-memory.dmp
                            Filesize

                            320KB

                          • memory/800-196-0x0000000075A00000-0x0000000075AF0000-memory.dmp
                            Filesize

                            960KB

                          • memory/800-168-0x000000000A880000-0x000000000ADAC000-memory.dmp
                            Filesize

                            5.2MB

                          • memory/800-55-0x0000000008810000-0x0000000008E28000-memory.dmp
                            Filesize

                            6.1MB

                          • memory/800-166-0x000000000A180000-0x000000000A342000-memory.dmp
                            Filesize

                            1.8MB

                          • memory/1104-88-0x0000000000400000-0x000000000043C000-memory.dmp
                            Filesize

                            240KB

                          • memory/1104-104-0x0000000073140000-0x00000000738F0000-memory.dmp
                            Filesize

                            7.7MB

                          • memory/1104-121-0x00000000074F0000-0x0000000007500000-memory.dmp
                            Filesize

                            64KB

                          • memory/1892-1-0x0000000002C40000-0x0000000002D40000-memory.dmp
                            Filesize

                            1024KB

                          • memory/1892-5-0x0000000000400000-0x0000000002ABF000-memory.dmp
                            Filesize

                            38.7MB

                          • memory/1892-8-0x0000000004800000-0x000000000480B000-memory.dmp
                            Filesize

                            44KB

                          • memory/1892-3-0x0000000000400000-0x0000000002ABF000-memory.dmp
                            Filesize

                            38.7MB

                          • memory/1892-2-0x0000000004800000-0x000000000480B000-memory.dmp
                            Filesize

                            44KB

                          • memory/2088-256-0x0000000000400000-0x0000000000965000-memory.dmp
                            Filesize

                            5.4MB

                          • memory/2088-184-0x0000000000400000-0x0000000000965000-memory.dmp
                            Filesize

                            5.4MB

                          • memory/2088-140-0x0000000000B50000-0x0000000000B51000-memory.dmp
                            Filesize

                            4KB

                          • memory/3108-205-0x0000000000400000-0x0000000000537000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/3108-265-0x0000000000400000-0x0000000000537000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/3108-204-0x0000000000400000-0x0000000000537000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/3108-206-0x0000000000400000-0x0000000000537000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/3108-207-0x0000000000400000-0x0000000000537000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/3108-208-0x0000000000400000-0x0000000000537000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/3112-177-0x0000000000400000-0x0000000000537000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/3112-154-0x0000000000400000-0x0000000000537000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/3112-159-0x0000000000400000-0x0000000000537000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/3112-157-0x0000000000400000-0x0000000000537000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/3112-160-0x0000000000400000-0x0000000000537000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/3192-4-0x00000000033A0000-0x00000000033B6000-memory.dmp
                            Filesize

                            88KB

                          • memory/3192-163-0x0000000003440000-0x0000000003456000-memory.dmp
                            Filesize

                            88KB

                          • memory/3680-65-0x0000000073140000-0x00000000738F0000-memory.dmp
                            Filesize

                            7.7MB

                          • memory/3680-64-0x00000000002F0000-0x0000000000964000-memory.dmp
                            Filesize

                            6.5MB

                          • memory/3680-106-0x0000000073140000-0x00000000738F0000-memory.dmp
                            Filesize

                            7.7MB

                          • memory/4016-91-0x00000000052E0000-0x00000000052F0000-memory.dmp
                            Filesize

                            64KB

                          • memory/4016-70-0x0000000073140000-0x00000000738F0000-memory.dmp
                            Filesize

                            7.7MB

                          • memory/4016-72-0x0000000000050000-0x0000000000218000-memory.dmp
                            Filesize

                            1.8MB

                          • memory/4016-73-0x0000000005160000-0x00000000051FC000-memory.dmp
                            Filesize

                            624KB

                          • memory/4016-187-0x0000000073140000-0x00000000738F0000-memory.dmp
                            Filesize

                            7.7MB

                          • memory/4016-143-0x0000000005FD0000-0x0000000006014000-memory.dmp
                            Filesize

                            272KB

                          • memory/4620-87-0x0000000001080000-0x00000000010EB000-memory.dmp
                            Filesize

                            428KB

                          • memory/4620-84-0x00000000010F0000-0x0000000001165000-memory.dmp
                            Filesize

                            468KB

                          • memory/4620-142-0x0000000001080000-0x00000000010EB000-memory.dmp
                            Filesize

                            428KB

                          • memory/4656-155-0x0000000004800000-0x00000000048A2000-memory.dmp
                            Filesize

                            648KB

                          • memory/4656-158-0x00000000048B0000-0x00000000049CB000-memory.dmp
                            Filesize

                            1.1MB

                          • memory/4684-161-0x0000000002F30000-0x0000000003040000-memory.dmp
                            Filesize

                            1.1MB

                          • memory/4684-148-0x0000000002F30000-0x0000000003040000-memory.dmp
                            Filesize

                            1.1MB

                          • memory/4684-139-0x0000000002E00000-0x0000000002F2D000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/4684-22-0x00000000011A0000-0x00000000011A6000-memory.dmp
                            Filesize

                            24KB

                          • memory/4684-23-0x0000000010000000-0x0000000010192000-memory.dmp
                            Filesize

                            1.6MB

                          • memory/4684-152-0x0000000002F30000-0x0000000003040000-memory.dmp
                            Filesize

                            1.1MB

                          • memory/4768-261-0x0000000000400000-0x000000000063A000-memory.dmp
                            Filesize

                            2.2MB

                          • memory/4768-306-0x0000000000400000-0x000000000063A000-memory.dmp
                            Filesize

                            2.2MB

                          • memory/4768-287-0x0000000061E00000-0x0000000061EF3000-memory.dmp
                            Filesize

                            972KB

                          • memory/4768-285-0x0000000000400000-0x000000000063A000-memory.dmp
                            Filesize

                            2.2MB

                          • memory/4768-284-0x0000000000400000-0x000000000063A000-memory.dmp
                            Filesize

                            2.2MB

                          • memory/4768-257-0x0000000000400000-0x000000000063A000-memory.dmp
                            Filesize

                            2.2MB

                          • memory/4788-98-0x0000000000D60000-0x0000000000D6C000-memory.dmp
                            Filesize

                            48KB

                          • memory/4788-110-0x0000000000D60000-0x0000000000D6C000-memory.dmp
                            Filesize

                            48KB

                          • memory/4980-146-0x0000000002B40000-0x0000000002C40000-memory.dmp
                            Filesize

                            1024KB

                          • memory/4980-144-0x0000000000400000-0x0000000002ABF000-memory.dmp
                            Filesize

                            38.7MB

                          • memory/4980-141-0x0000000002B10000-0x0000000002B1B000-memory.dmp
                            Filesize

                            44KB

                          • memory/4980-165-0x0000000000400000-0x0000000002ABF000-memory.dmp
                            Filesize

                            38.7MB