Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 16:42

General

  • Target

    0654d6ab350581e595631beeb9079605.exe

  • Size

    3.9MB

  • MD5

    0654d6ab350581e595631beeb9079605

  • SHA1

    a807801242f14ec106267c6c41f0fa4f8e9b7656

  • SHA256

    4a069324ef5e00a33b35c4870c95baf33293ea637d4886c7d7c0c0345809ae97

  • SHA512

    8910eb0bb77b09e2b94c4066cf8c0bd603dc440e4059ed925b386be2691087057dfa0184903633cf2fe9ffa6e14da08cda62d949ddf1fee4d8c9d743b888b3df

  • SSDEEP

    49152:I9V+LXbEKpO4JI4ZYr5SxA61wqOv46qy8B6r7J4CuRFxUPWlXypCasGSZf6e/Gpk:CYbbt3aMYr2wqM4NiN4sPpidac

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 21 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Gathers network information 2 TTPs 5 IoCs

    Uses commandline utility to view network configuration.

  • Script User-Agent 5 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0654d6ab350581e595631beeb9079605.exe
    "C:\Users\Admin\AppData\Local\Temp\0654d6ab350581e595631beeb9079605.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Users\Admin\AppData\Local\Temp\is-NL1VS.tmp\0654d6ab350581e595631beeb9079605.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-NL1VS.tmp\0654d6ab350581e595631beeb9079605.tmp" /SL5="$401D4,3133545,56832,C:\Users\Admin\AppData\Local\Temp\0654d6ab350581e595631beeb9079605.exe"
      2⤵
      • Executes dropped EXE
      • Maps connected drives based on registry
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\ex.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -inputformat none -NoProfile -NoLogo -Command "& {$avlist = @(); $os = Get-WmiObject Win32_OperatingSystem; if ($os.ProductType -eq 3) {Write-Host \"ServerOS|0\";} elseif ($os.Version -like \"5.*\") {Get-WmiObject -Namespace root\SecurityCenter -Class AntiVirusProduct | ForEach-Object {Write-Host \"$($_.displayName)|$(if ($_.onAccessScanningEnabled) {\"4096\"} else {\"0\"})\"};} else {Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiVirusProduct | ForEach-Object {$avlist += \"$($_.displayName)|$($_.productState)\"};Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiSpywareProduct | ForEach-Object {$avlist += \"$($_.displayName)|$($_.productState)\"};} Write-Host ($avlist -join \"*\")}"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:932
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:460
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3012
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq newversion.tmp" /FO CSV
          4⤵
            PID:3000
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1964
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq Setup.exe" /FO CSV
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:864
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq Setup (1).exe" /FO CSV
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3836
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist /FI "IMAGENAME eq Setup (1).exe" /FO CSV
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:1092
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
          3⤵
            PID:384
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq Setup (2).exe" /FO CSV
              4⤵
                PID:3220
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist /FI "IMAGENAME eq unchecky_svc.exe" /FO CSV
                  5⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:384
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2628
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
              3⤵
                PID:4536
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq Wireshark.exe" /FO CSV
                  4⤵
                    PID:1656
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                  3⤵
                    PID:4156
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                    3⤵
                      PID:2816
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq ipscan.exe" /FO CSV
                        4⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4808
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist /FI "IMAGENAME eq ipscan.exe" /FO CSV
                          5⤵
                          • Enumerates processes with tasklist
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3376
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                      3⤵
                        PID:5080
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c tasklist /FI "WINDOWTITLE eq Process Monitor*" |find "PID"
                        3⤵
                          PID:3044
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist /FI "WINDOWTITLE eq Process Monitor*"
                            4⤵
                            • Enumerates processes with tasklist
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4444
                          • C:\Windows\SysWOW64\find.exe
                            find "PID"
                            4⤵
                              PID:4456
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                            3⤵
                              PID:3736
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                              3⤵
                                PID:3256
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                                3⤵
                                  PID:2496
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq OLLYDBG.exe" /FO CSV
                                    4⤵
                                      PID:3188
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                                    3⤵
                                      PID:4528
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq Regshot-x64-Unicode.exe" /FO CSV
                                        4⤵
                                          PID:1084
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                                        3⤵
                                          PID:1996
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\cmd.bat""
                                          3⤵
                                            PID:3592
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /C netstat -na | findstr /C:":5900 " | findstr /C:"ESTABLISHED"
                                            3⤵
                                              PID:4628
                                              • C:\Windows\SysWOW64\findstr.exe
                                                findstr /C:"ESTABLISHED"
                                                4⤵
                                                  PID:2820
                                                • C:\Windows\SysWOW64\findstr.exe
                                                  findstr /C:":5900 "
                                                  4⤵
                                                    PID:1268
                                                  • C:\Windows\SysWOW64\NETSTAT.EXE
                                                    netstat -na
                                                    4⤵
                                                    • Gathers network information
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4536
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\system32\cmd.exe" /C netstat -na | findstr /C:":5901 " | findstr /C:"ESTABLISHED"
                                                  3⤵
                                                    PID:3052
                                                    • C:\Windows\SysWOW64\findstr.exe
                                                      findstr /C:"ESTABLISHED"
                                                      4⤵
                                                        PID:4712
                                                      • C:\Windows\SysWOW64\findstr.exe
                                                        findstr /C:":5901 "
                                                        4⤵
                                                          PID:4268
                                                        • C:\Windows\SysWOW64\NETSTAT.EXE
                                                          netstat -na
                                                          4⤵
                                                          • Gathers network information
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4076
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\system32\cmd.exe" /C netstat -na | findstr /C:":5904 " | findstr /C:"ESTABLISHED"
                                                        3⤵
                                                          PID:3640
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr /C:"ESTABLISHED"
                                                            4⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3380
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr /C:":5904 "
                                                            4⤵
                                                              PID:412
                                                            • C:\Windows\SysWOW64\NETSTAT.EXE
                                                              netstat -na
                                                              4⤵
                                                              • Gathers network information
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2840
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                                                            3⤵
                                                              PID:388
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq TeamViewer_Desktop.exe" /FO CSV
                                                                4⤵
                                                                  PID:4516
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                                                                3⤵
                                                                  PID:4084
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq unchecky_svc.exe" /FO CSV
                                                                    4⤵
                                                                    • Suspicious use of WriteProcessMemory
                                                                    PID:3220
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                                                                  3⤵
                                                                    PID:3744
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq unchecky_gb.exe" /FO CSV
                                                                      4⤵
                                                                        PID:4528
                                                                        • C:\Windows\SysWOW64\tasklist.exe
                                                                          tasklist /FI "IMAGENAME eq unchecky_gb.exe" /FO CSV
                                                                          5⤵
                                                                          • Enumerates processes with tasklist
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1856
                                                                    • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\gentlemjmp_ieeuu.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\gentlemjmp_ieeuu.exe" go=ofcourse product_id=UPD xmlsource=C:\Users\Admin\AppData\Local\Temp\0654d6ab350581e595631beeb9079605.exe
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      PID:2072
                                                                      • C:\Users\Admin\AppData\Local\Temp\is-PDL5M.tmp\gentlemjmp_ieeuu.tmp
                                                                        "C:\Users\Admin\AppData\Local\Temp\is-PDL5M.tmp\gentlemjmp_ieeuu.tmp" /SL5="$270060,2737967,56832,C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\gentlemjmp_ieeuu.exe" go=ofcourse product_id=UPD xmlsource=C:\Users\Admin\AppData\Local\Temp\0654d6ab350581e595631beeb9079605.exe
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3464
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-64HGT.tmp\ex.bat""
                                                                          5⤵
                                                                            PID:3144
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell.exe -inputformat none -NoProfile -NoLogo -Command "& {$avlist = @(); $os = Get-WmiObject Win32_OperatingSystem; if ($os.ProductType -eq 3) {Write-Host \"ServerOS|0\";} elseif ($os.Version -like \"5.*\") {Get-WmiObject -Namespace root\SecurityCenter -Class AntiVirusProduct | ForEach-Object {Write-Host \"$($_.displayName)|$(if ($_.onAccessScanningEnabled) {\"4096\"} else {\"0\"})\"};} else {Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiVirusProduct | ForEach-Object {$avlist += \"$($_.displayName)|$($_.productState)\"};Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiSpywareProduct | ForEach-Object {$avlist += \"$($_.displayName)|$($_.productState)\"};} Write-Host ($avlist -join \"*\")}"
                                                                              6⤵
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:4036
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                                                                        3⤵
                                                                          PID:4108
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\system32\cmd.exe" /C netstat -na | findstr /C:":5903 " | findstr /C:"ESTABLISHED"
                                                                          3⤵
                                                                            PID:3276
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C netstat -na | findstr /C:":5902 " | findstr /C:"ESTABLISHED"
                                                                            3⤵
                                                                              PID:5032
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\system32\cmd.exe" /C ""CheckProc.cmd""
                                                                              3⤵
                                                                                PID:3648
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq newversion.exe" /FO CSV
                                                                            1⤵
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:2180
                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                              tasklist /FI "IMAGENAME eq newversion.exe" /FO CSV
                                                                              2⤵
                                                                              • Enumerates processes with tasklist
                                                                              PID:4808
                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                            tasklist /FI "IMAGENAME eq newversion.tmp" /FO CSV
                                                                            1⤵
                                                                            • Enumerates processes with tasklist
                                                                            PID:616
                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                            tasklist /FI "IMAGENAME eq Setup.exe" /FO CSV
                                                                            1⤵
                                                                            • Enumerates processes with tasklist
                                                                            PID:3380
                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                            tasklist /FI "IMAGENAME eq Setup (2).exe" /FO CSV
                                                                            1⤵
                                                                            • Enumerates processes with tasklist
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3724
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq HMA! Pro VPN.exe" /FO CSV
                                                                            1⤵
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:2848
                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                              tasklist /FI "IMAGENAME eq HMA! Pro VPN.exe" /FO CSV
                                                                              2⤵
                                                                              • Enumerates processes with tasklist
                                                                              PID:3464
                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                            tasklist /FI "IMAGENAME eq Fiddler.exe" /FO CSV
                                                                            1⤵
                                                                            • Enumerates processes with tasklist
                                                                            PID:3900
                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                            tasklist /FI "IMAGENAME eq Wireshark.exe" /FO CSV
                                                                            1⤵
                                                                            • Enumerates processes with tasklist
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:440
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq Capsa.exe" /FO CSV
                                                                            1⤵
                                                                              PID:3156
                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                tasklist /FI "IMAGENAME eq Capsa.exe" /FO CSV
                                                                                2⤵
                                                                                • Enumerates processes with tasklist
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:928
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq Procmon.exe" /FO CSV
                                                                              1⤵
                                                                                PID:1844
                                                                                • C:\Windows\SysWOW64\tasklist.exe
                                                                                  tasklist /FI "IMAGENAME eq Procmon.exe" /FO CSV
                                                                                  2⤵
                                                                                  • Enumerates processes with tasklist
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2764
                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                tasklist /FI "IMAGENAME eq regedit.exe" /FO CSV
                                                                                1⤵
                                                                                • Enumerates processes with tasklist
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:4072
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq regedit.exe" /FO CSV
                                                                                1⤵
                                                                                  PID:4804
                                                                                • C:\Windows\SysWOW64\tasklist.exe
                                                                                  tasklist /FI "IMAGENAME eq Taskmgr.exe" /FO CSV
                                                                                  1⤵
                                                                                  • Enumerates processes with tasklist
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:1896
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq Taskmgr.exe" /FO CSV
                                                                                  1⤵
                                                                                    PID:3824
                                                                                  • C:\Windows\SysWOW64\tasklist.exe
                                                                                    tasklist /FI "IMAGENAME eq OLLYDBG.exe" /FO CSV
                                                                                    1⤵
                                                                                    • Enumerates processes with tasklist
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2748
                                                                                  • C:\Windows\SysWOW64\tasklist.exe
                                                                                    tasklist /FI "IMAGENAME eq Regshot-x64-Unicode.exe" /FO CSV
                                                                                    1⤵
                                                                                    • Enumerates processes with tasklist
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:1784
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq Regshot-Unicode.exe" /FO CSV
                                                                                    1⤵
                                                                                      PID:3976
                                                                                      • C:\Windows\SysWOW64\tasklist.exe
                                                                                        tasklist /FI "IMAGENAME eq Regshot-Unicode.exe" /FO CSV
                                                                                        2⤵
                                                                                        • Enumerates processes with tasklist
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4696
                                                                                    • C:\Windows\SysWOW64\tasklist.exe
                                                                                      tasklist /FI "IMAGENAME eq TeamViewer_Desktop.exe" /FO CSV
                                                                                      1⤵
                                                                                      • Enumerates processes with tasklist
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:2012
                                                                                    • C:\Windows\SysWOW64\tasklist.exe
                                                                                      tasklist /FI "IMAGENAME eq DFServ.exe" /FO CSV
                                                                                      1⤵
                                                                                      • Enumerates processes with tasklist
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:4988
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq DFServ.exe" /FO CSV
                                                                                      1⤵
                                                                                        PID:3540
                                                                                      • C:\Windows\SysWOW64\findstr.exe
                                                                                        findstr /C:"ESTABLISHED"
                                                                                        1⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:616
                                                                                      • C:\Windows\SysWOW64\findstr.exe
                                                                                        findstr /C:":5903 "
                                                                                        1⤵
                                                                                          PID:4304
                                                                                        • C:\Windows\SysWOW64\NETSTAT.EXE
                                                                                          netstat -na
                                                                                          1⤵
                                                                                          • Gathers network information
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:5080
                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                          findstr /C:"ESTABLISHED"
                                                                                          1⤵
                                                                                            PID:4984
                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                            findstr /C:":5902 "
                                                                                            1⤵
                                                                                              PID:4920
                                                                                            • C:\Windows\SysWOW64\NETSTAT.EXE
                                                                                              netstat -na
                                                                                              1⤵
                                                                                              • Gathers network information
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2004
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c tasklist /FI "IMAGENAME eq Fiddler.exe" /FO CSV
                                                                                              1⤵
                                                                                                PID:4080
                                                                                              • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                1⤵
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:3900
                                                                                              • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                                                1⤵
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:3000

                                                                                              Network

                                                                                              MITRE ATT&CK Enterprise v15

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                Filesize

                                                                                                2KB

                                                                                                MD5

                                                                                                0774a05ce5ee4c1af7097353c9296c62

                                                                                                SHA1

                                                                                                658ff96b111c21c39d7ad5f510fb72f9762114bb

                                                                                                SHA256

                                                                                                d9c5347ed06755feeb0615f1671f6b91e2718703da0dbc4b0bd205cbd2896dd4

                                                                                                SHA512

                                                                                                104d69fc4f4aaa5070b78ada130228939c7e01436351166fe51fe2da8a02f9948e6d92dd676f62820da1813872b91411e2f863c9a98a760581ec34d4aa354994

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                Filesize

                                                                                                17KB

                                                                                                MD5

                                                                                                92fc9e195ed2c0aaf500e79ac72069cc

                                                                                                SHA1

                                                                                                87fbc2b0bc6ebc4ec991548e95472d6b79a65ba1

                                                                                                SHA256

                                                                                                328e4175390a7e0a0f0ac990b7c16fdac8b573ceea02d5bcaf47ab650d7d6313

                                                                                                SHA512

                                                                                                80377a850d4416eaac36fc03f10d3901e7e8be54e5cf1c1a5109d87e07e14b4b0ae2262ca9b9600fd1ed0eff81dde2a060d2c1a6ab606a88cf7dd31989ca732d

                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5ej2y1jc.ime.ps1

                                                                                                Filesize

                                                                                                60B

                                                                                                MD5

                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                SHA1

                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                SHA256

                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                SHA512

                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-64HGT.tmp\_isetup\_shfoldr.dll

                                                                                                Filesize

                                                                                                22KB

                                                                                                MD5

                                                                                                92dc6ef532fbb4a5c3201469a5b5eb63

                                                                                                SHA1

                                                                                                3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                                                SHA256

                                                                                                9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                                                SHA512

                                                                                                9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-64HGT.tmp\ex.bat

                                                                                                Filesize

                                                                                                786B

                                                                                                MD5

                                                                                                6f639dff171e183e8f6d933c3b52b3ca

                                                                                                SHA1

                                                                                                8a03dae10cc9562de041dd307a6e919580696bfe

                                                                                                SHA256

                                                                                                43ac6b66a99b0d40c692f3bc42380dff7041e5bba1a699e2663dae726e465617

                                                                                                SHA512

                                                                                                845dcd9a68e31d4e3eb04382c35afc8bca45a86abbb3d75cf1ff8c8d92ebab59d48be083b5581da90b172938578b8c5bc3b8fa93fcf93a493b4233aa13ffa6e7

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-64HGT.tmp\innocallback.dll

                                                                                                Filesize

                                                                                                63KB

                                                                                                MD5

                                                                                                1c55ae5ef9980e3b1028447da6105c75

                                                                                                SHA1

                                                                                                f85218e10e6aa23b2f5a3ed512895b437e41b45c

                                                                                                SHA256

                                                                                                6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

                                                                                                SHA512

                                                                                                1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-64HGT.tmp\isskin.dll

                                                                                                Filesize

                                                                                                85KB

                                                                                                MD5

                                                                                                bb536cc96c7e1e03f6a81fbff9e53e64

                                                                                                SHA1

                                                                                                137faf17ebbcb8882449092168c36e54160d3ee8

                                                                                                SHA256

                                                                                                5cd2036b2f10971997bb73f517535b6bd827837b9216dfa53bc0ce4a4114b96c

                                                                                                SHA512

                                                                                                6625384060e345029e745e0821b709d8ee89b0febcd0f3d1291c3c1f2ffa474233f8adfc58e18ab9478bc28a48d81b0b542d649c354f6dfa38f9ea864b35e66a

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-64HGT.tmp\itdownload.dll

                                                                                                Filesize

                                                                                                93KB

                                                                                                MD5

                                                                                                50438e9715627e0478ec3b2b8864afa9

                                                                                                SHA1

                                                                                                d5e668a68c351efa69639308d05b43bfeb66fd63

                                                                                                SHA256

                                                                                                2d851609443c8c74e65b89dc45c3383ce7606fa27ccf083d1f4d757bb30c7827

                                                                                                SHA512

                                                                                                b0368fa63a3fdac3e9e705fd14a36fb5b8e8b37fb615205147f8d263cea47777f44a558307877573d41a3f521b511bbd70d542328a1e464bf509d9108563de55

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-64HGT.tmp\itdownload.dll

                                                                                                Filesize

                                                                                                100KB

                                                                                                MD5

                                                                                                34ffc5a8a73cdfefeaa8c2bb8bd32de2

                                                                                                SHA1

                                                                                                1237dfbfe60550d4916bdec1d9cd3b2ef5dd6312

                                                                                                SHA256

                                                                                                32c1ab632f434cabf07108cb6db083e8808e329e301cee41369a4a0346a4d172

                                                                                                SHA512

                                                                                                526e67329349bcceecf6a2e1d8b119540dd4f2a7d6feb5a7d4b4c8d344bbfd8828d8f518fd416d14da520037ddf573985c17011cb426c27c44b8745726409d13

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                132B

                                                                                                MD5

                                                                                                97cc4c6dda23b9631b8c9185859ad061

                                                                                                SHA1

                                                                                                5f912a6c094bd918afe5e9f0c70cd45b36dff722

                                                                                                SHA256

                                                                                                55b728e4cc0974b19641d1dc77df0f381f244b254d39e2566dcf525b9d106cd8

                                                                                                SHA512

                                                                                                cf82517f44425d402305129821cff7668c5db27d5427b8a8886e99146a1a56ef43b8055e6c62929fbfdf293a88664a760e49443ac89453fa3163ed1ebfb8469e

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                144B

                                                                                                MD5

                                                                                                e902b4bcf5b531d057d091d00be3daee

                                                                                                SHA1

                                                                                                0cd058fcfab51dbfe91b139dc52245d5a4326f55

                                                                                                SHA256

                                                                                                9daadc1e6c019a712e5236eafc29e687ea79efd4de1310dc2eeb1ed165ea26c3

                                                                                                SHA512

                                                                                                5f7a84040b4bbf46173ff5404d970af5cb3e54c0dfc0d6ab6b161c2f417b6b1a023abe7b9f2b723b2985511894649c54c045204de01b2a52a51d7143e8f82c11

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                120B

                                                                                                MD5

                                                                                                c842d438cebab4b876572a8bc032aabe

                                                                                                SHA1

                                                                                                e95c7d4e2f6246daba6f0baec8e1b94c91384c4d

                                                                                                SHA256

                                                                                                ef7d9a0d456e1901b0bdebdce961d480bcf8270a7d7646591bdc2886c8716218

                                                                                                SHA512

                                                                                                aa8a28a1b0a0b9b65db195863fec9b903ffa335ccee7d50dc514f5d9c63f2ca51b2bf52694879adf43021cedfc4c5f8e7c3c90bb6dc493114a700cd79cce183c

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                128B

                                                                                                MD5

                                                                                                dae8768bbb8a4fddc4dca8eae7c4d65f

                                                                                                SHA1

                                                                                                385ffb932fcff489392536d62e291ed9e0beea98

                                                                                                SHA256

                                                                                                ca1bf4fe8a59a31f06a4f2d975671fbb2eeca33d40b0c35318f2131a118754cf

                                                                                                SHA512

                                                                                                492feada84b7064547bd6d22ed13cf6949156eb3daa9af5aa9c3da44dd6ac7e540904c494de14a7858d498944ab51c7525caac3c9aa933d1e55ca35442c075b6

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                118B

                                                                                                MD5

                                                                                                f0315949ccc3d22d958503f5735cfbcc

                                                                                                SHA1

                                                                                                883bf4e366046eb1ef6e2d81fd74fe75ae73b2c0

                                                                                                SHA256

                                                                                                201c4e665ce446e067cb152d1c3834e416f6a09a9e6d7c45c20f1bc1cc74534d

                                                                                                SHA512

                                                                                                aa1faa44ba8f47052bf236d5135dc70f1293028663f4abbc7cc043277428217b047b25d6e6691c1685db52bd2065f0d5c4306d9db590696773c3becf2481a251

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                132B

                                                                                                MD5

                                                                                                410515fbd7d2a2b4fab0fb80c76c2a74

                                                                                                SHA1

                                                                                                f32bd4fc7ade9efdc92b99e79a0b2f95edfc5893

                                                                                                SHA256

                                                                                                6b398a1053c39530e13afb3bad98900d9a5a6d27523a0c5d44c746afb539fe99

                                                                                                SHA512

                                                                                                f301aaeb96aa848eb6823830397c9fb12086db558663235c8b0882cefe2ae105cc75e2cc70315ce2fdfa17d3538427f4afa6a9cf24834a884a10cb4cb87652aa

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                128B

                                                                                                MD5

                                                                                                6a745081c62a706c014a876f45b5a56b

                                                                                                SHA1

                                                                                                25f17fcc50dd202d2381c00970e2dc04c2ad9707

                                                                                                SHA256

                                                                                                e9f9690b327cf24e6c260f93232dd4b961d82a709c16589ba72aabcdba0c039c

                                                                                                SHA512

                                                                                                a420efa894ef6fedad4fafd5e15042f947ff96a169031b7299afeba797bcaefa675508f72f57bfa8452a35d61314a544e26bc535ddb61a0cdfdca03c07ae372f

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                126B

                                                                                                MD5

                                                                                                110d64c0e450ff59542f81690a2d53b7

                                                                                                SHA1

                                                                                                7f2e989deb095a0530792989e5fa9d7279d5f3e7

                                                                                                SHA256

                                                                                                735ca381b6d3cbb675e698aa92222566d5174c0fbdf7807605f105c512c9fa1e

                                                                                                SHA512

                                                                                                00b86a1fd4db9e8861d3973a395c34b41a5a277901552b66ac671ced492638174f256785f563bfad263bc93315544bce87c91d26bd48a39fbab7daccceae0d34

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                130B

                                                                                                MD5

                                                                                                0cbb771b9f9523adb96d5bae77154a05

                                                                                                SHA1

                                                                                                528330a335047039ab012b01bb7a3f585e6f5a8d

                                                                                                SHA256

                                                                                                4b6e256fc13fdb04ac97e583dda99f6ade2356f9c692f5150b262d3e464bd71e

                                                                                                SHA512

                                                                                                41f44acafb84b24e15ebee4a18c2ae39c06ad401db2272939ad1d650c27e1a219d7c05df63a7ec2ab0676c7ed34ca5c7ed1d4cfaa143998e90ce12f13875f0f1

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                126B

                                                                                                MD5

                                                                                                8fec1ab28e8ee7394915990458fb85dc

                                                                                                SHA1

                                                                                                c70e183a783a9621cd64584de99f8163deb40872

                                                                                                SHA256

                                                                                                b96251154ddbfd11d36e74eae84537229912a54dcb86f1277deab084322ce4dd

                                                                                                SHA512

                                                                                                c33223c094764b9704ced1ab6256aa227873c2be81acce328d12113504e55716563ad561641b726dcd2939c6237b4a4dad522512a4f59e3f805f91ffaf3a3be9

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                122B

                                                                                                MD5

                                                                                                b921f2f9f97a642d513e1307f7685e0f

                                                                                                SHA1

                                                                                                3489b63a484a6114f1828100908bbbc622b07ed1

                                                                                                SHA256

                                                                                                953998031a5ac3582232545f923b32f02587fb233791a0326b889f28af4cfabc

                                                                                                SHA512

                                                                                                1da42e0ed2dca9f2a559739c6a0c6b28a54e0d8d0617bec542729a362dd0f36f9287bcd4433c9cabd7db7430e7295f6879c7777a86035c4f3c86b3b05847ae0e

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                126B

                                                                                                MD5

                                                                                                b35e8ab65e7f8a4edb3663885f775681

                                                                                                SHA1

                                                                                                49b66b2e3cff64dd7d8315c53d852c19a46e8609

                                                                                                SHA256

                                                                                                9b78165c2b44ba6675654f776e34815c19482a84c87e6a7dc9d1a68d3d5a5e53

                                                                                                SHA512

                                                                                                3ec1fad817117f00f620103666b1caa2ece51b9cc1a9b3fb2142d57aedc745e9bc69608e0cb2a2eff1879c7ad6741b66751049020620bac8659598080404adcc

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                118B

                                                                                                MD5

                                                                                                f1b6aae3dcd94b94aee326517e3dc583

                                                                                                SHA1

                                                                                                3418fdda1ad30df64d7bac068e1a0c4e305cfd75

                                                                                                SHA256

                                                                                                a02aa2b143a8e126b1a044e1f036a912a0ac134e8e1f56836805b15819e43f6b

                                                                                                SHA512

                                                                                                dae27c24d2ef685e4f968dcd91cda18bfa605fd924b1bf928307107630bd671d6623e78451d3f397dfc93cc4e1c0f74c25e962b5669e2350a79b72ec061ec1ba

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                120B

                                                                                                MD5

                                                                                                d93cc818d32f755945cddfc02b29fb89

                                                                                                SHA1

                                                                                                fc564e791326d269d005c894cfca674352dae814

                                                                                                SHA256

                                                                                                c3fabcab01d67640320ce0a5354e4fc6a7832beebe2e9a7610f43614eefce32c

                                                                                                SHA512

                                                                                                62c20691da188a45b59c468826706ed47ad285d9e23996b714c03b4c639d87d93b57e22f9e4504be42a742ee4c64657d87565f9ce65b677d05f66d0bbef0e0d5

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                122B

                                                                                                MD5

                                                                                                660d266764b1952b43431d6c7dc0dfa9

                                                                                                SHA1

                                                                                                809794738d6ca580d6ec14e77a717e831b0d0e5c

                                                                                                SHA256

                                                                                                e3c86ead8667eac8c9ea88e2ee5f5f14f0f0be59a54864f99cbee17d554f74e5

                                                                                                SHA512

                                                                                                6fc27ec6f453c2791aa9d0c38817128ed8e2fff26748fbe0cfee6411d8a120970494b3504078a3079c90d409434f22b35974efd5cbbaf14ce3657715fc18f4c3

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                122B

                                                                                                MD5

                                                                                                59a8010aab7eb203cd9fda8f6be1beca

                                                                                                SHA1

                                                                                                b9a07636b921183c88880320294e279c935cddd7

                                                                                                SHA256

                                                                                                2a5b80a6a1522b75fda6e7f99ceb912bc7db1bd6be11995fdcbde1ab7d836dba

                                                                                                SHA512

                                                                                                26ae700f89e827f9d5f8d29c7f393eb3e5885d32266591d61b20ffd7ba1d08dfbc0e6e9368c94288185a01960cbd0a8ce96b063187396465e640e963e9b3666e

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                122B

                                                                                                MD5

                                                                                                a59dd0f9883ea39c5119831b0eed46cc

                                                                                                SHA1

                                                                                                8c9354051f7d92310636f0f17e5770aede9d1ad3

                                                                                                SHA256

                                                                                                ff1f1293c860b0709d0244a8c6a29294543efdc698a70469e1cd388c0db84493

                                                                                                SHA512

                                                                                                4a07eac5507fc174879eb960becf19b3a20b224232f74dfeb28d393bed3f181a0d4020efb9b656000d4ce756491c44f4f5a86dec184feca593c9bf6bd8700dac

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                122B

                                                                                                MD5

                                                                                                32b997a9d994996a4369a580e6541b7d

                                                                                                SHA1

                                                                                                d61b48404dd6f6dd43d90858ffb7ddb967ecb1f1

                                                                                                SHA256

                                                                                                39863141871b63880b4282066451321a902a7e6b97264c9ffdfd8128ac8293b8

                                                                                                SHA512

                                                                                                f3ff262b5986436671b4cf970d2ab4eb0dfd3d70651e7e84c8ae38788ef12032db825b81e6e1d8c4f20f0aa5a8067e6e7943b7e3e3c9817e97f0ab227f3fbe1f

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                146B

                                                                                                MD5

                                                                                                f0b99c1273d3787f7769feb4d56e6803

                                                                                                SHA1

                                                                                                6105232df9585072be8ca04712f8760812943cbf

                                                                                                SHA256

                                                                                                176a95493ca3bbfc9a68b4283b53a291faef0f9a7c413b43e1bdad86834a820d

                                                                                                SHA512

                                                                                                73b313c0046f6fcec974f2af64859c0af122e9f86503c7427519b7d2aaaf67e2f8cc68de17b93f24604aff815b843fce9a01571c1db48d3c12867e49daab0133

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\CheckProc.cmd

                                                                                                Filesize

                                                                                                138B

                                                                                                MD5

                                                                                                755c6764b8ecbb83798450705f51510f

                                                                                                SHA1

                                                                                                deb141c4fc3220f0ff5c16eabf1adf850bf55610

                                                                                                SHA256

                                                                                                cfe680c9896cade2f5163ee0a463a7f7dbae7ee4aadf8de15c6c119a1d582016

                                                                                                SHA512

                                                                                                a6292b9416cbbc4a407d143acd502b6a726abb5411309e292f6696a7e55ecb5b78b4bdc764dc3484e85a5a40f21d410018172544b00882759b251aa9dce5df89

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\av.txt

                                                                                                Filesize

                                                                                                1B

                                                                                                MD5

                                                                                                68b329da9893e34099c7d8ad5cb9c940

                                                                                                SHA1

                                                                                                adc83b19e793491b1c6ea0fd8b46cd9f32e592fc

                                                                                                SHA256

                                                                                                01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b

                                                                                                SHA512

                                                                                                be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\cmd.bat

                                                                                                Filesize

                                                                                                81B

                                                                                                MD5

                                                                                                9794dcf580cd0baffa7f08f4bbbd5135

                                                                                                SHA1

                                                                                                350181ad5b3112b5b5859636fea55b447f5a27b5

                                                                                                SHA256

                                                                                                95b64a6c4ffa34a3d57a6c2b40361098dc72c0e96850e146d18887b5d0d54843

                                                                                                SHA512

                                                                                                2e6d06a35980717bc14b90feebe37310aea94072a4e274e88e2d385ff98e2572e59bdf324190fa574e2bd62beab3423061bc4b278e3932eceaef7c6d99f0f1ce

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\ex.bat

                                                                                                Filesize

                                                                                                786B

                                                                                                MD5

                                                                                                aa74d30069bbcfc79ab6bcd2427758fb

                                                                                                SHA1

                                                                                                b52876eb74230cb6c8e95bd8d8390a7d5c34c043

                                                                                                SHA256

                                                                                                eeaa0329702e55b497e63ba3fe4c3eb3923df303f3f2495e2e61f62af0585df8

                                                                                                SHA512

                                                                                                697e28d301386a4322e581b311f3ebe86f9a009e4bdc357d7e454591b669781c3ca339d3cece416b589d05da0cfed77644ee02d101622f29e79644ac34ff8b76

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\favicon.ico

                                                                                                Filesize

                                                                                                10B

                                                                                                MD5

                                                                                                f0b81e3ecd1b5d144558da07bece8803

                                                                                                SHA1

                                                                                                9ee5bf12a207859d89dc893b8d02bd5c739edb52

                                                                                                SHA256

                                                                                                dd7aaa38192189cbf2adfc9416289be6ea3c2e10f2ca08bae453cb1df66babc1

                                                                                                SHA512

                                                                                                774a7485d316be62ca6a2303cf0e8f59611b804eb2d518dd76bcdbf755544818032be367d9c2d5ad778059b0c2da2d5a0e46e2a5420d6fd2da3cc0b2bcbe34a6

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\gentlemjmp_ieeuu.exe

                                                                                                Filesize

                                                                                                19KB

                                                                                                MD5

                                                                                                782f297c74c94f2d2f87ecc64804355d

                                                                                                SHA1

                                                                                                bd58e5d95ce35bbbc4956f1f726c9ef0276bf84e

                                                                                                SHA256

                                                                                                5efafc97907300f14b3614e24c617c634c228c4f48b0ec890b2ba50ce85858a0

                                                                                                SHA512

                                                                                                ab3d9836a13d5ae22cb65f50e594238d16d8ec0bfdaca7341f07e49c5847c1da71cb6c5b611e60da2640e80f65383fd69cf1eb47f3298cd3ce2148f4b800cc5e

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-8T3KA.tmp\gentlemjmp_ieeuu.exe

                                                                                                Filesize

                                                                                                14KB

                                                                                                MD5

                                                                                                5cbe808115074da73641ac06d9f8fcfa

                                                                                                SHA1

                                                                                                0374f4ba091c5e5695800ecab580087484087fac

                                                                                                SHA256

                                                                                                4363f6a1703b1892b0b0a51bb9addccbb7a03e9523851bdf48533814b0457549

                                                                                                SHA512

                                                                                                c656b453f0ab893411881295be14d790a7006792d58ca016941290d8eb330ccf5ed858611d50213c7048ce218cf57f479a61d7a0a8ecc402eb6b6c8d7fe28830

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-NL1VS.tmp\0654d6ab350581e595631beeb9079605.tmp

                                                                                                Filesize

                                                                                                196KB

                                                                                                MD5

                                                                                                610f49121bf286c6a0f4d3c0290b9e7d

                                                                                                SHA1

                                                                                                152b86418decca24988049ca6faa4509dbeca45d

                                                                                                SHA256

                                                                                                1b882d61f153279caf74274402e89dc9abde3f6d4161a1db63455df1dbb15dbb

                                                                                                SHA512

                                                                                                5b3797c04e9cde5d4c62d76327ba648cf9dad6702bcc693af0825514e329af3ba23df124ad895038b109c0cf9ef7955fb175b19828fa43fbc760c9cb3b343124

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-NL1VS.tmp\0654d6ab350581e595631beeb9079605.tmp

                                                                                                Filesize

                                                                                                155KB

                                                                                                MD5

                                                                                                374520b030d55686c52be2b5c5a0bc93

                                                                                                SHA1

                                                                                                593bd8ccb1f3340e943177abeb8b4710a496e393

                                                                                                SHA256

                                                                                                ae201a981e3a26db1bb0446aa2ab1dfbb39e5d71d7893bdc766d78fda63c6880

                                                                                                SHA512

                                                                                                9f07d4475c4f63f2bd4bd08846ea4fb1e2e782b07007e4cf7822592ccb959c0fd9512bef645c8f05d7db96d31fd1d0644584c0318154775421e364f098f25089

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-PDL5M.tmp\gentlemjmp_ieeuu.tmp

                                                                                                Filesize

                                                                                                1KB

                                                                                                MD5

                                                                                                409a88fc94c75433968f17d54480f58d

                                                                                                SHA1

                                                                                                abcba98e2774f69e9e6fcb1aa37a0232eaaea427

                                                                                                SHA256

                                                                                                c5572232a338a99ff098ddd75a9bfd68e5ed87c1de7144df06157937e7b29bbf

                                                                                                SHA512

                                                                                                e9da6be6a7950cc4f44040973066bd28e482289335982d544234a57df7e1e88fb45972933dd9e78d0465c738f17953c84f37724bd1f31fbc933666477c7fa786

                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-PDL5M.tmp\gentlemjmp_ieeuu.tmp

                                                                                                Filesize

                                                                                                37KB

                                                                                                MD5

                                                                                                f7a798d2ad4c14d154ec6e87281e890d

                                                                                                SHA1

                                                                                                f30dc927bc2b3b472aecba9e390480d200b5417f

                                                                                                SHA256

                                                                                                d5369a94e84c180521213ea6c680af870360576c7944595cf2658bc96ffc5721

                                                                                                SHA512

                                                                                                b70e683b1c606ac967b926aecdcd80542f864224661a2c356bddfa02367938be9adeed92500ee315b978b8a7fe52d5cf5858e81b641474f6202a1b3076c14e04

                                                                                              • memory/932-18-0x0000000005BF0000-0x0000000005C12000-memory.dmp

                                                                                                Filesize

                                                                                                136KB

                                                                                              • memory/932-15-0x0000000002DB0000-0x0000000002DE6000-memory.dmp

                                                                                                Filesize

                                                                                                216KB

                                                                                              • memory/932-32-0x0000000006550000-0x000000000659C000-memory.dmp

                                                                                                Filesize

                                                                                                304KB

                                                                                              • memory/932-33-0x0000000002EC0000-0x0000000002ED0000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/932-34-0x00000000069E0000-0x0000000006A76000-memory.dmp

                                                                                                Filesize

                                                                                                600KB

                                                                                              • memory/932-35-0x0000000006960000-0x000000000697A000-memory.dmp

                                                                                                Filesize

                                                                                                104KB

                                                                                              • memory/932-31-0x00000000064A0000-0x00000000064BE000-memory.dmp

                                                                                                Filesize

                                                                                                120KB

                                                                                              • memory/932-30-0x0000000005EE0000-0x0000000006234000-memory.dmp

                                                                                                Filesize

                                                                                                3.3MB

                                                                                              • memory/932-20-0x0000000005E70000-0x0000000005ED6000-memory.dmp

                                                                                                Filesize

                                                                                                408KB

                                                                                              • memory/932-19-0x0000000005D90000-0x0000000005DF6000-memory.dmp

                                                                                                Filesize

                                                                                                408KB

                                                                                              • memory/932-36-0x00000000069B0000-0x00000000069D2000-memory.dmp

                                                                                                Filesize

                                                                                                136KB

                                                                                              • memory/932-37-0x0000000007C90000-0x0000000008234000-memory.dmp

                                                                                                Filesize

                                                                                                5.6MB

                                                                                              • memory/932-41-0x0000000073980000-0x0000000074130000-memory.dmp

                                                                                                Filesize

                                                                                                7.7MB

                                                                                              • memory/932-16-0x0000000002EC0000-0x0000000002ED0000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/932-14-0x0000000073980000-0x0000000074130000-memory.dmp

                                                                                                Filesize

                                                                                                7.7MB

                                                                                              • memory/932-38-0x00000000088C0000-0x0000000008F3A000-memory.dmp

                                                                                                Filesize

                                                                                                6.5MB

                                                                                              • memory/932-17-0x0000000005590000-0x0000000005BB8000-memory.dmp

                                                                                                Filesize

                                                                                                6.2MB

                                                                                              • memory/1904-0-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                Filesize

                                                                                                80KB

                                                                                              • memory/1904-44-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                Filesize

                                                                                                80KB

                                                                                              • memory/1904-2-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                Filesize

                                                                                                80KB

                                                                                              • memory/1904-159-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                Filesize

                                                                                                80KB

                                                                                              • memory/2072-99-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                Filesize

                                                                                                80KB

                                                                                              • memory/2072-97-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                Filesize

                                                                                                80KB

                                                                                              • memory/2072-155-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                Filesize

                                                                                                80KB

                                                                                              • memory/3464-125-0x0000000003B90000-0x0000000003BA5000-memory.dmp

                                                                                                Filesize

                                                                                                84KB

                                                                                              • memory/3464-118-0x0000000003A10000-0x0000000003A4C000-memory.dmp

                                                                                                Filesize

                                                                                                240KB

                                                                                              • memory/3464-152-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                Filesize

                                                                                                756KB

                                                                                              • memory/3464-153-0x0000000003A10000-0x0000000003A4C000-memory.dmp

                                                                                                Filesize

                                                                                                240KB

                                                                                              • memory/3464-154-0x0000000003B90000-0x0000000003BA5000-memory.dmp

                                                                                                Filesize

                                                                                                84KB

                                                                                              • memory/3464-105-0x0000000002210000-0x0000000002211000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/4036-140-0x0000000006360000-0x00000000066B4000-memory.dmp

                                                                                                Filesize

                                                                                                3.3MB

                                                                                              • memory/4036-139-0x0000000005510000-0x0000000005520000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/4036-146-0x0000000006ED0000-0x0000000006F1C000-memory.dmp

                                                                                                Filesize

                                                                                                304KB

                                                                                              • memory/4036-147-0x0000000005510000-0x0000000005520000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/4036-138-0x0000000005510000-0x0000000005520000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/4036-149-0x0000000072FF0000-0x00000000737A0000-memory.dmp

                                                                                                Filesize

                                                                                                7.7MB

                                                                                              • memory/4036-132-0x0000000072FF0000-0x00000000737A0000-memory.dmp

                                                                                                Filesize

                                                                                                7.7MB

                                                                                              • memory/4500-45-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                Filesize

                                                                                                756KB

                                                                                              • memory/4500-51-0x0000000002210000-0x0000000002211000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/4500-130-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                Filesize

                                                                                                756KB

                                                                                              • memory/4500-7-0x0000000002210000-0x0000000002211000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/4500-157-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                Filesize

                                                                                                756KB

                                                                                              • memory/4500-158-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                Filesize

                                                                                                756KB

                                                                                              • memory/4500-59-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                Filesize

                                                                                                756KB