Resubmissions

10-01-2024 13:21

240110-qlvy5ahag4 10

10-01-2024 12:17

240110-pf835afbdr 10

Analysis

  • max time kernel
    590s
  • max time network
    599s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 12:17

General

  • Target

    a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe

  • Size

    3.2MB

  • MD5

    6d44f8f3c1608e5958b40f9c6d7b6718

  • SHA1

    9203ad3b6ffb7732591ef560965566555bce9d82

  • SHA256

    a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455

  • SHA512

    656eb44b563705e1045b6a881b4f8a462ecf3bb8b2421cb18dfa21421629f7af92fe4b72736edfe3fea2ea13bef84f5faab5a78b8ef2b4f656a9055d0c4a22bd

  • SSDEEP

    98304:wgwRevguPPFpugyxQkvA51nFbk+kUwWlGroD+1f:wgtv7ov5vqbk++AGkD+1f

Malware Config

Signatures

  • Detects Mimic ransomware 8 IoCs
  • Mimic

    Ransomware family was first exploited in the wild in 2022.

  • UAC bypass 3 TTPs 4 IoCs
  • Clears Windows event logs 1 TTPs 3 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (4495) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes System State backups 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system executable filetype association 2 TTPs 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 19 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 13 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe
    "C:\Users\Admin\AppData\Local\Temp\a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe"
    1⤵
      PID:2640
      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe
        "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" x -y -p58042791667523172 Everything64.dll
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4208
      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe
        "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" i
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2808
      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\3usdaa.exe
        "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\3usdaa.exe"
        2⤵
          PID:3700
          • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe
            "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe"
            3⤵
            • UAC bypass
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system executable filetype association
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops file in Program Files directory
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2900
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c DC.exe /D
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4800
              • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\DC.exe
                DC.exe /D
                5⤵
                • Executes dropped EXE
                PID:316
            • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe
              "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" -e ul1
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2160
            • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe
              "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" -e ul2
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:2580
            • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe
              "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" -e watch -pid 2900 -!
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1744
            • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe
              "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe" -startup
              4⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Suspicious use of SetWindowsHookEx
              PID:3860
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -ExecutionPolicy Bypass "Get-Volume | Get-DiskImage | Dismount-DiskImage"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1120
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -ExecutionPolicy Bypass "Get-VM | Select-Object vmid | Get-VHD | %{Get-DiskImage -ImagePath $_.Path; Get-DiskImage -ImagePath $_.ParentPath} | Dismount-DiskImage"
              4⤵
                PID:4092
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -ExecutionPolicy Bypass "Get-VM | Stop-VM"
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2024
              • C:\Windows\SYSTEM32\powercfg.exe
                powercfg.exe -S e9a42b02-d5df-448d-aa00-03f14749eb61
                4⤵
                  PID:2172
                • C:\Windows\SYSTEM32\powercfg.exe
                  powercfg.exe -S 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
                  4⤵
                    PID:4112
                  • C:\Windows\SYSTEM32\powercfg.exe
                    powercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
                    4⤵
                      PID:3956
                    • C:\Windows\SYSTEM32\powercfg.exe
                      powercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                      4⤵
                        PID:3560
                      • C:\Windows\SYSTEM32\powercfg.exe
                        powercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                        4⤵
                          PID:2440
                        • C:\Windows\SYSTEM32\powercfg.exe
                          powercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
                          4⤵
                            PID:852
                          • C:\Windows\SYSTEM32\powercfg.exe
                            powercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                            4⤵
                              PID:4860
                            • C:\Windows\SYSTEM32\powercfg.exe
                              powercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                              4⤵
                                PID:4628
                              • C:\Windows\SYSTEM32\powercfg.exe
                                powercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
                                4⤵
                                  PID:3260
                                • C:\Windows\SYSTEM32\powercfg.exe
                                  powercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                                  4⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Modifies system executable filetype association
                                  • Adds Run key to start application
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:3700
                                • C:\Windows\SYSTEM32\powercfg.exe
                                  powercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                                  4⤵
                                    PID:2128
                                  • C:\Windows\SYSTEM32\powercfg.exe
                                    powercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
                                    4⤵
                                      PID:4832
                                    • C:\Windows\SYSTEM32\powercfg.exe
                                      powercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                                      4⤵
                                        PID:2360
                                      • C:\Windows\SYSTEM32\powercfg.exe
                                        powercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                                        4⤵
                                          PID:1656
                                        • C:\Windows\SYSTEM32\powercfg.exe
                                          powercfg.exe -H off
                                          4⤵
                                            PID:1660
                                          • C:\Windows\SYSTEM32\wbadmin.exe
                                            wbadmin.exe delete catalog -quiet
                                            4⤵
                                            • Deletes backup catalog
                                            PID:3024
                                          • C:\Windows\SYSTEM32\wbadmin.exe
                                            wbadmin.exe DELETE SYSTEMSTATEBACKUP
                                            4⤵
                                            • Deletes System State backups
                                            • Drops file in Windows directory
                                            PID:5816
                                          • C:\Windows\SYSTEM32\bcdedit.exe
                                            bcdedit.exe /set {default} recoveryenabled no
                                            4⤵
                                            • Modifies boot configuration data using bcdedit
                                            PID:5736
                                          • C:\Windows\SYSTEM32\bcdedit.exe
                                            bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                            4⤵
                                            • Modifies boot configuration data using bcdedit
                                            PID:5796
                                          • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe
                                            "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe" -startup
                                            4⤵
                                            • Executes dropped EXE
                                            • Enumerates connected drives
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4468
                                          • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe
                                            "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe" -accepteula -p 1 -c F:\
                                            4⤵
                                            • Executes dropped EXE
                                            PID:3672
                                          • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe
                                            "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe" -accepteula -p 1 -c C:\
                                            4⤵
                                            • Executes dropped EXE
                                            PID:3696
                                          • C:\Windows\SysWOW64\notepad.exe
                                            notepad.exe "C:\Users\Admin\AppData\Local\----Read-Me-----.txt"
                                            4⤵
                                              PID:5192
                                            • C:\Windows\SysWOW64\wevtutil.exe
                                              wevtutil.exe cl security
                                              4⤵
                                              • Clears Windows event logs
                                              PID:1536
                                            • C:\Windows\SysWOW64\wevtutil.exe
                                              wevtutil.exe cl application
                                              4⤵
                                              • Clears Windows event logs
                                              PID:5612
                                            • C:\Windows\SysWOW64\wevtutil.exe
                                              wevtutil.exe cl system
                                              4⤵
                                              • Clears Windows event logs
                                              PID:6600
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd.exe /d /c "ping 127.2 -n 5 & fsutil file setZeroData offset=0 length=20000000 "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" & cd /d "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}" & Del /f /q /a *.exe *.ini *.dll *.bat *.db"
                                              4⤵
                                                PID:6020
                                                • C:\Windows\SysWOW64\PING.EXE
                                                  ping 127.2 -n 5
                                                  5⤵
                                                  • Runs ping.exe
                                                  PID:6876
                                                • C:\Windows\SysWOW64\fsutil.exe
                                                  fsutil file setZeroData offset=0 length=20000000 "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe"
                                                  5⤵
                                                    PID:2020
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
                                              2⤵
                                                PID:2136
                                            • C:\Windows\System32\Systray.exe
                                              C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                              1⤵
                                                PID:876
                                              • C:\Windows\System32\Systray.exe
                                                C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                1⤵
                                                  PID:1172
                                                • C:\Windows\System32\Systray.exe
                                                  C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:4136
                                                  • C:\Windows\System32\Systray.exe
                                                    C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                      PID:4604
                                                    • C:\Windows\System32\Systray.exe
                                                      C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                        PID:5060
                                                      • C:\Windows\System32\Systray.exe
                                                        C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:1788
                                                        • C:\Windows\System32\Systray.exe
                                                          C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                          1⤵
                                                            PID:5080
                                                          • C:\Windows\System32\Systray.exe
                                                            C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                            1⤵
                                                              PID:1936
                                                            • C:\Windows\System32\Systray.exe
                                                              C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                              1⤵
                                                                PID:4548
                                                              • C:\Windows\System32\Systray.exe
                                                                C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                1⤵
                                                                  PID:8
                                                                • C:\Windows\System32\Systray.exe
                                                                  C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                  1⤵
                                                                    PID:6512
                                                                  • C:\Windows\System32\Systray.exe
                                                                    C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                    1⤵
                                                                      PID:7024
                                                                    • C:\Windows\system32\vssvc.exe
                                                                      C:\Windows\system32\vssvc.exe
                                                                      1⤵
                                                                        PID:5716
                                                                      • C:\Windows\System32\vds.exe
                                                                        C:\Windows\System32\vds.exe
                                                                        1⤵
                                                                        • Checks SCSI registry key(s)
                                                                        PID:4112
                                                                      • C:\Windows\System32\vdsldr.exe
                                                                        C:\Windows\System32\vdsldr.exe -Embedding
                                                                        1⤵
                                                                          PID:6480
                                                                        • C:\Windows\system32\wbengine.exe
                                                                          "C:\Windows\system32\wbengine.exe"
                                                                          1⤵
                                                                            PID:5988
                                                                          • C:\Windows\System32\Systray.exe
                                                                            C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                            1⤵
                                                                              PID:1276
                                                                            • C:\Windows\System32\Systray.exe
                                                                              C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                              1⤵
                                                                                PID:2716
                                                                              • C:\Windows\System32\Systray.exe
                                                                                C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                1⤵
                                                                                  PID:3944
                                                                                • C:\Windows\System32\Conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  1⤵
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:4092

                                                                                Network

                                                                                MITRE ATT&CK Enterprise v15

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads

                                                                                • C:\Users\Admin\AppData\Local\----Read-Me-----.txt

                                                                                  Filesize

                                                                                  846B

                                                                                  MD5

                                                                                  839a3e5f4ac66d267dbf726f71cfc115

                                                                                  SHA1

                                                                                  c261ee5ffa6cb0845709654fa3e582fa68c3ed1f

                                                                                  SHA256

                                                                                  9e9e460bce9e3e800e4bbbefd0a1cee4d5718f324bff8217f562896116e6411d

                                                                                  SHA512

                                                                                  2389536c067977eed0e8cde89f25c201203cd455a53240d05caa8dfb4c5176368fd6a7bdf9bd5227b49161f4e36d9a17c4031049d5753aee46f0ed7fd8e48b9d

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                  Filesize

                                                                                  2KB

                                                                                  MD5

                                                                                  d85ba6ff808d9e5444a4b369f5bc2730

                                                                                  SHA1

                                                                                  31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                  SHA256

                                                                                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                  SHA512

                                                                                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                  Filesize

                                                                                  944B

                                                                                  MD5

                                                                                  6d42b6da621e8df5674e26b799c8e2aa

                                                                                  SHA1

                                                                                  ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                                                  SHA256

                                                                                  5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                                                  SHA512

                                                                                  53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  755e01dde3ca995ae926b19c20d1cf27

                                                                                  SHA1

                                                                                  f36ff7aed1cb8b099559e25f74abf2f70b66d3dd

                                                                                  SHA256

                                                                                  09dd73f04765551a00bc3e4767fe5a7c05ad6bbf155a7ab41c04384b7db851ef

                                                                                  SHA512

                                                                                  9306964f08e81f8867cd370c5c090f8ed9fb0f5ac791c795968091dd9eb5fbb52854e757ea71925c34071feae202405d942d710f08ded49206255b2542051d4f

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd

                                                                                  Filesize

                                                                                  300B

                                                                                  MD5

                                                                                  e1a82f783e5da276aaee7cd82b8f0634

                                                                                  SHA1

                                                                                  08ee4d34971a8a1d237b9fb44025b75552c25ab1

                                                                                  SHA256

                                                                                  785df04aad0f47e60a439c7c9a495cd6143d3f8f7f39435f687df0ac5f5e232f

                                                                                  SHA512

                                                                                  4b4a9345c6dc53fbc74ce92bc436d93082f6b6cd3483614a28bd58aea96d49b2d760d39e3207c1fad90fa2eb550007d2bbb0da3d7bab86fea20918299cba3006

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\3usdaa.exe

                                                                                  Filesize

                                                                                  5KB

                                                                                  MD5

                                                                                  ac0ec460e25b2471f3e998ca2e487d83

                                                                                  SHA1

                                                                                  b726a5d6941b1636a302fbb64e2107fa66e3131e

                                                                                  SHA256

                                                                                  583965ca1551339ee0576726571694a179293e8f76697efa9fb3ce5b277bd307

                                                                                  SHA512

                                                                                  6e10a8cc2535b48494783517d569130182988ee19d90f17f49b9675b37439283c8fce9c985a2880a9093020f65c845c3ddb6c5277d14185e1588ee97e8cd43ce

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\3usdaa.exe

                                                                                  Filesize

                                                                                  229KB

                                                                                  MD5

                                                                                  e5b3025450d21938339d7047c8082cec

                                                                                  SHA1

                                                                                  ad25882046798b2eeacaf3da116847ef52b467eb

                                                                                  SHA256

                                                                                  cb0feb017167bf5c22dc3ecfb49b19d0eb8bdf67df55ffe8f390dc601bf678a4

                                                                                  SHA512

                                                                                  4dc9f64893553a583a129113d466275ac8637e153519d0b66d4929fd600c1bb849dba513365ff0cdf6320469510e2fd55dfa2d6b2f75e3e19bad174aad856f80

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe

                                                                                  Filesize

                                                                                  8KB

                                                                                  MD5

                                                                                  bf711e26366c47f30b52e75258c4add4

                                                                                  SHA1

                                                                                  fdb170ac375f26c0157c884eb0d2513a50918e85

                                                                                  SHA256

                                                                                  81a774785d5c407cf3bd2f4398b8bb3381407564eaaf72327f1af6a2245e34a0

                                                                                  SHA512

                                                                                  177f08084112297d2bb0feb3ee9a36d658caeed170894e9af76575b50e0325b70a0f2d3d4c54172781674951b0ebdd52e8cf917489a9cac0d4e052f0ade414f9

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe

                                                                                  Filesize

                                                                                  103KB

                                                                                  MD5

                                                                                  8290a5e378f29fc935a38a1d437e7d1d

                                                                                  SHA1

                                                                                  a72e7eb465674bf8f1d1f86e4d053cb5f1eaaa32

                                                                                  SHA256

                                                                                  a12706d14edfb807639fdeacf34be2868cac7b5cc79c9648ea39238bda90e842

                                                                                  SHA512

                                                                                  c542f650d83e7ff2480aaa113057acd3e57ab2bb9017c1f8692be5156954811440924fe3af8b5b83ca5f3a5cd1fbc5435f2977937e5405ef9152c67f00971eb5

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe

                                                                                  Filesize

                                                                                  102KB

                                                                                  MD5

                                                                                  6a2a36ea144390432c03fa1d6e757fa3

                                                                                  SHA1

                                                                                  2511b7f40e5bbd3cc99036e6acc889c58d5104ef

                                                                                  SHA256

                                                                                  6e915966116765cfe8c281e1383cdc65720de8dbdbedd2f2232aa4b1d607dd38

                                                                                  SHA512

                                                                                  09415058792c6218bcbce1b23e8369d902112b7cb532d2e06040ed3d47c4310842e73450b34840dbea30fceb3256bca4d7726da7fc1ee1c8f04de23e593b01d5

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe

                                                                                  Filesize

                                                                                  170KB

                                                                                  MD5

                                                                                  bd781e9b85b9ab1fd874db8323caacce

                                                                                  SHA1

                                                                                  cfb06d358c3ea9fa63cbdd8e10fc3c4fd009ccd0

                                                                                  SHA256

                                                                                  3614784ee52dc407fb83e36a2215cb63b9b6107e6320c99c967da0c0d6b5c6f1

                                                                                  SHA512

                                                                                  bd0e4fa5fca0054a1e63785d4fcfdd60ec647324e309deac994fe2b4e40f5c091f2d18a09ba6821326e3ef710af803eea7f36b34b020c0a0af42b937524a94bb

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DC.exe

                                                                                  Filesize

                                                                                  199KB

                                                                                  MD5

                                                                                  82ad139acff9c43425c715f57ca78a2a

                                                                                  SHA1

                                                                                  71233b17eec548acf8f037ddff0089af4477e620

                                                                                  SHA256

                                                                                  78dc5d82b96febbe5ad514dfdd916cf88893bb9c1bd457be01586047a6ff2d3a

                                                                                  SHA512

                                                                                  213554bae5128b3310db2f0585f44be134594d3a1a18795b450f8a1feed6c79004dc116abd6434fdb480dd493f6f9d022d27651f4b2d2b6da14da5b873cdcca2

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything.exe

                                                                                  Filesize

                                                                                  210KB

                                                                                  MD5

                                                                                  b0483a64676eb50adc2370551f0c800d

                                                                                  SHA1

                                                                                  bf46ec45925b3975ff2a7d1ad80b66d8b7f9cbbe

                                                                                  SHA256

                                                                                  2167ea3ca441ce6992c3e9fbf488794a82503c902f57fe2c0a4ffd6a0f9871c0

                                                                                  SHA512

                                                                                  29555044b6717adb014d3b195f8fa1c87bf689eede920dbf5afa03d9aa346d79e68a59f08ebe308fb9c19946c6b41bb8763060d9f10366914da8749e0fa69bd6

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything.ini

                                                                                  Filesize

                                                                                  548B

                                                                                  MD5

                                                                                  742c2400f2de964d0cce4a8dabadd708

                                                                                  SHA1

                                                                                  c452d8d4c3a82af4bc57ca8a76e4407aaf90deca

                                                                                  SHA256

                                                                                  2fefb69e4b2310be5e09d329e8cf1bebd1f9e18884c8c2a38af8d7ea46bd5e01

                                                                                  SHA512

                                                                                  63a7f1482dc15d558e1a26d1214fcecca14df6db78c88735a67d1a89185c05210edc38b38e3e014dac817df88968aaf47beb40e8298777fbb5308abfe16479e4

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything2.ini

                                                                                  Filesize

                                                                                  550B

                                                                                  MD5

                                                                                  51014c0c06acdd80f9ae4469e7d30a9e

                                                                                  SHA1

                                                                                  204e6a57c44242fad874377851b13099dfe60176

                                                                                  SHA256

                                                                                  89ad2164717bd5f5f93fbb4cebf0efeb473097408fddfc7fc7b924d790514dc5

                                                                                  SHA512

                                                                                  79b5e2727cce5cd9f6d2e886f93b22b72ec0ad4a6b9ad47205d7cf283606280665ead729ab3921d7e84409cfc09a94e749a68918130f0172856626f5f7af010c

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything32.dll

                                                                                  Filesize

                                                                                  84KB

                                                                                  MD5

                                                                                  3b03324537327811bbbaff4aafa4d75b

                                                                                  SHA1

                                                                                  1218bd8165a2e0ec56a88b5a8bb4b27e52b564e7

                                                                                  SHA256

                                                                                  8cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880

                                                                                  SHA512

                                                                                  ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything32.dll

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  f7b8f08760ffbed048552b29f351631e

                                                                                  SHA1

                                                                                  44f1131e5ce6262d1ca88dff9901bfc6fe2f895f

                                                                                  SHA256

                                                                                  6f15277af4cce05b68b72a7fe1a5bcf70718543a3c83517f85b235ada8a58daa

                                                                                  SHA512

                                                                                  faa66bda65ea8c52586d915e4708688c6271cc418be56c005b370e381b7aad78fec5a7149260567aacaa0791de0fafb926a169650d72503901066b5d0f060bde

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything64.dll

                                                                                  Filesize

                                                                                  22KB

                                                                                  MD5

                                                                                  42ea1feea4e8b7868c4e9c836ea4c181

                                                                                  SHA1

                                                                                  3c6db0adad35d6dcd1d800c3f21404d1b031e913

                                                                                  SHA256

                                                                                  433f52f45e1923072c188703583ea0ae7d08108a99f9d4f0890e62ee2f9dd74f

                                                                                  SHA512

                                                                                  e1e0334336bd3e9ba4939ffd05a1346318f5876b2adbbb9f0cce03d619c92fc7613d828a0b72d9ffdaa2270283cc7077ab99afa345169f55278f935cbfbc91a1

                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\xdel.exe

                                                                                  Filesize

                                                                                  149KB

                                                                                  MD5

                                                                                  5b6ad1dd9f3967ccc0e3bb453a27534f

                                                                                  SHA1

                                                                                  5112a0f850a03282370dc416178914863df19a19

                                                                                  SHA256

                                                                                  3e241db938453652ffdd3af2c0b5e6991cae6b64a86359c32c38b7a10474c026

                                                                                  SHA512

                                                                                  746dd6152609b932dc0ffb631807a5c550dbddad1eaa598df61a0c51c11921360efd8ac532f80333bcbb78861b479aef363c3607964404f39c59a8eb1299fc71

                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pk034djx.n4a.ps1

                                                                                  Filesize

                                                                                  60B

                                                                                  MD5

                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                  SHA1

                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                  SHA256

                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                  SHA512

                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\7za.exe

                                                                                  Filesize

                                                                                  34KB

                                                                                  MD5

                                                                                  61ed2bc3ffee90c6d53baf3799b6dc10

                                                                                  SHA1

                                                                                  86a6f0fd8dd159c3e7f2c849169b604844037d6f

                                                                                  SHA256

                                                                                  293b167fea837b1ce096dd9e12fd2290b2abb7d4fa8fea1e95445069f9e4979f

                                                                                  SHA512

                                                                                  71fef85cd85909eab69190823703f91bbc43a7605ecc2d9e668d642c38624c8f45382c5823579912aaee3ef06911521cd8743e5ad27a35d327b83bcae3155e3a

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\DC.exe

                                                                                  Filesize

                                                                                  109KB

                                                                                  MD5

                                                                                  4baecb48cc8ffc033ecc00728675f526

                                                                                  SHA1

                                                                                  232deea68e065edfcaa5bb7751829604ce01ecd9

                                                                                  SHA256

                                                                                  8c967e0a05b77b4582ad7d41a8d4cd61df64bf6d1f8622da05871bdb8251b1a7

                                                                                  SHA512

                                                                                  650bfe3256534d63baa936f9a6dd1b22b981aa144c5b701accc1decc989de204e2c21dec0195e279d5ef92ac009a4d8a96623a2545f0fe559fca8a22c2927efc

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\DC.exe

                                                                                  Filesize

                                                                                  28KB

                                                                                  MD5

                                                                                  0a74caf822da10253cfea46b988fdb55

                                                                                  SHA1

                                                                                  22ad2904e4db4e05d51144b923864af573e3da9c

                                                                                  SHA256

                                                                                  c29c4451fb3e50ea6ea6cecf8a4c0f61a3396665c00a42f1f1bdb3578605a348

                                                                                  SHA512

                                                                                  b4fc0fd70628b9e89fc3014796ecfd72d1fd421d19c51ec5ce267fb3368f8c1921ad2812a50bb79f7058f61fdbcd2fc82b9af36163f3e6932748702969ad6fe0

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.db.tmp

                                                                                  Filesize

                                                                                  5.9MB

                                                                                  MD5

                                                                                  edb02c0c48721bd1f09230eb67e16416

                                                                                  SHA1

                                                                                  75a1432630795933c8a4b70e9acf817f98a0db68

                                                                                  SHA256

                                                                                  bb814f92a2206a67a3e153fdcac85d259bff02b11b988241cd261121da1f1dcf

                                                                                  SHA512

                                                                                  aa91096b11bf6ab19c83117c7844864943fe0e3ad47216c8e214769c35983d569dd51d5f44b0f965126d6e83ed05478c250ad2d9f65597440ea6672e391fa908

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe

                                                                                  Filesize

                                                                                  32KB

                                                                                  MD5

                                                                                  eb5f168ae2197e3bf16fe234f5a8109b

                                                                                  SHA1

                                                                                  ce00c21dfeb08323978bfca000682e105c5381e2

                                                                                  SHA256

                                                                                  f98e142330d9803e64051a2183109696a8f14bd1ccb35f2318b9633650becf1e

                                                                                  SHA512

                                                                                  64a0e3f40b0748b5fb817096610309bbdb61e977d65d3e81327394d73e54d385d9d47f9c40fd1a0f254c14507dc8c3a2039ae290f6a49adaf56cdce656fdc00b

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe

                                                                                  Filesize

                                                                                  35KB

                                                                                  MD5

                                                                                  5d0c6f198bc5e7e38ef913abd48b4aea

                                                                                  SHA1

                                                                                  70ddec4b8fd9db8bd1586a7f718cf73ee6a24e2e

                                                                                  SHA256

                                                                                  3863165e67706512a9ce0e51be8e018d496243e0b14a9db96f9532170dbc3634

                                                                                  SHA512

                                                                                  48014fef435739165410e7c76d95d54ec013d4ff77164bababc8af194f39b0e6fab46fd18fa69e5e28f59635706fa32fef64d418d48781bd9043dc6a31c8e255

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe

                                                                                  Filesize

                                                                                  113KB

                                                                                  MD5

                                                                                  c872a575f28efa08711fc6fbb6333b1a

                                                                                  SHA1

                                                                                  4cf8ee7ceb2d03abb3cb3900feb39cf4adffe247

                                                                                  SHA256

                                                                                  cd2b6f327cc0d8915346004f31e1659f74a18c4b97b971a2f2f6bffcf5078516

                                                                                  SHA512

                                                                                  6da1173d4c894c91aebada8af830ff7a441fcb0ff19b63cf5c9c22f7139151334b2f62764655c5fcf1e38b3127ce4c54f3297c811314c5a809c3b3a546ba7fc4

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.ini

                                                                                  Filesize

                                                                                  20KB

                                                                                  MD5

                                                                                  bbfe36f102c85c9cf1a836627279e8c1

                                                                                  SHA1

                                                                                  7a327effcdb0883cefeeba9b9e28f072f35dffa4

                                                                                  SHA256

                                                                                  71227ab3b9cb45fb63734ee90fa14645449df8fbb4e690fdad354de26592093e

                                                                                  SHA512

                                                                                  f102ff1f78509d134b452801b1efc7b910910ef9661717df76af35d4ec3b12bd45f742eed7c7af5d782aa347af4e79b9e52528e4aea515ddb43cffbe370306ae

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything32.dll

                                                                                  Filesize

                                                                                  40KB

                                                                                  MD5

                                                                                  5f3f8fa62cc6a9cf6812020cfbaf92d6

                                                                                  SHA1

                                                                                  5275007ec495ba4fee1fbae4e4bfe97e5f6a92de

                                                                                  SHA256

                                                                                  fff6872ab15734a4bc0194d3b363a1e3a767294631c5d1f0574fc8a9238765fa

                                                                                  SHA512

                                                                                  e106a4c2441761995526d976d13360e6b744743c668314936e68c70d9ff6f7706e7fa87c3c59ec3712241781c7c81ad4cc6227f9b502ccdb7286908e433b220f

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything64.dll

                                                                                  Filesize

                                                                                  37KB

                                                                                  MD5

                                                                                  f9b6ef62b979f9a68e211549c15c3ec4

                                                                                  SHA1

                                                                                  9824cb0f75b0af0e280f2a6536485219e4c4dac3

                                                                                  SHA256

                                                                                  bb6a6c237aac4bed20414c7565a1e80f369a3b5881ad9c0e0642500478b380a1

                                                                                  SHA512

                                                                                  c066f66db52128604f5d0a8205c188e7f965bef832dad90e4abb73a4e60ea299c69d8f860a02b81193c0d7e201cdf55cf29b770ade5be1641608e31e4b237b2e

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe

                                                                                  Filesize

                                                                                  121KB

                                                                                  MD5

                                                                                  cf3a99ed5cb34527d7f3bc2ddf1f68ad

                                                                                  SHA1

                                                                                  41a96c0c6c1f6af262b0d6bdfd471d9404682770

                                                                                  SHA256

                                                                                  89e36b38e4e9f6192a784313d732e4522431f380b6fa138ab12c2faed13b7122

                                                                                  SHA512

                                                                                  031fb8e3068d77cd4499107cb1d3e96815a9344704a2ff63ebbb2d20b134216b80b2afbed80a4a4d66bed2143eb66b8680eca17b3c622119fa3a138a37b6d539

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe

                                                                                  Filesize

                                                                                  112KB

                                                                                  MD5

                                                                                  f868a7701b31f57740197c498c8ee195

                                                                                  SHA1

                                                                                  e78f58f854c045cd429fc705cd411173fad6749e

                                                                                  SHA256

                                                                                  941c59b244e731993872f089625197d64746de986b4f2a3b571e63fde0900d07

                                                                                  SHA512

                                                                                  2d0c8a8c0c5600bc76b4cd3f77d367244f61a8e5e9b9dea6e52cc6a26dc3149009b08552a7b7e6c0b338456fd9f50c4147be6afc5fff520d2a9370e12122a499

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe

                                                                                  Filesize

                                                                                  35KB

                                                                                  MD5

                                                                                  49f49d91e5671e41639df3d41258345b

                                                                                  SHA1

                                                                                  20e905e977c3f67c3c66e286a5e7969a01848843

                                                                                  SHA256

                                                                                  af84f14d11b0fcbc78e35c21de5e40196811b5334819d19d83bf7147a33a27d9

                                                                                  SHA512

                                                                                  6283025d3446b99ce441b6aa89240fcae85e4e24ac3f16aa127702043de522f9f51b8352539031361fb4a9087afbff3a4c929e012730e3b8e687168be653d1a0

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe

                                                                                  Filesize

                                                                                  13KB

                                                                                  MD5

                                                                                  704bdc67a2930237dc13d3fcbbc5bdb1

                                                                                  SHA1

                                                                                  ceada42706c4d44820a893c82387b07685cd85fb

                                                                                  SHA256

                                                                                  cc083267bfb5117cf0a3746a920525582ca97f1d828b4c21e4cb33a03f1cc72b

                                                                                  SHA512

                                                                                  57e73590ba737315430125d34f3c29321f36f6c609120f929e58b56e67d94c2a2c59735138dde150ad6fd784ea34a47e59dc4094c770309b3b38f110ffa88627

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe

                                                                                  Filesize

                                                                                  135KB

                                                                                  MD5

                                                                                  e4a84fdc2367fd7e0380759bb65a8418

                                                                                  SHA1

                                                                                  61b10f05de4fa6b737eff7abdf37f0fcf0698caa

                                                                                  SHA256

                                                                                  c41cd5929acc96f79433cfb3c582aed9c0908c4046fb993eaa64b6512035efbb

                                                                                  SHA512

                                                                                  c1b3686229881be3486bf56216a90eb08bd5a7260ab7638ede51034e67f3e0b291023b5a0718b5a62bb699a79c3706f77068429a9233d330a43f30556414578d

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe

                                                                                  Filesize

                                                                                  150KB

                                                                                  MD5

                                                                                  b1f993cbdce8080c3845026b8f908d72

                                                                                  SHA1

                                                                                  dbb30d7cc338844834bb8d951ef6e5e8a52e2b11

                                                                                  SHA256

                                                                                  5d8690896efcb1662e597e147a4473f6414e1647d54186e254b960b797b2c34e

                                                                                  SHA512

                                                                                  0c11a2434e0cb970223f6c70aa073f4393d6167cc2dddb90066cae0e3c1a4425d976322b5cfb2ab73ad5929de6781eec22730a63f0e3bd007a5ea1546290c25b

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\session.tmp

                                                                                  Filesize

                                                                                  32B

                                                                                  MD5

                                                                                  d1505988a56e6ebb655dd5d19e6db941

                                                                                  SHA1

                                                                                  c9974efb1c27951d1eb08c942d3b47fa7c19f46f

                                                                                  SHA256

                                                                                  ee4dc904aa4a087cec42fa849eee215b4021519251ca906dbdee69c455755674

                                                                                  SHA512

                                                                                  7edce420767656b74577ca27ea5e919b833d26c628bfb3d37efa5cd777827b33d9517477d2f44d3f72a5bb95de7a05f2b4a9feb916af8708509377d3e01cacb1

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe

                                                                                  Filesize

                                                                                  99KB

                                                                                  MD5

                                                                                  89156561b2b17d4e442eb36424e3694e

                                                                                  SHA1

                                                                                  23a8759142ee8b1e2f14e8b3af352c15ad6e222f

                                                                                  SHA256

                                                                                  f61608092899931011b3344414504d86203e3d3ee4240a5c31636052d02465b4

                                                                                  SHA512

                                                                                  3f3d493e95ac747dcd6435f54ea09ee960963f4feb760629064d0b4ce9793ae5b71eaff9f4cc5c4647f9682d5d8206860de3bc385be828fb04c68ae9242035a2

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe

                                                                                  Filesize

                                                                                  63KB

                                                                                  MD5

                                                                                  2f0c06378c2207b2494a0fcd92378ac3

                                                                                  SHA1

                                                                                  f3cdb44f552154d7b07532a08839db25d15f69b3

                                                                                  SHA256

                                                                                  be14ef6f015d5e54113e3d60e47a2bcc5a4c22936fab4877611ceb90322cb9f0

                                                                                  SHA512

                                                                                  00d8944feaf8a2c2f2119383e1671d8c7aca5a1b1917288d5407f5b36192ca10648e9fb56dbe7cbc78c0bd3e85fab7eb96f9a3ae72e4b162c823a3becc8760a7

                                                                                • C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe

                                                                                  Filesize

                                                                                  127KB

                                                                                  MD5

                                                                                  b4c75a33ff2e8240fd912618be373930

                                                                                  SHA1

                                                                                  867326ec8de132dc1c61d38d7feff48efbce33a0

                                                                                  SHA256

                                                                                  476f65fef81a84fc6a53f1ae4fe6da1f8688a14ed6b2b82ed1f60149bcc6e7c3

                                                                                  SHA512

                                                                                  102449a47631a5686caa45c2192e8465e0eb279db33ab051a4d16760c05bce9925f58697195891711848757ae1f59e358ae2ffe28c2e9ab8728e3b35c6bf1fbf

                                                                                • C:\temp\MIMIC_LOG.txt

                                                                                  Filesize

                                                                                  24KB

                                                                                  MD5

                                                                                  370d5d6abb9438cbd3b09db2c8762a11

                                                                                  SHA1

                                                                                  c86dd6d891bc4760e56e1a9606706fe7aa6976d1

                                                                                  SHA256

                                                                                  fa02572b090aa1a176e82cfaf6493ec0ae5b5430a88e986910326b7e5a48d75d

                                                                                  SHA512

                                                                                  349c5b964c7afd79038cb2e303f98b1a4e2fef863bc4341e1c02ae87c30b130aa1106c7bb0f2f3d664388f46dee8bb3cc1919f1305b215ab91de8a9ead08db96

                                                                                • C:\temp\MIMIC_LOG.txt

                                                                                  Filesize

                                                                                  13KB

                                                                                  MD5

                                                                                  0f84f7fdec126404302c57ac9287f782

                                                                                  SHA1

                                                                                  e7971c2a38afa0b71d0650e7f3191eae77bb658b

                                                                                  SHA256

                                                                                  c1b72bb81396e38f565c770e35b625de73e0d4001978a064cd6517b2053b88ca

                                                                                  SHA512

                                                                                  cb11a7cc624571731e3017d280742bd31511f7ee6aa8cbfed0a73e32356a5699b9fc612351d91b79db0fb2efce96bffae5348e1da15f161de48ae0b0f8a48962

                                                                                • C:\temp\MIMIC_LOG.txt

                                                                                  Filesize

                                                                                  17KB

                                                                                  MD5

                                                                                  380bcff4606aacb53325d6f002f069cd

                                                                                  SHA1

                                                                                  78f17025d891493f8086dfaf68356771e539a318

                                                                                  SHA256

                                                                                  8864cbab207982bd93ab3d38c17892fc8c599964c3914ed957328d377f84f508

                                                                                  SHA512

                                                                                  d5720c5c083bacc0ad403994ea8f089d4ef49fe72bbac3b178ba9c49df62ac4e548da146c925e5e41d8563bf56b27c076fa59c0e4789f01affe0d7703d21db73

                                                                                • memory/1120-120-0x000001E0BAB30000-0x000001E0BAB40000-memory.dmp

                                                                                  Filesize

                                                                                  64KB

                                                                                • memory/1120-152-0x000001E0BAB30000-0x000001E0BAB40000-memory.dmp

                                                                                  Filesize

                                                                                  64KB

                                                                                • memory/1120-155-0x00007FFEAAF20000-0x00007FFEAB9E1000-memory.dmp

                                                                                  Filesize

                                                                                  10.8MB

                                                                                • memory/1120-119-0x000001E0BAB30000-0x000001E0BAB40000-memory.dmp

                                                                                  Filesize

                                                                                  64KB

                                                                                • memory/1120-118-0x00007FFEAAF20000-0x00007FFEAB9E1000-memory.dmp

                                                                                  Filesize

                                                                                  10.8MB

                                                                                • memory/1120-117-0x000001E0BAAD0000-0x000001E0BAAF2000-memory.dmp

                                                                                  Filesize

                                                                                  136KB

                                                                                • memory/2024-121-0x0000021EC1410000-0x0000021EC1420000-memory.dmp

                                                                                  Filesize

                                                                                  64KB

                                                                                • memory/2024-143-0x00007FFEAAF20000-0x00007FFEAB9E1000-memory.dmp

                                                                                  Filesize

                                                                                  10.8MB

                                                                                • memory/2024-150-0x00007FFEAAF20000-0x00007FFEAB9E1000-memory.dmp

                                                                                  Filesize

                                                                                  10.8MB

                                                                                • memory/2024-122-0x0000021EC1410000-0x0000021EC1420000-memory.dmp

                                                                                  Filesize

                                                                                  64KB

                                                                                • memory/4092-132-0x000001D75C4B0000-0x000001D75C4C0000-memory.dmp

                                                                                  Filesize

                                                                                  64KB

                                                                                • memory/4092-151-0x00007FFEAAF20000-0x00007FFEAB9E1000-memory.dmp

                                                                                  Filesize

                                                                                  10.8MB

                                                                                • memory/4092-144-0x00007FFEAAF20000-0x00007FFEAB9E1000-memory.dmp

                                                                                  Filesize

                                                                                  10.8MB

                                                                                • memory/4092-133-0x000001D75C4B0000-0x000001D75C4C0000-memory.dmp

                                                                                  Filesize

                                                                                  64KB