Analysis

  • max time kernel
    145s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-02-2024 14:49

General

  • Target

    221121-antabafb8z.exe

  • Size

    2.4MB

  • MD5

    3fcf77ffa0763350a1df45ab3b89f26a

  • SHA1

    0431c506fb86f1813621bc0d09ba12389021cc6b

  • SHA256

    08b82e2125b63ec97ed8fb9cbf829ca31935b8dfa2f67be4d686353570554281

  • SHA512

    07568d02a3cddf5285cf3ea7ab4bc05fb3cc0739b4bd59c75bdf60f0950a52e4ecc2168f53d5f41031271716ecc8babd164e42007c1cdf9ba00e55124232b842

  • SSDEEP

    49152:wgwREifu1DBgutBPNbPz0F3SMzx5QPdqGbHpIAxKof9X7PID/n3ZkIe:wgwREvguPPxzsfTe8GbHjkofeD/n2z

Malware Config

Signatures

  • Detects Mimic ransomware 1 IoCs
  • Mimic

    Ransomware family was first exploited in the wild in 2022.

  • UAC bypass 3 TTPs 4 IoCs
  • Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 1 IoCs
  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (203) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes System State backups 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system executable filetype association 2 TTPs 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\221121-antabafb8z.exe
    "C:\Users\Admin\AppData\Local\Temp\221121-antabafb8z.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe
      "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" i
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2692
    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe
      "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" x -y -p933916544411611201 Everything64.dll
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4804
    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\0v3yT8.06.10.exe
      "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\0v3yT8.06.10.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\system86.exe
        "C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\system86.exe"
        3⤵
        • UAC bypass
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Checks whether UAC is enabled
        • Enumerates connected drives
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:888
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c DC.exe /D
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1088
          • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\DC.exe
            DC.exe /D
            5⤵
            • Executes dropped EXE
            PID:2092
        • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\system86.exe
          "C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\system86.exe" -e watch -pid 888 -!
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3040
        • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\system86.exe
          "C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\system86.exe" -e ul1
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3208
        • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\system86.exe
          "C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\system86.exe" -e ul2
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:1936
        • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\Everything.exe
          "C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\Everything.exe" -startup
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Suspicious use of SetWindowsHookEx
          PID:3244
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -ExecutionPolicy Bypass "Get-Volume | Get-DiskImage | Dismount-DiskImage"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:468
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -ExecutionPolicy Bypass "Get-VM | Select-Object vmid | Get-VHD | %{Get-DiskImage -ImagePath $_.Path; Get-DiskImage -ImagePath $_.ParentPath} | Dismount-DiskImage"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:5032
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -ExecutionPolicy Bypass "Get-VM | Stop-VM"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1068
        • C:\Windows\SYSTEM32\powercfg.exe
          powercfg.exe -S e9a42b02-d5df-448d-aa00-03f14749eb61
          4⤵
            PID:5008
          • C:\Windows\SYSTEM32\powercfg.exe
            powercfg.exe -S 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
            4⤵
              PID:4004
            • C:\Windows\SYSTEM32\powercfg.exe
              powercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
              4⤵
                PID:5112
              • C:\Windows\SYSTEM32\powercfg.exe
                powercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                4⤵
                  PID:3704
                • C:\Windows\SYSTEM32\powercfg.exe
                  powercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                  4⤵
                    PID:4536
                  • C:\Windows\SYSTEM32\powercfg.exe
                    powercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
                    4⤵
                      PID:560
                    • C:\Windows\SYSTEM32\powercfg.exe
                      powercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                      4⤵
                        PID:1528
                      • C:\Windows\SYSTEM32\powercfg.exe
                        powercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                        4⤵
                          PID:228
                        • C:\Windows\SYSTEM32\powercfg.exe
                          powercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
                          4⤵
                            PID:3784
                          • C:\Windows\SYSTEM32\powercfg.exe
                            powercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                            4⤵
                              PID:2660
                            • C:\Windows\SYSTEM32\powercfg.exe
                              powercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                              4⤵
                                PID:4336
                              • C:\Windows\SYSTEM32\powercfg.exe
                                powercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0
                                4⤵
                                  PID:3448
                                • C:\Windows\SYSTEM32\powercfg.exe
                                  powercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 0
                                  4⤵
                                    PID:2860
                                  • C:\Windows\SYSTEM32\powercfg.exe
                                    powercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 0
                                    4⤵
                                      PID:3844
                                    • C:\Windows\SYSTEM32\powercfg.exe
                                      powercfg.exe -H off
                                      4⤵
                                        PID:4324
                                      • C:\Windows\SYSTEM32\bcdedit.exe
                                        bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                        4⤵
                                        • Modifies boot configuration data using bcdedit
                                        PID:4336
                                      • C:\Windows\SYSTEM32\bcdedit.exe
                                        bcdedit.exe /set {default} recoveryenabled no
                                        4⤵
                                        • Modifies boot configuration data using bcdedit
                                        PID:3864
                                      • C:\Windows\SYSTEM32\wbadmin.exe
                                        wbadmin.exe DELETE SYSTEMSTATEBACKUP
                                        4⤵
                                        • Deletes System State backups
                                        • Drops file in Windows directory
                                        PID:4504
                                      • C:\Windows\SYSTEM32\wbadmin.exe
                                        wbadmin.exe delete catalog -quiet
                                        4⤵
                                        • Deletes backup catalog
                                        PID:4548
                                      • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\Everything.exe
                                        "C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\Everything.exe" -startup
                                        4⤵
                                        • Executes dropped EXE
                                        • Enumerates connected drives
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3704
                                • C:\Windows\System32\Systray.exe
                                  C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                  1⤵
                                    PID:3596
                                  • C:\Windows\System32\Systray.exe
                                    C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:1972
                                    • C:\Windows\System32\Systray.exe
                                      C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                      1⤵
                                        PID:3044
                                      • C:\Windows\System32\Systray.exe
                                        C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                          PID:740
                                        • C:\Windows\System32\Systray.exe
                                          C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                          1⤵
                                            PID:3724
                                          • C:\Windows\System32\Systray.exe
                                            C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                              PID:3716
                                            • C:\Windows\System32\Systray.exe
                                              C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                              1⤵
                                                PID:3936
                                              • C:\Windows\System32\Systray.exe
                                                C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                1⤵
                                                  PID:3048
                                                • C:\Windows\System32\Systray.exe
                                                  C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:2392
                                                  • C:\Windows\System32\Systray.exe
                                                    C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                      PID:4992
                                                    • C:\Windows\System32\Systray.exe
                                                      C:\Windows\System32\Systray.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                        PID:732
                                                      • C:\Windows\system32\vssvc.exe
                                                        C:\Windows\system32\vssvc.exe
                                                        1⤵
                                                          PID:4792
                                                        • C:\Windows\system32\wbengine.exe
                                                          "C:\Windows\system32\wbengine.exe"
                                                          1⤵
                                                            PID:4928
                                                          • C:\Windows\System32\vdsldr.exe
                                                            C:\Windows\System32\vdsldr.exe -Embedding
                                                            1⤵
                                                              PID:3128
                                                            • C:\Windows\System32\vds.exe
                                                              C:\Windows\System32\vds.exe
                                                              1⤵
                                                              • Checks SCSI registry key(s)
                                                              PID:3436

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\How-to-decrypt.txt

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              cb7ad438670eae537f6160bd6bede7b0

                                                              SHA1

                                                              fe90fc1ed86ac74d35cd88a20208a55f4f336268

                                                              SHA256

                                                              5342e7adbbaad25538bef62eeb08984939e5da983512a455114429753df5e989

                                                              SHA512

                                                              aaeaf9a7d2f134ea2886e531d576fa12b715351ad05a73c192ebd5629dddbf6a20c7398d04491db8abf32475773d64567169f15b135912a3701e37978175820a

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              d85ba6ff808d9e5444a4b369f5bc2730

                                                              SHA1

                                                              31aa9d96590fff6981b315e0b391b575e4c0804a

                                                              SHA256

                                                              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                              SHA512

                                                              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                              Filesize

                                                              944B

                                                              MD5

                                                              d28a889fd956d5cb3accfbaf1143eb6f

                                                              SHA1

                                                              157ba54b365341f8ff06707d996b3635da8446f7

                                                              SHA256

                                                              21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                                              SHA512

                                                              0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              963146083fe374ae23a67448d63bc620

                                                              SHA1

                                                              2448befee1fb7057308afafdf9265610acbc42b9

                                                              SHA256

                                                              d1e2940cd2225f75a66bb66005945bbae7403bb979212b673d9e188d383ab0ca

                                                              SHA512

                                                              6109ce143104d222d58aedc548793a69bcbb177cc768c831e1176cf69221a7dcbad56e8b5007d2215f41e020b1f9880eb5fc01cc2f934d68c04aa730a7cc7aba

                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\0v3yT8.06.10.exe

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              6d081da0c4ea3eff0e18d414047bb5fd

                                                              SHA1

                                                              992fca17ad2fe4a6523c3858c87b0e5203628032

                                                              SHA256

                                                              a9a4843ea9af569ab5ffd213ac4910898019083eb74ff8f36678092daca92f2e

                                                              SHA512

                                                              12ed7bc4cc716bcda716f5667593223fb5155b1ee14d967f2b217bc6373954a22c169fafe0d969980cf08bfea426996e04c47d70d0658af9db462a8341e9dcb7

                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe

                                                              Filesize

                                                              772KB

                                                              MD5

                                                              b93eb0a48c91a53bda6a1a074a4b431e

                                                              SHA1

                                                              ac693a14c697b1a8ee80318e260e817b8ee2aa86

                                                              SHA256

                                                              ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142

                                                              SHA512

                                                              732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5

                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe

                                                              Filesize

                                                              704KB

                                                              MD5

                                                              114cd7d7822dccc5b020aee3a32c07c6

                                                              SHA1

                                                              46bd056aa1952c9272ca4ff5ff8662d7b6e4b2f8

                                                              SHA256

                                                              87f38533e44f72fe5bfbcf5ce103852f8f717408fa62b6d061cf427cb7d55876

                                                              SHA512

                                                              a6b646d22d9fdd5b10675b53873233201ed592671f6018f5c3ad53e07c607ea70accaa4f74c2567cc75ff5f77457cafb4ebfe9f9f27aec8d346cf9e2f27420d2

                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DC.exe

                                                              Filesize

                                                              576KB

                                                              MD5

                                                              d410e0a1f74e348e1b36d337ed988c5c

                                                              SHA1

                                                              29609868cfae9eb2ed13b0020e4e4705713c6d0d

                                                              SHA256

                                                              4eb3be5011f99dd4adea8b599fcd958e66b40797ad5c3b125c37500e6255b3c4

                                                              SHA512

                                                              a85a24b041523900998a4b7b15b7ce103b3b74f965ca8d107fceaaa64ce7d11d2bb92a3a3cd5564f391313ffa475d7852d77c7136c4ad881d91ec4bb421eb984

                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything.exe

                                                              Filesize

                                                              559KB

                                                              MD5

                                                              a0c520aa7cd13c81f4b19e4f2e652403

                                                              SHA1

                                                              9e3a00c63d5a6870f080fc77afb638f80c5349b5

                                                              SHA256

                                                              fa3c6750cb5ae7bf314e05f5c97bd5aa5345205482e4c975f60da37c9a59c55c

                                                              SHA512

                                                              860e2bbc16e8aa1cbb2b51c7c0c42a5af0ba88b3e64d16a968b3d6670db4bae79744826b5fb6941dfc36b6e46266185fa0addc0e5ef1db2e433cf4407123b875

                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything.ini

                                                              Filesize

                                                              548B

                                                              MD5

                                                              742c2400f2de964d0cce4a8dabadd708

                                                              SHA1

                                                              c452d8d4c3a82af4bc57ca8a76e4407aaf90deca

                                                              SHA256

                                                              2fefb69e4b2310be5e09d329e8cf1bebd1f9e18884c8c2a38af8d7ea46bd5e01

                                                              SHA512

                                                              63a7f1482dc15d558e1a26d1214fcecca14df6db78c88735a67d1a89185c05210edc38b38e3e014dac817df88968aaf47beb40e8298777fbb5308abfe16479e4

                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything2.ini

                                                              Filesize

                                                              550B

                                                              MD5

                                                              51014c0c06acdd80f9ae4469e7d30a9e

                                                              SHA1

                                                              204e6a57c44242fad874377851b13099dfe60176

                                                              SHA256

                                                              89ad2164717bd5f5f93fbb4cebf0efeb473097408fddfc7fc7b924d790514dc5

                                                              SHA512

                                                              79b5e2727cce5cd9f6d2e886f93b22b72ec0ad4a6b9ad47205d7cf283606280665ead729ab3921d7e84409cfc09a94e749a68918130f0172856626f5f7af010c

                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything32.dll

                                                              Filesize

                                                              84KB

                                                              MD5

                                                              3b03324537327811bbbaff4aafa4d75b

                                                              SHA1

                                                              1218bd8165a2e0ec56a88b5a8bb4b27e52b564e7

                                                              SHA256

                                                              8cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880

                                                              SHA512

                                                              ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62

                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Everything64.dll

                                                              Filesize

                                                              1.5MB

                                                              MD5

                                                              c73353f0e0abf5ca18a10a268aefdb68

                                                              SHA1

                                                              36887b5890bbd753f9556476ddb376208fe195fb

                                                              SHA256

                                                              1e077fc068b060e4356876e29ce01fd63598f1579a841336f4a30f73eda1f328

                                                              SHA512

                                                              212546b076b59867ecf67b4cb060789b23ec9c167d0f0b311581ce272bb261cb4f8d8540fae3311fd3059906464214defb3cb3415fcf4769bfbe4e6bbaf4ad63

                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\sdel.exe

                                                              Filesize

                                                              128KB

                                                              MD5

                                                              3cbeddde3ba9dee26eb3b27023499eff

                                                              SHA1

                                                              5648ee0fb578eaec1de58c0b9b79ac4dc64c1961

                                                              SHA256

                                                              871c28834883830d1ce08896bcc87fa93251ed2e965b48853dc34d8b439979df

                                                              SHA512

                                                              d6e9839381bfed6b70a3bc67736287d443ee86ae8cb40f0f7bf469757f4c98251ac1ace444d0da45cca451f0dccea5b7d7b337f483b726c52e9d855ebcc2667f

                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\sdel64.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              1a9e6799223c04b4e5e328604479a9d4

                                                              SHA1

                                                              7df2ca149946173c70aef9479d8c536380987488

                                                              SHA256

                                                              ff8abd13577a244c83957bc4700383d2c03bb6e169d1fdd47445f70239b8d3b9

                                                              SHA512

                                                              5bf93b6c1b7488c7de0ae60d70062fde692f01179bf81d2610b8565720085f656834574ac8fb09da5b136bc5ed966ef8301eec12fbd713c5383931111c655061

                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vm4oldyn.aaz.ps1

                                                              Filesize

                                                              60B

                                                              MD5

                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                              SHA1

                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                              SHA256

                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                              SHA512

                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                            • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\DC.exe

                                                              Filesize

                                                              802KB

                                                              MD5

                                                              ac34ba84a5054cd701efad5dd14645c9

                                                              SHA1

                                                              dc74a9fd5560b7c7a0fc9d183de9d676e92b9e8b

                                                              SHA256

                                                              c576f7f55c4c0304b290b15e70a638b037df15c69577cd6263329c73416e490e

                                                              SHA512

                                                              df491306a3c8ddb580b7cca1dce9e22a87fd43ca3632f3630cdcbe114bef243e847b2ce774d688f6e142516f2e0fc49d30fad7c7168e627523da21e2fe06836a

                                                            • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\Everything.db

                                                              Filesize

                                                              11.2MB

                                                              MD5

                                                              33640c77c0a3a04ccbb740f1ab0b6022

                                                              SHA1

                                                              4965bcb36416e9899d1e52bf943e8b0754c11391

                                                              SHA256

                                                              4c4b60fb00473df4aa0719802eb39fa2b5a44953780ada7b2e5b6d71c1055531

                                                              SHA512

                                                              4d08793f83b63f5ff3ad17b266871b388747844a5eea585c55704435ca7889c3decf3f1f9746afed1fd131b3e2bb426ac9ce6165867c99e57d7e33abe1440a9b

                                                            • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\Everything.exe

                                                              Filesize

                                                              1.0MB

                                                              MD5

                                                              11f123f4a56d05bc7a80f4bee2932c14

                                                              SHA1

                                                              00d92e898416f34d0f8b7584c72f69c92876643b

                                                              SHA256

                                                              4824f1df7e43d4e3e2ca70ee0babce62e5e4dabb0afd978cccd6e36c8aed725b

                                                              SHA512

                                                              3f000f673e4f25c928c41fb038428d21a4f8c782dd0ec30b6f53c7fb28abbd05147f167004ab3608f4c92d6b3bfabfcded090e1718dbc0842a80b07b30ba56a5

                                                            • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\Everything.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              c44487ce1827ce26ac4699432d15b42a

                                                              SHA1

                                                              8434080fad778057a50607364fee8b481f0feef8

                                                              SHA256

                                                              4c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405

                                                              SHA512

                                                              a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808

                                                            • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\Everything.ini

                                                              Filesize

                                                              20KB

                                                              MD5

                                                              85cb6aa876e8b4240473479c7f050760

                                                              SHA1

                                                              354d94cc84e7e1335b44bb4e57fca6ee1aef1b51

                                                              SHA256

                                                              6a0ef240a1b916fc67ef44d9199b9e296bd3a68bfdd0502abfefdb63c752eec5

                                                              SHA512

                                                              14ed8eda121a2fab9a0717739e630ece71de0f8bf8cdb3e0d1f279a0ee67f33371e4e01947abdd983c834c7bd6c4eed6989527487b788d3e6ea262c7f237dea5

                                                            • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\sdel.exe

                                                              Filesize

                                                              350KB

                                                              MD5

                                                              803df907d936e08fbbd06020c411be93

                                                              SHA1

                                                              4aa4b498ae037a2b0479659374a5c3af5f6b8d97

                                                              SHA256

                                                              e8eaa39e2adfd49ab69d7bb8504ccb82a902c8b48fbc256472f36f41775e594c

                                                              SHA512

                                                              5b9c44b4ed68b632360c66b35442722d2797807c88555c9fde9c176581d410e4f6ed433fabdcd9ee614db458158e6055a9f7f526ebfbc8e7f5f3d388f5de4532

                                                            • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\sdel64.exe

                                                              Filesize

                                                              448KB

                                                              MD5

                                                              e2114b1627889b250c7fd0425ba1bd54

                                                              SHA1

                                                              97412dba3cbeb0125c71b7b2ab194ea2fdff51b2

                                                              SHA256

                                                              5434dfdb731238edcb07a8c3a83594791536dda7a63c29f19be7bb1d59aedd60

                                                              SHA512

                                                              76ca5f677bc8ee1485f3d5b028b3a91f74344e9ff7af3c62a98e737a9888bd35389b3e6bf7b8b67747e0f64e1c973c0708864f12de1388b95f5c31b4e084e2e1

                                                            • C:\Users\Admin\AppData\Local\{E0F1BE03-0AEF-2317-9406-4D53D1C6E3CA}\session.tmp

                                                              Filesize

                                                              32B

                                                              MD5

                                                              e8cb764dda43cde825b772148a9005f5

                                                              SHA1

                                                              7634d3686bc531e8e382a59493024916cdac3c28

                                                              SHA256

                                                              160211a63ccba5381d6f68ef7e49a1dbb3a7c53df4a61fb3d2cbd7b2b011f97f

                                                              SHA512

                                                              ebe6c5f4a6f70cc7bceba30ddbdb2adde53c0a83bc3342ec96cdf722440fba1f8b49bc4d3257c281e9a2cd2f6ea4b87a15f4c0d881be77572187af9307688926

                                                            • memory/468-111-0x0000021DFCE30000-0x0000021DFCE40000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/468-205-0x0000021DFCE30000-0x0000021DFCE40000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/468-108-0x00007FFC92400000-0x00007FFC92EC1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/468-144-0x0000021DFCE30000-0x0000021DFCE40000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/468-109-0x0000021DFCDE0000-0x0000021DFCE02000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/468-208-0x00007FFC92400000-0x00007FFC92EC1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/468-110-0x0000021DFCE30000-0x0000021DFCE40000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/1068-132-0x000002B7B0110000-0x000002B7B0120000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/1068-153-0x00007FFC92400000-0x00007FFC92EC1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/1068-145-0x000002B7B0110000-0x000002B7B0120000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/1068-143-0x00007FFC92400000-0x00007FFC92EC1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/5032-122-0x0000019A393F0000-0x0000019A39400000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/5032-112-0x0000019A393F0000-0x0000019A39400000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/5032-139-0x00007FFC92400000-0x00007FFC92EC1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/5032-152-0x00007FFC92400000-0x00007FFC92EC1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/5032-146-0x0000019A393F0000-0x0000019A39400000-memory.dmp

                                                              Filesize

                                                              64KB