Resubmissions

22-03-2024 00:30

240322-att4ssdf42 10

21-03-2024 22:25

240321-2cbdxaca43 10

Analysis

  • max time kernel
    125s
  • max time network
    285s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-03-2024 22:25

General

  • Target

    43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe

  • Size

    1.8MB

  • MD5

    ed77409c8f8b66f81fae0754ee9d86f7

  • SHA1

    d2500b7585bed8dd179e84f73644a5b2afd8c8e1

  • SHA256

    43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825

  • SHA512

    1208c9dbc61325d2110ba9057ed1a0b4f94103d82fe172a5f40614c3a8d5621f8e04b73784bb70965acd6e38e9fb604e29f52cb8f04f66e5923cd4a06cc9fe92

  • SSDEEP

    24576:GqS02nN1gZ5woLL7hI+b31tDiiMBp9fHfyk21adtXUzXZKktlrfCNK20x2+MI9pN:Wg5wABzD1gf6FIdtXUNDfCN10lV

Malware Config

Extracted

Family

amadey

Version

4.12

C2

http://185.172.128.19

Attributes
  • install_dir

    cd1f156d67

  • install_file

    Utsysc.exe

  • strings_key

    0dd3e5ee91b367c60c9e575983554b30

  • url_paths

    /ghsdh39s/index.php

rc4.plain

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://sajdfue.com/test1/get.php

Attributes
  • extension

    .vook

  • offline_id

    1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1

  • payload_url

    http://sdfjhuz.com/dl/build2.exe

    http://sajdfue.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0857PsawqS

rsa_pubkey.plain

Extracted

Family

vidar

Version

8.4

Botnet

95002d0a9d65ffced363a8f35f42a529

C2

https://steamcommunity.com/profiles/76561199654112719

https://t.me/r2d0s

Attributes
  • profile_id_v2

    95002d0a9d65ffced363a8f35f42a529

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0

Extracted

Family

lumma

C2

https://relevantvoicelesskw.shop/api

https://resergvearyinitiani.shop/api

https://associationokeo.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat 4 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Vidar Stealer 3 IoCs
  • Detect ZGRat V1 3 IoCs
  • Detected Djvu ransomware 16 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
    "C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN 43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe /TR "C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe" /F
      2⤵
      • DcRat
      • Creates scheduled task(s)
      PID:3320
    • C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe
      "C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Users\Admin\AppData\Local\Temp\u29k.0.exe
        "C:\Users\Admin\AppData\Local\Temp\u29k.0.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:652
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\AAKKECFBGI.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3188
          • C:\Users\Admin\AppData\Local\Temp\AAKKECFBGI.exe
            "C:\Users\Admin\AppData\Local\Temp\AAKKECFBGI.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1328
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\AAKKECFBGI.exe
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4960
              • C:\Windows\SysWOW64\PING.EXE
                ping 2.2.2.2 -n 1 -w 3000
                7⤵
                • Runs ping.exe
                PID:4000
      • C:\Users\Admin\AppData\Local\Temp\u29k.1.exe
        "C:\Users\Admin\AppData\Local\Temp\u29k.1.exe"
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
          "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4156
    • C:\Users\Admin\AppData\Local\Temp\1000168001\toolspub1.exe
      "C:\Users\Admin\AppData\Local\Temp\1000168001\toolspub1.exe"
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:304
  • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
    C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2972
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3709.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
      2⤵
        PID:872
    • C:\Users\Admin\AppData\Local\Temp\6D7B.exe
      C:\Users\Admin\AppData\Local\Temp\6D7B.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:32
      • C:\Users\Admin\AppData\Local\Temp\6D7B.exe
        C:\Users\Admin\AppData\Local\Temp\6D7B.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\33c275af-1600-4572-a418-42685e86f684" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          3⤵
          • Modifies file permissions
          PID:4016
        • C:\Users\Admin\AppData\Local\Temp\6D7B.exe
          "C:\Users\Admin\AppData\Local\Temp\6D7B.exe" --Admin IsNotAutoStart IsNotTask
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1656
          • C:\Users\Admin\AppData\Local\Temp\6D7B.exe
            "C:\Users\Admin\AppData\Local\Temp\6D7B.exe" --Admin IsNotAutoStart IsNotTask
            4⤵
            • Executes dropped EXE
            PID:2284
            • C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build2.exe
              "C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build2.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4840
              • C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build2.exe
                "C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build2.exe"
                6⤵
                • Executes dropped EXE
                PID:4436
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 2128
                  7⤵
                  • Program crash
                  PID:3076
            • C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build3.exe
              "C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build3.exe"
              5⤵
              • Executes dropped EXE
              PID:1724
              • C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build3.exe
                "C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build3.exe"
                6⤵
                  PID:3920
                  • C:\Windows\SysWOW64\schtasks.exe
                    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                    7⤵
                    • DcRat
                    • Creates scheduled task(s)
                    PID:352
      • C:\Users\Admin\AppData\Local\Temp\89BF.exe
        C:\Users\Admin\AppData\Local\Temp\89BF.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2776
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
            PID:3652
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            2⤵
              PID:1136
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 1124
                3⤵
                • Program crash
                PID:2144
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 1212
                3⤵
                • Program crash
                PID:1880
          • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
            C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            PID:3140
          • C:\Users\Admin\AppData\Local\Temp\7086.exe
            C:\Users\Admin\AppData\Local\Temp\7086.exe
            1⤵
            • Executes dropped EXE
            PID:3060
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 1040
              2⤵
              • Program crash
              PID:4884
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 1084
              2⤵
              • Program crash
              PID:5092
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7578.bat" "
            1⤵
              PID:3320
              • C:\Windows\system32\reg.exe
                reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
                2⤵
                  PID:3204
              • C:\Users\Admin\AppData\Local\Temp\8C8C.exe
                C:\Users\Admin\AppData\Local\Temp\8C8C.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:3704
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  2⤵
                    PID:1592
                • C:\Users\Admin\AppData\Local\Temp\A082.exe
                  C:\Users\Admin\AppData\Local\Temp\A082.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3452
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    2⤵
                      PID:496
                    • C:\Users\Admin\AppData\Local\Temp\A082.exe
                      "C:\Users\Admin\AppData\Local\Temp\A082.exe"
                      2⤵
                        PID:2532
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          3⤵
                            PID:3208
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                            3⤵
                              PID:1316
                              • C:\Windows\system32\netsh.exe
                                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                4⤵
                                • Modifies Windows Firewall
                                PID:1504
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              3⤵
                                PID:3088
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                3⤵
                                  PID:4956
                                • C:\Windows\rss\csrss.exe
                                  C:\Windows\rss\csrss.exe
                                  3⤵
                                    PID:1504
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -nologo -noprofile
                                      4⤵
                                        PID:1060
                                      • C:\Windows\SYSTEM32\schtasks.exe
                                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                        4⤵
                                        • DcRat
                                        • Creates scheduled task(s)
                                        PID:3844
                                      • C:\Windows\SYSTEM32\schtasks.exe
                                        schtasks /delete /tn ScheduledUpdate /f
                                        4⤵
                                          PID:164
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          powershell -nologo -noprofile
                                          4⤵
                                            PID:3324
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -nologo -noprofile
                                            4⤵
                                              PID:4132
                                            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                              4⤵
                                                PID:3456
                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                4⤵
                                                • DcRat
                                                • Creates scheduled task(s)
                                                PID:2976
                                              • C:\Windows\windefender.exe
                                                "C:\Windows\windefender.exe"
                                                4⤵
                                                  PID:1932
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                    5⤵
                                                      PID:1604
                                                      • C:\Windows\SysWOW64\sc.exe
                                                        sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                        6⤵
                                                        • Launches sc.exe
                                                        PID:4948
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:1280
                                              • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
                                                C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
                                                1⤵
                                                  PID:4512
                                                • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
                                                  1⤵
                                                    PID:4640
                                                  • C:\Windows\windefender.exe
                                                    C:\Windows\windefender.exe
                                                    1⤵
                                                      PID:2328
                                                    • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
                                                      C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
                                                      1⤵
                                                        PID:4428
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                        1⤵
                                                          PID:3604
                                                        • C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
                                                          C:\Users\Admin\AppData\Local\Temp\43b6c8410a80960b00f3785b5123ab440862bdd4496594585c44f4b436ca7825.exe
                                                          1⤵
                                                            PID:2576
                                                          • C:\Users\Admin\AppData\Roaming\cudfduf
                                                            C:\Users\Admin\AppData\Roaming\cudfduf
                                                            1⤵
                                                              PID:3088

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\ProgramData\Are.docx

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              a33e5b189842c5867f46566bdbf7a095

                                                              SHA1

                                                              e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                              SHA256

                                                              5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                              SHA512

                                                              f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              608881bccd83bd848d8e1c5e44052740

                                                              SHA1

                                                              ef6b2e8c88544fc767f62c5e6479929a414faca4

                                                              SHA256

                                                              fe4388c8a609d41bf65a8925f7002372fd327de30af9cbf98c0cdd93d395f7d5

                                                              SHA512

                                                              fa978bb43a9a5a2a5489be9911a0b2c0ea1dc0a3756844a42246121bda728a6cdf5120b0890eb921f8ddf57ab4b07e1d86764566e4ab56dc4bb1191f91974cf3

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                                                              Filesize

                                                              724B

                                                              MD5

                                                              8202a1cd02e7d69597995cabbe881a12

                                                              SHA1

                                                              8858d9d934b7aa9330ee73de6c476acf19929ff6

                                                              SHA256

                                                              58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                                                              SHA512

                                                              97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                              Filesize

                                                              410B

                                                              MD5

                                                              4dc6236e8396a9a2ccba6ba22ea3ef9f

                                                              SHA1

                                                              7068e2137e367ff08f0936ccc100e2202c65966e

                                                              SHA256

                                                              2d9bf25c2702dec5342160aebd9a3f3f618742385f70bf77501e4bf9bcac3d61

                                                              SHA512

                                                              00df5814b2725954264946a76e66f6be2c9ac0085a0f76c164583deaba5b0682d2f9ae2032266d3a37528c1bd6f879b5f9c4fcd42e49480f1d8e19f0daaf9be3

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                                                              Filesize

                                                              392B

                                                              MD5

                                                              2475fd3b961e3b6a901ef05bc0a0823a

                                                              SHA1

                                                              396065d29c521e08f7bebbffb8a1c3e947da0290

                                                              SHA256

                                                              3751a14dddb80463bc974067635bd4937e127ba1e754f8fad2c0a3e829626989

                                                              SHA512

                                                              68f9c0b25a12079ade2a3f7760e3acab40743a3d384aae2ffc656d5f4fffb2ce72266a5362fff6271a17fbc30d40f55ec4f45c78ad8acf869a1d31f1f77b2d4b

                                                            • C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build2.exe

                                                              Filesize

                                                              55KB

                                                              MD5

                                                              15db2266de28fc9c4a3bebc166843c05

                                                              SHA1

                                                              e9d4f950ebbdb842ee4193fd8e5ef3295866c827

                                                              SHA256

                                                              ff73e83e0832648d0a184aa1b1054169cc0064986a154371c6b63ed8b7355432

                                                              SHA512

                                                              ccba126e40f29a7c7524483be53e259786cc29234f34bf1f549f26e2c1e59ad41fe840ad0866123a13292f7ea46e5b6640fe11ace0274962e7f554de56a05e14

                                                            • C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build2.exe

                                                              Filesize

                                                              47KB

                                                              MD5

                                                              5ffe3f5682ffcb833cab3a8056f3c1c6

                                                              SHA1

                                                              190dbccb12cfbe3626c40aea7cb8f1a0c984ba7b

                                                              SHA256

                                                              a5bcd64d0566c77226f916cb18785b9ad945ab83fd2f2c6178d9a6f969df2a18

                                                              SHA512

                                                              a6ccc9a5686cd2a7bef8b128ecc77a75524ee1cf9899e2bb38b8e8d017aee358e0434ead9896444febda74b0f90d6514921032505b0a03026fe0a8f0a5572394

                                                            • C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build2.exe

                                                              Filesize

                                                              83KB

                                                              MD5

                                                              d5c0ae3fb55bd533588096971a9061c2

                                                              SHA1

                                                              40faf1ea0450a34e5d243eca27d97abed33760de

                                                              SHA256

                                                              41f2f81c64c77fd8ed780f320b45a3464c5432f92065202d4515d8d456f62401

                                                              SHA512

                                                              3fa0e996281496f27307f5de6ad819b043bf9e092a726e0bf71de06cc5e9b50ea37da8e7ac34f697c84db5187b05ad8d513d739e0f63fd73e29cec09c3d1e58d

                                                            • C:\Users\Admin\AppData\Local\09ea3bee-5c5e-44b3-8b00-47d1e20efb77\build3.exe

                                                              Filesize

                                                              299KB

                                                              MD5

                                                              41b883a061c95e9b9cb17d4ca50de770

                                                              SHA1

                                                              1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

                                                              SHA256

                                                              fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

                                                              SHA512

                                                              cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

                                                            • C:\Users\Admin\AppData\Local\33c275af-1600-4572-a418-42685e86f684\6D7B.exe

                                                              Filesize

                                                              259KB

                                                              MD5

                                                              4013f30c97da6aefa499907203fb1b0e

                                                              SHA1

                                                              2913a74b37428226b5b372773d73abb6c7d80db5

                                                              SHA256

                                                              27b6f56b8e0db1dd14b5702f034da3a16520cf1aaaf6c143ef1ae1dfadd9ed69

                                                              SHA512

                                                              4a29681b175c2aa471378b6ab04f1deccf223ac30506a2ec60baef6f89bd5124b5cf964ae8aa23fc91782158f1cb1e14ef813d25cd9b90c09babeb7690b0366e

                                                            • C:\Users\Admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat

                                                              Filesize

                                                              985B

                                                              MD5

                                                              31574c2183556c75b422cb4596a7049a

                                                              SHA1

                                                              ce09ba667f90b87f4c63228fcb5f75615a973132

                                                              SHA256

                                                              736754730ef68934226d4238ba213ea2dc21b30f61b7fbdac2f22709d6b12223

                                                              SHA512

                                                              8aceafb0dcb228a3656be3b5aa91347370d56335da8d1dec67051b43f24000986d2de08f3f615c6d0df81b6949162e0894e794986e198825dd39d6127a0420da

                                                            • C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe

                                                              Filesize

                                                              115KB

                                                              MD5

                                                              44f6004025611f7f1475e78c45ede467

                                                              SHA1

                                                              c1aa1a27a72035d45c4f736ea827c739f139898f

                                                              SHA256

                                                              ac21ea1504181c6447cbecf6e80848011401006064b9ce80f5c62023bb187bb6

                                                              SHA512

                                                              04e83dcba3f602f122683ff1f230770507e265fcefd8d1ae6baf785079b173f2b70c51d5c7ae783ae09decb2259c8cc94107a12f0d853f32186871233240fc58

                                                            • C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe

                                                              Filesize

                                                              76KB

                                                              MD5

                                                              d2351c17036b07e5e45aafd15b5a4b84

                                                              SHA1

                                                              b5ef1d5743ddd8b23ea3a3c083070f7c0bb05a27

                                                              SHA256

                                                              b5944a5220d6fa39345131a27837c9f0a8f32519c4178a47a4bbb4b88d9be397

                                                              SHA512

                                                              f0d29cfeca503c360ab059444c4bcf69de7ffcc44deb592f3db6d89130616bb42ae8489594ad1ec8abfcc3b2d29355e7370d82bc1df459f76cc57b8cbeeed683

                                                            • C:\Users\Admin\AppData\Local\Temp\1000167001\ISetup8.exe

                                                              Filesize

                                                              138KB

                                                              MD5

                                                              041657c83d7c9978dbe43d218dc479e6

                                                              SHA1

                                                              951e08f6e9cd689901bd9a88ecb0d5803bfc642a

                                                              SHA256

                                                              eae2cf710205796b54b803e33134c5fa534f3e602ea59fec9b1eefb466603857

                                                              SHA512

                                                              e43478b4037e0fe07e1de933b0cadc8d5def21e6d78e4cb353f09d8973089b29b2393533535623efc6aedb0d6cbedee6eacb8ea7dd922fb51ae3788ce8a0b7e5

                                                            • C:\Users\Admin\AppData\Local\Temp\1000168001\toolspub1.exe

                                                              Filesize

                                                              231KB

                                                              MD5

                                                              8ad1f09f9bd6d1e486898d9b0c60b5f7

                                                              SHA1

                                                              e6c0b8e8a15ee4ed8ed21fc0be618cd39927f225

                                                              SHA256

                                                              d640e24c44544c63b539f4c1ea7bf77b117356fafa1287de0dde8ebd52297f68

                                                              SHA512

                                                              f399f70d552bf0d64f9ba9847d59e229eb50b73ed8082b4056cff99e2e2206a3d26d66d2f36481c90d5fec568ab491e35a65675a1499c5270041a8f88227e4aa

                                                            • C:\Users\Admin\AppData\Local\Temp\3709.bat

                                                              Filesize

                                                              77B

                                                              MD5

                                                              55cc761bf3429324e5a0095cab002113

                                                              SHA1

                                                              2cc1ef4542a4e92d4158ab3978425d517fafd16d

                                                              SHA256

                                                              d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                                                              SHA512

                                                              33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                                                            • C:\Users\Admin\AppData\Local\Temp\6D7B.exe

                                                              Filesize

                                                              694KB

                                                              MD5

                                                              66cae38d3dd49eb51abd43b4d20df5d7

                                                              SHA1

                                                              d08d08bdb702ada3d1497acce915161e45f66282

                                                              SHA256

                                                              856fa56b3353ce942fb919813343d57cbd22e35c7174b58ac376cd575e3e2762

                                                              SHA512

                                                              5deb715d126003aaac662977089a9b6342d1ab848b3150b91c166b4e644910e630d0d40b16572b4c1b4d48330d89e8637d192cb83cddde43c0684a68c128be88

                                                            • C:\Users\Admin\AppData\Local\Temp\6D7B.exe

                                                              Filesize

                                                              456KB

                                                              MD5

                                                              a09a5efcb6504b505a82689135c5394d

                                                              SHA1

                                                              02520b264669ac2283c9f412033911673dab7159

                                                              SHA256

                                                              e40a2265f557ae8268cc2e58c7a62c31b2e089465f4c885d8d4c999439a46b5e

                                                              SHA512

                                                              93957c75cf482ce11121e9604be6a0a9463cff063bc1b33045324ddbc4218010eb6821a45c8b715341123e599d0bcf6e98a1e166b616a4caef6d3eea26528534

                                                            • C:\Users\Admin\AppData\Local\Temp\6D7B.exe

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              4d848873fa4f1e3309a8eb566749d66e

                                                              SHA1

                                                              19f14ad58e83f2e6988c8f376bdff8ee101b5d6a

                                                              SHA256

                                                              f5394aaf0ef8f8cbac47992cf3156519fd77d1481561e85abf0ec4e445eeb1a6

                                                              SHA512

                                                              ae1033d50bce09f71e49651399cfc3740261f24c028f3c205aa7b1ee94084b64dc54345225c448384241def0611fc2e7557a61cf7f24f4b36036708e7a8e1a27

                                                            • C:\Users\Admin\AppData\Local\Temp\6D7B.exe

                                                              Filesize

                                                              152KB

                                                              MD5

                                                              48edde531c98855a939569cfc8404322

                                                              SHA1

                                                              fcfbf27742d4e158d2954d5615546f8951cb61a4

                                                              SHA256

                                                              a8e9c5c942eb6e5e7082abbe1834473a8a6341206e2b054c8fe8edcfc47c9eaa

                                                              SHA512

                                                              16ac4a816c88710ab01cd390bbad97c7bb19ed781a4d4e3b1fdfa84a7a5601b30316446ebf7b318895bb8c2fcaca389549261f894722250835cb5a55deb0e8b2

                                                            • C:\Users\Admin\AppData\Local\Temp\6D7B.exe

                                                              Filesize

                                                              341KB

                                                              MD5

                                                              be5877408b4c6500afcecfa287e3aa56

                                                              SHA1

                                                              39476b9104a96f09734cc237d80e5009dd177d68

                                                              SHA256

                                                              7da4341216461c41ccbaab92a50ae43e387eec6c5cd62eb6f52e29b21bfcf768

                                                              SHA512

                                                              73a2bbc8f0d3af7bc364e682110d6849e1c5f4c92fff531f38147b4c9f6e26db5a9be82c1909604c4e7d8d10890df79d12cbbb137329b70661b12420dfdc9ef3

                                                            • C:\Users\Admin\AppData\Local\Temp\7086.exe

                                                              Filesize

                                                              2.2MB

                                                              MD5

                                                              5ea2783a31e61dc879745a665e51c38d

                                                              SHA1

                                                              fff59be0d75c01f567781766aeb08cbbdc63a029

                                                              SHA256

                                                              73488116ac8ea455a05e2cb81db9d4821705132663943fa5c04296894b0f7f04

                                                              SHA512

                                                              8aa3c9f05a6e0194d25d04dbc350c71fde97233dc5e462b790fd6e6d5b70cb38bec1fbb6363720969eca9aaa7563c815acda74f51c3a6de4ef69b14e309d8fb4

                                                            • C:\Users\Admin\AppData\Local\Temp\7086.exe

                                                              Filesize

                                                              1.9MB

                                                              MD5

                                                              57dda47759511e1a485075620b084a6d

                                                              SHA1

                                                              d588be3c963a4143db652a5ff0a8aae6a94ce429

                                                              SHA256

                                                              22a1ab5440d6e7faef5666d22ca7f67ea4b61dce2db6e99100d81606c611e5a9

                                                              SHA512

                                                              71bcf65f240d1e8949a431404dbfc7259262df9a149dff22fee04036d4ab277b97c7cf0bfafe7ac68e327a6c90b4bfa962ae11fe6d44771e057cc752f2860b9f

                                                            • C:\Users\Admin\AppData\Local\Temp\89BF.exe

                                                              Filesize

                                                              149KB

                                                              MD5

                                                              824197e6c27b269650c8818a4234e053

                                                              SHA1

                                                              0fa1ac50c426474a8a42312e278b1f48f703485c

                                                              SHA256

                                                              9f05399848f83e558fe644cc9534e64562ad90d7bd81e18462485b9e2b2cca2c

                                                              SHA512

                                                              6aadf51b8bc2ce2c7e11e1f6b3180114b50d84a40a6b4266054196a29657c2a271396299c3f2c8f4787ec6f7245a69118210098f3d3abfa5fb134d91d6154851

                                                            • C:\Users\Admin\AppData\Local\Temp\89BF.exe

                                                              Filesize

                                                              172KB

                                                              MD5

                                                              86d8b3243d5c7c224d92f357341f433b

                                                              SHA1

                                                              54b4c4484275ebd2c44555415ae3d799ec191b22

                                                              SHA256

                                                              f16acbd063a73d32230d6924d7950a5ed3ade8425636cb5d5bac56a6681ae58d

                                                              SHA512

                                                              4c0bf724b2e6abe78281b1068cbe4d97714825dab2a61f045ffae2fea5951ab67cd844479d2d0c27bbc903f156ed41f1aed29997a7a5600388d18ee18346d8fe

                                                            • C:\Users\Admin\AppData\Local\Temp\8C8C.exe

                                                              Filesize

                                                              124KB

                                                              MD5

                                                              15e99fef6ef1009225f7c4c6e150be76

                                                              SHA1

                                                              89bc8a468138da2fac12db6a0fb7b93ffd8703c3

                                                              SHA256

                                                              11d03ca1f0e3a488cd6ce3b2db917f470218473ed7cbbe75b1e7bf301ea23269

                                                              SHA512

                                                              3b8ef63d2f08ef6dc0d74e596c23afaa701b22d8dbf52fc1d073b0d285256f340587d9a933d7eb664f2a79df9e0576fa6737a9919304e67150e39e3d51c10480

                                                            • C:\Users\Admin\AppData\Local\Temp\A082.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              1102814a961eec810381ac28cdcde664

                                                              SHA1

                                                              aa9cbfad4df8f0a40252029a78cfd1681c6a982f

                                                              SHA256

                                                              e9a7210a1969ef1e3368b4a4ff31e98c7e9a5a547e5b7ad9048874ab89b268d6

                                                              SHA512

                                                              bf620705a8cdcbc27f90614bb35600a2cfb35477657776e6020404e33f17b0766c5a28bd072405fbeecb73e8899341e3b75e8ac306b342c324e2f263f0efa5c3

                                                            • C:\Users\Admin\AppData\Local\Temp\A082.exe

                                                              Filesize

                                                              3.5MB

                                                              MD5

                                                              60c7e1b1a242996c6dacc9e634616498

                                                              SHA1

                                                              625c90ff16010adbb7919b706491b850effb8537

                                                              SHA256

                                                              22c0f9e1bd8575f187c7c8c958098b447dee0a7c7675ef166185f0139dee0a89

                                                              SHA512

                                                              b7452767e367b1ffa28a411ac82db978d2f0ffd015ba8180aa30d96706b5faea134e17a491c143ade1f9018b386befebe213c2113ffede857fdf1e9027555358

                                                            • C:\Users\Admin\AppData\Local\Temp\A082.exe

                                                              Filesize

                                                              4.1MB

                                                              MD5

                                                              105f3de24a97884559ba933061f7c46c

                                                              SHA1

                                                              3088f13998ee97020394f584a76c05a48c3ca073

                                                              SHA256

                                                              c59efa3d6fe0d425b42bfc950fa83b307058c704eb896376e93f346c2cb818be

                                                              SHA512

                                                              69420543ee5cecd1cb98e34e6293238394a01118ff94b324dc48ccc2c3d060f6d0002fa805d05611c99892c6769e095fdf3093f53cc8f3f320912baad07102d3

                                                            • C:\Users\Admin\AppData\Local\Temp\AAKKECFBGI.exe

                                                              Filesize

                                                              101KB

                                                              MD5

                                                              42b838cf8bdf67400525e128d917f6e0

                                                              SHA1

                                                              a578f6faec738912dba8c41e7abe1502c46d0cae

                                                              SHA256

                                                              0e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d

                                                              SHA512

                                                              f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0

                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u1sauccr.bre.ps1

                                                              Filesize

                                                              1B

                                                              MD5

                                                              c4ca4238a0b923820dcc509a6f75849b

                                                              SHA1

                                                              356a192b7913b04c54574d18c28d46e6395428ab

                                                              SHA256

                                                              6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                              SHA512

                                                              4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                              Filesize

                                                              281KB

                                                              MD5

                                                              d98e33b66343e7c96158444127a117f6

                                                              SHA1

                                                              bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                              SHA256

                                                              5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                              SHA512

                                                              705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                            • C:\Users\Admin\AppData\Local\Temp\u29k.0.exe

                                                              Filesize

                                                              35KB

                                                              MD5

                                                              fc2a0d37d6be67007970a7472e2fd30d

                                                              SHA1

                                                              a004f0f67fecb96cea13d05605ca7537d43d6c13

                                                              SHA256

                                                              acc0dcf2374e39b051e5b387dfb632d6265a308fc55409d39832e80e46ad99da

                                                              SHA512

                                                              cfc0fd667cdea97c34c610f3e451e20cfb05af3057968877d9acc953a095d235673463f2cb92816fbc60445559928c3f647cd797b0a439a1d0e3511e76d8d7ba

                                                            • C:\Users\Admin\AppData\Local\Temp\u29k.0.exe

                                                              Filesize

                                                              261KB

                                                              MD5

                                                              606625739201aa74813d211613b2aa82

                                                              SHA1

                                                              4409efa953358e31d940d698470bd0e2d952e8a7

                                                              SHA256

                                                              848e37628e8301c0845cab2eab491e49995db81fec86dec3841af2fc6ee584e2

                                                              SHA512

                                                              d6c1dff70bec93e54a1fa4dc420a2e1ca78955d9b5e1f25324732cb55dbe79642a949d5ffe7218d3b9e6534287f9924286d0eaa765cfd73b5f52f84924ef99f1

                                                            • C:\Users\Admin\AppData\Local\Temp\u29k.1.exe

                                                              Filesize

                                                              175KB

                                                              MD5

                                                              be6898b8ba85fd78a8f2a2c2a2b3c344

                                                              SHA1

                                                              a411f88965b5aa8c2ac023b2c88e415c900559d4

                                                              SHA256

                                                              51d69b0d5c5415665d16ac0eaa276b8e843f4a069ef07f6aeee028264871bd89

                                                              SHA512

                                                              2e36f3362772c2c47e4c1f08c0d8a41617eace13dd1421b3c68f16c81fcff83aa1fe42b39322abae8b55f7272725ef3d4957e6fdbe1d37a9bb306036e370d738

                                                            • C:\Users\Admin\AppData\Roaming\cudfduf

                                                              Filesize

                                                              216KB

                                                              MD5

                                                              eefda5058ba47fcf6814933a7c888e95

                                                              SHA1

                                                              64d9883a4010fadf740f1de698077ce0acd2adaa

                                                              SHA256

                                                              6e9702d3030bb0ddb97a6ff4e92bc059808be6457220bcff38f925b851982882

                                                              SHA512

                                                              014ffc27ca7a6b77f23c5a52447647322276124c8b833440f31f95c178877af7ca918d7309b47f74424c780985ff1664ac1d986220dc09013e688f0c092e717d

                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              1c19c16e21c97ed42d5beabc93391fc5

                                                              SHA1

                                                              8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                                              SHA256

                                                              1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                                              SHA512

                                                              7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                              Filesize

                                                              18KB

                                                              MD5

                                                              5cf658688247efa9a0470e95c5deb865

                                                              SHA1

                                                              e2155775d41d5555ec349f65196076333b54e70c

                                                              SHA256

                                                              95e65885674bd3b70d6628832ed4b1c39d1d2286a73904d783923d8d66a7bc4a

                                                              SHA512

                                                              392782e5f756ee316f26e3de2c2833be7dd9a7a85e437fa94045dcccc65cfa23e86e3ca6c8a38608bdff78b174fe2523d6242cab5b2f7cc5b40a7dcb02675804

                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                              Filesize

                                                              18KB

                                                              MD5

                                                              e73867c86e2b3c8492fbdf3725f5ff3a

                                                              SHA1

                                                              8f8016c9dea9b33d8b994473760a356bd9b6e0fa

                                                              SHA256

                                                              ff39a763279b683f955846e722261c5c3b110104e15edcf029f3aa3d2b6e1369

                                                              SHA512

                                                              589cde370ad3fdd6e704c1d4f9e11620056a993e7de284144169a2615a535ba05d3d42f2f03312be0d25dded426b499c120034a2b0897a8883d9e2049fbf2463

                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                              Filesize

                                                              18KB

                                                              MD5

                                                              0a46b5d6840b261abe30dc3fb1bc78b8

                                                              SHA1

                                                              7825f285ddf29806a728f70d2f8732482bd69de7

                                                              SHA256

                                                              2dc95b3da9784c92e35b50e3c1c172dc94ad3f07406e44107c1a677012c3f67a

                                                              SHA512

                                                              087bf906148d44062d84911c0b1eb0e47bd3938cf893adb5f33b63f4690c51499033a6f61be8d32ab816fcee371a7da0338194f047658f0ba4033c8f0194fec6

                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                              Filesize

                                                              18KB

                                                              MD5

                                                              871ae7752819ec11c56c0254e158c2e0

                                                              SHA1

                                                              de458c29d91d73581062cfa93f3d4289f3f07b31

                                                              SHA256

                                                              83c22f1e5124209b21f185690a798e7eb922127a4057e0d95e11788655df7b1f

                                                              SHA512

                                                              fa9a3b687fd09332165f3ebf08b720570854b388e3458410999457d895f56ba079cf5d33545e489f36bd606111276a35ee036c34adb1234272a1932f2494217f

                                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                              Filesize

                                                              18KB

                                                              MD5

                                                              5b6cc14e3f9746d8a9b65771d7ad298f

                                                              SHA1

                                                              3d9eeefdff42dbb727560c83e809afef7db31767

                                                              SHA256

                                                              25cd50a56c44df53b3440fa8ac4132ba9f28ac3972b611fac118eb8e212cb63c

                                                              SHA512

                                                              f5f1a3910a0cb1efedf295fc9b87b4f3084fe16bf49f379c2403bb33b615bf86e2819f70c8cba2592730d545f67c0b32073d182c3b9028360a584d9bafb6956a

                                                            • C:\Windows\rss\csrss.exe

                                                              Filesize

                                                              2.5MB

                                                              MD5

                                                              b15d5541f9a22d572857e9390e6de1ae

                                                              SHA1

                                                              9f63a6f7d635e868e5b714899c8abc1be6ac9461

                                                              SHA256

                                                              819de2ce29b15e8c8652daea25852c22d0a25e1d9c5db864e7dc902029608650

                                                              SHA512

                                                              5150c14234c2aeae82d97904181fe6e2d6bbb901a8cd5edcbfb383bc83f88af3aed984e832a354af993dbb5c280c5ddcaed68746f5bad5e7af6a32b54e30a1ac

                                                            • C:\Windows\rss\csrss.exe

                                                              Filesize

                                                              2.3MB

                                                              MD5

                                                              e3d1a53c5c2520289a4d90ffc34d2dac

                                                              SHA1

                                                              d07c1bf357faa58fd7e7963af87cedd2cf46a2b7

                                                              SHA256

                                                              1c0fe0072699144b05370175e06fda792c93c50a7475bab751da22a574f0a45c

                                                              SHA512

                                                              c02a013ad6932cd7f06256eee91f73d779755c71aee9657d299a200581e85233e45c1e5ad4f5c89e18a8dec54f558479fb9238283053e98d9ef2091c49b6dd89

                                                            • C:\Windows\windefender.exe

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              8e67f58837092385dcf01e8a2b4f5783

                                                              SHA1

                                                              012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                              SHA256

                                                              166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                              SHA512

                                                              40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                            • \??\c:\users\admin\appdata\local\temp\u29k.1.exe

                                                              Filesize

                                                              684KB

                                                              MD5

                                                              30d795fde46100de122415462a9109fc

                                                              SHA1

                                                              de12905d1f6f56e4fcc8ec1af0628b1f18d7f346

                                                              SHA256

                                                              e82293117f921356eb9e0101820cfa6b0afa8348078b3c01b2faf6252d708ae0

                                                              SHA512

                                                              774b0501fee5384452a1b9df78fb4d05f8bfd6ec67b30824f5320935151a17609aeea04dac00162aea7b907cb6fee5fd26076629301d14792017c82b2641281d

                                                            • \ProgramData\mozglue.dll

                                                              Filesize

                                                              593KB

                                                              MD5

                                                              c8fd9be83bc728cc04beffafc2907fe9

                                                              SHA1

                                                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                              SHA256

                                                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                              SHA512

                                                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                            • \ProgramData\nss3.dll

                                                              Filesize

                                                              597KB

                                                              MD5

                                                              cda008017efca5318e15d4180b8ec2ff

                                                              SHA1

                                                              35c40d4ff864975e69bb8aac91f6eb2766a36052

                                                              SHA256

                                                              d5aab49883d19d1a1e2484a0505ad4b27adce5e02e0c6d5917abcee6b68ad31f

                                                              SHA512

                                                              9cbc43e7bd69d21cec968244726e78f71f22b404a77d7e377c2c9212b65ed01608cc3b6fe61278c7337473c9484c2fe1929531fd6fc6cfe9e47a7e6b6d060908

                                                            • memory/32-213-0x00000000021F0000-0x000000000228F000-memory.dmp

                                                              Filesize

                                                              636KB

                                                            • memory/32-215-0x00000000023D0000-0x00000000024EB000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/304-52-0x00000000005A0000-0x00000000005AB000-memory.dmp

                                                              Filesize

                                                              44KB

                                                            • memory/304-51-0x0000000000750000-0x0000000000850000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/304-99-0x0000000000400000-0x000000000053E000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/304-53-0x0000000000400000-0x000000000053E000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/652-184-0x0000000000400000-0x000000000063B000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/652-187-0x0000000000400000-0x000000000063B000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/652-108-0x0000000000400000-0x000000000063B000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/652-54-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                              Filesize

                                                              972KB

                                                            • memory/652-111-0x0000000000870000-0x0000000000970000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/652-36-0x0000000000400000-0x000000000063B000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/652-34-0x0000000000870000-0x0000000000970000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/652-35-0x0000000000840000-0x0000000000867000-memory.dmp

                                                              Filesize

                                                              156KB

                                                            • memory/1136-300-0x0000000000400000-0x000000000044A000-memory.dmp

                                                              Filesize

                                                              296KB

                                                            • memory/1136-297-0x0000000000400000-0x000000000044A000-memory.dmp

                                                              Filesize

                                                              296KB

                                                            • memory/1328-194-0x00000000057B0000-0x00000000057C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/1328-193-0x00000000712C0000-0x00000000719AE000-memory.dmp

                                                              Filesize

                                                              6.9MB

                                                            • memory/1328-191-0x0000000000FE0000-0x0000000000FFE000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/1656-255-0x0000000000690000-0x000000000072A000-memory.dmp

                                                              Filesize

                                                              616KB

                                                            • memory/2284-341-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2284-283-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2284-260-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2284-259-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2284-267-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2284-266-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2284-286-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2284-307-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2284-285-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2284-261-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2360-125-0x00000000009E0000-0x00000000009E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2360-222-0x0000000000400000-0x00000000008AD000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2360-192-0x0000000000400000-0x00000000008AD000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2936-26-0x00000000021C0000-0x000000000222F000-memory.dmp

                                                              Filesize

                                                              444KB

                                                            • memory/2936-27-0x0000000000400000-0x000000000056B000-memory.dmp

                                                              Filesize

                                                              1.4MB

                                                            • memory/2936-107-0x0000000000400000-0x000000000056B000-memory.dmp

                                                              Filesize

                                                              1.4MB

                                                            • memory/2936-109-0x0000000000650000-0x0000000000750000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/2936-124-0x0000000000400000-0x000000000056B000-memory.dmp

                                                              Filesize

                                                              1.4MB

                                                            • memory/2936-25-0x0000000000650000-0x0000000000750000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/2972-91-0x0000000004CD0000-0x0000000004CD1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2972-85-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2972-83-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2972-87-0x0000000004D00000-0x0000000004D01000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2972-90-0x0000000004CC0000-0x0000000004CC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2972-89-0x0000000004D20000-0x0000000004D21000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2972-86-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2972-88-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3416-98-0x0000000000F50000-0x0000000000F66000-memory.dmp

                                                              Filesize

                                                              88KB

                                                            • memory/4148-241-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/4148-219-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/4148-218-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/4148-217-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/4148-214-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/4156-271-0x0000027620CF0000-0x0000027620CF8000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/4156-240-0x000002761C3B0000-0x000002761C3BA000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/4156-246-0x000002761CA10000-0x000002761CA8A000-memory.dmp

                                                              Filesize

                                                              488KB

                                                            • memory/4156-270-0x00000276039B0000-0x00000276039C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4156-269-0x00000276039B0000-0x00000276039C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4156-272-0x0000027621380000-0x00000276213B8000-memory.dmp

                                                              Filesize

                                                              224KB

                                                            • memory/4156-273-0x0000027621670000-0x000002762167A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/4156-274-0x0000027621680000-0x00000276216A2000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/4156-275-0x0000027621BE0000-0x0000027622106000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/4156-245-0x000002761C3D0000-0x000002761C3FA000-memory.dmp

                                                              Filesize

                                                              168KB

                                                            • memory/4156-242-0x000002761C960000-0x000002761CA12000-memory.dmp

                                                              Filesize

                                                              712KB

                                                            • memory/4156-268-0x00000276039B0000-0x00000276039C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4156-237-0x000002761C380000-0x000002761C3A4000-memory.dmp

                                                              Filesize

                                                              144KB

                                                            • memory/4156-235-0x00000276039F0000-0x0000027603A04000-memory.dmp

                                                              Filesize

                                                              80KB

                                                            • memory/4156-229-0x0000027603A00000-0x0000027603A0C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/4156-228-0x00000276039E0000-0x00000276039F0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4156-247-0x000002761CA90000-0x000002761CAF2000-memory.dmp

                                                              Filesize

                                                              392KB

                                                            • memory/4156-227-0x000002761C620000-0x000002761C72E000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/4156-226-0x00000276039B0000-0x00000276039C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4156-225-0x0000027600000000-0x00000276038D2000-memory.dmp

                                                              Filesize

                                                              56.8MB

                                                            • memory/4156-254-0x000002761CBF0000-0x000002761CEF0000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/4156-224-0x00007FFE60C60000-0x00007FFE6164C000-memory.dmp

                                                              Filesize

                                                              9.9MB

                                                            • memory/4156-248-0x000002761CB70000-0x000002761CBE6000-memory.dmp

                                                              Filesize

                                                              472KB

                                                            • memory/4156-249-0x00000276039C0000-0x00000276039CA000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/4436-317-0x0000000000400000-0x0000000000644000-memory.dmp

                                                              Filesize

                                                              2.3MB

                                                            • memory/4436-322-0x0000000000400000-0x0000000000644000-memory.dmp

                                                              Filesize

                                                              2.3MB

                                                            • memory/4436-345-0x0000000000400000-0x0000000000644000-memory.dmp

                                                              Filesize

                                                              2.3MB

                                                            • memory/4828-0-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4828-84-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4828-356-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4828-304-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4828-158-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4828-110-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4828-106-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4828-102-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4828-344-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4828-212-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4828-2-0x0000000000280000-0x000000000074B000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4828-3-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4828-4-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4828-5-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4828-6-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4828-8-0x0000000004B90000-0x0000000004B91000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4828-9-0x0000000004C00000-0x0000000004C01000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4828-10-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4828-7-0x0000000004B80000-0x0000000004B81000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4828-1-0x0000000077384000-0x0000000077385000-memory.dmp

                                                              Filesize

                                                              4KB