Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2024, 21:07

General

  • Target

    PandaPasswords.rar

  • Size

    7.2MB

  • MD5

    25399c8e2ca04e3c3c4180687997a316

  • SHA1

    e6ae53c6a74bf607144515a8a492f164d86d6472

  • SHA256

    eb72729b713882d6fa23e0c25a0b3e734f281d44fac179d7b9e898c169ee1e46

  • SHA512

    4171b322bb51bfc87473799c64a711669faa7418a61ddc92fb18583a41fb30fac86df22dd1f8b54e6f645983cceda058878b7518a60cb29d15dc4efb2bc49848

  • SSDEEP

    196608:P5MyK24Jg2SRJ1FJXBdkTRDq+c1UpEEyDktlxEdlD4:PRK24J23NU4+c+2RDoMZ4

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 34 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\PandaPasswords.rar
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\PandaPasswords.rar"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1788
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=3112,i,1786399861560734457,5606877702857066305,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2216
    • C:\Users\Admin\Desktop\PandaPasswords.exe
      "C:\Users\Admin\Desktop\PandaPasswords.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Users\Admin\Desktop\PandaPasswords.exe
        "C:\Users\Admin\Desktop\PandaPasswords.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2356
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\PandaPasswords.exe'"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2072
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\PandaPasswords.exe'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3572
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4132
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4892
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Please open file as an administrator', 0, 'error 404', 0+16);close()""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:780
          • C:\Windows\system32\mshta.exe
            mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Please open file as an administrator', 0, 'error 404', 0+16);close()"
            4⤵
              PID:2904
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1076
            • C:\Windows\system32\tasklist.exe
              tasklist /FO LIST
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:1852
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4244
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic csproduct get uuid
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3352
      • C:\Users\Admin\Desktop\PandaPasswords.exe
        "C:\Users\Admin\Desktop\PandaPasswords.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4168
        • C:\Users\Admin\Desktop\PandaPasswords.exe
          "C:\Users\Admin\Desktop\PandaPasswords.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\PandaPasswords.exe'"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4700
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\PandaPasswords.exe'
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4996
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4944
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4876
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Please open file as an administrator', 0, 'error 404', 0+16);close()""
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4708
            • C:\Windows\system32\mshta.exe
              mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Please open file as an administrator', 0, 'error 404', 0+16);close()"
              4⤵
                PID:1120
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1852
              • C:\Windows\system32\tasklist.exe
                tasklist /FO LIST
                4⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:1364
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1940
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic csproduct get uuid
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3788

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          d85ba6ff808d9e5444a4b369f5bc2730

          SHA1

          31aa9d96590fff6981b315e0b391b575e4c0804a

          SHA256

          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

          SHA512

          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          944B

          MD5

          d28a889fd956d5cb3accfbaf1143eb6f

          SHA1

          157ba54b365341f8ff06707d996b3635da8446f7

          SHA256

          21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

          SHA512

          0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\VCRUNTIME140.dll

          Filesize

          106KB

          MD5

          49c96cecda5c6c660a107d378fdfc3d4

          SHA1

          00149b7a66723e3f0310f139489fe172f818ca8e

          SHA256

          69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc

          SHA512

          e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\_bz2.pyd

          Filesize

          48KB

          MD5

          c413931b63def8c71374d7826fbf3ab4

          SHA1

          8b93087be080734db3399dc415cc5c875de857e2

          SHA256

          17bfa656cabf7ef75741003497a1c315b10237805ff171d44625a04c16532293

          SHA512

          7dc45e7e5ed35cc182de11a1b08c066918920a6879ff8e37b6bfbdd7d40bffa39ea4aca778aa8afb99c81a365c51187db046bceb938ce9ace0596f1cf746474f

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\_ctypes.pyd

          Filesize

          58KB

          MD5

          00f75daaa7f8a897f2a330e00fad78ac

          SHA1

          44aec43e5f8f1282989b14c4e3bd238c45d6e334

          SHA256

          9ffadcb2c40ae6b67ab611acc09e050bbe544672cf05e8402a7aa3936326de1f

          SHA512

          f222f0ebf16a5c6d16aa2fba933034e692e26e81fea4d8b008259aff4102fe8acf3807f3b016c24002daa15bb8778d7fef20f4ae1206d5a6e226f7336d4da5d4

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\_decimal.pyd

          Filesize

          106KB

          MD5

          e3fb8bf23d857b1eb860923ccc47baa5

          SHA1

          46e9d5f746c047e1b2fefaaf8d3ec0f2c56c42f0

          SHA256

          7da13df1f416d3ffd32843c895948e460af4dc02cf05c521909555061ed108e3

          SHA512

          7b0a1fc00c14575b8f415fadc2078bebd157830887dc5b0c4414c8edfaf9fc4a65f58e5cceced11252ade4e627bf17979db397f4f0def9a908efb2eb68cd645c

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\_hashlib.pyd

          Filesize

          35KB

          MD5

          b227bf5d9fec25e2b36d416ccd943ca3

          SHA1

          4fae06f24a1b61e6594747ec934cbf06e7ec3773

          SHA256

          d42c3550e58b9aa34d58f709dc65dc4ee6eea83b651740822e10b0aa051df1d7

          SHA512

          c6d7c5a966c229c4c7042ef60015e3333dab86f83c230c97b8b1042231fdb2a581285a5a08c33ad0864c6bd82f5a3298964ab317736af8a43e7caa7669298c3e

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\_lzma.pyd

          Filesize

          85KB

          MD5

          542eab18252d569c8abef7c58d303547

          SHA1

          05eff580466553f4687ae43acba8db3757c08151

          SHA256

          d2a7111feeaacac8b3a71727482565c46141cc7a5a3d837d8349166bea5054c9

          SHA512

          b7897b82f1aa9d5aa895c3de810dab1aa335fdf7223e4ff29b32340ad350d9be6b145f95a71c7bc7c88c8df77c3f04853ae4d6f0d5a289721fc1468ecba3f958

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\_queue.pyd

          Filesize

          25KB

          MD5

          347d6a8c2d48003301032546c140c145

          SHA1

          1a3eb60ad4f3da882a3fd1e4248662f21bd34193

          SHA256

          e71803913b57c49f4ce3416ec15dc8a9e5c14f8675209624e76cd71b0319b192

          SHA512

          b1fdb46b80bb4a39513685781d563a7d55377e43e071901930a13c3e852d0042a5302cd238ddf6ea4d35ceee5a613c96996bffad2da3862673a0d27e60ff2c06

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\_socket.pyd

          Filesize

          43KB

          MD5

          1a34253aa7c77f9534561dc66ac5cf49

          SHA1

          fcd5e952f8038a16da6c3092183188d997e32fb9

          SHA256

          dc03d32f681634e682b02e9a60fdfce420db9f26754aefb9a58654a064dc0f9f

          SHA512

          ff9eeb4ede4b4dd75c67fab30d0dec462b8af9ca6adc1dcae58f0d169c55a98d85bb610b157f17077b8854ec15af4dfab2f0d47fa9bc463e5b2449979a50293a

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\_sqlite3.pyd

          Filesize

          56KB

          MD5

          1a8fdc36f7138edcc84ee506c5ec9b92

          SHA1

          e5e2da357fe50a0927300e05c26a75267429db28

          SHA256

          8e4b9da9c95915e864c89856e2d7671cd888028578a623e761aeac2feca04882

          SHA512

          462a8f995afc4cf0e041515f0f68600dfd0b0b1402be7945d60e2157ffd4e476cf2ae9cdc8df9595f0fe876994182e3e43773785f79b20c6df08c8a8c47fffa0

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\_ssl.pyd

          Filesize

          65KB

          MD5

          f9cc7385b4617df1ddf030f594f37323

          SHA1

          ebceec12e43bee669f586919a928a1fd93e23a97

          SHA256

          b093aa2e84a30790abeee82cf32a7c2209978d862451f1e0b0786c4d22833cb6

          SHA512

          3f362c8a7542212d455f1f187e24f63c6190e564ade0f24561e7e20375a1f15eb36bd8dce9fdaafdab1d6b348a1c6f7cddb9016e4f3535b49136550bc23454fb

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\base_library.zip

          Filesize

          1.4MB

          MD5

          32ede00817b1d74ce945dcd1e8505ad0

          SHA1

          51b5390db339feeed89bffca925896aff49c63fb

          SHA256

          4a73d461851b484d213684f0aadf59d537cba6fe7e75497e609d54c9f2ba5d4a

          SHA512

          a0e070b2ee1347e85f37e9fd589bc8484f206fa9c8f4020de147b815d2041293551e3a14a09a6eb4050cfa1f74843525377e1a99bbdcfb867b61ebddb89f21f7

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\blank.aes

          Filesize

          115KB

          MD5

          5953aedeeaf2f453053852bf5b1b61bb

          SHA1

          53ccf69d307eda674e83de04c2bab4e9447754d0

          SHA256

          fe0eba21ab0fd845dada21e0e99ce357f79a93d8a9e1798960bfe545a3cc9d62

          SHA512

          faff5cfb4321666a116aeb7cb8f9a08bffa8852c041638e70a508aa329adce28cb2391cea9480085a1fde4cf42cc5edef0fedeb86fc9fe337e0152a1a14077df

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\blank.aes

          Filesize

          115KB

          MD5

          29991b735ce41ec3719445854b42733e

          SHA1

          53f77663dac39d1b309cfdd43285bd311e2ab3a5

          SHA256

          2cb25b166fbeb621b99820f3505e2fc4febcda6978ae14d30a9c4479312b5c47

          SHA512

          2bd00599c13a3cb9e2e75242800fd854deef3608f3a0116be04f83eb7fadf53026a2affb519ee04a9e2c54d4150342223ef6a5a18001b5a7491e4e52550a1ac7

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\libcrypto-3.dll

          Filesize

          1.6MB

          MD5

          78ebd9cb6709d939e4e0f2a6bbb80da9

          SHA1

          ea5d7307e781bc1fa0a2d098472e6ea639d87b73

          SHA256

          6a8c458e3d96f8dd3bf6d3cacc035e38edf7f127eee5563b51f8c8790ced0b3e

          SHA512

          b752769b3de4b78905b0326b5270091642ac89ff204e9e4d78670791a1fa211a54d777aeef59776c21f854c263add163adaef6a81b166190518cfaaf4e2e4122

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\libffi-8.dll

          Filesize

          29KB

          MD5

          08b000c3d990bc018fcb91a1e175e06e

          SHA1

          bd0ce09bb3414d11c91316113c2becfff0862d0d

          SHA256

          135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

          SHA512

          8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\libssl-3.dll

          Filesize

          223KB

          MD5

          bf4a722ae2eae985bacc9d2117d90a6f

          SHA1

          3e29de32176d695d49c6b227ffd19b54abb521ef

          SHA256

          827fdb184fdcde9223d09274be780fe4fe8518c15c8fc217748ad5fd5ea0f147

          SHA512

          dd83b95967582152c7b5581121e6b69a07073e7a76fe87975742bb0fd7ecef7494ec940dba914364034cc4e3f623be98cc887677b65c208f14a2a9fc7497ca73

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\python311.dll

          Filesize

          1.6MB

          MD5

          5f6fd64ec2d7d73ae49c34dd12cedb23

          SHA1

          c6e0385a868f3153a6e8879527749db52dce4125

          SHA256

          ff9f102264d1944fbfae2ba70e7a71435f51a3e8c677fd970b621c4c9ea71967

          SHA512

          c4be2d042c6e4d22e46eacfd550f61b8f55814bfe41d216a4df48382247df70bc63151068513855aa78f9b3d2f10ba6a824312948324c92de6dd0f6af414e8ab

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\rar.exe

          Filesize

          615KB

          MD5

          9c223575ae5b9544bc3d69ac6364f75e

          SHA1

          8a1cb5ee02c742e937febc57609ac312247ba386

          SHA256

          90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

          SHA512

          57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\rarreg.key

          Filesize

          456B

          MD5

          4531984cad7dacf24c086830068c4abe

          SHA1

          fa7c8c46677af01a83cf652ef30ba39b2aae14c3

          SHA256

          58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

          SHA512

          00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\select.pyd

          Filesize

          25KB

          MD5

          45d5a749e3cd3c2de26a855b582373f6

          SHA1

          90bb8ac4495f239c07ec2090b935628a320b31fc

          SHA256

          2d15c2f311528440aa29934920fb0b015eaf8cbe3b3c9ad08a282a2d6ba68876

          SHA512

          c7a641d475a26712652a84b8423155ca347e0ec0155bd257c200225a64752453e4763b8885d8fb043b30e92ae023a501fff04777ba5cfe54da9a68071f25fbea

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\sqlite3.dll

          Filesize

          622KB

          MD5

          dbc64142944210671cca9d449dab62e6

          SHA1

          a2a2098b04b1205ba221244be43b88d90688334c

          SHA256

          6e6b6f7df961c119692f6c1810fbfb7d40219ea4e5b2a98c413424cf02dce16c

          SHA512

          3bff546482b87190bb2a499204ab691532aa6f4b4463ab5c462574fc3583f9fc023c1147d84d76663e47292c2ffc1ed1cb11bdb03190e13b6aa432a1cef85c4b

        • C:\Users\Admin\AppData\Local\Temp\_MEI16122\unicodedata.pyd

          Filesize

          295KB

          MD5

          8c42fcc013a1820f82667188e77be22d

          SHA1

          fba7e4e0f86619aaf2868cedd72149e56a5a87d4

          SHA256

          0e00b0e896457ecdc6ef85a8989888ccfbf05ebd8d8a1c493946a2f224b880c2

          SHA512

          3a028443747d04d05fdd3982bb18c52d1afee2915a90275264bf5db201bd4612090914c7568f870f0af7dfee850c554b3fec9d387334d53d03da6426601942b4

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_unhmmfbx.f15.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\Desktop\PandaPasswords.exe

          Filesize

          7.3MB

          MD5

          eb85e045fdac135518267df9624b4d35

          SHA1

          dbb3d1385befffec62d79ff7121be1bcdb7eb67e

          SHA256

          a60ad41c9fce38669db19e3a5e15977c2f66b1948b9bcac51514c3d2747a258c

          SHA512

          e0c6563ead4734531366c2ab8cbe26e66dbf4422b0df44c54a2c07db65d7fbb83e7c50cc511b3d82941f126a21c735eb76531c44ce47ddaf8d464cc333f30909

        • memory/1216-238-0x00007FFBA4B20000-0x00007FFBA4B4D000-memory.dmp

          Filesize

          180KB

        • memory/1216-199-0x00007FFB926F0000-0x00007FFB9280C000-memory.dmp

          Filesize

          1.1MB

        • memory/1216-243-0x00007FFBA64A0000-0x00007FFBA64AD000-memory.dmp

          Filesize

          52KB

        • memory/1216-245-0x00007FFB93650000-0x00007FFB9371D000-memory.dmp

          Filesize

          820KB

        • memory/1216-246-0x00007FFB91BA0000-0x00007FFB920C0000-memory.dmp

          Filesize

          5.1MB

        • memory/1216-241-0x00007FFB93920000-0x00007FFB93A97000-memory.dmp

          Filesize

          1.5MB

        • memory/1216-242-0x00007FFBA4310000-0x00007FFBA4329000-memory.dmp

          Filesize

          100KB

        • memory/1216-239-0x00007FFBA48C0000-0x00007FFBA48D9000-memory.dmp

          Filesize

          100KB

        • memory/1216-240-0x00007FFBA4850000-0x00007FFBA4873000-memory.dmp

          Filesize

          140KB

        • memory/1216-237-0x00007FFBA6670000-0x00007FFBA667F000-memory.dmp

          Filesize

          60KB

        • memory/1216-236-0x00007FFBA4B50000-0x00007FFBA4B73000-memory.dmp

          Filesize

          140KB

        • memory/1216-247-0x00007FFBA4160000-0x00007FFBA4174000-memory.dmp

          Filesize

          80KB

        • memory/1216-235-0x00007FFB92810000-0x00007FFB92DF9000-memory.dmp

          Filesize

          5.9MB

        • memory/1216-229-0x00007FFBA4850000-0x00007FFBA4873000-memory.dmp

          Filesize

          140KB

        • memory/1216-228-0x00007FFBA4B20000-0x00007FFBA4B4D000-memory.dmp

          Filesize

          180KB

        • memory/1216-226-0x00007FFBA4B50000-0x00007FFBA4B73000-memory.dmp

          Filesize

          140KB

        • memory/1216-224-0x00007FFB92810000-0x00007FFB92DF9000-memory.dmp

          Filesize

          5.9MB

        • memory/1216-244-0x00007FFB9F260000-0x00007FFB9F293000-memory.dmp

          Filesize

          204KB

        • memory/1216-198-0x00007FFBA4CF0000-0x00007FFBA4CFD000-memory.dmp

          Filesize

          52KB

        • memory/1216-197-0x00007FFBA4160000-0x00007FFBA4174000-memory.dmp

          Filesize

          80KB

        • memory/1216-196-0x00007FFB91BA0000-0x00007FFB920C0000-memory.dmp

          Filesize

          5.1MB

        • memory/1216-195-0x00000244F3780000-0x00000244F3CA0000-memory.dmp

          Filesize

          5.1MB

        • memory/1216-194-0x00007FFB93650000-0x00007FFB9371D000-memory.dmp

          Filesize

          820KB

        • memory/1216-193-0x00007FFB9F260000-0x00007FFB9F293000-memory.dmp

          Filesize

          204KB

        • memory/1216-192-0x00007FFBA64A0000-0x00007FFBA64AD000-memory.dmp

          Filesize

          52KB

        • memory/1216-191-0x00007FFBA4310000-0x00007FFBA4329000-memory.dmp

          Filesize

          100KB

        • memory/1216-190-0x00007FFB93920000-0x00007FFB93A97000-memory.dmp

          Filesize

          1.5MB

        • memory/1216-189-0x00007FFBA4850000-0x00007FFBA4873000-memory.dmp

          Filesize

          140KB

        • memory/1216-188-0x00007FFBA48C0000-0x00007FFBA48D9000-memory.dmp

          Filesize

          100KB

        • memory/1216-187-0x00007FFBA4B20000-0x00007FFBA4B4D000-memory.dmp

          Filesize

          180KB

        • memory/1216-172-0x00007FFBA4B50000-0x00007FFBA4B73000-memory.dmp

          Filesize

          140KB

        • memory/1216-248-0x00007FFBA4CF0000-0x00007FFBA4CFD000-memory.dmp

          Filesize

          52KB

        • memory/1216-249-0x00007FFB926F0000-0x00007FFB9280C000-memory.dmp

          Filesize

          1.1MB

        • memory/1216-182-0x00007FFBA6670000-0x00007FFBA667F000-memory.dmp

          Filesize

          60KB

        • memory/1216-166-0x00007FFB92810000-0x00007FFB92DF9000-memory.dmp

          Filesize

          5.9MB

        • memory/2356-71-0x00007FFB9ACF0000-0x00007FFB9AD09000-memory.dmp

          Filesize

          100KB

        • memory/2356-81-0x00007FFB91A20000-0x00007FFB91F40000-memory.dmp

          Filesize

          5.1MB

        • memory/2356-131-0x00007FFBA64A0000-0x00007FFBA64AD000-memory.dmp

          Filesize

          52KB

        • memory/2356-132-0x00007FFB93DF0000-0x00007FFB93E23000-memory.dmp

          Filesize

          204KB

        • memory/2356-133-0x00007FFB92740000-0x00007FFB9280D000-memory.dmp

          Filesize

          820KB

        • memory/2356-134-0x00007FFB91A20000-0x00007FFB91F40000-memory.dmp

          Filesize

          5.1MB

        • memory/2356-135-0x00007FFB95910000-0x00007FFB95924000-memory.dmp

          Filesize

          80KB

        • memory/2356-137-0x00007FFB8A740000-0x00007FFB8A85C000-memory.dmp

          Filesize

          1.1MB

        • memory/2356-136-0x00007FFBA4CF0000-0x00007FFBA4CFD000-memory.dmp

          Filesize

          52KB

        • memory/2356-129-0x00007FFB91F40000-0x00007FFB920B7000-memory.dmp

          Filesize

          1.5MB

        • memory/2356-128-0x00007FFB94040000-0x00007FFB94063000-memory.dmp

          Filesize

          140KB

        • memory/2356-127-0x00007FFB9AD40000-0x00007FFB9AD59000-memory.dmp

          Filesize

          100KB

        • memory/2356-31-0x00007FFB92810000-0x00007FFB92DF9000-memory.dmp

          Filesize

          5.9MB

        • memory/2356-125-0x00007FFBA6670000-0x00007FFBA667F000-memory.dmp

          Filesize

          60KB

        • memory/2356-126-0x00007FFB95930000-0x00007FFB9595D000-memory.dmp

          Filesize

          180KB

        • memory/2356-123-0x00007FFB9EE70000-0x00007FFB9EE93000-memory.dmp

          Filesize

          140KB

        • memory/2356-122-0x00007FFB92810000-0x00007FFB92DF9000-memory.dmp

          Filesize

          5.9MB

        • memory/2356-53-0x00007FFB9EE70000-0x00007FFB9EE93000-memory.dmp

          Filesize

          140KB

        • memory/2356-54-0x00007FFBA6670000-0x00007FFBA667F000-memory.dmp

          Filesize

          60KB

        • memory/2356-118-0x00007FFB9EE70000-0x00007FFB9EE93000-memory.dmp

          Filesize

          140KB

        • memory/2356-113-0x00007FFB92810000-0x00007FFB92DF9000-memory.dmp

          Filesize

          5.9MB

        • memory/2356-112-0x00007FFB8A740000-0x00007FFB8A85C000-memory.dmp

          Filesize

          1.1MB

        • memory/2356-62-0x00007FFB9AD40000-0x00007FFB9AD59000-memory.dmp

          Filesize

          100KB

        • memory/2356-60-0x00007FFB95930000-0x00007FFB9595D000-memory.dmp

          Filesize

          180KB

        • memory/2356-65-0x00007FFB91F40000-0x00007FFB920B7000-memory.dmp

          Filesize

          1.5MB

        • memory/2356-66-0x00007FFB94040000-0x00007FFB94063000-memory.dmp

          Filesize

          140KB

        • memory/2356-72-0x00007FFBA64A0000-0x00007FFBA64AD000-memory.dmp

          Filesize

          52KB

        • memory/2356-75-0x00007FFB93DF0000-0x00007FFB93E23000-memory.dmp

          Filesize

          204KB

        • memory/2356-76-0x00007FFB92740000-0x00007FFB9280D000-memory.dmp

          Filesize

          820KB

        • memory/2356-77-0x000002706EC00000-0x000002706F120000-memory.dmp

          Filesize

          5.1MB

        • memory/2356-80-0x00007FFBA4CF0000-0x00007FFBA4CFD000-memory.dmp

          Filesize

          52KB

        • memory/2356-130-0x00007FFB9ACF0000-0x00007FFB9AD09000-memory.dmp

          Filesize

          100KB

        • memory/2356-82-0x00007FFB95910000-0x00007FFB95924000-memory.dmp

          Filesize

          80KB

        • memory/3572-124-0x00007FFB8F820000-0x00007FFB902E1000-memory.dmp

          Filesize

          10.8MB

        • memory/3572-110-0x000001BB34880000-0x000001BB34890000-memory.dmp

          Filesize

          64KB

        • memory/3572-105-0x00007FFB8F820000-0x00007FFB902E1000-memory.dmp

          Filesize

          10.8MB

        • memory/3572-107-0x000001BB34880000-0x000001BB34890000-memory.dmp

          Filesize

          64KB

        • memory/3572-106-0x000001BB34880000-0x000001BB34890000-memory.dmp

          Filesize

          64KB

        • memory/4876-213-0x000001DF1F0E0000-0x000001DF1F0F0000-memory.dmp

          Filesize

          64KB

        • memory/4876-230-0x000001DF1F0E0000-0x000001DF1F0F0000-memory.dmp

          Filesize

          64KB

        • memory/4876-232-0x00007FFB8FA50000-0x00007FFB90511000-memory.dmp

          Filesize

          10.8MB

        • memory/4876-225-0x000001DF1F0E0000-0x000001DF1F0F0000-memory.dmp

          Filesize

          64KB

        • memory/4876-201-0x00007FFB8FA50000-0x00007FFB90511000-memory.dmp

          Filesize

          10.8MB

        • memory/4892-108-0x0000014C6F4F0000-0x0000014C6F500000-memory.dmp

          Filesize

          64KB

        • memory/4892-89-0x0000014C6F500000-0x0000014C6F522000-memory.dmp

          Filesize

          136KB

        • memory/4892-99-0x00007FFB8F820000-0x00007FFB902E1000-memory.dmp

          Filesize

          10.8MB

        • memory/4892-109-0x0000014C6F4F0000-0x0000014C6F500000-memory.dmp

          Filesize

          64KB

        • memory/4892-104-0x0000014C6F4F0000-0x0000014C6F500000-memory.dmp

          Filesize

          64KB

        • memory/4892-117-0x00007FFB8F820000-0x00007FFB902E1000-memory.dmp

          Filesize

          10.8MB

        • memory/4892-116-0x0000014C6F4F0000-0x0000014C6F500000-memory.dmp

          Filesize

          64KB

        • memory/4996-220-0x000001D4682A0000-0x000001D4682B0000-memory.dmp

          Filesize

          64KB

        • memory/4996-211-0x00007FFB8FA50000-0x00007FFB90511000-memory.dmp

          Filesize

          10.8MB

        • memory/4996-212-0x000001D4682A0000-0x000001D4682B0000-memory.dmp

          Filesize

          64KB

        • memory/4996-234-0x00007FFB8FA50000-0x00007FFB90511000-memory.dmp

          Filesize

          10.8MB

        • memory/4996-227-0x000001D4682A0000-0x000001D4682B0000-memory.dmp

          Filesize

          64KB